{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:01:56Z","timestamp":1763017316819},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,8,15]],"date-time":"2013-08-15T00:00:00Z","timestamp":1376524800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1186\/1687-1499-2013-208","type":"journal-article","created":{"date-parts":[[2013,8,15]],"date-time":"2013-08-15T15:06:29Z","timestamp":1376579189000},"source":"Crossref","is-referenced-by-count":45,"title":["Detection of jamming attacks in 802.11b wireless networks"],"prefix":"10.1186","volume":"2013","author":[{"given":"Nadeem","family":"Sufyan","sequence":"first","affiliation":[]},{"given":"Nazar Abbass","family":"Saqib","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Zia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,8,15]]},"reference":[{"key":"785_CR1","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1145\/1062689.1062697","volume-title":"Proceedings of the 6th ACM International Symposium on Mobile ad hoc Networking and Computing (MobiHoc 2005)","author":"W Xu","year":"2005","unstructured":"Xu W, Trappe W, Zhang Y, Wood T: The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM International Symposium on Mobile ad hoc Networking and Computing (MobiHoc 2005). New York,USA; May 2005:46-57."},{"key":"785_CR2","volume-title":"Proceedings of the 27th Conference on Computer Communications(INFOCOM \u201908)","author":"E Bayrataroglu","year":"2008","unstructured":"Bayrataroglu E, King C, Liu X, Noubir G, Rajaraman R, Thapa B: On the performance of IEEE 802.11 under jamming. In Proceedings of the 27th Conference on Computer Communications(INFOCOM \u201908). Phoenix AZ, USA; 13\u201318 Apr 2008."},{"key":"785_CR3","first-page":"1","volume-title":"International Conference on Communications (ICC \u201909)","author":"A Hamieh","year":"2009","unstructured":"Hamieh A, Ben-Othman J: Detection of jamming attacks in wireless Ad Hoc networks using error distribution. In International Conference on Communications (ICC \u201909). Dresden, Germany; 14\u201318 Jun 2009:1-6."},{"key":"785_CR4","first-page":"105","volume-title":"Proceedings of the 7th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE \u201910)","author":"X Zou","year":"2010","unstructured":"Zou X, Deng J: Detection of fabricated CTS packet attacks in wireless LANs. In Proceedings of the 7th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE \u201910). Houston,USA; 17\u201319 Nov 2010:105-115."},{"key":"785_CR5","first-page":"57","volume-title":"Proceeding of the 6thInternational Wireless Communications and Mobile Computing Conference","author":"X Zou","year":"2010","unstructured":"Zou X, Deng J: Detecting and mitigating the impact of wideband jammers in IEEE 802.11 WLANS. In Proceeding of the 6thInternational Wireless Communications and Mobile Computing Conference. New York: ACM; 2010:57-61."},{"key":"785_CR6","first-page":"721","volume-title":"International Conference on Networking Sensing and Control","author":"M Yu","year":"2010","unstructured":"Yu M, Su W, Zhou M: A new approach to detect radio jamming attacks in wireless networks. In International Conference on Networking Sensing and Control. Chicago,USA; 10\u201312 Apr 2010:721-726."},{"key":"785_CR7","first-page":"1075","volume-title":"Proceedings of the IEEE MILCOM IEEE","author":"D Thuente","year":"2006","unstructured":"Thuente D, Acharya M: Intelligent jamming in wireless networks with applications to 802.11b and other networks. In Proceedings of the IEEE MILCOM IEEE. NJ, USA: Piscataway; 2006:1075-1081."},{"key":"785_CR8","unstructured":"Wikipedia . Accessed 23 Jun 2012 http:\/\/en.wikipedia.org\/wiki\/Shot"},{"key":"785_CR9","first-page":"1","volume-title":"Proceedings of the 8th International Conference on Wireless and Optical Communications Networks","author":"A Hussain","year":"2011","unstructured":"Hussain A, Saqib NA: Protocol aware shot-noise based radio frequency jamming method in 802.11 networks. In Proceedings of the 8th International Conference on Wireless and Optical Communications Networks. Paris,France; 24\u201326 May 2011:1-6."},{"key":"785_CR10","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1109\/SURV.2011.041110.00022","volume":"13","author":"K Pelechrinis","year":"2010","unstructured":"Pelechrinis K, Iliofotou M, Krishnamurthy V: Denial of service attacks in wireless networks: the case of jammers. Communications Surveys and Tutorials 2010, 13: 245-257.","journal-title":"Communications Surveys and Tutorials"},{"key":"785_CR11","doi-asserted-by":"crossref","unstructured":"Bianchi G: On performance analysis of the ieee802.11 distributed coordination function. IEEE J. Selected Areas, Commun 2000., 18(3):","DOI":"10.1109\/49.840210"},{"key":"785_CR12","volume-title":"Introduction to Probability Models","author":"SM Ross","year":"2006","unstructured":"Ross SM: Introduction to Probability Models. Orlando: Academic Press; 2006."},{"key":"785_CR13","unstructured":"Ettus Research , Accessed 3 Mar 2012 https:\/\/www.ettus.com\/product\/details\/UN210-KIT"},{"key":"785_CR14","unstructured":"PCMCIA , Accessed 9 Apr 2012 http:\/\/www.egr.msu.edu\/waves\/people\/Ali.htm"},{"key":"785_CR15","first-page":"1181","volume-title":"26th IEEE International Conference on Computer Communications","author":"G Bianchi","year":"2007","unstructured":"Bianchi G, Di Stefano A, Giaconia C, Scalia L, Terrazzino G, Tinnirello I: Experimental assessment of the backoff behavior of commercial IEEE 802.11b Network Cards. In 26th IEEE International Conference on Computer Communications. Anchorage, Alaska, USA; 6\u201312 May 2007:1181-1189."},{"key":"785_CR16","first-page":"1","volume-title":"Proceedings of the 6th IEEE Consumer Communications and Networking Conference (CCNC 2009)","author":"O Alay","year":"2009","unstructured":"Alay O, Korakis T, Wang Y, Panwar S: An experimental study of packet loss and forward error correction in video multicast over IEEE 802.11b network. In Proceedings of the 6th IEEE Consumer Communications and Networking Conference (CCNC 2009). Las Vegas, Nevada, USA; 10\u201313 Jan 2009:1-5."},{"key":"785_CR17","unstructured":"Wikipedia . Accessed 23 Jun 2012 http:\/\/en.wikipedia.org\/wiki\/Modulation"},{"key":"785_CR18","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1145\/1282427.1282424","volume":"37","author":"R Gummadi","year":"2007","unstructured":"Gummadi R, Wetherall D, Greenstein B, Seshan S: Understanding and mitigating the impact of RF interference on 802.11 networks. SIGCOMM Comput. Commun. Rev 2007, 37: 385-396. 10.1145\/1282427.1282424","journal-title":"SIGCOMM Comput. Commun. Rev"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2013-208\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-208.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-208.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,21]],"date-time":"2019-07-21T01:20:24Z","timestamp":1563672024000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2013-208"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,15]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["785"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2013-208","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8,15]]},"article-number":"208"}}