{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:23:18Z","timestamp":1725459798146},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642354151"},{"type":"electronic","value":"9783642354168"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35416-8_22","type":"book-chapter","created":{"date-parts":[[2012,11,15]],"date-time":"2012-11-15T03:35:58Z","timestamp":1352950558000},"page":"312-327","source":"Crossref","is-referenced-by-count":0,"title":["On Trigger Detection against Reactive Jamming Attacks: A Localized Solution"],"prefix":"10.1007","author":[{"given":"Incheol","family":"Shin","sequence":"first","affiliation":[]},{"given":"Sinkyu","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jungtaek","family":"Seo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Bellardo, J., Savage, S.: 802.11 Denail-of-Service Sttacks: Real Vulnerabilities and Practical Solutions. In: Proceedings of the 12th Conference on USENIX Security Symposium (2003)"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Sidek, O., Yahya, A.: Reed Solomon Coding for Frequency Hopping Spread Spectrum in Jamming Environment. American Journal of Applied Sciences (2008)","DOI":"10.3844\/ajassp.2008.1281.1284"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Chiang, T., Hu, Y.: Dynamic Jamming Mitigation for Wireless Broadcast Networks. In: INFOCOM (2008)","DOI":"10.1109\/INFOCOM.2008.177"},{"key":"22_CR4","unstructured":"Desmedt, Y., Safavi-Naini, R., Wang, H., Charnes, C., Pieprzyk, J.: Broadcast Anti-Jamming Systems. Computer Networks, 349\u2013355 (1999)"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-540-88582-5_36","volume-title":"Wireless Algorithms, Systems, and Applications","author":"Q. Ling","year":"2008","unstructured":"Ling, Q., Ren, J., Li, T.: Message-Driven Frequency Hopping \u2014 Design and Analysis. In: Li, Y., Huynh, D.T., Das, S.K., Du, D.-Z. (eds.) WASA 2008. LNCS, vol.\u00a05258, pp. 373\u2013384. Springer, Heidelberg (2008)"},{"key":"22_CR6","unstructured":"Wood, A., Stankovic, J., Son, S.: A Jammed-Area Mapping Service for Sensor Networks. In: Proceedings of the 24th IEEE International Real-Time System Symposium, vol.\u00a078, pp. 286\u2013297 (2003)"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Strasser, M., Popper, C., Capkun, S., Cagalj, M.: Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, pp. 80\u201389 (2008)","DOI":"10.1109\/SP.2008.9"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Xu, W., Wood, T., Trappe, W., Zhang, Y.: Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service. In: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 80\u201389 (2004)","DOI":"10.1145\/1023646.1023661"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Xu, W., Trappe, W., Zhang, Y.: Channel Surfing: Defending Wireless Sensor Networks from Interference. In: Proceedings of the 6th International Conference on Information Processing in Sensor Networks, pp. 499\u2013508 (2007)","DOI":"10.1109\/IPSN.2007.4379710"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Shin, I., Shen, Y., Xuan, Y., Thai, M., Znati, T.: Reactive Jamming Attacks in Multi-Radio Wireless Sensor Networks: an Efficient Mitigating Measure by Identifying Trigger Nodes. In: Proceedings of the 2nd ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing, FOWANC 2009, pp. 87\u201396 (2009)","DOI":"10.1145\/1540343.1540357"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Xuan, Y., Shin, I., Thai, M.: On Trigger Detection against Reactive Jamming Attacks: A Clique-Independent Set Based Approach. In: Performance Computing and Communications Conference (IPCCC), pp. 223\u2013230 (2009)","DOI":"10.1109\/PCCC.2009.5403842"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Xu, W., Trappe, W., Zhang, Y., Wood, T.: The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 46\u201357 (2005)","DOI":"10.1145\/1062689.1062697"},{"key":"22_CR13","unstructured":"Sen, A., Roxborough, T., Sinha, B.: On an Optimal Algorithm for Channel Assignment in Cellular Networks. In: IEEE International Conference on Communications (1999)"},{"key":"22_CR14","unstructured":"Niculescu, D., Nath, B.: Ad Hoc Positioning System (APS) using AOA. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2003 (2003)"},{"key":"22_CR15","unstructured":"Niculescu, D., Nath, B.: Ad Hoc Positioning System (APS) using AOA. In: GLOBECOM 2001 (2001)"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Thai, M., Tiwari, R., Du, D.: On Construction of Virtual Backbone in Wireless Ad Hoc Networks with Unidirectional Links. IEEE Transactions on Mobile Computing, TMC (2008)","DOI":"10.1109\/TMC.2008.22"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35416-8_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T13:15:17Z","timestamp":1620134117000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35416-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642354151","9783642354168"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35416-8_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}