{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,9]],"date-time":"2024-07-09T12:02:31Z","timestamp":1720526551154},"reference-count":19,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers & Electrical Engineering"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1016\/j.compeleceng.2022.107698","type":"journal-article","created":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T14:11:13Z","timestamp":1643724673000},"page":"107698","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":7,"special_numbering":"C","title":["Efficient and lightweight protocol for anti-jamming communications in wireless body area networks"],"prefix":"10.1016","volume":"98","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-7672-7917","authenticated-orcid":false,"given":"Feriel","family":"Cherifi","sequence":"first","affiliation":[]},{"given":"Mawloud","family":"Omar","sequence":"additional","affiliation":[]},{"given":"Tinhinane","family":"Chenache","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2056-1177","authenticated-orcid":false,"given":"Sylia","family":"Radji","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.compeleceng.2022.107698_b1","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.compeleceng.2016.03.007","article-title":"Random codekey selection using codebook without pre-shared keys for anti-jamming in WBAN","volume":"51","author":"Gopalakrishnan","year":"2016","journal-title":"Comput Electr Eng"},{"key":"10.1016\/j.compeleceng.2022.107698_b2","first-page":"559","article-title":"Security vulnerabilities and countermeasures against jamming attacks in wireless sensor networks : A survey sign in or purchase","author":"Jaitly","year":"2017","journal-title":"Computer Commun Electron (Comptelix), IEEE Int Conf"},{"issue":"8","key":"10.1016\/j.compeleceng.2022.107698_b3","doi-asserted-by":"crossref","first-page":"1119","DOI":"10.1109\/TMC.2010.75","article-title":"Optimal jamming attack strategies and network defense policies in wireless sensor networks","volume":"9","author":"Li","year":"2010","journal-title":"IEEE Trans Mob Comput"},{"key":"10.1016\/j.compeleceng.2022.107698_b4","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.ijpe.2015.11.008","article-title":"Jamming attacks on wireless networks : A taxonomic survey","volume":"172","author":"Vadlamani","year":"2016","journal-title":"Int J Prod Econ"},{"issue":"11","key":"10.1016\/j.compeleceng.2022.107698_b5","doi-asserted-by":"crossref","first-page":"1433","DOI":"10.1109\/26.729385","article-title":"Chaotic frequency hopping sequences","volume":"46","author":"Cong","year":"1998","journal-title":"IEEE Trans Commun"},{"key":"10.1016\/j.compeleceng.2022.107698_b6","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2019.2960617","article-title":"Security and privacy for the internet of medical things enabled healthcare systems: A survey","volume":"7","author":"Sun","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2022.107698_b7","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1016\/j.comcom.2020.06.026","article-title":"Securing internet of medical things with friendly-jamming schemes","volume":"160","author":"Li","year":"2020","journal-title":"Comput Commun"},{"key":"10.1016\/j.compeleceng.2022.107698_b8","unstructured":"Geron A. WiFi Professionnel la norme 802.11, le d\u00e9ploiement, la s\u00e9curit\u00e9, 3rd edition, Paris, Dunod; 2009."},{"issue":"6","key":"10.1016\/j.compeleceng.2022.107698_b9","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1049\/htl.2017.0041","article-title":"Anti-jamming communication for body area network using chaotic frequency hopping","volume":"4","author":"Gopalakrishnan","year":"2017","journal-title":"Healthc Technol Lett"},{"issue":"8","key":"10.1016\/j.compeleceng.2022.107698_b10","doi-asserted-by":"crossref","first-page":"5733","DOI":"10.1109\/TWC.2016.2569083","article-title":"United against the enemy : Anti-jamming based on cross-layer cooperation in wireless networks","volume":"15","author":"Zhang","year":"2016","journal-title":"World Symp Comput Appl Res (WSCAR) IEEE Trans Wirel Commun"},{"key":"10.1016\/j.compeleceng.2022.107698_b11","doi-asserted-by":"crossref","unstructured":"Heo J, Kim J-J, Paek J, Bahk S. Dodge-jam : Anti-jamming technique for low-power and lossy wireless networks. In: 14th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), San Diego, CA; 2017, p. 1\u20139.","DOI":"10.1109\/SAHCN.2017.7964926"},{"issue":"2","key":"10.1016\/j.compeleceng.2022.107698_b12","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1109\/LCOMM.2017.2773466","article-title":"Robust relay beamforming against jamming attack","volume":"22","author":"Sadr","year":"2018","journal-title":"IEEE Commun Lett"},{"issue":"10","key":"10.1016\/j.compeleceng.2022.107698_b13","doi-asserted-by":"crossref","DOI":"10.1109\/TCOMM.2020.3007742","article-title":"Reinforcement learning-based mobile offloading for edge computing against jamming and interference","volume":"68","author":"Xiao","year":"2020","journal-title":"IEEE Trans Commun"},{"key":"10.1016\/j.compeleceng.2022.107698_b14","first-page":"1","article-title":"New Slot-Head Jamming Attack and mitigation mechanism for Wireless Body Area networks","author":"Achour","year":"2018","journal-title":"Glob Commun Conf"},{"key":"10.1016\/j.compeleceng.2022.107698_b15","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/WSCAR.2016.19","article-title":"A hybrid DS-FH-THSS based approach anti-jamming in wireless sensor networks","author":"Rouissi","year":"2016","journal-title":"World Symp Comput Appl Res (WSCAR)"},{"issue":"6","key":"10.1016\/j.compeleceng.2022.107698_b16","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Trans Inform Theory"},{"issue":"2","key":"10.1016\/j.compeleceng.2022.107698_b17","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1049\/iet-wss.2017.0048","article-title":"\u03bcKMS: Micro key management system for WSNs","volume":"8","author":"Aissani","year":"2018","journal-title":"IET Wirel Sens Syst"},{"issue":"9","key":"10.1016\/j.compeleceng.2022.107698_b18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-015-0277-4","article-title":"Strategies for optimal mac parameters tuning in ieee 802.15.6 wearable wireless sensor networks","volume":"39","author":"Alam","year":"2015","journal-title":"J Med Syst"},{"key":"10.1016\/j.compeleceng.2022.107698_b19","article-title":"A one-leader multi-follower Bayesian-Stackelberg game for anti-jamming transmission in UAV communication networks","volume":"6","author":"Xu","year":"2018","journal-title":"IEEE Access"}],"container-title":["Computers & Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790622000180?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790622000180?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T22:57:16Z","timestamp":1672613836000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790622000180"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":19,"alternative-id":["S0045790622000180"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107698","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2022,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Efficient and lightweight protocol for anti-jamming communications in wireless body area networks","name":"articletitle","label":"Article Title"},{"value":"Computers & Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107698","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"107698"}}