iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1016/J.JNCA.2021.103037
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T13:27:12Z","timestamp":1719926832932},"reference-count":30,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/100014048","name":"RDECOM CERDEC NVESD","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100014048","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Network and Computer Applications"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1016\/j.jnca.2021.103037","type":"journal-article","created":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T07:24:14Z","timestamp":1615274654000},"page":"103037","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":6,"special_numbering":"C","title":["Advanced protocols for the mitigation of friendly jamming in mobile ad-hoc networks"],"prefix":"10.1016","volume":"181","author":[{"given":"Jonghyun","family":"Kim","sequence":"first","affiliation":[]},{"given":"Pratik K.","family":"Biswas","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5424-4586","authenticated-orcid":false,"given":"Stephan","family":"Bohacek","sequence":"additional","affiliation":[]},{"given":"Sharon J.","family":"Mackey","sequence":"additional","affiliation":[]},{"given":"Siamak","family":"Samoohi","sequence":"additional","affiliation":[]},{"given":"Mitesh P.","family":"Patel","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jnca.2021.103037_bib1","series-title":"The Annual IEEE International Conference on Computer Communications (INFOCOM)","article-title":"On the performance of IEEE 802.11 under jamming","author":"Bayraktaroglu","year":"2008"},{"key":"10.1016\/j.jnca.2021.103037_bib2","series-title":"The 6th International Conference on Emerging Technologies (ICET)","article-title":"Engaging the jammer on the jammed channel in MANET","author":"Beg","year":"2010"},{"key":"10.1016\/j.jnca.2021.103037_bib3","series-title":"Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks","first-page":"105","article-title":"Gaining insight on friendly jamming in a real-world IEEE 802.11 network\u201d","author":"Berger","year":"2014"},{"key":"10.1016\/j.jnca.2021.103037_bib4","series-title":"The Optimized Link State Routing Protocol Version 2 Draft-Ietf-Manet-Olsrv2-19","author":"Clausen","year":"2013"},{"key":"10.1016\/j.jnca.2021.103037_bib5","series-title":"RFC 2501: Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations","author":"Corson","year":"1999"},{"key":"10.1016\/j.jnca.2021.103037_bib6","series-title":"The IEEE International Conference on Sensing, Communications and Networking (SECON)","article-title":"How to jam without getting caught: analysis and empirical study of stealthy periodic jamming","author":"DeBruhl","year":"2013"},{"issue":"7","key":"10.1016\/j.jnca.2021.103037_bib7","article-title":"MPH-M, AODV-M and DSR-M performance evaluation under jamming attacks","volume":"17","author":"Del-Valle-Sotto","year":"2017","journal-title":"Sensors"},{"key":"10.1016\/j.jnca.2021.103037_bib8","series-title":"Proc. IEEE GLOBECOM, Dec","article-title":"Supporting PHY-layer security in multi-link wireless networks using friendly jamming","author":"Eletreby","year":"2015"},{"key":"10.1016\/j.jnca.2021.103037_bib9","series-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","author":"Garey","year":"1978"},{"key":"10.1016\/j.jnca.2021.103037_bib10","series-title":"Proc. of Multi Topic Conference, 2001","article-title":"Optimized link state routing protocol for ad hoc networks","author":"Jacquet","year":"2001"},{"key":"10.1016\/j.jnca.2021.103037_bib11","article-title":"Jamming attacks impact on the performance of mobile ad-hoc network and improvement using MANET routing protocols","volume":"3","author":"Jasim","year":"2013","journal-title":"Int. J. Eng. Adv. Technol."},{"key":"10.1016\/j.jnca.2021.103037_bib12","first-page":"437","article-title":"Mitigating the impact of jamming attack by using antenna patterns in MANET","volume":"2","author":"Kaur","year":"2012","journal-title":"VSRD International Journal of Computer Science and Information Technology"},{"key":"10.1016\/j.jnca.2021.103037_bib13","series-title":"Proceedings of 2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC), Orlando, Fl., USA","article-title":"Friendly-jamming-aware routing protocols for tactical networks","author":"Kim","year":"2018"},{"key":"10.1016\/j.jnca.2021.103037_bib14","series-title":"Proc. of IEEE 18th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), June 12-15","article-title":"Friendly Jamming: an anti-eavesdropping scheme in wireless networks","author":"Li","year":"2017"},{"key":"10.1016\/j.jnca.2021.103037_bib15","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1016\/j.comcom.2020.06.026","article-title":"Securing Internet of medical Things with friendly jamming schemes","volume":"160","author":"Li","year":"2020","journal-title":"Elsevier Comput. Commun."},{"issue":"1","key":"10.1016\/j.jnca.2021.103037_bib16","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1109\/TWC.2015.2474378","article-title":"Secure communication with a wireless powered friendly jammer","volume":"15","author":"Liu","year":"2015","journal-title":"IEEE Trans. Wireless Commun."},{"key":"10.1016\/j.jnca.2021.103037_bib17","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1109\/SURV.2011.041110.00022","article-title":"Denial of service attacks in wireless networks: the case of jammers","volume":"13","author":"Pelechrinis","year":"2011","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.jnca.2021.103037_bib18","article-title":"Routing protocols in mobile ad-hoc network: a review","volume":"vol. 115","author":"Renu","year":"2013"},{"issue":"10","key":"10.1016\/j.jnca.2021.103037_bib19","doi-asserted-by":"crossref","first-page":"6828","DOI":"10.1109\/TWC.2016.2591016","article-title":"Energy-efficient routing in wireless networks in the presence of jamming","volume":"15","author":"Sheikholeslami","year":"2016","journal-title":"IEEE Trans. Wireless Commun."},{"key":"10.1016\/j.jnca.2021.103037_bib20","series-title":"Proc. of IEEE Symposium on Security and Privay","article-title":"Ally friendly jamming: how to jam your enemy and maintain your own wireless connectivity at the same time","author":"Shen","year":"2013"},{"issue":"9","key":"10.1016\/j.jnca.2021.103037_bib21","doi-asserted-by":"crossref","DOI":"10.1109\/TMC.2009.33","article-title":"Mitigation of control channel jamming under node capture attacks","volume":"8","author":"Tague","year":"2009","journal-title":"IEEE Trans. Mobile Comput."},{"key":"10.1016\/j.jnca.2021.103037_bib22","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1109\/TNET.2010.2057515","article-title":"Jamming-aware traffic allocation for multiple-path routing using portfolio selection","volume":"19","author":"Tague","year":"2011","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"10.1016\/j.jnca.2021.103037_bib23","series-title":"Proc. IEEE Military Communications Conference (MILCOM\u201906), Washington, DC, USA, Oct","article-title":"A\u00a0cross-layer approach to detect jamming attacks in wireless ad hoc networks","author":"Thamilarasu","year":"2006"},{"key":"10.1016\/j.jnca.2021.103037_bib24","series-title":"MILCOM\u201906, Washington, DC","article-title":"Intelligent jamming in wireless networks with applications to 802.11b and other networks","author":"Thuente","year":"2006"},{"key":"10.1016\/j.jnca.2021.103037_bib25","series-title":"Principles of Secure Communication Systems","author":"Torrieri","year":"1992"},{"key":"10.1016\/j.jnca.2021.103037_bib26","article-title":"Optimal scheduling of friendly jammers for secring wireless communication","volume":"1710","author":"Wan","year":"2017","journal-title":"Comput. Res. Repos."},{"key":"10.1016\/j.jnca.2021.103037_bib27","series-title":"Proc. 4th ACM Conference on Wireless Network Security, Hamburg, Germany","article-title":"Reactive jamming in wireless networks: how realistic is the threat?","author":"Wilhelm","year":"2011"},{"issue":"3","key":"10.1016\/j.jnca.2021.103037_bib29","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MNET.2006.1637931","article-title":"Jamming sensor networks: attack and defense strategies","volume":"20","author":"Xu","year":"2006","journal-title":"IEEE Network"},{"key":"10.1016\/j.jnca.2021.103037_bib28","series-title":"The ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)","article-title":"The feasibility of launching and detecting jamming attacks in wireless networks","author":"Xu","year":"2005"},{"key":"10.1016\/j.jnca.2021.103037_bib30","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.adhoc.2010.04.007","article-title":"Multipath optimized link state routing for mobile ad hoc networks","volume":"9","author":"Yi","year":"2011","journal-title":"Ad Hoc Netw."}],"container-title":["Journal of Network and Computer Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1084804521000631?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1084804521000631?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T19:56:36Z","timestamp":1679946996000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1084804521000631"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5]]},"references-count":30,"alternative-id":["S1084804521000631"],"URL":"https:\/\/doi.org\/10.1016\/j.jnca.2021.103037","relation":{},"ISSN":["1084-8045"],"issn-type":[{"value":"1084-8045","type":"print"}],"subject":[],"published":{"date-parts":[[2021,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Advanced protocols for the mitigation of friendly jamming in mobile ad-hoc networks","name":"articletitle","label":"Article Title"},{"value":"Journal of Network and Computer Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jnca.2021.103037","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103037"}}