{"id":"https://openalex.org/W2167210400","doi":"https://doi.org/10.1109/icc.2009.5198912","title":"Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution","display_name":"Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution","publication_year":2009,"publication_date":"2009-06-01","ids":{"openalex":"https://openalex.org/W2167210400","doi":"https://doi.org/10.1109/icc.2009.5198912","mag":"2167210400"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2009.5198912","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2009.5198912","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069874671","display_name":"Ali Hamieh","orcid":"https://orcid.org/0000-0002-5218-3617"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"A. Hamieh","raw_affiliation_strings":["CNRS-PRiSM Laboratory, University of Versailles, Versailles, France"],"affiliations":[{"raw_affiliation_string":"CNRS-PRiSM Laboratory, University of Versailles, Versailles, France","institution_ids":["https://openalex.org/I1294671590"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085749623","display_name":"Jalel Ben\u2010Othman","orcid":"https://orcid.org/0000-0001-6942-5435"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"J. Ben-Othman","raw_affiliation_strings":["CNRS-PRiSM Laboratory, University of Versailles, Versailles, France"],"affiliations":[{"raw_affiliation_string":"CNRS-PRiSM Laboratory, University of Versailles, Versailles, France","institution_ids":["https://openalex.org/I1294671590"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5069874671"],"corresponding_institution_ids":["https://openalex.org/I1294671590"],"apc_list":null,"apc_paid":null,"fwci":4.1142,"has_fulltext":false,"cited_by_count":68,"citation_normalized_percentile":{"value":0.9458388,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8225435614585876},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.8066909909248352},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.7521700859069824},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6732540130615234},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.6715742349624634},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.6594475507736206},{"id":"https://openalex.org/keywords/ad-hoc-wireless-distribution-service","display_name":"Ad hoc wireless distribution service","score":0.5747442245483398},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.5468035936355591},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.5209544897079468},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4911291301250458},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4776531457901001},{"id":"https://openalex.org/keywords/adaptive-quality-of-service-multi-hop-routing","display_name":"Adaptive quality of service multi-hop routing","score":0.43434906005859375},{"id":"https://openalex.org/keywords/optimized-link-state-routing-protocol","display_name":"Optimized Link State Routing Protocol","score":0.43180179595947266},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4172232747077942},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.41643691062927246},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2063390612602234},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.08118119835853577}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8225435614585876},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8066909909248352},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.7521700859069824},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6732540130615234},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.6715742349624634},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.6594475507736206},{"id":"https://openalex.org/C190526755","wikidata":"https://www.wikidata.org/wiki/Q4678071","display_name":"Ad hoc wireless distribution service","level":5,"score":0.5747442245483398},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.5468035936355591},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.5209544897079468},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4911291301250458},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4776531457901001},{"id":"https://openalex.org/C32244324","wikidata":"https://www.wikidata.org/wiki/Q4680755","display_name":"Adaptive quality of service multi-hop routing","level":5,"score":0.43434906005859375},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.43180179595947266},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4172232747077942},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.41643691062927246},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2063390612602234},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.08118119835853577},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2009.5198912","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2009.5198912","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1624921370","https://openalex.org/W2015306478","https://openalex.org/W2087903610","https://openalex.org/W2124280970","https://openalex.org/W2133282516","https://openalex.org/W2135421257","https://openalex.org/W2136032111","https://openalex.org/W2153526702","https://openalex.org/W2162067775","https://openalex.org/W6654252001"],"related_works":["https://openalex.org/W2099860032","https://openalex.org/W42887645","https://openalex.org/W2018142708","https://openalex.org/W2347424268","https://openalex.org/W3135686529","https://openalex.org/W2060613440","https://openalex.org/W2077426240","https://openalex.org/W2368919087","https://openalex.org/W2487621230","https://openalex.org/W2169952094"],"abstract_inverted_index":{"Mobile":[0],"ad":[1,18,53],"hoc":[2,19,54],"networks":[3,20,63],"are":[4,47],"a":[5,76,87,105,112,127],"new":[6,128],"wireless":[7,16,94],"networking":[8],"paradigm":[9],"for":[10],"mobile":[11,15],"hosts.":[12],"Unlike":[13],"traditional":[14],"networks,":[17],"do":[21],"not":[22],"rely":[23,30],"on":[24,31],"any":[25],"fixed":[26],"infrastructure.":[27],"Instead,":[28],"hosts":[29],"each":[32],"other":[33,43],"to":[34,67,90],"keep":[35],"the":[36,49,117,136],"network":[37],"connected.":[38],"The":[39,84],"military":[40],"tactical":[41],"and":[42],"security-":[44],"sensitive":[45],"operations":[46],"still":[48],"main":[50,57],"applications":[51],"of":[52,61,79,86,119,130,132,138],"networks.":[55],"One":[56],"challenge":[58],"in":[59,124],"design":[60],"these":[62],"is":[64,89],"their":[65],"vulnerability":[66],"Denial-of-Service":[68],"(DoS)":[69],"attacks.":[70],"In":[71],"this":[72,100,125],"paper,":[73],"we":[74],"consider":[75],"particular":[77],"class":[78],"DoS":[80],"attacks":[81],"called":[82],"Jamming.":[83],"objective":[85],"jammer":[88,97],"interfere":[91],"with":[92],"legitimate":[93,120],"communications.":[95],"A":[96],"can":[98],"achieve":[99],"goal":[101],"by":[102,115,135],"either":[103],"preventing":[104,116],"real":[106],"traffic":[107],"source":[108],"from":[109],"sending":[110],"out":[111],"packet,":[113],"or":[114],"reception":[118],"packets.":[121],"We":[122],"propose":[123],"study":[126],"method":[129],"detection":[131],"such":[133],"attack":[134],"measurement":[137],"error":[139],"distribution.":[140]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":10},{"year":2013,"cited_by_count":7},{"year":2012,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
