{"id":"https://openalex.org/W4285813888","doi":"https://doi.org/10.1109/iwcmc55113.2022.9824968","title":"Impact of Jamming on Real Life LTE Networks: Experimental Results","display_name":"Impact of Jamming on Real Life LTE Networks: Experimental Results","publication_year":2022,"publication_date":"2022-05-30","ids":{"openalex":"https://openalex.org/W4285813888","doi":"https://doi.org/10.1109/iwcmc55113.2022.9824968"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc55113.2022.9824968","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc55113.2022.9824968","pdf_url":null,"source":{"id":"https://openalex.org/S4363605313","display_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042084195","display_name":"NYA K. Narcisse","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"NYA K. Narcisse","raw_affiliation_strings":["KEAS Group,Grenoble,France","KEAS Group, Grenoble, France"],"affiliations":[{"raw_affiliation_string":"KEAS Group,Grenoble,France","institution_ids":[]},{"raw_affiliation_string":"KEAS Group, Grenoble, France","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039147803","display_name":"Laurent Damon","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Laurent Damon","raw_affiliation_strings":["KEAS Group,Grenoble,France","KEAS Group, Grenoble, France"],"affiliations":[{"raw_affiliation_string":"KEAS Group,Grenoble,France","institution_ids":[]},{"raw_affiliation_string":"KEAS Group, Grenoble, France","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113660909","display_name":"Guillaume Bossard","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guillaume Bossard","raw_affiliation_strings":["KEAS Group,Grenoble,France","KEAS Group, Grenoble, France"],"affiliations":[{"raw_affiliation_string":"KEAS Group,Grenoble,France","institution_ids":[]},{"raw_affiliation_string":"KEAS Group, Grenoble, France","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5042084195"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.9657,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.67827084,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"3","issue":null,"first_page":"248","last_page":"253"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.9566761255264282},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7006458044052124},{"id":"https://openalex.org/keywords/near-far-problem","display_name":"Near-far problem","score":0.5889888405799866},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.576296329498291},{"id":"https://openalex.org/keywords/lte-advanced","display_name":"LTE Advanced","score":0.45962417125701904},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4556858539581299},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3605833649635315},{"id":"https://openalex.org/keywords/telecommunications-link","display_name":"Telecommunications link","score":0.24310293793678284},{"id":"https://openalex.org/keywords/code-division-multiple-access","display_name":"Code division multiple access","score":0.11293575167655945}],"concepts":[{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.9566761255264282},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7006458044052124},{"id":"https://openalex.org/C89719804","wikidata":"https://www.wikidata.org/wiki/Q6984333","display_name":"Near-far problem","level":3,"score":0.5889888405799866},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.576296329498291},{"id":"https://openalex.org/C17652562","wikidata":"https://www.wikidata.org/wiki/Q1345402","display_name":"LTE Advanced","level":3,"score":0.45962417125701904},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4556858539581299},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3605833649635315},{"id":"https://openalex.org/C138660444","wikidata":"https://www.wikidata.org/wiki/Q5607897","display_name":"Telecommunications link","level":2,"score":0.24310293793678284},{"id":"https://openalex.org/C47696715","wikidata":"https://www.wikidata.org/wiki/Q233394","display_name":"Code division multiple access","level":2,"score":0.11293575167655945},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc55113.2022.9824968","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc55113.2022.9824968","pdf_url":null,"source":{"id":"https://openalex.org/S4363605313","display_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W47630388","https://openalex.org/W1869681984","https://openalex.org/W1992174576","https://openalex.org/W2064085910","https://openalex.org/W2083164542","https://openalex.org/W2110793865","https://openalex.org/W2135842153","https://openalex.org/W2137898377","https://openalex.org/W2183080147","https://openalex.org/W2280912016","https://openalex.org/W2287724167","https://openalex.org/W2337120071","https://openalex.org/W2962983518","https://openalex.org/W6601962281","https://openalex.org/W6686148627","https://openalex.org/W6743717967"],"related_works":["https://openalex.org/W2400042297","https://openalex.org/W2368768979","https://openalex.org/W2556127377","https://openalex.org/W2116514861","https://openalex.org/W2003014326","https://openalex.org/W2342236755","https://openalex.org/W4205462601","https://openalex.org/W3217715525","https://openalex.org/W4312068168","https://openalex.org/W2477235677"],"abstract_inverted_index":{"Jamming":[0],"is":[1,63,160],"a":[2,8],"solution":[3],"often":[4],"considered":[5],"to":[6,20,43,53,64,99,122,126,137,164],"create":[7],"non-LTE":[9],"area":[10],"in":[11,58,75,90,134,149],"critical":[12],"geographic":[13],"zones":[14],"such":[15],"as":[16,93,152],"prisons":[17],"where":[18],"access":[19],"public":[21],"networks":[22],"causes":[23],"security":[24],"problems.":[25],"Several":[26],"studies":[27],"have":[28],"analyzed":[29],"LTE":[30,52,70,98,109,159,166],"channels":[31,42,86,116],"based":[32],"on":[33,106],"3GPP":[34],"specifications":[35],"and":[36,87,117],"point":[37],"out":[38,105],"the":[39,81,84,91,94,127,150,153],"most":[40,154],"vulnerable":[41,121,133],"jamming.":[44,100],"In":[45],"this":[46],"paper,":[47],"we":[48,79,111,143],"examine":[49],"vulnerabilities":[50,82],"of":[51,83,97],"jamming":[54,67,123,147,156],"through":[55,102],"experimental":[56],"testing":[57],"commercial":[59,76],"networks.":[60],"Our":[61],"aim":[62],"identify":[65],"efficient":[66,155],"strategies":[68],"against":[69,158],"that":[71,113,145],"can":[72],"be":[73],"implemented":[74],"jammer.":[77],"Firstly,":[78],"study":[80],"6":[85],"signals":[88],"presented":[89,148],"literature":[92,151],"weakest":[95],"points":[96],"Secondly,":[101],"experiments":[103],"carried":[104],"real":[107],"life":[108],"networks,":[110],"observe":[112],"although":[114],"these":[115],"signal":[118],"seems":[119],"strongly":[120],"with":[124],"regard":[125],"specification,":[128],"they":[129],"are":[130],"not":[131,161],"so":[132],"practice":[135],"due":[136],"some":[138],"constructors":[139],"specific":[140],"mechanisms.":[141],"Furthermore,":[142],"observed":[144],"PCFICH":[146],"attack":[157],"always":[162],"able":[163],"prevent":[165],"communication.":[167]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
