{"id":"https://openalex.org/W2027298528","doi":"https://doi.org/10.1109/milcom.2011.6127469","title":"Adaptive rapid channel-hopping scheme mitigating smart jammer attacks in secure WLAN","display_name":"Adaptive rapid channel-hopping scheme mitigating smart jammer attacks in secure WLAN","publication_year":2011,"publication_date":"2011-11-01","ids":{"openalex":"https://openalex.org/W2027298528","doi":"https://doi.org/10.1109/milcom.2011.6127469","mag":"2027298528"},"language":"en","primary_location":{"id":"doi:10.1109/milcom.2011.6127469","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2011.6127469","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 - MILCOM 2011 Military Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056879058","display_name":"Jaemin Jeung","orcid":null},"institutions":[{"id":"https://openalex.org/I57664883","display_name":"Ajou University","ror":"https://ror.org/03tzb2h73","country_code":"KR","type":"education","lineage":["https://openalex.org/I57664883"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Jaemin Jeung","raw_affiliation_strings":["Tactical Network Research Center, Ajou University, Suwon, South Korea","Tactical Network Research Center, Ajou University, Suwon, Korea"],"affiliations":[{"raw_affiliation_string":"Tactical Network Research Center, Ajou University, Suwon, South Korea","institution_ids":["https://openalex.org/I57664883"]},{"raw_affiliation_string":"Tactical Network Research Center, Ajou University, Suwon, Korea","institution_ids":["https://openalex.org/I57664883"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021300866","display_name":"Seungmyeong Jeong","orcid":null},"institutions":[{"id":"https://openalex.org/I57664883","display_name":"Ajou University","ror":"https://ror.org/03tzb2h73","country_code":"KR","type":"education","lineage":["https://openalex.org/I57664883"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seungmyeong Jeong","raw_affiliation_strings":["Tactical Network Research Center, Ajou University, Suwon, South Korea","Tactical Network Research Center, Ajou University, Suwon, Korea"],"affiliations":[{"raw_affiliation_string":"Tactical Network Research Center, Ajou University, Suwon, South Korea","institution_ids":["https://openalex.org/I57664883"]},{"raw_affiliation_string":"Tactical Network Research Center, Ajou University, Suwon, Korea","institution_ids":["https://openalex.org/I57664883"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027010503","display_name":"Jaesung Lim","orcid":"https://orcid.org/0000-0003-0080-9398"},"institutions":[{"id":"https://openalex.org/I57664883","display_name":"Ajou University","ror":"https://ror.org/03tzb2h73","country_code":"KR","type":"education","lineage":["https://openalex.org/I57664883"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jaesung Lim","raw_affiliation_strings":["Tactical Network Research Center, Ajou University, Suwon, South Korea","Tactical Network Research Center, Ajou University, Suwon, Korea"],"affiliations":[{"raw_affiliation_string":"Tactical Network Research Center, Ajou University, Suwon, South Korea","institution_ids":["https://openalex.org/I57664883"]},{"raw_affiliation_string":"Tactical Network Research Center, Ajou University, Suwon, Korea","institution_ids":["https://openalex.org/I57664883"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5056879058"],"corresponding_institution_ids":["https://openalex.org/I57664883"],"apc_list":null,"apc_paid":null,"fwci":1.4003,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.81899994,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1231","last_page":"1236"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7189394235610962},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.7148503065109253},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6763921976089478},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6007511615753174},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5750462412834167},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5110632181167603},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5100065469741821},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4312346875667572},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.23271772265434265}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7189394235610962},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.7148503065109253},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6763921976089478},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6007511615753174},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5750462412834167},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5110632181167603},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5100065469741821},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4312346875667572},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.23271772265434265},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom.2011.6127469","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2011.6127469","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 - MILCOM 2011 Military Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1487163696","https://openalex.org/W1593646160","https://openalex.org/W1870374471","https://openalex.org/W2064218148","https://openalex.org/W2115185534","https://openalex.org/W2118795709","https://openalex.org/W2141316949"],"related_works":["https://openalex.org/W4200319726","https://openalex.org/W1984793747","https://openalex.org/W3197729047","https://openalex.org/W4312547492","https://openalex.org/W1987034598","https://openalex.org/W2370486284","https://openalex.org/W2143847498","https://openalex.org/W2354671671","https://openalex.org/W3005169718","https://openalex.org/W2004695857"],"abstract_inverted_index":{"As":[0],"the":[1,69,81,88,145,154,163],"military":[2],"continues":[3],"its":[4],"transformation":[5],"towards":[6],"Network":[7,29],"Centric":[8],"Warfare,":[9],"a":[10,15,73,91,96,113,125],"quickly-deployable":[11],"communication":[12,54,93],"solution":[13],"for":[14],"Tactical":[16,40],"Operations":[17,41],"Center":[18,42],"is":[19,124,139,166],"required.":[20],"The":[21,121,136],"U.S.":[22],"Army":[23],"uses":[24],"Secure":[25],"Wireless":[26],"Local":[27],"Area":[28],"(SWLAN)":[30],"with":[31,55],"IEEE":[32],"802.11":[33],"standard":[34],"waveforms":[35],"to":[36,61,95,116,128,143,147],"quickly":[37],"set":[38],"up":[39],"communications":[43],"without":[44],"cables.":[45],"A":[46],"SWLAN":[47,70],"provides":[48],"extremely":[49],"secure":[50],"mobile":[51],"wireless":[52],"data":[53],"COMSEC,":[56],"TRANSEC,":[57],"and":[58,64,112,158],"monitoring":[59],"systems":[60],"detect":[62],"PHY":[63],"MAC":[65],"layer":[66],"misbehavior.":[67],"However,":[68],"cannot":[71],"mitigate":[72,117],"smart":[74,118],"jammer":[75,119,146],"that":[76,162],"transmits":[77],"back-to-back":[78],"packets":[79],"on":[80,133],"detected":[82],"channel":[83,151],"after":[84],"scanning":[85],"all":[86],"of":[87],"channels":[89],"until":[90],"legitimate":[92],"hops":[94],"new":[97],"channel.":[98],"In":[99],"this":[100],"paper,":[101],"we":[102],"introduce":[103],"an":[104,149],"adaptive":[105],"rapid":[106],"channel-hopping":[107],"scheme":[108,165],"using":[109],"Dwell":[110,122],"Window":[111,123],"Deception":[114,137],"Mechanism":[115,138],"attacks.":[120],"novel":[126,141],"concept":[127,142],"adjust":[129],"transmission":[130],"time":[131],"based":[132],"jammer's":[134],"capability.":[135],"another":[140],"force":[144],"attack":[148],"inactive":[150],"by":[152],"deceiving":[153],"jammer.":[155],"Numerical":[156],"analysis":[157],"simulation":[159],"results":[160],"show":[161],"proposed":[164],"more":[167],"effective":[168],"than":[169],"prior":[170],"studies.":[171]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
