{"id":"https://openalex.org/W1972845921","doi":"https://doi.org/10.1109/milcom.2011.6127470","title":"Timely and robust key establishment under jamming attack in critical wireless networks","display_name":"Timely and robust key establishment under jamming attack in critical wireless networks","publication_year":2011,"publication_date":"2011-11-01","ids":{"openalex":"https://openalex.org/W1972845921","doi":"https://doi.org/10.1109/milcom.2011.6127470","mag":"1972845921"},"language":"en","primary_location":{"id":"doi:10.1109/milcom.2011.6127470","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2011.6127470","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 - MILCOM 2011 Military Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100689925","display_name":"Eun\u2010Kyu Lee","orcid":"https://orcid.org/0000-0003-1459-5458"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Eun-Kyu Lee","raw_affiliation_strings":["Computer Science Department, UCLA, Los Angeles, CA, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, UCLA, Los Angeles, CA, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103578446","display_name":"Soon Y. Oh","orcid":null},"institutions":[{"id":"https://openalex.org/I4210139270","display_name":"UtopiaCompression (United States)","ror":"https://ror.org/051d4q284","country_code":"US","type":"company","lineage":["https://openalex.org/I4210139270"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Soon Y. Oh","raw_affiliation_strings":["UtopiaCompression, Los Angeles, CA, USA","UtopiaCompression, 11150 Olympic Blvd. #820, Los Angeles, CA, USA"],"affiliations":[{"raw_affiliation_string":"UtopiaCompression, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I4210139270"]},{"raw_affiliation_string":"UtopiaCompression, 11150 Olympic Blvd. #820, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I4210139270"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059529956","display_name":"M\u00e1rio Gerla","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mario Gerla","raw_affiliation_strings":["Computer Science Department, UCLA, Los Angeles, CA, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, UCLA, Los Angeles, CA, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100689925"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.7002,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.70290793,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1237","last_page":"1242"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.8409147262573242},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6971459984779358},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6801406741142273},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6050825715065002},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5457091927528381},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4971983730792999},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4536608159542084},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.23125767707824707}],"concepts":[{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.8409147262573242},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6971459984779358},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6801406741142273},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6050825715065002},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5457091927528381},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4971983730792999},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4536608159542084},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.23125767707824707},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom.2011.6127470","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2011.6127470","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 - MILCOM 2011 Military Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1984549474","https://openalex.org/W2087903610","https://openalex.org/W2107442947","https://openalex.org/W2112696545","https://openalex.org/W2115467602","https://openalex.org/W2118795709","https://openalex.org/W2124952412","https://openalex.org/W2133282516","https://openalex.org/W2141316949","https://openalex.org/W2142009827","https://openalex.org/W2142049063","https://openalex.org/W2142302990","https://openalex.org/W2145417574","https://openalex.org/W2162926971","https://openalex.org/W2167540951","https://openalex.org/W3163268305","https://openalex.org/W6676095421","https://openalex.org/W6678747588","https://openalex.org/W6684610550"],"related_works":["https://openalex.org/W1984793747","https://openalex.org/W4312547492","https://openalex.org/W3197729047","https://openalex.org/W3016692377","https://openalex.org/W1624160917","https://openalex.org/W1987034598","https://openalex.org/W2370486284","https://openalex.org/W2143847498","https://openalex.org/W2354671671","https://openalex.org/W3005169718"],"abstract_inverted_index":{"Jamming":[0],"attacks":[1],"are":[2],"security":[3],"threats":[4],"disrupting":[5],"RF":[6],"communications":[7],"in":[8,88],"wireless":[9],"networks.":[10],"Traditionally,":[11],"spread":[12,21],"spectrum":[13,22],"has":[14],"been":[15],"proposed":[16,100],"as":[17],"a":[18,41],"countermeasure.":[19],"However,":[20],"requires":[23],"secure":[24,72],"pre-key":[25],"establishment":[26,57],"before":[27],"data":[28],"transmission,":[29],"with":[30],"considerable":[31],"time":[32,65,76,89],"investment":[33],"and":[34,105,109,117],"thus":[35,59],"limited":[36],"functionality.":[37],"This":[38],"paper":[39],"proposes":[40],"Frequency":[42],"Quorum":[43],"Rendezvous":[44],"(FQR)":[45],"scheme.":[46],"In":[47],"FQR,":[48],"nodes":[49,68],"hop":[50],"over":[51],"random":[52],"frequencies":[53,116],"during":[54],"the":[55,75,80,99],"key":[56],"phase,":[58],"preventing":[60],"jamming.":[61],"By":[62],"exploiting":[63],"quorum":[64],"bounded":[66],"rendezvous,":[67],"\u201cmeet\u201d":[69],"to":[70,90],"exchange":[71],"keys":[73],"within":[74],"constraints":[77],"posed":[78],"by":[79],"application":[81],"(for":[82],"example,":[83],"merger":[84],"of":[85,114,120],"two":[86],"teams":[87],"fight":[91],"back":[92],"an":[93],"imminent":[94],"enemy":[95],"attack).":[96],"We":[97],"validate":[98],"scheme":[101],"via":[102],"extensive":[103],"simulations":[104],"show":[106],"its":[107],"robustness":[108],"efficiency":[110],"under":[111],"varying":[112,118],"number":[113],"available":[115],"probability":[119],"jamming":[121],"attacks.":[122]},"counts_by_year":[{"year":2016,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
