{"id":"https://openalex.org/W3092066876","doi":"https://doi.org/10.1109/pimrc48278.2020.9217140","title":"Mitigation of Jamming Attacks via Deception","display_name":"Mitigation of Jamming Attacks via Deception","publication_year":2020,"publication_date":"2020-08-01","ids":{"openalex":"https://openalex.org/W3092066876","doi":"https://doi.org/10.1109/pimrc48278.2020.9217140","mag":"3092066876"},"language":"en","primary_location":{"id":"doi:10.1109/pimrc48278.2020.9217140","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc48278.2020.9217140","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047494418","display_name":"Satyaki Nan","orcid":null},"institutions":[{"id":"https://openalex.org/I75256744","display_name":"Tennessee State University","ror":"https://ror.org/01fpczx89","country_code":"US","type":"education","lineage":["https://openalex.org/I75256744"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Satyaki Nan","raw_affiliation_strings":["Department of Computer Science, Tennessee State University, Nashville, TN"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Tennessee State University, Nashville, TN","institution_ids":["https://openalex.org/I75256744"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086959874","display_name":"Swastik Brahma","orcid":"https://orcid.org/0000-0002-7235-7856"},"institutions":[{"id":"https://openalex.org/I75256744","display_name":"Tennessee State University","ror":"https://ror.org/01fpczx89","country_code":"US","type":"education","lineage":["https://openalex.org/I75256744"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Swastik Brahma","raw_affiliation_strings":["Department of Computer Science, Tennessee State University, Nashville, TN"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Tennessee State University, Nashville, TN","institution_ids":["https://openalex.org/I75256744"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090126029","display_name":"Charles Kamhoua","orcid":"https://orcid.org/0000-0003-2169-5975"},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Charles A. Kamhoua","raw_affiliation_strings":["US Army Research Laboratory, Network Security Branch, Adelphi, MD"],"affiliations":[{"raw_affiliation_string":"US Army Research Laboratory, Network Security Branch, Adelphi, MD","institution_ids":["https://openalex.org/I166416128"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075553610","display_name":"Nandi Leslie","orcid":null},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nandi O. Leslie","raw_affiliation_strings":["US Army Research Laboratory, Network Security Branch, Adelphi, MD"],"affiliations":[{"raw_affiliation_string":"US Army Research Laboratory, Network Security Branch, Adelphi, MD","institution_ids":["https://openalex.org/I166416128"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5047494418"],"corresponding_institution_ids":["https://openalex.org/I75256744"],"apc_list":null,"apc_paid":null,"fwci":1.5417,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.84404794,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.8991600275039673},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.8960652351379395},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6261909008026123},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6214897632598877},{"id":"https://openalex.org/keywords/radar-jamming-and-deception","display_name":"Radar jamming and deception","score":0.4266693890094757},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.18757903575897217},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.1085723340511322},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.05937182903289795},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.05606013536453247},{"id":"https://openalex.org/keywords/radar","display_name":"Radar","score":0.05110052227973938}],"concepts":[{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.8991600275039673},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.8960652351379395},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6261909008026123},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6214897632598877},{"id":"https://openalex.org/C176381164","wikidata":"https://www.wikidata.org/wiki/Q1486507","display_name":"Radar jamming and deception","level":5,"score":0.4266693890094757},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.18757903575897217},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.1085723340511322},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.05937182903289795},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.05606013536453247},{"id":"https://openalex.org/C554190296","wikidata":"https://www.wikidata.org/wiki/Q47528","display_name":"Radar","level":2,"score":0.05110052227973938},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C10929652","wikidata":"https://www.wikidata.org/wiki/Q7279985","display_name":"Radar imaging","level":3,"score":0.0},{"id":"https://openalex.org/C139931591","wikidata":"https://www.wikidata.org/wiki/Q1029151","display_name":"Pulse-Doppler radar","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pimrc48278.2020.9217140","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc48278.2020.9217140","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5600000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1560022960","https://openalex.org/W1598668352","https://openalex.org/W1998999659","https://openalex.org/W2002937495","https://openalex.org/W2025613511","https://openalex.org/W2047399268","https://openalex.org/W2055518442","https://openalex.org/W2082998961","https://openalex.org/W2122311135","https://openalex.org/W2132645110","https://openalex.org/W2150307351","https://openalex.org/W2413094783","https://openalex.org/W2488787028","https://openalex.org/W6682106626"],"related_works":["https://openalex.org/W2355227927","https://openalex.org/W2547584104","https://openalex.org/W2358221753","https://openalex.org/W2055550092","https://openalex.org/W2382050893","https://openalex.org/W2357521318","https://openalex.org/W2376884913","https://openalex.org/W2360153323","https://openalex.org/W2393502612","https://openalex.org/W2384000656"],"abstract_inverted_index":{"This":[0],"paper":[1,31,67,114],"considers":[2],"the":[3,13,17,30,33,49,61,73,77,85,89,92,98,102,111,116,122,125,136,144,149,152,167,172],"problem":[4],"of":[5,19,36,54,121,143],"mitigating":[6],"jamming":[7,56,60,81],"attacks":[8],"by":[9],"aiming":[10],"to":[11,22,47,110,127,154,163],"deceive":[12,48],"jammer.":[14,112],"Specifically,":[15],"in":[16,45,130,171],"presence":[18],"a":[20,24,41,69],"jammer,":[21],"defend":[23],"transmitter-receiver":[25,43],"pair":[26,44],"sending":[27,37],"(real)":[28],"information,":[29,96],"proposes":[32],"novel":[34],"technique":[35],"fake":[38,64,95],"information":[39],"over":[40],"second":[42],"order":[46],"jammer":[50,74,126,153],"into":[51,166],"investing":[52],"some":[53],"its":[55,105],"power":[57,106,118],"budget":[58],"for":[59],"channel":[62],"carrying":[63,91],"information.":[65],"The":[66,113],"develops":[68],"leader-follower":[70,145],"model":[71],"where":[72],"(acting":[75,100],"as":[76,101,132,134],"follower)":[78],"adopts":[79,104],"it's":[80],"strategy":[82,108,120,142],"after":[83],"sensing":[84],"communication":[86],"activities":[87],"on":[88],"channels":[90],"real":[93],"and":[94,151],"while":[97],"system":[99,123,150],"leader)":[103],"allocation":[107,119],"prior":[109],"characterizes":[115,135],"optimal":[117],"considering":[124,147],"be":[128,155],"non-strategic":[129],"nature,":[131],"well":[133],"Subgame":[137],"Perfect":[138],"Nash":[139],"Equilibrium":[140],"(SPNE)":[141],"game":[146],"both":[148],"strategic":[156],"entities.":[157],"Extensive":[158],"simulation":[159],"results":[160],"are":[161],"provided":[162],"gain":[164],"insights":[165],"deception":[168],"strategies":[169],"developed":[170],"paper.":[173]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
