{"id":"https://openalex.org/W2159362188","doi":"https://doi.org/10.1109/tifs.2011.2142305","title":"Position-Based Jamming for Enhanced Wireless Secrecy","display_name":"Position-Based Jamming for Enhanced Wireless Secrecy","publication_year":2011,"publication_date":"2011-04-15","ids":{"openalex":"https://openalex.org/W2159362188","doi":"https://doi.org/10.1109/tifs.2011.2142305","mag":"2159362188"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2011.2142305","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2011.2142305","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074435675","display_name":"Jo\u00e3o P. Vilela","orcid":"https://orcid.org/0000-0001-5805-1351"},"institutions":[{"id":"https://openalex.org/I182534213","display_name":"Universidade do Porto","ror":"https://ror.org/043pwc612","country_code":"PT","type":"education","lineage":["https://openalex.org/I182534213"]},{"id":"https://openalex.org/I4210120471","display_name":"Instituto de Telecomunica\u00e7\u00f5es","ror":"https://ror.org/02ht4fk33","country_code":"PT","type":"nonprofit","lineage":["https://openalex.org/I4210120471"]}],"countries":["PT"],"is_corresponding":true,"raw_author_name":"Jo\u00e3o P. Vilela","raw_affiliation_strings":["Instituto de Telecomunica\u00e7\u00f5es, Departamento de Ci\u00eancia de Computadores, Faculdade de Ci\u00eancias, Universidade do Porto, Porto, Portugal"],"affiliations":[{"raw_affiliation_string":"Instituto de Telecomunica\u00e7\u00f5es, Departamento de Ci\u00eancia de Computadores, Faculdade de Ci\u00eancias, Universidade do Porto, Porto, Portugal","institution_ids":["https://openalex.org/I4210120471","https://openalex.org/I182534213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066403110","display_name":"Pedro Pint\u00f3","orcid":"https://orcid.org/0000-0002-3673-9494"},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Pedro C. Pinto","raw_affiliation_strings":["School of Computer and Communication Sciences, Swiss Federal Institute of Technology, Lausanne, Switzerland"],"affiliations":[{"raw_affiliation_string":"School of Computer and Communication Sciences, Swiss Federal Institute of Technology, Lausanne, Switzerland","institution_ids":["https://openalex.org/I5124864"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089850116","display_name":"Jo\u00e3o Barros","orcid":"https://orcid.org/0000-0003-0465-1751"},"institutions":[{"id":"https://openalex.org/I182534213","display_name":"Universidade do Porto","ror":"https://ror.org/043pwc612","country_code":"PT","type":"education","lineage":["https://openalex.org/I182534213"]},{"id":"https://openalex.org/I4210120471","display_name":"Instituto de Telecomunica\u00e7\u00f5es","ror":"https://ror.org/02ht4fk33","country_code":"PT","type":"nonprofit","lineage":["https://openalex.org/I4210120471"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Jo\u00e3o Barros","raw_affiliation_strings":["Instituto de Telecomunica\u00e7\u00f5es, Departamento de Ci\u00eancia de Computadores, Faculdade de Ci\u00eancias, Universidade do Porto, Porto, Portugal"],"affiliations":[{"raw_affiliation_string":"Instituto de Telecomunica\u00e7\u00f5es, Departamento de Ci\u00eancia de Computadores, Faculdade de Ci\u00eancias, Universidade do Porto, Porto, Portugal","institution_ids":["https://openalex.org/I4210120471","https://openalex.org/I182534213"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5074435675"],"corresponding_institution_ids":["https://openalex.org/I182534213","https://openalex.org/I4210120471"],"apc_list":null,"apc_paid":null,"fwci":4.5044,"has_fulltext":false,"cited_by_count":44,"citation_normalized_percentile":{"value":0.95022545,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"6","issue":"3","first_page":"616","last_page":"627"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.8254683017730713},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7999632358551025},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6272870302200317},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.6169820427894592},{"id":"https://openalex.org/keywords/position","display_name":"Position (finance)","score":0.5548921227455139},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4532902240753174},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4181895852088928},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.4004901647567749}],"concepts":[{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.8254683017730713},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7999632358551025},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6272870302200317},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.6169820427894592},{"id":"https://openalex.org/C198082294","wikidata":"https://www.wikidata.org/wiki/Q3399648","display_name":"Position (finance)","level":2,"score":0.5548921227455139},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4532902240753174},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4181895852088928},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.4004901647567749},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2011.2142305","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2011.2142305","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.9100000262260437,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W98812071","https://openalex.org/W2007529001","https://openalex.org/W2043769961","https://openalex.org/W2102940326","https://openalex.org/W2106473863","https://openalex.org/W2115613211","https://openalex.org/W2120206415","https://openalex.org/W2129457795","https://openalex.org/W2135785322","https://openalex.org/W2142102521","https://openalex.org/W2145873277","https://openalex.org/W2146794521","https://openalex.org/W2147348113","https://openalex.org/W2148963518","https://openalex.org/W2152121970","https://openalex.org/W2156759922","https://openalex.org/W2159724474","https://openalex.org/W2167165277","https://openalex.org/W2169763893","https://openalex.org/W3098064086","https://openalex.org/W4206533730"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W2016567611","https://openalex.org/W2475541339","https://openalex.org/W565335793","https://openalex.org/W2363071176","https://openalex.org/W2107199751","https://openalex.org/W4243812570","https://openalex.org/W4300441478","https://openalex.org/W2062965938","https://openalex.org/W99756173"],"abstract_inverted_index":{"Signal":[0],"interference":[1,23,110,124],"and":[2,100,139],"packet":[3,41],"collisions":[4,42],"are":[5,36,91,116],"typically":[6],"viewed":[7],"as":[8,83,108,111],"negative":[9],"factors":[10],"that":[11,40,71,115,150],"hinder":[12],"wireless":[13,60],"communication":[14],"networks.":[15],"When":[16],"security":[17],"is":[18,105],"the":[19,73,79,95,123,127,132,144,154],"primary":[20],"concern,":[21],"signal":[22],"may":[24],"actually":[25],"be":[26,49],"very":[27],"helpful.":[28],"Starting":[29],"with":[30],"a":[31,67,84,141,161],"stochastic":[32],"network":[33],"model,":[34],"we":[35,65,137],"able":[37],"to":[38,52,106,113],"show":[39,149],"caused":[43],"by":[44,126],"jamming":[45,69,101,151],"nodes":[46],"can":[47,152],"indeed":[48],"used":[50],"effectively":[51],"attain":[53],"new":[54],"levels":[55,155],"of":[56,78,97,134,156,166],"secrecy":[57,157],"in":[58,118,164],"multiterminal":[59],"environments.":[61],"To":[62,130],"this":[63],"effect,":[64],"propose":[66],"practical":[68],"protocol":[70],"uses":[72],"well-known":[74],"request-to-send/clear-to-send":[75],"(RTS/CTS)":[76],"handshake":[77],"IEEE":[80],"802.11":[81],"standard":[82],"signaling":[85],"scheme.":[86],"Various":[87],"jammer":[88],"selection":[89],"strategies":[90],"investigated":[92],"depending":[93],"on":[94],"position":[96],"source,":[98],"destination,":[99],"nodes.":[102],"The":[103],"goal":[104],"cause":[107],"much":[109],"possible":[112],"eavesdroppers":[114],"located":[117],"unknown":[119],"positions,":[120],"while":[121],"limiting":[122],"observed":[125],"legitimate":[128],"receiver.":[129],"evaluate":[131],"performance":[133],"each":[135],"strategy,":[136],"introduce":[138],"compute":[140],"measure":[142],"for":[143],"secure":[145],"throughput.":[146],"Our":[147],"results":[148],"increase":[153],"significantly":[158],"albeit":[159],"at":[160],"substantial":[162],"cost":[163],"terms":[165],"energy":[167],"efficiency.":[168]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":10},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":8},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
