{"id":"https://openalex.org/W4206211043","doi":"https://doi.org/10.1109/tifs.2022.3140714","title":"Asymptotically Guaranteed Anti-Jamming Spread Spectrum Random Access Without Pre-Shared Secret","display_name":"Asymptotically Guaranteed Anti-Jamming Spread Spectrum Random Access Without Pre-Shared Secret","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4206211043","doi":"https://doi.org/10.1109/tifs.2022.3140714"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3140714","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3140714","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090804957","display_name":"M. A. V\u00e1zquez\u2010Castro","orcid":"https://orcid.org/0000-0002-6292-7149"},"institutions":[{"id":"https://openalex.org/I123044942","display_name":"Universitat Aut\u00f2noma de Barcelona","ror":"https://ror.org/052g8jq94","country_code":"ES","type":"education","lineage":["https://openalex.org/I123044942"]},{"id":"https://openalex.org/I4210092024","display_name":"Institut d'Estudis Espacials de Catalunya","ror":"https://ror.org/00k6njn28","country_code":"ES","type":"facility","lineage":["https://openalex.org/I4210092024","https://openalex.org/I4387153040"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Angeles Vazquez-Castro","raw_affiliation_strings":["CERES (IEEC-UAB), Autonomous University of Barcelona, Barcelona, Spain","Department of Telecommunication Engineering and Systems Design and with the Center of Space Studies and Research, CERES (IEEC-UAB). Autonomous University of Barcelona, Spain, 08193 Barcelona, Spain. (e-mail: angeles.vazquez@uab.es)"],"affiliations":[{"raw_affiliation_string":"CERES (IEEC-UAB), Autonomous University of Barcelona, Barcelona, Spain","institution_ids":["https://openalex.org/I123044942"]},{"raw_affiliation_string":"Department of Telecommunication Engineering and Systems Design and with the Center of Space Studies and Research, CERES (IEEC-UAB). Autonomous University of Barcelona, Spain, 08193 Barcelona, Spain. (e-mail: angeles.vazquez@uab.es)","institution_ids":["https://openalex.org/I4210092024","https://openalex.org/I123044942"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5090804957"],"corresponding_institution_ids":["https://openalex.org/I123044942","https://openalex.org/I4210092024"],"apc_list":null,"apc_paid":null,"fwci":1.5631,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.83037484,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"17","issue":null,"first_page":"332","last_page":"343"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12879","display_name":"Distributed Sensor Networks and Detection Algorithms","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.881625771522522},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7969644069671631},{"id":"https://openalex.org/keywords/random-access","display_name":"Random access","score":0.5263717770576477},{"id":"https://openalex.org/keywords/asymptotically-optimal-algorithm","display_name":"Asymptotically optimal algorithm","score":0.5196079611778259},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.4829522967338562},{"id":"https://openalex.org/keywords/spread-spectrum","display_name":"Spread spectrum","score":0.4658079743385315},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.46390077471733093},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.44388407468795776},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4167240858078003},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.3296574354171753},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3000987768173218},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2867507338523865},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1803322434425354},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1782408356666565},{"id":"https://openalex.org/keywords/code-division-multiple-access","display_name":"Code division multiple access","score":0.1295565664768219},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.09070894122123718}],"concepts":[{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.881625771522522},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7969644069671631},{"id":"https://openalex.org/C101722063","wikidata":"https://www.wikidata.org/wiki/Q218825","display_name":"Random access","level":2,"score":0.5263717770576477},{"id":"https://openalex.org/C181789720","wikidata":"https://www.wikidata.org/wiki/Q4812191","display_name":"Asymptotically optimal algorithm","level":2,"score":0.5196079611778259},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.4829522967338562},{"id":"https://openalex.org/C105344744","wikidata":"https://www.wikidata.org/wiki/Q958957","display_name":"Spread spectrum","level":3,"score":0.4658079743385315},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.46390077471733093},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.44388407468795776},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4167240858078003},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.3296574354171753},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3000987768173218},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2867507338523865},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1803322434425354},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1782408356666565},{"id":"https://openalex.org/C47696715","wikidata":"https://www.wikidata.org/wiki/Q233394","display_name":"Code division multiple access","level":2,"score":0.1295565664768219},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.09070894122123718},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2022.3140714","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3140714","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:digital.csic.es:10261/269776","is_oa":false,"landing_page_url":"http://hdl.handle.net/10261/269776","pdf_url":null,"source":{"id":"https://openalex.org/S4306400616","display_name":"DIGITAL.CSIC (Spanish National Research Council (CSIC))","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I134820265","host_organization_name":"Consejo Superior de Investigaciones Cient\u00edficas","host_organization_lineage":["https://openalex.org/I134820265"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"art\u00edculo"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7900000214576721}],"awards":[{"id":"https://openalex.org/G6591988557","display_name":null,"funder_award_id":"4000113177/15/NL/CLP","funder_id":"https://openalex.org/F4320318240","funder_display_name":"European Space Agency"}],"funders":[{"id":"https://openalex.org/F4320318240","display_name":"European Space Agency","ror":"https://ror.org/03wd9za21"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W55761002","https://openalex.org/W1503188747","https://openalex.org/W1526632983","https://openalex.org/W1542915664","https://openalex.org/W1967387941","https://openalex.org/W1984386576","https://openalex.org/W2047785219","https://openalex.org/W2048092462","https://openalex.org/W2063726406","https://openalex.org/W2068154847","https://openalex.org/W2098346479","https://openalex.org/W2107581287","https://openalex.org/W2108475361","https://openalex.org/W2115312743","https://openalex.org/W2119917718","https://openalex.org/W2124280970","https://openalex.org/W2124602541","https://openalex.org/W2124952412","https://openalex.org/W2126026248","https://openalex.org/W2127820195","https://openalex.org/W2148393970","https://openalex.org/W2148879089","https://openalex.org/W2151998323","https://openalex.org/W2155438308","https://openalex.org/W2162926971","https://openalex.org/W2164902512","https://openalex.org/W2168078686","https://openalex.org/W2280566217","https://openalex.org/W2474583434","https://openalex.org/W2511419557","https://openalex.org/W2566023797","https://openalex.org/W2962802462","https://openalex.org/W2963309328","https://openalex.org/W2963402130","https://openalex.org/W2997040229","https://openalex.org/W3003257958","https://openalex.org/W3012264393","https://openalex.org/W3015908042","https://openalex.org/W3018388517","https://openalex.org/W3021198511","https://openalex.org/W3128522984","https://openalex.org/W6796938863"],"related_works":["https://openalex.org/W2148840373","https://openalex.org/W2390634769","https://openalex.org/W1614911096","https://openalex.org/W2791583388","https://openalex.org/W2348168522","https://openalex.org/W2599060843","https://openalex.org/W4301764780","https://openalex.org/W2158681463","https://openalex.org/W1584193842","https://openalex.org/W4206211043"],"abstract_inverted_index":{"Our":[0],"main":[1],"contribution":[2],"is":[3,118,178],"the":[4,34,46,51,79,85,90,102,115,119,124,131,167,174,181,192],"design":[5,149],"of":[6,48,73,151,166,194],"a":[7,55,70,147],"spread":[8],"spectrum":[9],"random":[10,71],"access":[11],"scheme":[12],"without":[13,187],"pre-shared":[14],"secret":[15],"with":[16],"asymptotically":[17,110],"guaranteed":[18],"availability":[19],"against":[20],"electronic/cyber-based":[21],"jamming":[22,42],"attacks.":[23],"In":[24],"order":[25],"to":[26,78,84,100,122,141,153,191],"establish":[27],"asymptotic":[28],"anti-jamming":[29,176,188],"guarantees,":[30],"first":[31],"we":[32,68,88,171],"develop":[33],"system":[35,148],"model":[36],"and":[37,126],"show":[38,172],"that":[39,108,138,173],"for":[40,54,64],"reactive":[41],"(only":[43],"limited":[44],"by":[45,61],"laws":[47],"physical":[49],"propagation),":[50],"required":[52],"location":[53],"successful":[56],"attack":[57,117],"can":[58],"be":[59],"controlled":[60],"design.":[62],"Then,":[63],"non-reactive":[65],"protocol-aware":[66],"jamming,":[67],"map":[69],"selection":[72],"(publicly":[74],"known)":[75],"spreading":[76,104,156],"codes":[77],"computational":[80],"birthday":[81,91,116],"problem.":[82],"Differently":[83],"related":[86],"literature,":[87],"formulate":[89],"problem":[92],"using":[93],"entropic":[94,144],"measures":[95],"(R&#x00E9;nyi":[96],"entropy),":[97],"which":[98],"allows":[99],"obtain":[101,135],"optimal":[103],"code":[105,157],"set":[106,158],"sizes":[107],"guarantee":[109],"zero":[111],"collision":[112,195],"probability.":[113],"Accordingly,":[114],"best":[120],"strategy":[121],"optimize":[123],"(trial":[125],"error)":[127],"blind":[128],"acquisition":[129],"at":[130],"legitimate":[132],"detector.":[133],"We":[134,160],"numerical":[136],"results":[137],"illustrate":[139],"how":[140],"use":[142],"our":[143],"method":[145],"as":[146],"degree":[150],"freedom":[152],"identify":[154],"realistic":[155],"sizes.":[159],"also":[161],"derive":[162],"an":[163],"upper":[164],"bound":[165],"detection":[168],"latency.":[169],"Finally,":[170],"resulting":[175],"throughput":[177,182],"higher":[179],"than":[180],"under":[183],"conventional":[184],"operation":[185],"(i.e.":[186],"guarantees)":[189],"due":[190],"control":[193],"probability":[196],"by-design.":[197]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
