{"id":"https://openalex.org/W4378364052","doi":"https://doi.org/10.1109/isdfs58141.2023.10131740","title":"A Lightweight and Energy Efficient Secrecy Outage Probability-based Friendly Jamming","display_name":"A Lightweight and Energy Efficient Secrecy Outage Probability-based Friendly Jamming","publication_year":2023,"publication_date":"2023-05-11","ids":{"openalex":"https://openalex.org/W4378364052","doi":"https://doi.org/10.1109/isdfs58141.2023.10131740"},"language":"en","primary_location":{"id":"doi:10.1109/isdfs58141.2023.10131740","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/isdfs58141.2023.10131740","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 11th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://gcris.iyte.edu.tr/bitstream/11147/13690/1/A_Lightweight.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048592992","display_name":"Okan Yaman","orcid":"https://orcid.org/0000-0001-7292-2344"},"institutions":[{"id":"https://openalex.org/I120217413","display_name":"Izmir Institute of Technology","ror":"https://ror.org/03stptj97","country_code":"TR","type":"education","lineage":["https://openalex.org/I120217413"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Okan Yaman","raw_affiliation_strings":["Izmir Institute of Technology,Department of Computer Engineering,Izmir,Turkey","Department of Computer Engineering, Izmir Institute of Technology, Izmir, Turkey"],"affiliations":[{"raw_affiliation_string":"Izmir Institute of Technology,Department of Computer Engineering,Izmir,Turkey","institution_ids":["https://openalex.org/I120217413"]},{"raw_affiliation_string":"Department of Computer Engineering, Izmir Institute of Technology, Izmir, Turkey","institution_ids":["https://openalex.org/I120217413"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110836534","display_name":"Tolga Ayav","orcid":null},"institutions":[{"id":"https://openalex.org/I120217413","display_name":"Izmir Institute of Technology","ror":"https://ror.org/03stptj97","country_code":"TR","type":"education","lineage":["https://openalex.org/I120217413"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Tolga Ayav","raw_affiliation_strings":["Izmir Institute of Technology,Department of Computer Engineering,Izmir,Turkey","Department of Computer Engineering, Izmir Institute of Technology, Izmir, Turkey"],"affiliations":[{"raw_affiliation_string":"Izmir Institute of Technology,Department of Computer Engineering,Izmir,Turkey","institution_ids":["https://openalex.org/I120217413"]},{"raw_affiliation_string":"Department of Computer Engineering, Izmir Institute of Technology, Izmir, Turkey","institution_ids":["https://openalex.org/I120217413"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056799442","display_name":"Yusuf Murat Erten","orcid":"https://orcid.org/0000-0001-9537-7414"},"institutions":[{"id":"https://openalex.org/I15059493","display_name":"\u0130zmir University of Economics","ror":"https://ror.org/04hjr4202","country_code":"TR","type":"education","lineage":["https://openalex.org/I15059493"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Yusuf Murat Erten","raw_affiliation_strings":["Izmir University of Economics,Department of Computer Engineering,Izmir,Turkey","Department of Computer Engineering, Izmir University of Economics, Izmir, Turkey"],"affiliations":[{"raw_affiliation_string":"Izmir University of Economics,Department of Computer Engineering,Izmir,Turkey","institution_ids":["https://openalex.org/I15059493"]},{"raw_affiliation_string":"Department of Computer Engineering, Izmir University of Economics, Izmir, Turkey","institution_ids":["https://openalex.org/I15059493"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5048592992"],"corresponding_institution_ids":["https://openalex.org/I120217413"],"apc_list":null,"apc_paid":null,"fwci":0.1299,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.41219698,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8218652009963989},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7607361078262329},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.754822850227356},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6608355045318604},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6601676940917969},{"id":"https://openalex.org/keywords/efficient-energy-use","display_name":"Efficient energy use","score":0.5559666752815247},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5132100582122803},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.494524210691452},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.48734912276268005},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.42126885056495667},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41936996579170227},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3301340937614441},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.20405304431915283},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17078238725662231},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13318327069282532}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8218652009963989},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7607361078262329},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.754822850227356},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6608355045318604},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6601676940917969},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.5559666752815247},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5132100582122803},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.494524210691452},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.48734912276268005},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.42126885056495667},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41936996579170227},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3301340937614441},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.20405304431915283},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17078238725662231},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13318327069282532},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/isdfs58141.2023.10131740","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/isdfs58141.2023.10131740","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 11th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"},{"id":"pmh:oai:gcris.iyte.edu.tr:11147/13690","is_oa":true,"landing_page_url":"https://hdl.handle.net/11147/13690","pdf_url":"https://gcris.iyte.edu.tr/bitstream/11147/13690/1/A_Lightweight.pdf","source":{"id":"https://openalex.org/S4306400894","display_name":"\u0130YTE (\u0130ZM\u0130R Y\u00dcKSEK TEKNOLOJ\u0130 ENST\u0130T\u00dcS\u00dc)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I120217413","host_organization_name":"Izmir Institute of Technology","host_organization_lineage":["https://openalex.org/I120217413"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Object"}],"best_oa_location":{"id":"pmh:oai:gcris.iyte.edu.tr:11147/13690","is_oa":true,"landing_page_url":"https://hdl.handle.net/11147/13690","pdf_url":"https://gcris.iyte.edu.tr/bitstream/11147/13690/1/A_Lightweight.pdf","source":{"id":"https://openalex.org/S4306400894","display_name":"\u0130YTE (\u0130ZM\u0130R Y\u00dcKSEK TEKNOLOJ\u0130 ENST\u0130T\u00dcS\u00dc)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I120217413","host_organization_name":"Izmir Institute of Technology","host_organization_lineage":["https://openalex.org/I120217413"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Object"},"sustainable_development_goals":[{"score":0.8999999761581421,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4378364052.pdf"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W1963802579","https://openalex.org/W1987034598","https://openalex.org/W1997754586","https://openalex.org/W2156759922","https://openalex.org/W2196278068","https://openalex.org/W2576157399","https://openalex.org/W2605107826","https://openalex.org/W2786306741","https://openalex.org/W2800375709","https://openalex.org/W2810500455","https://openalex.org/W2912241863","https://openalex.org/W2942582850","https://openalex.org/W2957382329","https://openalex.org/W2968032176","https://openalex.org/W3088324614","https://openalex.org/W3134572092","https://openalex.org/W3182610994","https://openalex.org/W3188481277","https://openalex.org/W4292387465","https://openalex.org/W4322628812","https://openalex.org/W6641247316","https://openalex.org/W7020636220"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W2016567611","https://openalex.org/W2475541339","https://openalex.org/W565335793","https://openalex.org/W2363071176","https://openalex.org/W2107199751","https://openalex.org/W4243812570","https://openalex.org/W4300441478","https://openalex.org/W2062965938","https://openalex.org/W2566795117"],"abstract_inverted_index":{"Third":[0],"parties":[1],"and":[2,7,21,72,98,151],"legitimate":[3],"entities":[4],"can":[5],"reach":[6],"process":[8],"users'":[9],"private":[10],"data":[11],"through":[12],"most":[13],"wireless":[14,33],"networks.":[15],"However,":[16,101],"attackers":[17],"such":[18],"as":[19],"intruders":[20],"eavesdroppers":[22],"may":[23],"also":[24],"try":[25],"to":[26,39,51,60,88],"exploit":[27],"this":[28,114,139],"property":[29],"in":[30,138],"communication.":[31],"Hence,":[32,125],"networks":[34],"are":[35,47],"intrinsically":[36],"more":[37,129],"vulnerable":[38],"threats,":[40],"unlike":[41],"their":[42],"wired":[43],"alternatives.":[44],"Cryptographic":[45],"techniques":[46],"the":[48,62,85,90],"conventional":[49],"approaches":[50],"deal":[52],"with":[53,70,120],"that":[54,77,102],"weakness.":[55],"Nevertheless,":[56],"they":[57],"still":[58],"need":[59],"meet":[61],"requirements":[63],"of":[64,84],"contemporary":[65],"technologies,":[66],"including":[67],"IoT":[68],"nodes":[69],"energy":[71,152],"processing":[73],"power":[74],"constraints.":[75],"In":[76],"respect,":[78],"friendly":[79],"jamming":[80],"(FJ)":[81],"is":[82,123],"one":[83],"encouraging":[86],"countermeasures":[87],"overcome":[89],"mentioned":[91],"susceptibility":[92],"since":[93],"it":[94],"has":[95],"an":[96],"energy-efficient":[97],"computation-friendly":[99],"nature.":[100],"promising":[103],"approach":[104],"brings":[105],"another":[106],"challenge,":[107],"applicability.":[108],"Although":[109],"various":[110],"models":[111],"exist":[112],"against":[113],"issue,":[115],"a":[116,128,143],"lightweight":[117,144],"scheme":[118],"compliant":[119],"novel":[121],"technologies":[122],"needed.":[124],"we":[126],"propose":[127],"straightforward":[130],"FJ":[131],"model":[132],"evaluated":[133],"on":[134],"cellular":[135],"network-based":[136],"simulations":[137],"study.":[140],"Moreover,":[141],"introducing":[142],"secrecy":[145],"outage":[146],"probability":[147],"definition":[148],"increases":[149],"robustness":[150],"efficiency.":[153]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-06T07:47:59.780226","created_date":"2025-10-10T00:00:00"}
