{"id":"https://openalex.org/W2171878643","doi":"https://doi.org/10.1145/1920261.1920315","title":"Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure","display_name":"Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure","publication_year":2010,"publication_date":"2010-12-06","ids":{"openalex":"https://openalex.org/W2171878643","doi":"https://doi.org/10.1145/1920261.1920315","mag":"2171878643"},"language":"en","primary_location":{"id":"doi:10.1145/1920261.1920315","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1920261.1920315","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100340369","display_name":"An Liu","orcid":"https://orcid.org/0000-0002-3943-5234"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"An Liu","raw_affiliation_strings":["North Carolina State University"],"affiliations":[{"raw_affiliation_string":"North Carolina State University","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016753473","display_name":"Peng Ning","orcid":"https://orcid.org/0000-0002-1455-9919"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Ning","raw_affiliation_strings":["North Carolina State University"],"affiliations":[{"raw_affiliation_string":"North Carolina State University","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027155270","display_name":"Huaiyu Dai","orcid":"https://orcid.org/0000-0002-0078-4891"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Huaiyu Dai","raw_affiliation_strings":["North Carolina State University"],"affiliations":[{"raw_affiliation_string":"North Carolina State University","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101444211","display_name":"Yao Liu","orcid":"https://orcid.org/0000-0003-2817-0725"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yao Liu","raw_affiliation_strings":["North Carolina State University"],"affiliations":[{"raw_affiliation_string":"North Carolina State University","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044174480","display_name":"Cliff Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210163870","display_name":"United States Army Research Office","ror":"https://ror.org/05epdh915","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437","https://openalex.org/I4210163870"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cliff Wang","raw_affiliation_strings":["U.S. Army Research Office"],"affiliations":[{"raw_affiliation_string":"U.S. Army Research Office","institution_ids":["https://openalex.org/I4210163870"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100340369"],"corresponding_institution_ids":["https://openalex.org/I137902535"],"apc_list":null,"apc_paid":null,"fwci":6.6945,"has_fulltext":false,"cited_by_count":48,"citation_normalized_percentile":{"value":0.97125469,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"367","last_page":"376"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/direct-sequence-spread-spectrum","display_name":"Direct-sequence spread spectrum","score":0.9176061749458313},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.8459568619728088},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.734626054763794},{"id":"https://openalex.org/keywords/spread-spectrum","display_name":"Spread spectrum","score":0.7280239462852478},{"id":"https://openalex.org/keywords/frequency-hopping-spread-spectrum","display_name":"Frequency-hopping spread spectrum","score":0.7275625467300415},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5323728919029236},{"id":"https://openalex.org/keywords/near-far-problem","display_name":"Near-far problem","score":0.46423521637916565},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4606788754463196},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4325820505619049},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3899126350879669},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.29790762066841125},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.17695888876914978}],"concepts":[{"id":"https://openalex.org/C194491627","wikidata":"https://www.wikidata.org/wiki/Q1334354","display_name":"Direct-sequence spread spectrum","level":4,"score":0.9176061749458313},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.8459568619728088},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.734626054763794},{"id":"https://openalex.org/C105344744","wikidata":"https://www.wikidata.org/wiki/Q958957","display_name":"Spread spectrum","level":3,"score":0.7280239462852478},{"id":"https://openalex.org/C122962297","wikidata":"https://www.wikidata.org/wiki/Q1136013","display_name":"Frequency-hopping spread spectrum","level":2,"score":0.7275625467300415},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5323728919029236},{"id":"https://openalex.org/C89719804","wikidata":"https://www.wikidata.org/wiki/Q6984333","display_name":"Near-far problem","level":3,"score":0.46423521637916565},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4606788754463196},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4325820505619049},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3899126350879669},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.29790762066841125},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.17695888876914978},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1920261.1920315","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1920261.1920315","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.174.6253","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.174.6253","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://discovery.csc.ncsu.edu/%7Epning/pubs/acsac10a.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.185.3029","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.185.3029","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://discovery.csc.ncsu.edu/pubs/acsac10a.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5699999928474426}],"awards":[{"id":"https://openalex.org/G1488912386","display_name":null,"funder_award_id":"W911NF-04-D-0003","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G6666475281","display_name":null,"funder_award_id":"CNS-1016260 CAREER-0447761","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G784266842","display_name":null,"funder_award_id":"CNS-1016260 CAREER-0447761","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W99628326","https://openalex.org/W595252221","https://openalex.org/W1572298868","https://openalex.org/W1977004736","https://openalex.org/W1984549474","https://openalex.org/W1993658504","https://openalex.org/W2018061461","https://openalex.org/W2063798825","https://openalex.org/W2097369613","https://openalex.org/W2107831657","https://openalex.org/W2124280970","https://openalex.org/W2124952412","https://openalex.org/W2133282516","https://openalex.org/W2134205659","https://openalex.org/W2144453263","https://openalex.org/W2151090982","https://openalex.org/W2157944696","https://openalex.org/W2158603556","https://openalex.org/W2162926971","https://openalex.org/W2569854100","https://openalex.org/W2610335499","https://openalex.org/W2798333393","https://openalex.org/W4237887428","https://openalex.org/W4245808720","https://openalex.org/W7018733341"],"related_works":["https://openalex.org/W2304504342","https://openalex.org/W242789257","https://openalex.org/W2898347774","https://openalex.org/W2120948202","https://openalex.org/W2131832797","https://openalex.org/W2369457601","https://openalex.org/W2157944696","https://openalex.org/W2327370533","https://openalex.org/W2359828397","https://openalex.org/W2284715751"],"abstract_inverted_index":{"Spread":[0,7],"spectrum":[1,25,161],"techniques":[2,26,62],"such":[3],"as":[4],"Direct":[5],"Sequence":[6],"Spectrum":[8],"(DSSS)":[9],"and":[10,30,81,123,202,218],"Frequency":[11],"Hopping":[12],"(FH)":[13],"have":[14,219],"been":[15],"commonly":[16],"used":[17],"for":[18,41,66,99,116,143,158],"anti-jamming":[19,67,101,107,159],"wireless":[20,85],"communication.":[21,86,103],"However,":[22],"traditional":[23],"spread":[24,160],"require":[27],"that":[28,214],"sender":[29],"receivers":[31],"share":[32],"a":[33,43,50,58,71,78,92,120,171,191,203],"common":[34,44,51],"secret":[35],"in":[36],"order":[37],"to":[38,154,178],"agree":[39],"upon,":[40],"example,":[42],"hopping":[45],"sequence":[46,54,115],"(in":[47,55],"FH)":[48],"or":[49],"spreading":[52,113],"code":[53,114,148],"DSSS).":[56],"Such":[57],"requirement":[59],"prevents":[60],"these":[61],"from":[63,77],"being":[64],"effective":[65,140],"broadcast":[68,102,162],"communication,":[69],"where":[70],"jammer":[72,172],"may":[73],"learn":[74],"the":[75,84,112,125,128,131,134,187],"key":[76],"compromised":[79],"receiver":[80],"then":[82],"disrupt":[83],"In":[87,167],"this":[88],"paper,":[89],"we":[90],"develop":[91,138],"novel":[93],"Delayed":[94],"Seed-Disclosure":[95],"DSSS":[96],"(DSD-DSSS)":[97],"scheme":[98],"efficient":[100],"DSD-DSSS":[104,151,183,197,215],"achieves":[105],"its":[106],"capability":[108,177],"through":[109,198],"randomly":[110],"generating":[111],"each":[117],"message":[118],"using":[119,146],"random":[121],"seed":[122,129,144],"delaying":[124],"disclosure":[126,145],"of":[127,133],"at":[130],"end":[132],"message.":[135],"We":[136,195],"also":[137],"an":[139],"protection":[141],"mechanism":[142],"content-based":[147],"subset":[149],"selection.":[150],"is":[152,216],"superior":[153,220],"all":[155],"previous":[156],"attempts":[157],"communication":[163],"without":[164],"shared":[165],"keys.":[166],"particular,":[168],"even":[169],"if":[170],"possesses":[173],"real-time":[174],"online":[175],"analysis":[176,201],"launch":[179],"reactive":[180],"jamming":[181,188],"attacks,":[182],"can":[184],"still":[185],"defeat":[186],"attacks":[189],"with":[190],"very":[192],"high":[193],"probability.":[194],"evaluate":[196],"both":[199],"theoretical":[200],"prototype":[204],"implementation":[205],"based":[206],"on":[207],"GNU":[208],"Radio;":[209],"our":[210],"evaluation":[211],"results":[212],"demonstrate":[213],"practical":[217],"security":[221],"properties.":[222]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":8},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":7}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
