{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:33:51Z","timestamp":1765438431173,"version":"3.37.3"},"reference-count":42,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T00:00:00Z","timestamp":1467331200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100004895","name":"European Social Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004895","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1016\/j.comcom.2016.04.009","type":"journal-article","created":{"date-parts":[[2016,4,30]],"date-time":"2016-04-30T21:47:21Z","timestamp":1462052841000},"page":"75-85","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":19,"special_numbering":"C","title":["Jammer localization in wireless networks: An experimentation-driven approach"],"prefix":"10.1016","volume":"86","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6443-3935","authenticated-orcid":false,"given":"Konstantinos","family":"Pelechrinis","sequence":"first","affiliation":[]},{"given":"Iordanis","family":"Koutsopoulos","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Broustis","sequence":"additional","affiliation":[]},{"given":"Srikanth V.","family":"Krishnamurthy","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.comcom.2016.04.009_bib0001","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1109\/COMST.2015.2402161","article-title":"Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset","volume":"18","author":"Kolias","year":"2016","journal-title":"Commun. Surv. Tut. IEEE"},{"issue":"8","key":"10.1016\/j.comcom.2016.04.009_bib0002","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1145\/1076211.1076229","article-title":"Wi-Fi attack vectors","volume":"48","author":"Berghel","year":"2005","journal-title":"Commun. ACM"},{"issue":"5","key":"10.1016\/j.comcom.2016.04.009_bib0003","doi-asserted-by":"crossref","first-page":"931","DOI":"10.1016\/j.csi.2008.09.038","article-title":"Denial-of-service attacks and countermeasures in IEEE 802.11 wireless networks","volume":"31","author":"Bicakci","year":"2009","journal-title":"Comput. Stand. Interfaces"},{"key":"10.1016\/j.comcom.2016.04.009_bib0004","unstructured":"SESP jammers, (http:\/\/www.sesp.com\/)."},{"key":"10.1016\/j.comcom.2016.04.009_bib0005","unstructured":"ISM wide-band jammers, (http:\/\/69.6.206.229\/e-commerce-solutions-catalog1.0.4.html)."},{"key":"10.1016\/j.comcom.2016.04.009_bib0006","unstructured":"Jamming attack at hacker conference. http:\/\/findarticles.com\/p\/articles\/mi_m0EIN\/is_2005_August_2\/ai_n14841565,"},{"key":"10.1016\/j.comcom.2016.04.009_bib0007","unstructured":"Techworld news, (http:\/\/www.techworld.com\/mobility\/news\/index.cfm?newsid=10941)."},{"key":"10.1016\/j.comcom.2016.04.009_bib0008","unstructured":"RF jamming attack, (http:\/\/manageengine.adventnet.com\/products\/wifi-manager\/rfjamming-attack.html)."},{"key":"10.1016\/j.comcom.2016.04.009_bib0009","unstructured":"ISA: users fear wireless networks for control, (http:\/\/lists.jammed.com\/ISN\/2007\/05\/0122.html)."},{"key":"10.1016\/j.comcom.2016.04.009_bib0010","unstructured":"Dueling with microwave ovens. http:\/\/www.wi-fiplanet.com\/tutorials\/article.php\/3116531."},{"key":"10.1016\/j.comcom.2016.04.009_bib0011","series-title":"IEEE INFOCOM","article-title":"Optimal jamming attacks and network defense policies in wireless sensor networks","author":"Li","year":"2007"},{"key":"10.1016\/j.comcom.2016.04.009_bib0012","unstructured":"Click modular router, (http:\/\/read.cs.ucla.edu\/click\/)."},{"key":"10.1016\/j.comcom.2016.04.009_bib0013","series-title":"ION GPS, Salt Lake City, UT","article-title":"GIDL: generalized interference detection and localization system","author":"Gromov","year":"2000"},{"key":"10.1016\/j.comcom.2016.04.009_bib0014","series-title":"DTIC","article-title":"Signal detection and jammer localization in multipath channels for frequency hopping communications","author":"Liu","year":"2005"},{"key":"10.1016\/j.comcom.2016.04.009_bib0015","series-title":"RADARCON, Dallas, Texas, USA","article-title":"3-D jammer localization using out-of-plane multipath","author":"Coutts","year":"1998"},{"key":"10.1016\/j.comcom.2016.04.009_bib0016","series-title":"Advanced signal-processing algorithms, architectures, and implementations","article-title":"Improved jammer localization using multiple focussing","author":"Velez","year":"1990"},{"key":"10.1016\/j.comcom.2016.04.009_bib0017","unstructured":"A.M. Dean, Detection of active emitters using triangulation and trilateration techniques: theory and practice, in: AGARD, Radiolocation Techniques."},{"key":"10.1016\/j.comcom.2016.04.009_bib0018","series-title":"IPCCC, Phoenix, AZ","article-title":"Overcoming the challenges of security in a mobile environment","author":"Broustis","year":"2006"},{"key":"10.1016\/j.comcom.2016.04.009_bib0019","series-title":"ACM MobiSys, Seattle, WA","article-title":"Accuracy characterization for metropolitan-scale Wi-Fi localization","author":"Cheng","year":"2005"},{"key":"10.1016\/j.comcom.2016.04.009_bib0020","series-title":"ACM MobiCom, Rome, IT","article-title":"Dynamic fine-grained localization in ad-hoc networks of sensors","author":"Savvides","year":"2001"},{"key":"10.1016\/j.comcom.2016.04.009_bib0021","series-title":"IEEE INFOCOM","article-title":"Drive-by localization of roadside Wi-Fi networks","author":"Subramanian","year":"2008"},{"key":"10.1016\/j.comcom.2016.04.009_bib0022","series-title":"PAM","article-title":"Access point localization using local signal strength gradient","author":"Han","year":"2009"},{"key":"10.1016\/j.comcom.2016.04.009_bib0023","series-title":"PerCom","article-title":"Exploiting environmental properties for wireless localization and location aware applications","author":"Chen","year":"2008"},{"key":"10.1016\/j.comcom.2016.04.009_bib0024","series-title":"ACM MOBIHOC","article-title":"The feasibility of launching and detecting jamming attacks in wireless networks","author":"Xu","year":"2005"},{"issue":"2","key":"10.1016\/j.comcom.2016.04.009_bib0025","doi-asserted-by":"crossref","first-page":"508","DOI":"10.1109\/TPDS.2015.2398435","article-title":"An error-minimizing framework for localizing jammers in wireless networks","volume":"25","author":"Liu","year":"2014","journal-title":"Parallel Distr. Syst. IEEE Trans."},{"key":"10.1016\/j.comcom.2016.04.009_bib0026","series-title":"IEEE GLOBECOM","article-title":"Lightweight jammer localization in wireless networks: system design and implementation","author":"Pelechrinis","year":"2009"},{"key":"10.1016\/j.comcom.2016.04.009_bib0027","series-title":"Pervasive Computing and Communications, 2009 (PerCom 2009) IEEE International Conference on","first-page":"1","article-title":"Localizing jammers in wireless networks","author":"Liu","year":"2009"},{"key":"10.1016\/j.comcom.2016.04.009_bib0028","series-title":"IEEE AINA","article-title":"An algorithm for jammer localization in wireless sensor networks","author":"Cheng","year":"2012"},{"key":"10.1016\/j.comcom.2016.04.009_bib0029","series-title":"IEEE CIS","article-title":"Multi-jammer localization in wireless sensor networks","author":"Cheng","year":"2011"},{"issue":"3","key":"10.1016\/j.comcom.2016.04.009_bib0030","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1109\/TPDS.2011.154","article-title":"Exploiting jamming-caused neighbor changes for jammer localization","volume":"23","author":"Liu","year":"2012","journal-title":"Parallel Distr. Syst. IEEE Trans."},{"issue":"18","key":"10.1016\/j.comcom.2016.04.009_bib0031","doi-asserted-by":"crossref","first-page":"3799","DOI":"10.1016\/j.comnet.2013.09.004","article-title":"Joint reactive jammer detection and localization in an enterprise Wi-Fi network","volume":"57","author":"Cai","year":"2013","journal-title":"Els. Comput. Netw."},{"key":"10.1016\/j.comcom.2016.04.009_bib0032","series-title":"ACM MOBICOM","article-title":"Routing in multi-radio, multi-hop wireless mesh networks","author":"Draves","year":"2004"},{"key":"10.1016\/j.comcom.2016.04.009_bib0033","series-title":"ACM MobiCom (poster session)","article-title":"Gradient-based routing in sensor networks","author":"Faruque","year":"2003"},{"key":"10.1016\/j.comcom.2016.04.009_bib0034","unstructured":"R. Poor, Gradient routing in ad hoc networks, in: www.media.mit.edu\/pia\/Research\/ESP\/texts\/poorieeepaper.pdf."},{"key":"10.1016\/j.comcom.2016.04.009_bib0035","series-title":"ICDCIT","article-title":"Positioned based gradient routing in mobile ad hoc networks","author":"Ruhil","year":"2005"},{"year":"1999","series-title":"IEEE 802.11 Handbook, a Designer\u2019s Companion","author":"O\u2019hara","key":"10.1016\/j.comcom.2016.04.009_bib0036"},{"key":"10.1016\/j.comcom.2016.04.009_bib0037","series-title":"IEEE INFOCOM","article-title":"Detecting selfish exploitation of carrier sensing in 802.11 networks","author":"Pelechrinis","year":"2009"},{"key":"10.1016\/j.comcom.2016.04.009_bib0038","unstructured":"The UCR testbed., (http:\/\/networks.cs.ucr.edu\/testbed\/)."},{"key":"10.1016\/j.comcom.2016.04.009_bib0039","series-title":"ACM CoNEXT","article-title":"Ares: an anti-jamming reinforcement system for 802.11 networks","author":"Pelechrinis","year":"2009"},{"key":"10.1016\/j.comcom.2016.04.009_bib0040","series-title":"Radioengineering","article-title":"Wireless LAN networks design: site syrvey or propagation models?","volume":"Vol. 12","author":"Zvanovec","year":"2003"},{"key":"10.1016\/j.comcom.2016.04.009_bib0041","unstructured":"MIT Roofnet, (http:\/\/pdos.csail.mit.edu\/roofnet)."},{"issue":"8","key":"10.1016\/j.comcom.2016.04.009_bib0042","doi-asserted-by":"crossref","first-page":"1119","DOI":"10.1109\/TMC.2010.75","article-title":"Optimal jamming attack strategies and network defense policies in wireless sensor networks","volume":"9","author":"Li","year":"2010","journal-title":"IEEE Trans. Mobile Comput."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366416301372?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366416301372?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,5,12]],"date-time":"2021-05-12T21:56:12Z","timestamp":1620856572000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366416301372"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":42,"alternative-id":["S0140366416301372"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2016.04.009","relation":{},"ISSN":["0140-3664"],"issn-type":[{"type":"print","value":"0140-3664"}],"subject":[],"published":{"date-parts":[[2016,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Jammer localization in wireless networks: An experimentation-driven approach","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comcom.2016.04.009","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}