{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:54:32Z","timestamp":1776102872386,"version":"3.50.1"},"reference-count":46,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/sp.2013.22","type":"proceedings-article","created":{"date-parts":[[2013,6,26]],"date-time":"2013-06-26T15:02:12Z","timestamp":1372258932000},"page":"174-188","source":"Crossref","is-referenced-by-count":29,"title":["Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time"],"prefix":"10.1109","author":[{"family":"Wenbo Shen","sequence":"first","affiliation":[]},{"family":"Peng Ning","sequence":"additional","affiliation":[]},{"family":"Xiaofan He","sequence":"additional","affiliation":[]},{"family":"Huaiyu Dai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018454"},{"key":"35","doi-asserted-by":"crossref","DOI":"10.1007\/11506157_16","article-title":"RFID guardian: A battery-powered mobile device for rfid privacy management","author":"rieback","year":"2005","journal-title":"Information Security and Privacy"},{"key":"17","doi-asserted-by":"crossref","DOI":"10.1145\/352600.352638","article-title":"Simple and fault-tolerant key agreement for dynamic collaborative groups","author":"kim","year":"2000","journal-title":"CCS"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1145\/2248371.2248383"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-010-0252-4"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.100608"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409983"},{"key":"34","author":"proakis","year":"2008","journal-title":"Digital Communications"},{"key":"16","volume":"5","author":"haykin","year":"1988","journal-title":"Digital Communications"},{"key":"39","article-title":"Jamming-resistant key establishment using uncoordinated frequency hopping","author":"strasser","year":"0","journal-title":"IEEE Symposium on Security and Privacy 2008"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402977"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592588"},{"key":"37","article-title":"A game-theoretic framework for jamming attacks and mitigation in commercial aircraft wireless networks","author":"slater","year":"0","journal-title":"AIAA Infotech aerospace 2009 Conference"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511841224"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514297"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018438"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920315"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2010.5663968"},{"key":"43","doi-asserted-by":"crossref","DOI":"10.1145\/285243.285260","article-title":"Secure group communications using key graphs","author":"wong","year":"1998","journal-title":"SIGCOMM"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2005.1542654"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614327"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530778"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934987"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502451"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053287"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948141"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462156"},{"key":"25","year":"0","journal-title":"The USRP Product Family Products and Daughter Boards"},{"key":"26","author":"lyons","year":"2011","journal-title":"Understanding Digital Signal Processing"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514298"},{"key":"28","author":"meyr","year":"1998","journal-title":"Digital Communication Receivers Synchronization Channel Estimation and Signal Processing"},{"key":"29","author":"pahlavan","year":"2001","journal-title":"Principles of Wireless Networks"},{"key":"3","year":"0"},{"key":"2","year":"0","journal-title":"Improvised Explosive Device - Wikipedia"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.08.005"},{"key":"1","year":"0","journal-title":"GNU Radio - The GNU Software Radio"},{"key":"30","article-title":"ELK, a new protocol for efficient large-group key distribution","author":"perrig","year":"0","journal-title":"Proceedings of the 2001 IEEE Symposium on Security and Privacy"},{"key":"7","article-title":"Random key predistribution schemes for sensor networks","author":"chan","year":"0","journal-title":"IEEE Symposium on Security and Privacy 2003"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5601957"},{"key":"32","article-title":"Jamming-resistant broadcast communication without shared keys","author":"po?pper","year":"0","journal-title":"USENIX Security Symposium 2009"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2007.381926"},{"key":"31","author":"poisel","year":"2006","journal-title":"Modern Communications Jamming Principles and Techniques"},{"key":"4","year":"0","journal-title":"USRP N210 Datasheet"},{"key":"9","article-title":"Mitigation of periodic jamming in a spread spectrum system by adaptive filter selection","author":"debruhl","year":"2012","journal-title":"PECCS"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2011.6006020"}],"event":{"name":"2013 IEEE Symposium on Security and Privacy (SP) Conference","location":"Berkeley, CA","start":{"date-parts":[[2013,5,19]]},"end":{"date-parts":[[2013,5,22]]}},"container-title":["2013 IEEE Symposium on Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/6547086\/6547088\/06547109.pdf?arnumber=6547109","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T11:18:42Z","timestamp":1498043922000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/6547109\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":46,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/sp.2013.22","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}