{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:32:41Z","timestamp":1726003961770},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030017002"},{"type":"electronic","value":"9783030017019"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01701-9_17","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T17:03:08Z","timestamp":1546016588000},"page":"297-317","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks"],"prefix":"10.1007","author":[{"given":"Qi","family":"Dong","sequence":"first","affiliation":[]},{"given":"Yu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiaohua","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Roger","family":"Zimmermann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"17_CR1","unstructured":"Federal Communications Commission: Facilitating opportunities for flexible, efficient, and reliable spectrum use employing spectrum agile radio technologies. Et et docket (03\u2013108) edn, December 2003"},{"key":"17_CR2","unstructured":"Federal Communications Commission: Enabling innovative small cell use in 3.5 GHz band NPRM & order, December 2012"},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"2367","DOI":"10.1016\/j.adhoc.2013.06.002","volume":"11","author":"F Adelantado","year":"2013","unstructured":"Adelantado, F., Verikoukis, C.: Detection of malicious users in cognitive radio ad hoc networks: a non-parametric statistical approach. Ad Hoc Netw. 11, 2367\u20132380 (2013)","journal-title":"Ad Hoc Netw."},{"key":"17_CR4","unstructured":"Baker, M.A.: Introductory remarks: panel on the future of radio technology. Technical report, Federal Communications Commission (2010)"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Brik, V., Banerjee, S., Gruteser, M., Oh, S.: Wireless device identification with radiometric signatures. ACM (2008)","DOI":"10.1145\/1409944.1409959"},{"issue":"1","key":"17_CR6","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/JSAC.2008.080104","volume":"26","author":"R Chen","year":"2008","unstructured":"Chen, R., Park, J.M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26(1), 25\u201337 (2008)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"17_CR7","unstructured":"Chen, Z., Cooklev, T., Chen, C., Pomalaza-R\u00e1ez, C.: Modeling primary user emulation attacks and defenses in cognitive radio networks. In: 2009 IEEE 28th International Performance Computing and Communications Conference (IPCCC), pp. 208\u2013215. IEEE (2009)"},{"issue":"3","key":"17_CR8","first-page":"312","volume":"3","author":"D Das","year":"2013","unstructured":"Das, D., Das, S.: Primary user emulation attack in cognitive radio networks: a survey. IRACST-Int. J. Comput. Netw. Wirel. Commun. 3(3), 312\u2013318 (2013)","journal-title":"IRACST-Int. J. Comput. Netw. Wirel. Commun."},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-319-65127-9_20","volume-title":"Computer Network Security","author":"Q Dong","year":"2017","unstructured":"Dong, Q., Yang, Z., Chen, Y., Li, X., Zeng, K.: Anomaly detection in cognitive radio networks exploiting singular spectrum analysis. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds.) MMM-ACNS 2017. LNCS, vol. 10446, pp. 247\u2013259. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-65127-9_20"},{"issue":"12","key":"17_CR10","first-page":"e3","volume":"4","author":"Q Dong","year":"2017","unstructured":"Dong, Q., Yang, Z., Chen, Y., Li, X., Zeng, K.: Exploration of singular spectrum analysis for online anomaly detection in CRNs. EAI Endorsed Trans. Secur. Saf. 4(12), e3 (2017)","journal-title":"EAI Endorsed Trans. Secur. Saf."},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Feng, X., Zhang, J., Zhang, Q.: Database-assisted multi-AP network on TV white spaces: architecture, spectrum allocation and AP discovery. In: 2011 IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), pp. 265\u2013276. IEEE (2011)","DOI":"10.1109\/DYSPAN.2011.5936215"},{"key":"17_CR12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511841224","volume-title":"Wireless Communications","author":"A Goldsmith","year":"2005","unstructured":"Goldsmith, A.: Wireless Communications. Cambridge University Press, Cambridge (2005)"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Huang, L., Xie, L., Yu, H., Wang, W., Yao, Y.: Anti-PUE attack based on joint position verification in cognitive radio networks, vol. 2. IEEE (2010)","DOI":"10.1109\/CMC.2010.26"},{"key":"17_CR14","unstructured":"Kawalec, A., Owczarek, R.: Specific emitter identification using intrapulse data. In: Radar Conference, 2004. EURAD. First European, pp. 249\u2013252. IEEE (2004)"},{"key":"17_CR15","unstructured":"Langley, L.E.: Specific emitter identification (SEI) and classical parameter fusion technology. In: WESCON\/1993. Conference Record, pp. 377\u2013381. IEEE (1993). 0780399706"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Liu, Y., Ning, P., Dai, H.: Authenticating primary users\u2019 signals in cognitive radio networks via integrated cryptographic and wireless link signatures, pp. 286\u2013301. IEEE (2010)","DOI":"10.1109\/SP.2010.24"},{"issue":"1","key":"17_CR17","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1186\/s13635-015-0021-0","volume":"2015","author":"J Marinho","year":"2015","unstructured":"Marinho, J., Granjal, J., Monteiro, E.: A survey on security attacks and countermeasures with primary user detection in cognitive radio networks. EURASIP J. Inf. Secur. 2015(1), 4 (2015). ISSN 1687-417X","journal-title":"EURASIP J. Inf. Secur."},{"key":"17_CR18","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/TMC.2011.241","volume":"11","author":"R Murty","year":"2012","unstructured":"Murty, R., Chandra, R., Moscibroda, T., Bahl, P.V.: Senseless: a database-driven white spaces network. IEEE Trans. Mob. Comput. 11, 189\u2013203 (2012)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"3","key":"17_CR19","doi-asserted-by":"publisher","first-page":"1193","DOI":"10.1109\/SURV.2014.031914.00078","volume":"16","author":"F Paisana","year":"2014","unstructured":"Paisana, F., Marchetti, N., DaSilva, L.A.: Radar, TV and cellular bands: which spectrum access techniques for which bands? IEEE Commun. Surv. Tutor. 16(3), 1193\u20131220 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"17_CR20","unstructured":"Peng, K., Zeng, F., Zeng, Q.: A new method to detect primary user emulation attacks in cognitive radio networks. In: International Conference on Computer Science and Service System (CSSS 2014) (2014)"},{"issue":"11","key":"17_CR21","first-page":"3789","volume":"8","author":"M Pesko","year":"2014","unstructured":"Pesko, M., Javornik, T., Kosir, A., Stular, M., Mohorcic, M.: Radio environment maps: the survey of construction methods. TIIS 8(11), 3789\u20133809 (2014)","journal-title":"TIIS"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Rasmussen, K.B., Capkun, S.: Implications of radio fingerprinting on the security of sensor networks. In: Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007, pp. 331\u2013340. IEEE (2007)","DOI":"10.1109\/SECCOM.2007.4550352"},{"issue":"1","key":"17_CR23","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/TMC.2002.1011059","volume":"99","author":"T Roos","year":"2002","unstructured":"Roos, T., Myllymaki, P., Tirri, H.: A statistical modeling approach to location estimation. IEEE Trans. Mob. Comput. 99(1), 59\u201369 (2002)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"12","key":"17_CR24","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1109\/MCOM.2013.6685772","volume":"51","author":"HB Yilmaz","year":"2013","unstructured":"Yilmaz, H.B., Tugcu, T., Alagoz, F., Bayhan, S.: Radio environment map as enabler for practical cognitive radio networks. IEEE Commun. Mag. 51(12), 162\u2013169 (2013)","journal-title":"IEEE Commun. Mag."},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Zhang, X., Jia, Q., Guo, L.: Secure and optimized unauthorized secondary user detection in dynamic spectrum access. In: IEEE Conference on Communications and Network Security (CNS), pp. 1\u20139, October 2017","DOI":"10.1109\/CNS.2017.8228639"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01701-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T06:16:59Z","timestamp":1573625819000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01701-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017002","9783030017019"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01701-9_17","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}