{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:17:50Z","timestamp":1726064270934},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030222765"},{"type":"electronic","value":"9783030222772"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_10","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:02:28Z","timestamp":1577775748000},"page":"247-264","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security Issues in Cognitive Radio Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Mahendra Kumar","family":"Murmu","sequence":"first","affiliation":[]},{"given":"Awadhesh Kumar","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"issue":"13","key":"10_CR1","doi-asserted-by":"publisher","first-page":"2127","DOI":"10.1016\/j.comnet.2006.05.001","volume":"50","author":"IF Akyildiz","year":"2006","unstructured":"Akyildiz, I. F., Lee, W. Y., Vuran, M. C., & Mohanty, S. (2006). NeXt generation\/dynamic spectrum access\/cognitive radio wireless networks: A survey. Computer Networks, 50(13), 2127\u20132159.","journal-title":"Computer Networks"},{"issue":"1","key":"10_CR2","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/MCOM.2010.5394033","volume":"48","author":"F Granelli","year":"2010","unstructured":"Granelli, F., Pawelczak, P., Prasad, R. V., Subbalakshmi, K. P., Chandramouli, R., Hoffmeyer, J. A., & Berger, H. S. (2010). Standardization and research in cognitive and dynamic spectrum access networks: IEEE SCC41 efforts and other activities. IEEE Communications Magazine, 48(1), 71.","journal-title":"IEEE Communications Magazine"},{"key":"10_CR3","unstructured":"Orumwense, E. F., Oyerinde, O., & Mneney, S. H. (2017). Improved cooperative spectrum sensing under primary user emulation attacks in cognitive radio networks. Journal of Engineering Research, 5(3), 1\u201318."},{"issue":"5","key":"10_CR4","doi-asserted-by":"publisher","first-page":"810","DOI":"10.1016\/j.adhoc.2009.01.001","volume":"7","author":"IF Akyildiz","year":"2009","unstructured":"Akyildiz, I. F., Lee, W. Y., & Chowdhury, K. R. (2009). CRAHNs: Cognitive radio ad hoc networks. Ad Hoc Networks, 7(5), 810\u2013836.","journal-title":"Ad Hoc Networks"},{"issue":"3","key":"10_CR5","doi-asserted-by":"publisher","first-page":"1117","DOI":"10.1007\/s11277-014-2175-3","volume":"81","author":"N Mansoor","year":"2015","unstructured":"Mansoor, N., Islam, A. M., Zareei, M., Baharun, S., Wakabayashi, T., & Komaki, S. (2015). Cognitive radio ad-hoc network architectures: A survey. Wireless Personal Communications, 81(3), 1117\u20131142.","journal-title":"Wireless Personal Communications"},{"key":"10_CR6","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0105-3","volume-title":"Handbook of research on modern cryptographic solutions for computer and cyber security","author":"BB Gupta","year":"2016","unstructured":"Gupta, B. B., Agrawal, D. P., & Yamaguchi, S. (2016). Handbook of research on modern cryptographic solutions for computer and cyber security. Pennsylvania: IGI Global. \nhttps:\/\/doi.org\/10.4018\/978-1-5225-0105-3\n\n."},{"issue":"1","key":"10_CR7","doi-asserted-by":"publisher","first-page":"143","DOI":"10.4018\/IJCAC.2018010107","volume":"8","author":"H Ko","year":"2018","unstructured":"Ko, H., Mesicek, L., Choi, J., Choi, J., & Hwang, S. (2018). A study on secure contents strategies for applications with DRM on cloud computing. International Journal of Cloud Applications and Computing (IJCAC), 8(1), 143\u2013153. \nhttps:\/\/doi.org\/10.4018\/IJCAC.2018010107\n\n.","journal-title":"International Journal of Cloud Applications and Computing (IJCAC)"},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"1402","DOI":"10.1109\/JIOT.2018.2844727","volume":"6","author":"L Wang","year":"2018","unstructured":"Wang, L., Li, L., Li, J., Li, J., Gupta, B. B., & Liu, X. (2018). Compressive sensing of medical images with confidentially homomorphic aggregations. IEEE IoT Journal, 6, 1402. \nhttps:\/\/doi.org\/10.1109\/JIOT.2018.2844727\n\n.","journal-title":"IEEE IoT Journal"},{"key":"10_CR9","first-page":"666","volume-title":"Computer and cyber security: Principles, algorithm, applications, and perspectives","author":"BB Gupta","year":"2018","unstructured":"Gupta, B. B., Agrawal, D. P., & Wang, H. (2018). Computer and cyber security: Principles, algorithm, applications, and perspectives (p. 666). Boca Raton, FL: CRC Press, Taylor & Francis."},{"issue":"1","key":"10_CR10","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1109\/SURV.2011.122211.00162","volume":"15","author":"AG Fragkiadakis","year":"2013","unstructured":"Fragkiadakis, A. G., Tragos, E. Z., & Askoxylakis, I. G. (2013). A survey on security threats and detection techniques in cognitive radio networks. IEEE Communications Surveys and Tutorials, 15(1), 428\u2013445.","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"10_CR11","first-page":"1","volume-title":"SoutheastCon","author":"S Holcomb","year":"2016","unstructured":"Holcomb, S., & Rawat, D. B. (2016, March). Recent security issues on cognitive radio networks: A survey. In SoutheastCon (pp. 1\u20136). Piscataway, NJ: IEEE."},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"1904","DOI":"10.1109\/JIOT.2018.2817339","volume":"5","author":"HB Salameh","year":"2018","unstructured":"Salameh, H. B., Almajali, S., Ayyash, M., & Elgala, H. (2018). Spectrum assignment in cognitive radio networks for internet-of-things delay-sensitive applications under jamming attacks. IEEE Internet of Things Journal, 5, 1904.","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"10_CR13","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/SURV.2009.090109","volume":"11","author":"T Yucek","year":"2009","unstructured":"Yucek, T., & Arslan, H. (2009). A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Communications Surveys and Tutorials, 11(1), 116\u2013130.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"3","key":"10_CR14","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MNET.2013.6523808","volume":"27","author":"M Jo","year":"2013","unstructured":"Jo, M., Han, L., Kim, D., & In, H. P. (2013). Selfish attacks and detection in cognitive radio ad-hoc networks. IEEE Network, 27(3), 46\u201350.","journal-title":"IEEE Network"},{"issue":"2","key":"10_CR15","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1109\/SURV.2011.032511.00097","volume":"14","author":"G Baldini","year":"2012","unstructured":"Baldini, G., Sturman, T., Biswas, A. R., Leschhorn, R., Godor, G., & Street, M. (2012). Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead. IEEE Communications Surveys and Tutorials, 14(2), 355\u2013379.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"1","key":"10_CR16","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s13319-018-0161-3","volume":"9","author":"CK Nagpal","year":"2018","unstructured":"Nagpal, C. K. (2018). A game theory based solution for security challenges in CRNs. 3D Research, 9(1), 11.","journal-title":"3D Research"},{"key":"10_CR17","doi-asserted-by":"publisher","unstructured":"Meghanathan, N., & Reddy, Y. B. (2013). Cognitive radio technology applications for wireless and mobile ad hoc networks. IGI Global book series in AWTT. \nhttps:\/\/doi.org\/10.4018\/978-1-4666-4221-8\n\n.","DOI":"10.4018\/978-1-4666-4221-8"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Agarwal, S., Shakya, R. K., Singh, Y. N., & Roy, A. (2012). DSAT-MAC: Dynamic slot allocation based TDMA MAC protocol for cognitive radio networks. In International Conference on Wireless and Optical Communications Networks (WOCN) (pp. 1\u20136).","DOI":"10.1109\/WOCN.2012.6331889"},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/3261058","volume":"2017","author":"M Khasawneh","year":"2017","unstructured":"Khasawneh, M., & Agarwal, A. (2017). A collaborative approach for monitoring nodes behavior during spectrum sensing to mitigate multiple attacks in cognitive radio networks. Security and Communication Networks, 2017, 1.","journal-title":"Security and Communication Networks"},{"key":"10_CR20","first-page":"284","volume-title":"Cognitive networks: Towards self-aware networks","author":"CN Mathur","year":"2007","unstructured":"Mathur, C. N., & Subbalakshmi, K. P. (2007). Security issues in cognitive radio networks. In Cognitive networks: Towards self-aware networks (pp. 284\u2013293). Hoboken, NJ: Wiley."},{"key":"10_CR21","first-page":"1","volume-title":"Automation and computing (ICAC)","author":"MW Akram","year":"2017","unstructured":"Akram, M. W., Salman, M., Shah, M. A., & Ahmed, M. M. (2017, September). A review: Security challenges in cognitive radio networks. In Automation and computing (ICAC) (pp. 1\u20136). Piscataway, NJ: IEEE."},{"key":"10_CR22","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/MNET.2013.6523800","volume":"27","author":"K Ren","year":"2013","unstructured":"Ren, K., Zhu, H., Han, Z., & Poovendran, R. (2013). Security in cognitive radio networks. Proceedings of IEEE Network, 27, 2\u20133.","journal-title":"Proceedings of IEEE Network"},{"issue":"4","key":"10_CR23","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/s11036-015-0633-0","volume":"20","author":"T Kang","year":"2015","unstructured":"Kang, T., & Guo, L. (2015). Physical layer security in cognitive radio based self-organization network. Mobile Networks and Applications, 20(4), 459\u2013465.","journal-title":"Mobile Networks and Applications"},{"key":"10_CR24","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.jisa.2017.11.010","volume":"38","author":"M Bouabdellah","year":"2018","unstructured":"Bouabdellah, M., Kaabouch, N., El Bouanani, F., & Ben-Azza, H. (2018). Network layer attacks and countermeasures in cognitive radio networks: A survey. Journal of Information Security and Applications, 38, 40\u201349.","journal-title":"Journal of Information Security and Applications"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Babu, B. R., Tripathi, M., Gaur, M. S., Gopalani, D., & Jat, D. S. (2015, May). Cognitive radio ad-hoc networks: Attacks and its impact. In Emerging Trends in Networks and Computer Communications (ETNCC) (pp. 125\u2013130). IEEE.","DOI":"10.1109\/ETNCC.2015.7184821"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Hossain, A., & Sarkar, N. I. (2015, November). Cross layer rendezvous in cognitive radio ad-hoc networks. In Telecommunication Networks and Applications Conference (ITNAC) (pp. 149\u2013154). IEEE.","DOI":"10.1109\/ATNAC.2015.7366804"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Soliman, J. N., Mageed, T. A., & El-Hennawy, H. M. (2017, December). Taxonomy of security attacks and threats in cognitive radio networks. In Electronics, Communications and Computers (JAC-ECC), 2017 Japan-Africa Conference on IEEE (pp. 127\u2013131).","DOI":"10.1109\/JEC-ECC.2017.8305794"},{"issue":"12","key":"10_CR28","doi-asserted-by":"publisher","first-page":"3172","DOI":"10.1109\/JPROC.2012.2208211","volume":"100","author":"A Attar","year":"2012","unstructured":"Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172\u20133186.","journal-title":"Proceedings of the IEEE"},{"issue":"2","key":"10_CR29","doi-asserted-by":"publisher","first-page":"142","DOI":"10.4103\/0256-4602.110553","volume":"30","author":"H Kim","year":"2013","unstructured":"Kim, H. (2013). Privacy preserving security framework for cognitive radio networks. IETE Technical Review, 30(2), 142\u2013148.","journal-title":"IETE Technical Review"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Nuallain, E. O. (2008, October). A proposed propagation-based methodology with which to address the hidden node problem and security\/reliability issues in cognitive radio. In Wireless Communications, Networking and Mobile Computing, 2008. WiCOM\u201908 IEEE (pp. 1\u20135).","DOI":"10.1109\/WiCom.2008.290"},{"issue":"3","key":"10_CR31","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1109\/CC.2015.7084371","volume":"12","author":"LI Jianwu","year":"2015","unstructured":"Jianwu, L. I., Zebing, F., Zhiyong, F., & Ping, Z. (2015). A survey of security issues in cognitive radio networks. China Communications, 12(3), 132\u2013150.","journal-title":"China Communications"},{"issue":"10","key":"10_CR32","doi-asserted-by":"publisher","first-page":"1665","DOI":"10.1631\/FITEE.1700203","volume":"18","author":"QM Jiang","year":"2017","unstructured":"Jiang, Q. M., Chen, H. F., Xie, L., & Wang, K. (2017). On detecting primary user emulation attack using channel impulse response in the cognitive radio network. Frontiers of Information Technology and Electronic Engineering, 18(10), 1665\u20131676.","journal-title":"Frontiers of Information Technology and Electronic Engineering"},{"key":"10_CR33","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/TCCN.2018.2826552","volume":"4","author":"DT Ta","year":"2018","unstructured":"Ta, D. T., Nguyen-Thanh, N., Maill\u00e9, P., & Nguyen, V. T. (2018). Strategic surveillance against primary user emulation attacks in cognitive radio networks. IEEE Transactions on Cognitive Communications and Networking, 4, 582.","journal-title":"IEEE Transactions on Cognitive Communications and Networking"},{"key":"10_CR34","doi-asserted-by":"publisher","first-page":"29486","DOI":"10.1109\/ACCESS.2018.2842826","volume":"6","author":"HA Shah","year":"2018","unstructured":"Shah, H. A., & Koo, I. (2018). A novel physical layer security scheme in OFDM-based cognitive radio networks. IEEE Access, 6, 29486.","journal-title":"IEEE Access"},{"key":"10_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/5457176","volume":"2018","author":"K Ho-Van","year":"2018","unstructured":"Ho-Van, K., & Do-Dac, T. (2018). Reliability-security trade-off analysis of cognitive radio networks with jamming and licensed interference. Wireless Communications and Mobile Computing, 2018, 1.","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"3","key":"10_CR36","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., & Pease, M. (1982). The byzantine generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS), 4(3), 382\u2013401.","journal-title":"ACM Transactions on Programming Languages and Systems (TOPLAS)"},{"issue":"2","key":"10_CR37","doi-asserted-by":"publisher","first-page":"370","DOI":"10.3390\/s18020370","volume":"18","author":"J Feng","year":"2018","unstructured":"Feng, J., Zhang, M., Xiao, Y., & Yue, H. (2018). Securing cooperative spectrum sensing against collusive SSDF attack using XOR distance analysis in cognitive radio networks. Sensors, 18(2), 370.","journal-title":"Sensors"}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:03:51Z","timestamp":1577775831000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_10","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}