{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:47:42Z","timestamp":1743029262630,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030980016"},{"type":"electronic","value":"9783030980023"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-98002-3_16","type":"book-chapter","created":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T18:05:04Z","timestamp":1648663504000},"page":"215-230","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detection of\u00a0Malicious Nodes Using Collaborative Neighbour Monitoring in\u00a0DSA Networks"],"prefix":"10.1007","author":[{"given":"Augustine","family":"Takyi","sequence":"first","affiliation":[]},{"given":"Natasha","family":"Zlobinsky","sequence":"additional","affiliation":[]},{"given":"Odametey","family":"Akuye-Shika","sequence":"additional","affiliation":[]},{"given":"David","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"Melissa","family":"Densmore","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,31]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Matthee, K.W., et al.: Bringing Internet connectivity to rural Zambia using a collaborative approach. In: International Conference on Information and Communication Technologies and Development, 2007, ICTD 2007. IEEE (2007)","DOI":"10.1109\/ICTD.2007.4937391"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Chen, E.T.: The Internet of Things: opportunities, issues, and challenges. In: The Internet of Things in the Modern Business Environment, pp. 167\u2013187. IGI Global, Hershey (2017)","DOI":"10.4018\/978-1-5225-2104-4.ch009"},{"key":"16_CR3","unstructured":"Takyi, A., Densmore, M., Johnson, D.: Collaborative neighbour monitoring in TV white space network. In: Proceedings Southern Africa Telecommunication Networks and Applications Conference (SATNAC 2016), George, South Africa (2016)"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Yuvraj, S.: Comparison of Okumura, Hata and COST-231 models on the basis of path loss and signal strength. Int. J. Comput. Appl. 59(11), 37\u201341 (2012)","DOI":"10.5120\/9594-4216"},{"key":"16_CR5","unstructured":"Patil, B., Anthony M., Scott P.: Protocol to Access White-Space (PAWS) Databases: Use Cases and Requirements (2013)"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Anand, S., Jin, Z., Subbalakshmi. K.P.: An analytical model for primary user emulation attacks in cognitive radio networks. In: 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2008, DySPAN 2008. IEEE (2008)","DOI":"10.1109\/DYSPAN.2008.16"},{"key":"16_CR7","unstructured":"Kamat, P., et al.: Enhancing source-location privacy in sensor network routing. In: Proceedings 25th IEEE International Conference on Distributed Computing Systems, 2005, ICDCS 2005. IEEE (2005)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Tapiador, J.E., Clark, J.A.: Masquerade mimicry attack detection: a randomised approach. Comput. Secur. 30(5), 297\u2013310 (2011)","DOI":"10.1016\/j.cose.2011.05.004"},{"key":"16_CR9","unstructured":"Richard Yu, F.: Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios. In: MILCOM 2009 - 2009 IEEE Military Communications Conference, p. 2009. IEEE (2009)"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"van den Heuvel, M.P., et al.: High-cost, high-capacity backbone for global brain communication. Proc. Natl. Acad. Sci. 109(28), 11372\u201311377 (2012):","DOI":"10.1073\/pnas.1203593109"},{"key":"16_CR11","unstructured":"Subramanian, L., et al.: Rethinking wireless for the developing world. In: IRVINE IS BURNING, p. 43 (2006)"},{"key":"16_CR12","unstructured":"Jonathan, P., et al.: Successful deployment and key applications of Television White Space Networks (TVWS) Malawi (2014)"},{"key":"16_CR13","doi-asserted-by":"publisher","unstructured":"Albert, A.L., Moshe, T.M., David, L.J.: The television white space opportunity in Southern Africa: from field measurements to quantifying white spaces, In: White Space Communication, pp. 75\u2013116. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-08747-4","DOI":"10.1007\/978-3-319-08747-4"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Kaligineedi, P., Majid, K., Vijay, K.B.: Secure cooperative sensing techniques for cognitive radio systems. In: IEEE International Conference on Communications, ICC 2008. IEEE (2008)","DOI":"10.1109\/ICC.2008.640"},{"key":"16_CR15","unstructured":"Zargar, S.T., et al.: Security in dynamic spectrum access systems: a survey. (2009)"},{"issue":"13","key":"16_CR16","doi-asserted-by":"publisher","first-page":"1387","DOI":"10.1016\/j.comcom.2013.06.003","volume":"36","author":"S Bhattacharjee","year":"2013","unstructured":"Bhattacharjee, S., Shamik, S., Mainak, C.: Vulnerabilities in cognitive radio networks: a survey. Comput. Commun. 36(13), 1387\u20131398 (2013)","journal-title":"Comput. Commun."},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Fatemieh, O., Ranveer C., Carl , A.G.: Secure collaborative sensing for crowd sourcing spectrum data in white space networks. In: 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum. IEEE (2010)","DOI":"10.1109\/DYSPAN.2010.5457893"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Zarrin, S., Teng J.L: Belief propagation on factor graphs for cooperative spectrum sensing in cognitive radio. In: 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2008, DySPAN 2008. IEEE (2008)","DOI":"10.1109\/DYSPAN.2008.18"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Jayaprakasam, A., Vinod S.: Sequential detection based cooperative spectrum sensing algorithms in cognitive radio. In: 2009 First UK-India International Workshop on Cognitive Wireless Systems (UKIWCWS). IEEE (2009)","DOI":"10.1109\/UKIWCWS.2009.5749426"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, W., Ranjan K.M., Khaled B.L.: Optimization of cooperative spectrum sensing with energy detection in cognitive radio networks. IEEE Trans. Wirel. Commun. 8(12), 5761\u20135766 (2009)","DOI":"10.1109\/TWC.2009.12.081710"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Saad, W., et al.: Coalitional games for distributed collaborative spectrum sensing in cognitive radio networks. In: IEEE INFOCOM 2009. IEEE (2009)","DOI":"10.1109\/INFCOM.2009.5062135"},{"key":"16_CR22","unstructured":"Visotsky, E., Kuffner, S., Peterson, R.: On collaborative detection of TV transmissions in support of dynamic spectrum sharing. In: 2005 First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks 2005, DySPAN 2005. IEEE (2005)"},{"issue":"2","key":"16_CR23","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1109\/JSAC.2011.110206","volume":"29","author":"JJ Meng","year":"2011","unstructured":"Meng, J.J., et al.: Collaborative spectrum sensing from sparse observations in cognitive radio networks. IEEE J. Select. Areas Commun. 29(2), 327\u2013337 (2011)","journal-title":"IEEE J. Select. Areas Commun."},{"key":"16_CR24","unstructured":"Wang, W., et al.: Attack-proof collaborative spectrum sensing in cognitive radio networks. In: 43rd Annual Conference on Information Sciences and Systems 2009, CISS 2009. IEEE (2009)"},{"issue":"1","key":"16_CR25","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.phycom.2009.08.005","volume":"3","author":"D Angelosante","year":"2010","unstructured":"Angelosante, D., Ezio, B., Marco, L.: Neighbor discovery in wireless networks: a multiuser-detection approach. Phy. Commun. 3(1), 28\u201336 (2010)","journal-title":"Phy. Commun."},{"key":"16_CR26","doi-asserted-by":"publisher","unstructured":"Pejovic, V., et al.: VillageLink: a channel allocation technique for wide-area white space networks. In: White Space Communication, pp. 249\u2013280. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-08747-4","DOI":"10.1007\/978-3-319-08747-4"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Jin, Z., Anand, S., Subbalakshmi, K.P.: Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing. ACM SIGMOBILE Mobile Comput. Commun. Rev. 13(2), 74\u201385 (2009)","DOI":"10.1145\/1621076.1621084"},{"key":"16_CR28","unstructured":"Augustine, T., et al.: Performance analysis of a collaborative DSA-based network with malicious nodes (2017)"},{"issue":"1","key":"16_CR29","first-page":"22","volume":"9","author":"MS Bouassida","year":"2009","unstructured":"Bouassida, M.S., et al.: Sybil nodes detection based on received signal strength variations within VANET. IJ Netw. Secur. 9(1), 22\u201333 (2009)","journal-title":"IJ Netw. Secur."},{"key":"16_CR30","unstructured":"Al-Khalid, O., Adams, A.E., Charalampos C.T.: Node discovery protocol and localization for distributed underwater acoustic networks. In: Advanced International Conference on Telecommunications, 2006\/International Conference on Internet and Web Applications and Services, AICT-ICIW 2006. IEEE (2006)"},{"key":"16_CR31","unstructured":"Karthikeyan, V., Vinod, A., Jeyakumar, P.: An energy efficient neighbour node discovery method for wireless sensor networks. arXiv preprint arXiv:1402.3655 (2014)"},{"issue":"8","key":"16_CR32","doi-asserted-by":"publisher","first-page":"1564","DOI":"10.1109\/LCOMM.2013.062113.130759","volume":"17","author":"S Althunibat","year":"2013","unstructured":"Althunibat, S., et al.: On the trade-off between security and energy efficiency in cooperative spectrum sensing for cognitive radio. IEEE Commun. Lett. 17(8), 1564\u20131567 (2013)","journal-title":"IEEE Commun. Lett."},{"issue":"5","key":"16_CR33","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1109\/TIFS.2014.2310355","volume":"9","author":"A Alahmadi","year":"2014","unstructured":"Alahmadi, A., et al.: Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard. IEEE Trans. Inf. Forensics Secur. 9(5), 772\u2013781 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"16_CR34","unstructured":"Kaemarungsi, K., Prashant, K.: Properties of indoor received signal strength for WLAN location fingerprinting. In: The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004, MOBIQUITOUS 2004. IEEE (2004)"},{"key":"16_CR35","doi-asserted-by":"crossref","unstructured":"Rida, M.E., et al.: Indoor location position based on bluetooth signal strength. In: 2015 2nd International Conference on Information Science and Control Engineering (ICISCE). IEEE (2015)","DOI":"10.1109\/ICISCE.2015.177"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Cognitive Radio Oriented Wireless Networks and Wireless Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-98002-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T18:12:01Z","timestamp":1648663921000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-98002-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030980016","9783030980023"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-98002-3_16","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"31 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CROWNCOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cognitive Radio Oriented Wireless Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"crowncom2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/crowncom.eai-conferences.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}