{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:12:59Z","timestamp":1748751179417,"version":"3.41.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319269603"},{"type":"electronic","value":"9783319269610"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26961-0_26","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T13:07:52Z","timestamp":1450271272000},"page":"441-460","source":"Crossref","is-referenced-by-count":2,"title":["Attack-Resistant Trust-Based Weighted Majority Game Rule for Spectrum Sensing in Cognitive Radio Networks"],"prefix":"10.1007","author":[{"given":"Suchismita","family":"Bhattacharjee","sequence":"first","affiliation":[]},{"given":"Ningrinla","family":"Marchang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,31]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Mitola, J.: Cognitive radio for flexible mobile multimedia communications. In: Proceedings of the IEEE International Workshop on Mobile Communications, pp. 3\u201310 (1999)","key":"26_CR1","DOI":"10.1109\/MOMUC.1999.819467"},{"unstructured":"Mitola, J.: Cognitive Radio: An integrated agent architecture for software defined radio, Ph.D. thesis in Royal Institute of Technology (KTH) (2000)","key":"26_CR2"},{"doi-asserted-by":"publisher","unstructured":"Carlos, C., Challapali, K., Birru, D., Sai Shankar, N.: IEEE 802.22: the first worldwide wireless standard based on cognitive radios. In: Proceedings of the First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2005, pp. 328\u2013337 (2005). doi: 10.1109\/DYSPAN.2005.1542649","key":"26_CR3","DOI":"10.1109\/DYSPAN.2005.1542649"},{"doi-asserted-by":"crossref","unstructured":"Shen, J., Liu, S., Zhang, R., Liu, Y.: Soft versus hard cooperative energy detection under low SNR. In: Proceedings of the Third International Conference on Communications and Networking in China, pp. 128\u2013131 (2008)","key":"26_CR4","DOI":"10.1093\/ietcom\/e91-b.11.3732"},{"key":"26_CR5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511754326","volume-title":"Insights into Game Theory","author":"E-Y Gura","year":"2008","unstructured":"Gura, E.-Y., Maschler, M.B.: Insights into Game Theory. Cambridge University Press, Cambridge (2008)"},{"doi-asserted-by":"crossref","unstructured":"Wang, W., Li, H., Sun, Y., Han, Z.: Attack-proof collaborative spectrum sensing in cognitive radio networks. In: Proceedings of CISS, pp. 130\u2013134 (2009)","key":"26_CR6","DOI":"10.1109\/CISS.2009.5054704"},{"doi-asserted-by":"crossref","unstructured":"Rawat, A., Anand, P., Chen, H., Varshney, P.: Countering byzantine attacks in cognitive radio networks. In: Proceedings of ICASSP, pp. 3098\u20133101 (2010)","key":"26_CR7","DOI":"10.1109\/ICASSP.2010.5496102"},{"doi-asserted-by":"crossref","unstructured":"Chen, R., Park, J., Bian, K.: Robust distributed spectrum sensing in cognitive radio networks. In: Proceedings of Milcom, pp. 1876\u20131884 (2008)","key":"26_CR8","DOI":"10.1109\/INFOCOM.2008.251"},{"doi-asserted-by":"crossref","unstructured":"Noon, E., Li, H.: Defending against hit-and-run attackers in collaborative spectrum sensing of cognitive radio networks: a point system. In: VTC, pp. 1\u20135 (2010)","key":"26_CR9","DOI":"10.1109\/VETECS.2010.5494003"},{"doi-asserted-by":"crossref","unstructured":"Li, H., Han, Z.: Catching attacker(s) for collaborative spectrum sensing in cognitive radio systems: an abnormality detection approach. In: DySPAN, pp. 1\u201312 (2010)","key":"26_CR10","DOI":"10.1109\/DYSPAN.2010.5457898"},{"issue":"11","key":"26_CR11","doi-asserted-by":"publisher","first-page":"3554","DOI":"10.1109\/TWC.2010.091510.100315","volume":"9","author":"H Li","year":"2010","unstructured":"Li, H., Han, Z.: Catch me if you can: an abnormality detection approach for collaborative spectrum sensing in cognitive radio networks. IEEE Trans. Wirel. Commun. 9(11), 3554\u20133565 (2010)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"8","key":"26_CR12","doi-asserted-by":"publisher","first-page":"4649","DOI":"10.1109\/TVT.2009.2018258","volume":"58","author":"X Kang","year":"2009","unstructured":"Kang, X., Liang, Y.-C., Garg, H.K., Zhang, L.: Sensing-based spectrum sharing in cognitive radio networks. IEEE Trans. Veh. Technol. 58(8), 4649\u20134654 (2009)","journal-title":"IEEE Trans. Veh. Technol."},{"doi-asserted-by":"crossref","unstructured":"Min, A., Shin, K., Hu, X.: Attack-tolerant distributed sensing for dynamic spectrum access networks. In: Proceedings of ICNP, pp. 294\u2013303 (2009)","key":"26_CR13","DOI":"10.1109\/ICNP.2009.5339675"},{"key":"26_CR14","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/JCN.2009.6391387","volume":"11","author":"F Zhu","year":"2009","unstructured":"Zhu, F., Seo, S.: Enhanced robust cooperative spectrum sensing in cognitive radio. J. Commun. Netw. 11, 122\u2013133 (2009)","journal-title":"J. Commun. Netw."},{"doi-asserted-by":"crossref","unstructured":"Wang, W., Li, H., Sun, Y., Han, Z.: CatchIt: detect malicious nodes in collaborative spectrum sensing. In: Proceedings of the 28th IEEE Conference on Global Telecommunications, GLOBECOM 2009, pp. 5071\u20135076 (2009). ISBN- 978-1-4244-4147-1","key":"26_CR15","DOI":"10.1109\/GLOCOM.2009.5425380"},{"issue":"10","key":"26_CR16","doi-asserted-by":"publisher","first-page":"1755","DOI":"10.1109\/JPROC.2010.2059690","volume":"98","author":"H Yu","year":"2010","unstructured":"Yu, H., Shen, Z., Miao, C., Leung, C., Niyato, D.: A survey of trust and reputation management systems in wireless communications. Proc. IEEE 98(10), 1755\u20131772 (2010)","journal-title":"Proc. IEEE"},{"issue":"4","key":"26_CR17","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MCOM.2008.4481340","volume":"46","author":"R Chen","year":"2008","unstructured":"Chen, R., Park, J.-M., Hou, Y.T., Reed, J.H.: Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Commun. Mag. 46(4), 50\u201355 (2008)","journal-title":"IEEE Commun. Mag."},{"doi-asserted-by":"crossref","unstructured":"Yifeng, C., Liu, C., Pelechrinis, K., Krishnamurthy, P., Weiss, M.B.H., Mo, Y.: Decoupling trust and wireless channel induced effects on collaborative sensing attacks. In: 2014 IEEE International Symposium on Dynamic Spectrum Access Nteworks (DYSPAN), pp. 224\u2013235, 1\u20134 April 2014","key":"26_CR18","DOI":"10.1109\/DySPAN.2014.6817799"},{"doi-asserted-by":"crossref","unstructured":"Abdelhakim, M., Zhang, L., Ren, J., Li, T.: Cooperative sensing in cognitive networks under malicious attack. In: 2011 IEEE International Conference on Acoustics, Speech Processing (ICASSP), pp. 3004\u20133007, 22\u201327 May 2011","key":"26_CR19","DOI":"10.1109\/ICASSP.2011.5946290"},{"issue":"4","key":"26_CR20","doi-asserted-by":"publisher","first-page":"1927","DOI":"10.1109\/TWC.2014.2377017","volume":"14","author":"SA Mousavifar","year":"2015","unstructured":"Mousavifar, S.A., Leung, C.: Energy efficient collaborative spectrum sensing based on trust managemnt in cognitive radio networks. IEEE Trans. Wirel. Commun. 14(4), 1927\u20131939 (2015)","journal-title":"IEEE Trans. Wirel. Commun."},{"doi-asserted-by":"crossref","unstructured":"Wang, J., Chen, I.-R.: Trust-based data fusion mechanism design in cognitive radio networks. In: 2014 IEEE Conference on Communications and Network Security (CNS), pp. 53\u201359, 29\u201331 Oct 2014","key":"26_CR21","DOI":"10.1109\/CNS.2014.6997465"},{"doi-asserted-by":"crossref","unstructured":"Sagduyu, Y.E.: Securing cognitive radio networks with dynamic trust against spectrum sensing data falsification. In: 2014 IEEE Military Communications Conference (MILCOM), pp. 235\u2013241, 6\u20138 Oct 2014","key":"26_CR22","DOI":"10.1109\/MILCOM.2014.44"},{"key":"26_CR23","doi-asserted-by":"publisher","first-page":"2392","DOI":"10.1109\/TMC.2015.2398446","volume":"14","author":"W Wang","year":"2015","unstructured":"Wang, W., Chen, L., Shin, K.G., Duan, L.: Thwarting intelligent malicious behaviours in cooperative spectrum sensing. IEEE Trans. Mob. Comput. 14, 2392\u20132405 (2015)","journal-title":"IEEE Trans. Mob. Comput."},{"doi-asserted-by":"crossref","unstructured":"Bhattacharjee, S., Rajkumari, R., Marchang, N.: Effect of colluding attack in collaborative spectrum sensing. In: 2015 IEEE 2nd International Conference on Signal Processing and Integrated Networks (SPIN), pp. 223\u2013227, 19\u201320 Feb 2015","key":"26_CR24","DOI":"10.1109\/SPIN.2015.7095266"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26961-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T20:20:11Z","timestamp":1748722811000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26961-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319269603","9783319269610"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26961-0_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}