{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:38:52Z","timestamp":1725557932667},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642141706"},{"type":"electronic","value":"9783642141713"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14171-3_9","type":"book-chapter","created":{"date-parts":[[2010,6,12]],"date-time":"2010-06-12T07:34:46Z","timestamp":1276328086000},"page":"99-111","source":"Crossref","is-referenced-by-count":2,"title":["Secure Spectrum Sensing and Decision in Cognitive Radio Networks"],"prefix":"10.1007","author":[{"given":"Seda Demira\u011f","family":"Ers\u00f6z","sequence":"first","affiliation":[]},{"given":"Suzan","family":"Bayhan","sequence":"additional","affiliation":[]},{"given":"Fatih","family":"Alag\u00f6z","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Jakimoski, G., Subbalakshmi, K.: Towards secure spectrum decision. In: IEEE Intl. Conf. on Commun., ICC 2009 (2009)","DOI":"10.1109\/ICC.2009.5199536"},{"key":"9_CR2","unstructured":"Brown, T., Sethi, A.: Potential cognitive radio denial of service attacks and remedies. In: Proceedings of the international symposium on advanced radio technologies, pp. 26\u201328 (2007)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Jakimoski, G., Subbalakshmi, K.: Denial-of-service attacks on dynamic spectrum access networks. In: CogNets Workshop, IEEE International Conference on Communications Workshops, pp. 524\u2013528 (2008)","DOI":"10.1109\/ICCW.2008.105"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1007\/s11036-008-0085-x","volume":"13","author":"T. Brown","year":"2008","unstructured":"Brown, T., Sethi, A.: Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: a multi-dimensional analysis and assessment. Mobile Networks and Applications\u00a013, 516\u2013532 (2008)","journal-title":"Mobile Networks and Applications"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Mathur, C., Subbalakshmi, K.: Digital Signatures for Centralized DSA Networks. In: 4th IEEE Consumer Communications and Networking Conference, CCNC 2007, pp. 1037\u20131041 (2007)","DOI":"10.1109\/CCNC.2007.209"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Jin, Z., Anand, S., Subbalakshmi, K.: Detecting primary user emulation attacks in dynamic spectrum access networks. In: IEEE Intl. Conf. on Commun., ICC 2009 (2009)","DOI":"10.1109\/ICC.2009.5198911"},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/JSAC.2008.080104","volume":"26","author":"R. Chen","year":"2008","unstructured":"Chen, R., Park, J., Reed, J.: Defense against primary user emulation attacks in cognitive radio networks. IEEE Journal on Selected Areas in Communications\u00a026, 25\u201337 (2008)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Anand, S., Jin, Z., Subbalakshmi, K.: An analytical model for primary user emulation attacks in cognitive radio networks. In: Proc. IEEE Symposium of New Frontiers in Dynamic Spectrum Access Networks (DySPAN 2008), pp. 1\u20136 (2008)","DOI":"10.1109\/DYSPAN.2008.16"},{"key":"9_CR9","unstructured":"ETSI: Telecommunications and internet protocol harmonization over networks (TIPHON) release 4; protocol framework definition; methods and protocols for security; part 1: Threat analysis. Technical Specification. Technical Report ETSI TS 102 165-1 V4.1.1, ETSI (2003)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Clancy, T., Goergen, N.: Security in cognitive radio networks: Threats and mitigation. In: International Conference on Cognitive Radio Oriented Wireless Networks and Communications, Crowncom 2008 (2008)","DOI":"10.1109\/CROWNCOM.2008.4562534"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MCOM.2008.4481340","volume":"46","author":"C. Rui-liang","year":"2008","unstructured":"Rui-liang, C., Park, J., Hou, Y., et al.: Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Communications Magazine\u00a046, 50\u201355 (2008)","journal-title":"IEEE Communications Magazine"},{"key":"9_CR12","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"2001","unstructured":"Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Florida (2001)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Arslan, M., Alagoz, F.: Security issues and performance study of key management techniques over satellite links. In: 11th Intenational Workshop on Computer-Aided Modeling, Analysis and Design of Communication Links and Networks, pp. 122\u2013128 (2006)","DOI":"10.1109\/CAMAD.2006.1649728"},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"38","DOI":"10.4304\/jcm.1.1.38-47","volume":"1","author":"C. Cordeiro","year":"2006","unstructured":"Cordeiro, C., Challapali, K., Birru, D., Shankar, S.: IEEE 802.22: an introduction to the first wireless standard based on cognitive radios. Journal of communications\u00a01, 38\u201347 (2006)","journal-title":"Journal of communications"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Burbank, J.: Security in cognitive radio networks: The required evolution in approaches to wireless network security. In: 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, CrownCom 2008, pp. 1\u20137 (2008)","DOI":"10.1109\/CROWNCOM.2008.4562536"},{"key":"9_CR16","volume-title":"Applied cryptography: protocols, algorithms, and source code in C","author":"B. Schneier","year":"2007","unstructured":"Schneier, B.: Applied cryptography: protocols, algorithms, and source code in C. Wiley, India (2007)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14171-3_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:48:43Z","timestamp":1606168123000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14171-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642141706","9783642141713"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14171-3_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}