{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T05:30:23Z","timestamp":1772602223918,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811623790","type":"print"},{"value":"9789811623806","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T00:00:00Z","timestamp":1631836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T00:00:00Z","timestamp":1631836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-2380-6_2","type":"book-chapter","created":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T09:02:47Z","timestamp":1631782967000},"page":"11-25","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Spectrum Sensing Data Falsification Attack Reputation and Q-Out-of-M Rule Security Scheme"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1619-7429","authenticated-orcid":false,"given":"Velempini","family":"Mthulisi","sequence":"first","affiliation":[]},{"given":"Ngomane","family":"Issah","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7691-0623","authenticated-orcid":false,"given":"Mapunya Sekgoari","family":"Semaka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,17]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"12905","DOI":"10.1109\/ACCESS.2018.2808473","volume":"6","author":"X Zhang","year":"2018","unstructured":"Zhang X, Zhang X, Han L, Ruiqing X (2018) Utilization-oriented spectrum allocation in an underlay cognitive radio network. IEEE Access 6:12905\u201312912","journal-title":"IEEE Access"},{"issue":"15","key":"2_CR2","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/CC.2018.8300274","volume":"2","author":"D Pang","year":"2018","unstructured":"Pang D, Deng Z, Hu G, Chen Y, Xu M (2018) Cost sharing based truthful spectrum auction with collusion-proof. China Commun 2(15):74\u201387","journal-title":"China Commun"},{"issue":"31","key":"2_CR3","first-page":"178","volume":"2","author":"SS Mapunya","year":"2019","unstructured":"Mapunya SS, Velempini M (2019) The design and implementation of a robust scheme to combat the effect of malicious nodes in cognitive radio ad hoc networks. South Afr Comput J 2(31):178\u2013194","journal-title":"South Afr Comput J"},{"issue":"7","key":"2_CR4","doi-asserted-by":"publisher","first-page":"6006","DOI":"10.1109\/TVT.2018.2809794","volume":"67","author":"KH Boddapati","year":"2018","unstructured":"Boddapati KH, Bhatnagar RM, Prakriya S (2018) Performance of incremental relaying protocols for cooperative multi-hop CRNs. IEEE Trans Veh Technol 67(7):6006\u20136022","journal-title":"IEEE Trans Veh Technol"},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"14255","DOI":"10.1109\/ACCESS.2018.2808479","volume":"6","author":"Z-H Wei","year":"2018","unstructured":"Wei Z-H, Hu B-J (2018) A fair multi-channel assignment algorithm with practical implementation in distributed cognitive radio networks. IEEE Access 6:14255\u201314267","journal-title":"IEEE Access"},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"11086","DOI":"10.1109\/ACCESS.2018.2810107","volume":"6","author":"E Osama","year":"2018","unstructured":"Osama E, Maha E, Osamu M, Hiroshi F (2018) Game theoretic approaches for cooperative spectrum sensing in energy-harvesting cognitive radio networks. IEEE Access 6:11086\u201311100","journal-title":"IEEE Access"},{"key":"2_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/IACC.2017.0055","volume-title":"Non-uniform quantized data fusion rule alleviating control channel overhead for cooperative spectrum sensing in cognitive radio networks. In: 2017 IEEE 7th international advance computing conference (IACC)","author":"A Chakraborty","year":"2017","unstructured":"Chakraborty A, Banerjee JS, Chattopadhyay A (2017) Non-uniform quantized data fusion rule alleviating control channel overhead for cooperative spectrum sensing in cognitive radio networks. In: 2017 IEEE 7th international advance computing conference (IACC). Hyderabad, India"},{"key":"2_CR8","first-page":"60","volume-title":"Investigating spectrum sensing security threats in cognitive radio networks. In: Ad Hoc networks","author":"S Mapunya","year":"2018","unstructured":"Mapunya S, Velempini M (2018) Investigating spectrum sensing security threats in cognitive radio networks. In: Ad Hoc networks. Springer, Niagara Falls, pp 60\u201368"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Kishore R, Ramesha CK, Tanuja S (2016) Superior selective reporting mechanism for cooperative spectrum sensing in cognitive radio networks. In: 2016 international conference on wireless communications, signal processing and networking (WiSPNET), Chennai, India","DOI":"10.1109\/WiSPNET.2016.7566169"},{"key":"2_CR10","first-page":"2641","volume":"5","author":"J Ouyang","year":"2017","unstructured":"Ouyang J, Lin M, Zou Y, Zhu W-P, Massicotte D (2017) Secrecy energy efficiency maximization in cognitive radio networks. Open Access J 5:2641","journal-title":"Open Access J"},{"issue":"7","key":"2_CR11","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.1109\/LCOMM.2017.2686393","volume":"21","author":"H Guo","year":"2017","unstructured":"Guo H, Jian W, Luo W (2017) Linear soft combination for cooperative spectrum sensing in cognitive radio networks. IEEE Commun Lett 21(7):1089\u20137798","journal-title":"IEEE Commun Lett"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Morozov MY, Perfilov OY, Malyavina NV, Teryokhin RV, Chernova I (2020) Combined approach to SSDF-attacks mitigation in cognitive radio networks. In: 2020 systems of signals generating and processing in the field of on board communications, Moscow, Russia, Russia, 2020","DOI":"10.1109\/IEEECONF48371.2020.9078600"},{"issue":"10","key":"2_CR13","doi-asserted-by":"publisher","first-page":"1696","DOI":"10.1109\/LCOMM.2019.2931974","volume":"23","author":"Z Sun","year":"2019","unstructured":"Sun Z, Xu Z, Hammad MZ, Ning X, Wang Q, Guo L (2019) Defending against massive SSDF attacks from a novel perspective of honest secondary users. IEEE Commun Lett 23(10):1696\u20131699","journal-title":"IEEE Commun Lett"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Liu X, Li F, Na Z (2015) Optimal resource allocation in simultaneous cooperative spectrum sensing and energy harvesting for multichannel cognitive radio. J Latex Class Files 5:3801\u20133812","DOI":"10.1109\/ACCESS.2017.2677976"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Maric S, Reisenfeld S, Goratti L (2016) A simple and highly effective SSDF attacks mitigation method. In: 2016 10th international conference on signal processing and communication systems (ICSPCS), Gold Coast, QLD, Australia","DOI":"10.1109\/ICSPCS.2016.7843340"},{"issue":"2","key":"2_CR16","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1049\/cje.2016.06.018","volume":"26","author":"Q Pei","year":"2017","unstructured":"Pei Q, Li H, Liu X (2017) Neighbour detection-based spectrum sensing algorithm in distributed cognitive radio networks. Chin J Electron 26(2):399\u2013406","journal-title":"Chin J Electron"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Mapunya S, Velempini M (2019) The design of byzantine attack mitigation scheme in cognitive radio ad-hoc networks. In: 2018 international conference on intelligent and innovative computing applications (ICONIC), Holiday Inn Mauritius, Mon Tr\u00e9sor, Plaine Magnien, Mauritius","DOI":"10.1109\/ICONIC.2018.8601087"},{"key":"2_CR18","doi-asserted-by":"publisher","first-page":"11007","DOI":"10.1109\/ACCESS.2018.2811341","volume":"6","author":"H Wang","year":"2018","unstructured":"Wang H, Yao Y-D, Peng S (2018) Prioritized secondary user access control in cognitive radio networks. IEEE Access 6:11007\u201311016","journal-title":"IEEE Access"},{"key":"2_CR19","doi-asserted-by":"publisher","first-page":"20089","DOI":"10.1109\/ACCESS.2017.2756992","volume":"5","author":"G Nie","year":"2017","unstructured":"Nie G, Ding G, Zhang L, Wu Q (2017) Byzantine defense in collaborative spectrum sensing via Bayesian learning. IEEE Access 5:20089\u201320098","journal-title":"IEEE Access"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Ngomane I, Velempini M, Dlamini SV (2016) The design of a defence mechanism to mitigate the spectrum sensing data falsification attack in cognitive radio ad hoc networks. In: 2016 international conference on advances in computing and communication engineering (ICACCE), Durban, South Africa","DOI":"10.1109\/ICACCE.2016.8073754"},{"key":"2_CR21","unstructured":"Avinash S, Feng L, Jie W (2008) A novel CDS-based reputation monitoring system for wireless sensor networks. In: 2008 the 28th international conference on distributed computing systems workshops, Beijing, China"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Abdelhakim M, Zhang L, Ren J, Li T (2011) Cooperative sensing in cognitive networks under malicious attack. In: 2011 IEEE international conference on acoustics, speech and signal processing (ICASSP), Prague, Czech Republic","DOI":"10.1109\/ICASSP.2011.5946290"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Ngomane I, Velempini M, Dlamini SV (2018) The detection of the spectrum sensing data falsification attack in cognitive radio Ad Hoc networks. In: 2018 conference on information communications technology and society (ICTAS), Durban, South Africa","DOI":"10.1109\/ICTAS.2018.8368742"},{"key":"2_CR24","volume-title":"A density based scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks. In: 2013 IEEE global communications conference (GLOBECOM)","author":"C Chen","year":"2013","unstructured":"Chen C, Song M, Xin C (2013) A density based scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks. In: 2013 IEEE global communications conference (GLOBECOM). Atlanta, GA, USA"},{"key":"2_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2014.61","volume-title":"Multi-fusion based distributed spectrum sensing against data falsification attacks and Byzantine failures in CR MANET. In: 2014 IEEE 22nd international symposium on modelling, analysis & simulation of computer and telecommunication systems","author":"K Pongaliur","year":"2014","unstructured":"Pongaliur K, Xiao L (2014) Multi-fusion based distributed spectrum sensing against data falsification attacks and Byzantine failures in CR MANET. In: 2014 IEEE 22nd international symposium on modelling, analysis & simulation of computer and telecommunication systems. Paris, France"},{"issue":"8","key":"2_CR26","doi-asserted-by":"publisher","first-page":"1707","DOI":"10.1109\/TMC.2013.26","volume":"13","author":"CS Hyder","year":"2014","unstructured":"Hyder CS, Grebur B, Xiao L, Ellison M (2014) ARC: adaptive reputation-based clustering against spectrum sensing data falsification attacks. IEEE Trans Mob Comput 13(8):1707\u20131719","journal-title":"IEEE Trans Mob Comput"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Wang W, Li H, Sun Y, Han Z (2009) Attack-proof collaborative spectrum sensing in cognitive radio networks. In: 2009 43rd annual conference on information sciences and systems, Baltimore, MD, USA, 2009","DOI":"10.1109\/CISS.2009.5054704"},{"key":"2_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2009.5379832","volume-title":"\u201cDefense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios. In: MILCOM 2009\u20132009 IEEE military communications conference","author":"FR Yu","year":"2009","unstructured":"Yu FR, Tang H, Huang M, Li Z, Mason P (2009) \u201cDefense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios. In: MILCOM 2009\u20132009 IEEE military communications conference. Boston, MA, USA"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Ngomane I, Velempini M, Dlamini SD (2018) Trust-based system to defend against the spectrum sensing data falsification attack in cognitive radio ad hoc network. In: International conference on advances in big data, computing and data communication system, Durban, South Africa","DOI":"10.1109\/ICABCD.2018.8465461"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Ngomane I, Velempini M, Dlamini SV (2017) Detection and mitigation of the spectrum sensing data falsification attack in cognitive radio ad hoc networks. In: Southern Africa telecommunication networks and applications conference (SATNAC) 2017, Barcelona, Spain","DOI":"10.1109\/ICTAS.2018.8368742"},{"issue":"1","key":"2_CR31","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1109\/SURV.2011.122211.00162","volume":"15","author":"AG Fragkiadakis","year":"2013","unstructured":"Fragkiadakis AG, Tragos EZ, Askoxylakis IG (2013) A survey on security threats and detection techniques in cognitive radio networks. IEEE Commun Surveys Tutorials 15(1):428\u2013445","journal-title":"IEEE Commun Surveys Tutorials"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of Sixth International Congress on Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-2380-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T09:16:55Z","timestamp":1631783815000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-2380-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,17]]},"ISBN":["9789811623790","9789811623806"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-2380-6_2","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,17]]},"assertion":[{"value":"17 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}