{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T19:41:29Z","timestamp":1772221289234,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T00:00:00Z","timestamp":1556496000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s00034-019-01123-z","type":"journal-article","created":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T02:04:16Z","timestamp":1556503456000},"page":"1071-1088","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["An Adaptive Learning-Based Attack Detection Technique for Mitigating Primary User Emulation in Cognitive Radio Networks"],"prefix":"10.1007","volume":"39","author":[{"given":"S.","family":"Arun","sequence":"first","affiliation":[]},{"given":"G.","family":"Umamaheswari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,29]]},"reference":[{"issue":"6","key":"1123_CR1","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1109\/TIFS.2016.2526963","volume":"11","author":"A Abrardo","year":"2016","unstructured":"A. Abrardo, M. Barni, K. Kallas, B. Tondi, A game-theoretic framework for optimum decision fusion in the presence of by zantines. IEEE Trans. Inf. Forensics Secur. 11(6), 1333\u20131345 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1123_CR2","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.comnet.2019.01.027","volume":"152","author":"S Baskar","year":"2019","unstructured":"S. Baskar, S. Periyanayagi, P.M. Shakeel, V.S. Dhulipala, An energy persistent range-dependent regulated transmission communication model for vehicular network applications. Comput. Netw. 152, 144\u2013153 (2019)","journal-title":"Comput. Netw."},{"issue":"10","key":"1123_CR3","doi-asserted-by":"publisher","first-page":"2225","DOI":"10.1109\/TIFS.2015.2452893","volume":"10","author":"KM Borle","year":"2015","unstructured":"K.M. Borle, B. Chen, W.K. Du, Physical layer spectrum usage authentication in cognitive radio: Analysis and implementation. IEEE Trans. Inf. Forensics Secur. 10(10), 2225\u20132235 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"1123_CR4","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MCOM.2008.4481340","volume":"46","author":"RL Chen","year":"2008","unstructured":"R.L. Chen, J.M. Park, Y.T. Hou, Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Commun. Mag. 46(4), 50\u201355 (2008)","journal-title":"IEEE Commun. Mag."},{"issue":"15","key":"1123_CR5","doi-asserted-by":"publisher","first-page":"2370","DOI":"10.1049\/iet-com.2016.0235","volume":"11","author":"D Das","year":"2017","unstructured":"D. Das, S. Das, Intelligent resource allocation scheme for the cognitive radio network in the presence of primary user emulation attack. IET Commun. 11(15), 2370\u20132379 (2017)","journal-title":"IET Commun."},{"issue":"7","key":"1123_CR6","doi-asserted-by":"publisher","first-page":"6561","DOI":"10.1109\/TVT.2018.2808347","volume":"67","author":"X Dong","year":"2018","unstructured":"X. Dong, Y. Gong, J. Ma, Y. Guo, Protecting operation-time privacy of primary users in downlink cognitive two-tier networks. IEEE Trans. Veh. Technol. 67(7), 6561\u20136572 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1123_CR7","doi-asserted-by":"crossref","unstructured":"T. Duc-Tuyen, N. Nguyen-Thanh, P. Maille, P. Ciblat, and V. T. Nguyen, Mitigating selfish primary user emulation attacks in multi-channel cognitive radio networks: a surveillance game, in Proceedings of IEEE Globecom (2016)","DOI":"10.1109\/EuCNC.2015.7194088"},{"key":"1123_CR8","doi-asserted-by":"publisher","unstructured":"S. M. Elghamrawy, Security in cognitive radio network: defense against primary user emulation attacks using genetic artificial bee colony (GABC) algorithm. Future Gener. Comput. Syst. (2018). https:\/\/doi.org\/10.1016\/j.future.2018.08.022","DOI":"10.1016\/j.future.2018.08.022"},{"issue":"S2","key":"1123_CR9","doi-asserted-by":"publisher","first-page":"2667","DOI":"10.1007\/s10586-017-1427-x","volume":"22","author":"Shuang Fu","year":"2017","unstructured":"S. Fu, G. Zhang, L. Yang, Spectrum sensing defending against PUE attack based on fractal dimension. Clust. Comput. (2017). https:\/\/doi.org\/10.1007\/s10586-017-1427-x","journal-title":"Cluster Computing"},{"issue":"9","key":"1123_CR10","doi-asserted-by":"publisher","first-page":"1535","DOI":"10.1049\/iet-com.2016.1248","volume":"11","author":"M Ghaznavi","year":"2017","unstructured":"M. Ghaznavi, A. Jamshidi, Defence against primary user emulation attack using statistical properties of the cognitive radio received power. IET Commun. 11(9), 1535\u20131542 (2017)","journal-title":"IET Commun."},{"issue":"10","key":"1123_CR11","doi-asserted-by":"publisher","first-page":"1665","DOI":"10.1631\/FITEE.1700203","volume":"18","author":"QM Jiang","year":"2017","unstructured":"Q.M. Jiang, H.-F. Chen, L. Xie, K. Wang, On detecting primary user emulation attack using channel impulse response in the cognitive radio network. Front. Inf. Technol. Electron. Eng. 18(10), 1665\u20131676 (2017)","journal-title":"Front. Inf. Technol. Electron. Eng."},{"issue":"4","key":"1123_CR12","doi-asserted-by":"publisher","first-page":"3767","DOI":"10.1109\/JSYST.2017.2747594","volume":"12","author":"M Karimi","year":"2018","unstructured":"M. Karimi, S.M.S. Sadough, Efficient transmission strategy for cognitive radio systems under primary user emulation attack. IEEE Syst. J. 12(4), 3767\u20133774 (2018)","journal-title":"IEEE Syst. J."},{"issue":"1","key":"1123_CR13","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s11235-018-0472-y","volume":"70","author":"SBA Khaliq","year":"2019","unstructured":"S.B.A. Khaliq, M.F. Amjad, H. Abbas, N. Shafqat, H. Afzal, Defence against PUE attacks in ad hoc cognitive radio networks: a mean field game approach. Telecommun. Syst. 70(1), 123\u2013140 (2019)","journal-title":"Telecommun. Syst."},{"issue":"1","key":"1123_CR14","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/TSIPN.2017.2723761","volume":"4","author":"SC Lin","year":"2018","unstructured":"S.C. Lin, C.Y. Wen, W.A. Sethares, Two-tier device-based authentication protocol against PUEA attacks for IoT applications. IEEE Trans. Signal Inf. Process. Netw. 4(1), 33\u201347 (2018)","journal-title":"IEEE Trans. Signal Inf. Process. Netw."},{"issue":"11","key":"1123_CR15","doi-asserted-by":"publisher","first-page":"2160","DOI":"10.1002\/sec.899","volume":"7","author":"MH Ling","year":"2013","unstructured":"M.H. Ling, K.-L.A. Yau, G.S. Poh, Trust and reputation management in cognitive radio networks: a survey. Secur. Commun. Netw. 7(11), 2160\u20132179 (2013)","journal-title":"Secur. Commun. Netw."},{"issue":"3","key":"1123_CR16","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s40998-018-0073-5","volume":"42","author":"S Madbushi","year":"2018","unstructured":"S. Madbushi, R. Raut, M.S.S. Rukmini, Trust establishment in chaotic cognitive environment to improve attack detection accuracy under primary user emulation. Iran. J. Sci. Technol. Trans. Electr. Eng. 42(3), 291\u2013297 (2018)","journal-title":"Iran. J. Sci. Technol. Trans. Electr. Eng."},{"issue":"10","key":"1123_CR17","doi-asserted-by":"publisher","first-page":"5082","DOI":"10.1007\/s11227-018-2378-6","volume":"74","author":"MA Mirza","year":"2018","unstructured":"M.A. Mirza, M. Ahmad, M.A. Habib, N. Mahmood, C.M.N. Faisal, U. Ahmad, CDCSS: cluster-based distributed cooperative spectrum sensing model against primary user emulation (PUE) cyber attacks. J. Supercomput. 74(10), 5082\u20135098 (2018)","journal-title":"J. Supercomput."},{"key":"1123_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-1154-z","author":"SKSL Preeth","year":"2018","unstructured":"S.K.S.L. Preeth, R. Dhanalakshmi, R. Kumar, P.M. Shakeel, An adaptive fuzzy rule based energy efficient clustering and immune-inspired routing protocol for WSN-assisted IoT system. J. Ambient Intell. Humaniz. Comput. (2018). https:\/\/doi.org\/10.1007\/s12652-018-1154-z","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"issue":"4","key":"1123_CR19","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/s10776-017-0363-2","volume":"24","author":"D Pu","year":"2017","unstructured":"D. Pu, B. Aygun, A.M. Wyglinski, Primary user emulation detection algorithm based on distributed sensor networks. Int. J. Wirel. Inf. Netw. 24(4), 344\u2013355 (2017)","journal-title":"Int. J. Wirel. Inf. Netw."},{"key":"1123_CR20","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.aeue.2017.11.012","volume":"84","author":"S Shrivastava","year":"2018","unstructured":"S. Shrivastava, A. Rajesh, P. Bora, Defense against primary user emulation attacks from the secondary user throughput perspective. AEU Int. J. Electron. Commun. 84, 131\u2013143 (2018)","journal-title":"AEU Int. J. Electron. Commun."},{"issue":"3","key":"1123_CR21","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/TCCN.2018.2826552","volume":"4","author":"DT Ta","year":"2018","unstructured":"D.T. Ta, N. Nguyen-Thanh, P. Maille, V.-T. Nguyen, Strategic surveillance against primary user emulation attacks in cognitive radio networks. IEEE Trans. Cognit. Commun. Netw. 4(3), 582\u2013596 (2018)","journal-title":"IEEE Trans. Cognit. Commun. Netw."},{"issue":"9","key":"1123_CR22","doi-asserted-by":"publisher","first-page":"4981","DOI":"10.1109\/TWC.2015.2430865","volume":"14","author":"NN Thanh","year":"2015","unstructured":"N.N. Thanh, P. Ciblat, A. Pham, V.-T. Nguyen, Surveillance strategies against primary user emulation attack in cognitive radio networks. IEEE Trans. Wirel. Commun. 14(9), 4981\u20134993 (2015)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"1123_CR23","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/s00034-019-01065-6","volume":"122","author":"NL Venkataraman","year":"2019","unstructured":"N.L. Venkataraman, R. Kumar, P.M. Shakeel, Ant lion optimized bufferless routing in the design of low power application specific network on chip. Circuits Syst. Signal Process. 122, 122 (2019). https:\/\/doi.org\/10.1007\/s00034-019-01065-6","journal-title":"Circuits Syst. Signal Process."},{"issue":"4","key":"1123_CR24","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MNET.2015.7166193","volume":"29","author":"R Yu","year":"2015","unstructured":"R. Yu, Y. Zhang, Y. Liu, S. Gjessing, M. Guizani, Securing cognitive radio networks against primary user emulation attacks. IEEE Netw. 29(4), 68\u201374 (2015)","journal-title":"IEEE Netw."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-019-01123-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00034-019-01123-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-019-01123-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,17]],"date-time":"2022-09-17T01:21:58Z","timestamp":1663377718000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00034-019-01123-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,29]]},"references-count":24,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["1123"],"URL":"https:\/\/doi.org\/10.1007\/s00034-019-01123-z","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,29]]},"assertion":[{"value":"27 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}