{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T01:01:30Z","timestamp":1772067690508,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"S5","license":[{"start":{"date-parts":[[2017,8,21]],"date-time":"2017-08-21T00:00:00Z","timestamp":1503273600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s10586-017-1092-0","type":"journal-article","created":{"date-parts":[[2017,8,21]],"date-time":"2017-08-21T11:38:05Z","timestamp":1503315485000},"page":"10491-10501","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks"],"prefix":"10.1007","volume":"22","author":[{"given":"S.","family":"Vimal","sequence":"first","affiliation":[]},{"given":"L.","family":"Kalaivani","sequence":"additional","affiliation":[]},{"given":"M.","family":"Kaliappan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,21]]},"reference":[{"issue":"1","key":"1092_CR1","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/MWC.2012.6155873","volume":"19","author":"M Song","year":"2012","unstructured":"Song, M., Xin, C., Zhao, Y., Cheng, X.: Dynamic spectrum access: from cognitive radio to network radio. IEEE Wire. Commun. 19(1), 23\u201329 (2012). doi: 10.1109\/MWC.2012.6155873","journal-title":"IEEE Wire. Commun."},{"issue":"1","key":"1092_CR2","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1186\/1687-1499-2012-28","volume":"2012","author":"L Lu","year":"2012","unstructured":"Lu, L., Zhou, X., Onunkwo, U., Li, G.Y.: Ten years of research in spectrum sensing and sharing in cognitive radio. EURASIP J. Wire. Commun. Netw. 2012(1), 28 (2012)","journal-title":"EURASIP J. Wire. Commun. Netw."},{"issue":"3","key":"1092_CR3","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1109\/JSAC.2014.140313","volume":"32","author":"X Zhai","year":"2014","unstructured":"Zhai, X., Zheng, L., Tan, C.W.: Energy-infeasibility tradeoffin cognitive radio net- works: price-driven spectrum access algorithms. IEEE J. Sel. Areas Commun. 32(3), 528\u2013538 (2014). doi: 10.1109\/JSAC.2014.140313","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"1092_CR4","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.phycom.2013.11.003","volume":"10","author":"A Bourdenaa","year":"2014","unstructured":"Bourdenaa, A., Pallisb, E., Kormentzasa, G., Mastorakisc, G.: A prototype cognitive radio architecture for tvws exploitation under the real time secondary spectrum market policy. Phy. Commun. 10, 159\u2013169 (2014). doi: 10.1016\/j.phycom.2013.11.003","journal-title":"Phy. Commun."},{"key":"1092_CR5","doi-asserted-by":"publisher","first-page":"1626","DOI":"10.1109\/ICC.2014.6883555","volume":"2014","author":"C Yi","year":"2014","unstructured":"Yi, C., Cai, J.: Combinatorial spectrum auction with multiple heterogeneous sell- ers in cognitive radio networks. IEEE Int. Conf. Commun. 2014, 1626\u20131631 (2014). doi: 10.1109\/ICC.2014.6883555","journal-title":"IEEE Int. Conf. Commun."},{"issue":"6","key":"1092_CR6","doi-asserted-by":"publisher","first-page":"3196","DOI":"10.1109\/TWC.2013.042114.130952","volume":"13","author":"G Sun","year":"2014","unstructured":"Sun, G., Feng, X., Tian, X., Gan, X.: Coalitional double auction for spatial spec- trum allocation in cognitive radio networks. IEEE Trans. Wire. Commun. 13(6), 3196\u20133206 (2014). doi: 10.1109\/TWC.2013.042114.130952","journal-title":"IEEE Trans. Wire. Commun."},{"key":"1092_CR7","doi-asserted-by":"publisher","unstructured":"Yang, D., Xue, G., Zhang, X.: Truthful group buying-based spectrum auction de- sign for cognitive radio networks. In: IEEE Int. Conf. Commun. (ICC), pp. 2295\u20132300. doi: 10.1109\/ICC.2014.6883665 (2014)","DOI":"10.1109\/ICC.2014.6883665"},{"issue":"1","key":"1092_CR8","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.phycom.2010.12.003","volume":"4","author":"IF Akyildiz","year":"2011","unstructured":"Akyildiz, I.F., Lo, B.F., Balakrishnan, R.: Cooperative spectrum sensing in cognitive radio networks: a survey. Phys. Commun. 4(1), 40\u201362 (2011)","journal-title":"Phys. Commun."},{"issue":"9","key":"1092_CR9","doi-asserted-by":"publisher","first-page":"4236","DOI":"10.1109\/TWC.2013.080113.120260","volume":"12","author":"J Deng","year":"2013","unstructured":"Deng, J., Zhang, R.Q., Song, L.Y., Han, Z., Jiao, B.L.: Truthful mechanisms for secure communication in wireless cooperative system. IEEE Trans. Wirel. Commun. 12(9), 4236\u20134245 (2013)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"1092_CR10","doi-asserted-by":"crossref","unstructured":"Cha, J.C., Cheon, J.H.: Anidentity-based signature from gap Diffie\u2013Hellman groups. In: Proceeding of 6th International Workshop on Practice and Theory in Public Key Cryptography, pp. 18\u201330 (2003)","DOI":"10.1007\/3-540-36288-6_2"},{"issue":"1","key":"1092_CR11","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/JSAC.2008.080104","volume":"26","author":"R Chen","year":"2008","unstructured":"Chen, R., Park, J.M., Reed, J.H.: Defense against primary user emulation attacks. IEEE J. Sel. Areas Commun 26(1), 25\u201337 (2008)","journal-title":"IEEE J. Sel. Areas Commun"},{"key":"1092_CR12","doi-asserted-by":"crossref","unstructured":"Clancy, T., Goergen, N.: Security in cognitive radio networks: threats and mitigation. In: Proc. of IEEE\/ICST Crown Comm, pp. 1\u20138 (2008)","DOI":"10.1109\/CROWNCOM.2008.4562534"},{"key":"1092_CR13","doi-asserted-by":"crossref","unstructured":"Li, H., Han, Z.: Blind dogfight in spectrum: combating primary user emulation attacks in cognitive radio systems with unknown channel statistics. In: Proc. IEEE ICC, pp. 1\u20136 (2010)","DOI":"10.1109\/ICC.2010.5502301"},{"issue":"2","key":"1092_CR14","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MWC.2013.6507399","volume":"20","author":"X Xing","year":"2013","unstructured":"Xing, X., Jing, T., Cheng, W., Huo, Y., Cheng, X.: Spectrum prediction in cognitive radio networks. IEEE Wirel. Commun. 20(2), 90\u201396 (2013). doi: 10.1109\/MWC.2013.6507399","journal-title":"IEEE Wirel. Commun."},{"issue":"9","key":"1092_CR15","doi-asserted-by":"publisher","first-page":"2408","DOI":"10.1109\/TPDS.2013.155","volume":"25","author":"X Xing","year":"2014","unstructured":"Xing, X., Jing, T., Li, H., Huo, Y., Cheng, X., Znati, T.: Optimal spectrum sensing interval in cognitive radio networks. IEEE Trans. Parallel Distrib. Syst. 25(9), 2408\u20132417 (2014). doi: 10.1109\/TPDS.2013.155","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"9","key":"1092_CR16","doi-asserted-by":"publisher","first-page":"4672","DOI":"10.1109\/TVT.2013.2269617","volume":"62","author":"K Lee","year":"2013","unstructured":"Lee, K., Chae, C.-B., Kang, J.: Spectrum leasing via cooperation for enhanced physical-layer secrecy. IEEE Trans. Veh. Technol. 62(9), 4672\u20134678 (2013)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1092_CR17","unstructured":"Andersson, A., Tenhunen, M., Ygge, F.: Integer programming for combinatorial auction winner determination. In: Proc. Fourth International Conference on Multi-Agent Systems (ICMAS), Boston, MA, pp. 39\u201346 (2000)"},{"key":"1092_CR18","doi-asserted-by":"crossref","unstructured":"Wang, H.B., Gao, L., Gan, X.Y., Wang, X.B., Hossain, E.: Cooperative spectrum sharing in cognitive radio networks: a game-theoretic approach. In: Proceedings of IEEE International Conference on Communications, IEEE, Cape Town, South Africa, pp. 23\u201327 (2010)","DOI":"10.1109\/ICC.2010.5502052"},{"issue":"5","key":"1092_CR19","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1109\/TIFS.2014.2310355","volume":"9","author":"A Alahmadi","year":"2014","unstructured":"Alahmadi, A., Abdelhakim, M., Ren, J., Li, T.: Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard. IEEE Trans. Inf. Forensics Secur. 9(5), 772\u2013781 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1092_CR20","doi-asserted-by":"crossref","unstructured":"Yu, F., Tang, H., Huang, M., Li, Zh., Mason, P.C.: Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios. In: IEEE Military Communications Conference MILCOM, Boston, USA, pp. 1\u20137 ( 2009)","DOI":"10.1109\/MILCOM.2009.5379832"},{"key":"1092_CR21","doi-asserted-by":"crossref","unstructured":"Khasawneh M., Kajman I., Alkhudaidy R., Althubyani A.: A survey on wi-fi protocols: WPA and WPA2. In: International Conference on Security in Computer Networks and Distributed Systems, SNDS, pp. 496\u2013511 (2014)","DOI":"10.1007\/978-3-642-54525-2_44"},{"key":"1092_CR22","volume-title":"Advances in Wireless Technologies and Telecommunication","author":"S Alrabaee","year":"2014","unstructured":"Alrabaee, S., Khasawneh, M., Agarwal, A., Goel, N., Zaman, M.: Advances in Wireless Technologies and Telecommunication. IGI Global, Hershey (2014)"},{"key":"1092_CR23","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.compeleceng.2014.11.011","volume":"41","author":"M Kaliappan","year":"2015","unstructured":"Kaliappan, M., Paramasivam, B.: Enhancing secure routing in Mobile Ad Hoc Networks using a Dynamic Bayesian Signalling Game model. Comput. Electr. Eng. 41, 301\u2013313 (2015)","journal-title":"Comput. Electr. Eng."},{"key":"1092_CR24","unstructured":"Paramasivan, B., Prakash, M.J.V., Kaliappan, M.: Development of a secure routing protocol using game theory model in mobile ad hoc networks. J. Commun. Netw. 17(1), 75\u201383 (2015)"},{"key":"1092_CR25","unstructured":"Vidhyarani, P., Vimal, S.: Defense against Routing towards Primary User attack in Cognitive Radio Networks. In: TCIFES 2015 International Conference on Technological Convergence For Information, Food, Health and Energy Security (2015)"},{"key":"1092_CR26","unstructured":"Vimal, S., Kalaivani, L.: Secure Authentication mechanisms to mitigate PUE attacks for mobile Cognitive Radio networks. In: IEEE,IEEE CSI,IEEE-ITS & BRNS sponsored International Conference on Computing Technologies and Intelligent Data Engineering (2016)"},{"key":"1092_CR27","unstructured":"Vimal, S., Kalaivani, L.: A stochastic game theoretical approach for jamming attack in cognitive radio network using WQLA. In: International Conference on Advanced Information and Communication Technology (ICAIC\u201917) (2017)"},{"issue":"2","key":"1092_CR28","doi-asserted-by":"publisher","first-page":"1575","DOI":"10.1007\/s10586-017-0864-x","volume":"20","author":"T Veeramakali","year":"2017","unstructured":"Veeramakali, T., Jayashri, S., Prabu, S.: Intelligent dynamic spectrum allocation with bandwidth flexibility in cognitive radio network. Clust. Comput. 20(2), 1575\u20131586 (2017)","journal-title":"Clust. Comput."},{"issue":"1","key":"1092_CR29","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s10586-014-0409-5","volume":"18","author":"CY Chen","year":"2015","unstructured":"Chen, C.Y., Hsu, S.W., Chao, H.C.: CogIMS: an active service-oriented cognitive networks over IP multimedia subsystems. Clust. Comput. 18(1), 135\u2013145 (2015)","journal-title":"Clust. Comput."},{"key":"1092_CR30","doi-asserted-by":"publisher","unstructured":"Ykhlef, M., Alqifari, R.: A new hybrid algorithm to solve winner determination problem in multiunit double internet auction. Math. Probl. Eng. doi: 10.1155\/2015\/639787 (2015)","DOI":"10.1155\/2015\/639787"},{"key":"1092_CR31","doi-asserted-by":"publisher","unstructured":"Achour, K., Slaouti, L., Boughaci, D.: A metacomputing approach for the winner determination problem in combinatorial auctions. In: 2010 International Conference on Machine and Web Intelligence, Algiers, pp. 485\u2013 488. doi: 10.1109\/ICMWI.2010.5647909 (2010)","DOI":"10.1109\/ICMWI.2010.5647909"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1092-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-1092-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1092-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T23:45:34Z","timestamp":1750808734000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-1092-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,21]]},"references-count":31,"journal-issue":{"issue":"S5","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["1092"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-1092-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,21]]},"assertion":[{"value":"22 June 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2017","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}