{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:17:49Z","timestamp":1759331869415,"version":"3.37.3"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T00:00:00Z","timestamp":1649808000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T00:00:00Z","timestamp":1649808000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100014718","name":"innovative research group project of the national natural science foundation of china","doi-asserted-by":"publisher","award":["61601111"],"award-info":[{"award-number":["61601111"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the excellent middle-aged and young research and innovation team of northeast petroleum university","award":["KYCXTDQ201901"],"award-info":[{"award-number":["KYCXTDQ201901"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s11235-022-00896-0","type":"journal-article","created":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T08:03:10Z","timestamp":1649836990000},"page":"227-238","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Research on spectrum sensing data falsification attack detection algorithm in cognitive Internet of Things"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7563-672X","authenticated-orcid":false,"given":"Liu","family":"Miao","sequence":"first","affiliation":[]},{"given":"Xu","family":"Di","sequence":"additional","affiliation":[]},{"given":"Zhuo-Miao","family":"Huo","sequence":"additional","affiliation":[]},{"given":"Zhen-Xing","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"issue":"15","key":"896_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787\u20132805.","journal-title":"Computer Networks"},{"key":"896_CR2","doi-asserted-by":"publisher","first-page":"106564","DOI":"10.1016\/j.ymssp.2019.106564","volume":"138","author":"B Di\u00e8ne","year":"2020","unstructured":"Di\u00e8ne, B., Rodrigues, J. J. P. C., Diallo, O., Ndoye, E. L. H. M., & Korotaev, V. V. (2020). Data management techniques for internet of things. Mechanical Systems and Signal Processing, 138, 106564.","journal-title":"Mechanical Systems and Signal Processing"},{"issue":"8","key":"896_CR3","doi-asserted-by":"publisher","first-page":"6704","DOI":"10.1109\/JIOT.2020.2993216","volume":"7","author":"L Xing","year":"2020","unstructured":"Xing, L. (2020). Reliability in internet of things: Current status and future perspectives. IEEE Internet of Things Journal, 7(8), 6704\u20136721.","journal-title":"IEEE Internet of Things Journal"},{"issue":"2","key":"896_CR4","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1109\/TNSE.2019.2917071","volume":"7","author":"W Lu","year":"2019","unstructured":"Lu, W., Hu, S., Liu, X., He, C., & Gong, Y. (2019). Incentive mechanism based cooperative spectrum sharing for OFDM cognitive IoT network. IEEE Transactions on Network Science and Engineering, 7(2), 662\u2013672.","journal-title":"IEEE Transactions on Network Science and Engineering"},{"doi-asserted-by":"crossref","unstructured":"Chatterjee, P. S. (2021). Systematic survey on SSDF attack and detection mechanism in cognitive wireless sensor network. 1\u20135.","key":"896_CR5","DOI":"10.1109\/CONIT51480.2021.9498386"},{"issue":"9","key":"896_CR6","doi-asserted-by":"publisher","first-page":"11196","DOI":"10.3390\/s130911196","volume":"13","author":"GP Joshi","year":"2013","unstructured":"Joshi, G. P., Nam, S. Y., & Kim, S. W. (2013). Cognitive radio wireless sensor networks: Applications, challenges and research trends. Sensors, 13(9), 11196\u201311228.","journal-title":"Sensors"},{"key":"896_CR7","doi-asserted-by":"publisher","first-page":"103062","DOI":"10.1109\/ACCESS.2020.2998730","volume":"8","author":"Z Niu","year":"2020","unstructured":"Niu, Z., Ma, T., Shu, N., & Shan, H. (2020). Interference sources localization and communication relationship inference with cognitive radio IoT networks. IEEE Access, 8, 103062\u2013103072.","journal-title":"IEEE Access"},{"issue":"6","key":"896_CR8","first-page":"151","volume":"9","author":"M Zhang","year":"2012","unstructured":"Zhang, M., Zhao, H., Zheng, R., Wu, Q., & Wei, W. (2012). Cognitive internet of things: Concepts and application example. International Journal of Computer Science Issues (IJCSI), 9(6), 151.","journal-title":"International Journal of Computer Science Issues (IJCSI)"},{"issue":"2","key":"896_CR9","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/JIOT.2014.2311513","volume":"1","author":"Q Wu","year":"2014","unstructured":"Wu, Q., Ding, G., Xu, Y., Feng, S., Du, Z., Wang, J., & Long, K. (2014). Cognitive internet of things: A new paradigm beyond connection. IEEE Internet of Things Journal, 1(2), 129\u2013143.","journal-title":"IEEE Internet of Things Journal"},{"doi-asserted-by":"crossref","unstructured":"Ploennigs, J., Ba, A., & Barry, M. (2017). Materializing the promises of cognitive IoT: How cognitive buildings are shaping the way. IEEE Internet of Things Journal, 5(4), 2367\u20132374.","key":"896_CR10","DOI":"10.1109\/JIOT.2017.2755376"},{"doi-asserted-by":"crossref","unstructured":"Tarek, D., Benslimane, A., Darwish, M., & Kotb, A. M. (2020). A new strategy for packets scheduling in cognitive radio internet of things. Computer Networks, 178, 107292.","key":"896_CR11","DOI":"10.1016\/j.comnet.2020.107292"},{"doi-asserted-by":"crossref","unstructured":"Tarek, D., Benslimane, A., Darwish, M., & Kotb, A. M. (2020). Survey on spectrum sharing\/allocation for cognitive radio networks internet of things. Egyptian Informatics Journal","key":"896_CR12","DOI":"10.1016\/j.eij.2020.02.003"},{"issue":"4","key":"896_CR13","doi-asserted-by":"publisher","first-page":"2661","DOI":"10.1007\/s11277-020-07346-7","volume":"113","author":"V Kumar","year":"2020","unstructured":"Kumar, V., Jha, R. K., & Jain, S. (2020). NB-IoT security: A survey. Wireless Personal Communications, 113(4), 2661\u20132708.","journal-title":"Wireless Personal Communications"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Z. K., Cho, M. C. Y., Wang, C. W., Hsu, C. W., Chen, C. K., & Shieh, S. (2014). IoT security: Ongoing challenges and research opportunities. In 2014 IEEE 7th international conference on service-oriented computing and applications (pp. 230\u2013234). IEEE.","key":"896_CR14","DOI":"10.1109\/SOCA.2014.58"},{"doi-asserted-by":"crossref","unstructured":"Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I. (2015). Internet of things (IoT) security: Current status, challenges and prospective measures. In 2015 10th international conference for internet technology and secured transactions (ICITST) (pp. 336\u2013341). IEEE.","key":"896_CR15","DOI":"10.1109\/ICITST.2015.7412116"},{"issue":"5","key":"896_CR16","doi-asserted-by":"publisher","first-page":"8182","DOI":"10.1109\/JIOT.2019.2935189","volume":"6","author":"F Meneghello","year":"2019","unstructured":"Meneghello, F., Calore, M., Zucchetto, Daniel, Polese, Michele, & Zanella, Andrea. (2019). IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet of Things Journal, 6(5), 8182\u20138201.","journal-title":"IEEE Internet of Things Journal"},{"doi-asserted-by":"crossref","unstructured":"Akyildiz, I. F., Lo, B. F., & Balakrishnan, R. (2011). Cooperative spectrum sensing in cognitive radio networks: A survey. Physical Communication, 4(1), 40\u201362.","key":"896_CR17","DOI":"10.1016\/j.phycom.2010.12.003"},{"doi-asserted-by":"crossref","unstructured":"Wu, J., Li, P., Chen, Y., Tang, J., Wei, C., Xia, L., & Song, T. (2020). Analysis of Byzantine attack strategy for cooperative spectrum sensing. IEEE Communications Letters, 24(8), 1631\u20131635.","key":"896_CR18","DOI":"10.1109\/LCOMM.2020.2990869"},{"doi-asserted-by":"crossref","unstructured":"Cao, Y., & Pan, H. (2020). Energy-efficient cooperative spectrum sensing strategy for cognitive wireless sensor networks based on particle swarm optimization. IEEE Access, 8, 214707\u2013214715.","key":"896_CR19","DOI":"10.1109\/ACCESS.2020.3037707"},{"doi-asserted-by":"crossref","unstructured":"Zhang, L., Ding, G., Wu, Q., Zou, Y., Han, Z., & Wang, J. (2015). Byzantine attack and defense in cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials, 17(3), 1342\u20131363.","key":"896_CR20","DOI":"10.1109\/COMST.2015.2422735"},{"doi-asserted-by":"crossref","unstructured":"Chatterjee, P. S., & Roy, M. (2015). A regression based spectrum-sensing data-falsification attack detection technique in CWSN. In 2015 International Conference on Information Technology (ICIT) (pp. 48\u201353). IEEE.","key":"896_CR21","DOI":"10.1109\/ICIT.2015.25"},{"doi-asserted-by":"crossref","unstructured":"Yadav, K., Roy, S. D., & Kundu, S. (2020). Defense against spectrum sensing data falsification attacker in cognitive radio networks. Wireless Personal Communications, 1\u201314.","key":"896_CR22","DOI":"10.1007\/s11277-020-07077-9"},{"issue":"2","key":"896_CR23","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.dcan.2019.08.006","volume":"6","author":"K Sha","year":"2020","unstructured":"Sha, K., Yang, T. A., Wei, W., & Davari, S. (2020). A survey of edge computing-based designs for IoT security. Digital Communications and Networks, 6(2), 195\u2013202.","journal-title":"Digital Communications and Networks"},{"doi-asserted-by":"crossref","unstructured":"Wu, J., Wang, C., Yu, Y., Song, T., & Hu, J. (2020). Sequential fusion to defend against sensing data falsification attack for cognitive internet of things. ETRI Journal, 42(6), 976\u2013986.","key":"896_CR24","DOI":"10.4218\/etrij.2019-0388"},{"doi-asserted-by":"crossref","unstructured":"Yao, D., Yuan, S., Lv, Z., Wan, D., & Mao, W. (2020). An enhanced cooperative spectrum sensing scheme against SSDF attack based on Dempster\u2013Shafer evidence theory for cognitive wireless sensor networks. IEEE Access, 8, 175881\u2013175890.","key":"896_CR25","DOI":"10.1109\/ACCESS.2020.3026738"},{"issue":"6","key":"896_CR26","first-page":"1468","volume":"34","author":"K Mergu","year":"2021","unstructured":"Mergu, K., & Khan, H. (2021). Mitigation of spectrum sensing data falsification attack in cognitive radio networks using trust based cooperative sensing. International Journal of Engineering, 34(6), 1468\u20131474.","journal-title":"International Journal of Engineering"},{"issue":"12","key":"896_CR27","doi-asserted-by":"publisher","first-page":"147","DOI":"10.3390\/sym8120147","volume":"8","author":"F Ye","year":"2016","unstructured":"Ye, F., Zhang, X., & Li, Y. (2016). Comprehensive reputation-based security mechanism against dynamic SSDF attack in cognitive radio networks. Symmetry, 8(12), 147.","journal-title":"Symmetry"},{"unstructured":"Zhou, M., Shen, J., Chen, H., & Xie, L. (2013). A cooperative spectrum sensing scheme based on the Bayesian reputation model in cognitive radio networks. In 2013 IEEE wireless communications and networking conference (WCNC) (pp. 614\u2013619). IEEE.","key":"896_CR28"},{"doi-asserted-by":"crossref","unstructured":"Morozov, M. Y., Perfilov, O. Y., Malyavina, N. V., Teryokhin, R. V., & Chernova, I. V. (2020). Combined approach to SSDF-attacks mitigation in cognitive radio networks. In 2020 Systems of signals generating and processing in the field of on board communications (pp. 1\u20134). IEEE.","key":"896_CR29","DOI":"10.1109\/IEEECONF48371.2020.9078600"},{"doi-asserted-by":"crossref","unstructured":"Zhang, S., Wang, Y., Wan, P., Zhuang, J., Zhang, Y., & Li, Y. (2020). Clustering algorithm-based data fusion scheme for robust cooperative spectrum sensing. IEEE Access, 8, 5777\u20135786.","key":"896_CR30","DOI":"10.1109\/ACCESS.2019.2963512"},{"issue":"2","key":"896_CR31","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1504\/IJAHUC.2019.102452","volume":"32","author":"WN Singh","year":"2019","unstructured":"Singh, W. N., Marchang, N., & Taggu, A. (2019). Mitigating SSDF attack using distance-based outlier approach in cognitive radio networks. International Journal of Ad Hoc and Ubiquitous Computing, 32(2), 119\u2013132.","journal-title":"International Journal of Ad Hoc and Ubiquitous Computing"},{"issue":"2","key":"896_CR32","doi-asserted-by":"publisher","first-page":"e3852","DOI":"10.1002\/dac.3852","volume":"32","author":"R Rajkumari","year":"2019","unstructured":"Rajkumari, R., & Marchang, N. (2019). Mitigating spectrum sensing data falsification attack in ad hoc cognitive radio networks. International Journal of Communication Systems, 32(2), e3852.","journal-title":"International Journal of Communication Systems"},{"doi-asserted-by":"crossref","unstructured":"Chen, C., Song, M., Xin, C., & Alam, M. (2012). A robust malicious user detection scheme in cooperative spectrum sensing. In 2012 IEEE Global Communications Conference (GLOBECOM) (pp. 4856\u20134861). IEEE.","key":"896_CR33","DOI":"10.1109\/GLOCOM.2012.6503888"},{"issue":"8","key":"896_CR34","doi-asserted-by":"publisher","first-page":"5939","DOI":"10.1007\/s11276-020-02398-w","volume":"26","author":"R Sarmah","year":"2020","unstructured":"Sarmah, R., Taggu, A., & Marchang, N. (2020). Detecting byzantine attack in cognitive radio networks using machine learning. Wireless Networks, 26(8), 5939\u20135950.","journal-title":"Wireless Networks"},{"issue":"2","key":"896_CR35","doi-asserted-by":"publisher","first-page":"1764","DOI":"10.1109\/JSYST.2019.2936263","volume":"14","author":"Y Fu","year":"2019","unstructured":"Fu, Y., & He, Z. (2019). Bayesian-inference-based sliding window trust model against probabilistic SSDF attack in cognitive radio networks. IEEE Systems Journal, 14(2), 1764\u20131775.","journal-title":"IEEE Systems Journal"},{"doi-asserted-by":"crossref","unstructured":"Khan, M. S., Khan, L., Gul, N., Amir, M., Kim, J., & Kim, S. M. (2020). Support vector machine-based classification of malicious users in cognitive radio networks. Wireless Communications and Mobile Computing, 2020.","key":"896_CR36","DOI":"10.1155\/2020\/8846948"},{"unstructured":"Li, Y., & Peng, Q. (2016). Achieving secure spectrum sensing in presence of malicious attacks utilizing unsupervised machine learning. In MILCOM 2016-2016 IEEE Military Communications Conference (pp. 174\u2013179). IEEE.","key":"896_CR37"},{"doi-asserted-by":"crossref","unstructured":"Bhattacharjee, S., Keitangnao, R., & Marchang, N. (2016). Association rule mining for detection of colluding SSDF attack in cognitive radio networks. 1\u20136.","key":"896_CR38","DOI":"10.1109\/ICCCI.2016.7480001"},{"doi-asserted-by":"crossref","unstructured":"Khan, M. S., Jibran, M., Koo, I., Kim, S. M., & Kim, J. (2019). A double adaptive approach to tackle malicious users in cognitive radio networks. Wireless Communications and Mobile Computing, 2019.","key":"896_CR39","DOI":"10.1155\/2019\/2350694"},{"issue":"8","key":"896_CR40","doi-asserted-by":"publisher","first-page":"1631","DOI":"10.1109\/LCOMM.2020.2990869","volume":"24","author":"J Wu","year":"2020","unstructured":"Wu, J., Li, P., Chen, Y., Tang, J., Wei, C., Xia, L., & Song, T. (2020). Analysis of byzantine attack strategy for cooperative spectrum sensing. IEEE Communications Letters, 24(8), 1631\u20131635.","journal-title":"IEEE Communications Letters"},{"doi-asserted-by":"crossref","unstructured":"Vimal, S., Kalaivani, L., Kaliappan, M., Suresh, A., Gao, X. Z., & Varatharajan. R. (2018). Development of secured data transmission using machine learning-based discrete-time partially observed Markov model and energy optimization in cognitive radio networks. Neural Computing and Applications.","key":"896_CR41","DOI":"10.1007\/s00521-018-3788-3"},{"issue":"11","key":"896_CR42","doi-asserted-by":"publisher","first-page":"2196","DOI":"10.1109\/JSAC.2013.131119","volume":"31","author":"X He","year":"2013","unstructured":"He, X., Dai, H., & Ning, P. (2013). HMM-based malicious user detection for robust collaborative spectrum sensing. IEEE Journal on Selected Areas in Communications, 31(11), 2196\u20132208.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"doi-asserted-by":"crossref","unstructured":"Rabiner, L. R. (1989). A tutorial on hidden Markov models and selected applications in speech recognition. Proc IEEE, 77.","key":"896_CR43","DOI":"10.1109\/5.18626"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-022-00896-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-022-00896-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-022-00896-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,18]],"date-time":"2022-05-18T04:38:52Z","timestamp":1652848732000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-022-00896-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,13]]},"references-count":43,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["896"],"URL":"https:\/\/doi.org\/10.1007\/s11235-022-00896-0","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"type":"print","value":"1018-4864"},{"type":"electronic","value":"1572-9451"}],"subject":[],"published":{"date-parts":[[2022,4,13]]},"assertion":[{"value":"16 February 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 April 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}