{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:18:06Z","timestamp":1761401886124,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,12,15]],"date-time":"2017-12-15T00:00:00Z","timestamp":1513296000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s11277-017-5105-3","type":"journal-article","created":{"date-parts":[[2017,12,15]],"date-time":"2017-12-15T03:22:22Z","timestamp":1513308142000},"page":"799-816","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Honest Auction Based Spectrum Assignment and Exploiting Spectrum Sensing Data Falsification Attack Using Stochastic Game Theory in Wireless Cognitive Radio Network"],"prefix":"10.1007","volume":"102","author":[{"given":"P.","family":"Subbulakshmi","sequence":"first","affiliation":[]},{"given":"M.","family":"Prakash","sequence":"additional","affiliation":[]},{"given":"V.","family":"Ramalakshmi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,15]]},"reference":[{"issue":"1","key":"5105_CR1","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/mwc.2012.6155873","volume":"19","author":"M Song","year":"2012","unstructured":"Song, M., Xin, C., Zhao, Y., & Cheng, X. (2012). Dynamic spectrum access: from cognitive radio to network radio. IEEE Wireless Communications, 19(1), 23\u201329. \n                        https:\/\/doi.org\/10.1109\/mwc.2012.6155873\n                        \n                    .","journal-title":"IEEE Wireless Communications"},{"issue":"3","key":"5105_CR2","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1109\/JSAC.2014.140313","volume":"32","author":"X Zhai","year":"2014","unstructured":"Zhai, X., Zheng, L., & Tan, C. W. (2014). Energy-infeasibility tradeoff in cognitive radio net- works: Price-driven spectrum access algorithms. IEEE Journal on Selected Areas in Communications, 32(3), 528\u2013538. \n                        https:\/\/doi.org\/10.1109\/JSAC.2014.140313\n                        \n                    .","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"5105_CR3","doi-asserted-by":"crossref","unstructured":"Yang, D., Fang, X., & Xue, G. (2011a). Truthful auction for cooperative communications. In MobiHoc, ACM (p. 9).","DOI":"10.1145\/2107502.2107514"},{"key":"5105_CR4","doi-asserted-by":"crossref","unstructured":"Shi, Y., Sharma, S., Hou, Y. T., et al. (2008). Optimal relay assignment for cooperative communications. In MobiHoc, ACM (pp. 3\u201312).","DOI":"10.1145\/1374618.1374621"},{"key":"5105_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-6180-2014-171","volume":"2014","author":"K Dabcevic","year":"2014","unstructured":"Dabcevic, K., Betancourt, A., Marcenaro, L., & Regazzoni, C. S. (2014). Intelligent cognitive radio jamming-a game-theoretical approach. EURASIP Journal on Advances in Signal Processing, 2014, 1\u201318.","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"issue":"4","key":"5105_CR6","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1016\/j.pmcj.2012.06.008","volume":"9","author":"W Wang","year":"2013","unstructured":"Wang, W., Bhattacharjee, S., Chatterjee, M., & Kwiat, K. (2013). Collaborative jamming and collaborative defense in cognitive radio networks. Pervasive and Mobile Computing, 9(4), 572\u2013587.","journal-title":"Pervasive and Mobile Computing"},{"issue":"1","key":"5105_CR7","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1109\/SURV.2012.021312.00116","volume":"15","author":"OG Aliu","year":"2013","unstructured":"Aliu, O. G., Imran, A., Imran, M. A., et al. (2013). A survey of self organisation in future cellular networks. IEEE Communications Surveys and Tutorials, 15(1), 336\u2013361.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"1","key":"5105_CR8","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/JSAC.2012.120102","volume":"30","author":"Y Wu","year":"2012","unstructured":"Wu, Y., Wang, B., Liu, K. R., & Clancy, T. C. (2012). Anti-jamming games in multi-channel cognitive radio networks. IEEE Journal on Selected Areas in Communications, 30(1), 4\u201315.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"3","key":"5105_CR9","doi-asserted-by":"crossref","first-page":"1108","DOI":"10.1109\/SURV.2012.121112.00047","volume":"15","author":"EZ Tragos","year":"2013","unstructured":"Tragos, E. Z., Zeadally, S., Fragkiadakis, A. G., & Siris, V. A. (2013). Spectrum assignment in cognitive radio networks: A comprehensive survey. IEEE Communications Surveys and Tutorials, 15(3), 1108\u20131135.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"9","key":"5105_CR10","doi-asserted-by":"publisher","first-page":"2408","DOI":"10.1109\/TPDS.2013.155","volume":"25","author":"X Xing","year":"2014","unstructured":"Xing, X., Jing, T., Li, H., Huo, Y., Cheng, X., & Znati, T. (2014). Optimal spectrum sensing interval in cognitive radio networks. IEEE Transactions on Parallel and Distributed Systems, 25(9), 2408\u20132417. \n                        https:\/\/doi.org\/10.1109\/TPDS.2013.155\n                        \n                    .","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"5105_CR11","doi-asserted-by":"publisher","unstructured":"Vimal, S., et al. Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks. Cluster Computing. \n                        https:\/\/doi.org\/10.1007\/s10586-017-1092-0\n                        \n                    .","DOI":"10.1007\/s10586-017-1092-0"},{"issue":"5","key":"5105_CR12","doi-asserted-by":"crossref","first-page":"772","DOI":"10.1109\/TIFS.2014.2310355","volume":"9","author":"A Alahmadi","year":"2014","unstructured":"Alahmadi, A., Abdelhakim, M., Ren, J., & Li, T. (2014). Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard. IEEE Transactions on Information Forensics and Security, 9(5), 772\u2013781.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"5105_CR13","doi-asserted-by":"crossref","unstructured":"Sun, W., & Zhu, Y. (2015). An efficient distributed algorithm for spectrum allocation in multi-hop cognitive radio networks. In International Symposium on Quality of Service (IWQoS), IEEE (pp. 59\u201360).","DOI":"10.1109\/IWQoS.2015.7404705"},{"issue":"5","key":"5105_CR14","doi-asserted-by":"crossref","first-page":"2524","DOI":"10.1109\/TSP.2012.2187644","volume":"60","author":"L Hesham","year":"2012","unstructured":"Hesham, L., Sultan, A., Nafie, M., & Digham, F. (2012). Distributed spectrum sensing with sequential ordered transmissions to a cognitive fusion center. IEEE Transactions on Signal Processing, 60(5), 2524\u20132538.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"5105_CR15","doi-asserted-by":"crossref","unstructured":"Yu, F., Tang, H., Huang, M., Li, Zh., & Mason, P. C. (2009). Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios. IEEE Military Communications Conference MILCOM, Boston, USA (pp. 1\u20137).","DOI":"10.1109\/MILCOM.2009.5379832"},{"key":"5105_CR16","first-page":"1","volume":"1","author":"K Dabcevic","year":"2014","unstructured":"Dabcevic, K., Betancourt, A., Marcenaro, L., & Regazzoni, C. S. (2014). Intelligent cognitive radio jamming-a game-theoretical approach. EURASIP Journal on Advances in Signal Processing, 1, 1\u201318.","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"issue":"4","key":"5105_CR17","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MNET.2015.7166193","volume":"29","author":"R Yu","year":"2015","unstructured":"Yu, R., Zhang, Y., Liu, Y., Gjessing, S., & Guizani, M. (2015). Securing cognitive radio networks against primary user emulation attacks. IEEE Network, 29(4), 68\u201374.","journal-title":"IEEE Network"},{"key":"5105_CR18","doi-asserted-by":"crossref","unstructured":"Gardellin, V., Das, S., & Lenzini, L. (2010). A fully distributed game theoretic approach to guarantee self-coexistence among wrans. In INFOCOM IEEE conference on computer communications workshops (pp. 1\u20136). \n                        http:\/\/dx.doi.org\/10.1109\/INFCOMW.2010.5466713\n                        \n                    .","DOI":"10.1109\/INFCOMW.2010.5466713"},{"key":"5105_CR19","unstructured":"Subbulakshmi, P., et al. (2017). A multilevel stackelberg game theoretic approach for enhancing secrecy. In Cognitive radio networks, international conference on advanced information and communication technology (ICAIC\u201917) (pp. 23\u201328)."},{"issue":"4","key":"5105_CR20","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1016\/j.pmcj.2011.08.003","volume":"9","author":"S Sengupta","year":"2013","unstructured":"Sengupta, S., Brahma, S., Chatterjee, M., & Shankar, N. S. (2013). Self-coexistence among interference-aware IEEE 802.22 networks with enhanced air-interface. Pervasive and Mobile Computing, 9(4), 454\u2013471.","journal-title":"Pervasive and Mobile Computing"},{"key":"5105_CR21","doi-asserted-by":"crossref","unstructured":"Brown, T. X., & Sethi, A. (2007). Potential cognitive radio denial-of-service vulnerailities and protection countermeasures: A multi-dimensional analysis and assessment. In Cognitive radio oriented wireless networks and communications (CrownCom) (pp. 456\u2013464). \n                        http:\/\/doi.org\/10.1109\/CROWNCOM.2007.4549841\n                        \n                    .","DOI":"10.1109\/CROWNCOM.2007.4549841"},{"key":"5105_CR22","doi-asserted-by":"publisher","unstructured":"Lavanis, N. (2016). Improving detection of primary user in a cognitive radio network with malicious users. In 2016 International conference on wireless communications, signal processing and networking (WiSPNET) (pp. 733\u2013736). \n                        https:\/\/doi.org\/10.1109\/wispnet.2016.7566230\n                        \n                    .","DOI":"10.1109\/wispnet.2016.7566230"},{"issue":"8","key":"5105_CR23","doi-asserted-by":"publisher","first-page":"2488","DOI":"10.1109\/TWC.2010.061510.090395","volume":"9","author":"P Kaligineedi","year":"2010","unstructured":"Kaligineedi, P., Khabbazian, M., & Bhargava, V. K. (2010). Malicious user detection in a cognitive radio cooperative sensing system. IEEE Transactions on Wireless Communications, 9(8), 2488\u20132497. \n                        https:\/\/doi.org\/10.1109\/TWC.2010.061510.090395\n                        \n                    .","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"5105_CR24","doi-asserted-by":"publisher","unstructured":"Han, Y., Chen, Q., & Wang, J. X. (2012). An enhanced d-s theory cooperative spectrum sensing algorithm against SSDF attack. In Vehicular Technology Conference (VTC Spring), 2012 IEEE 75th (pp. 1\u20135). \n                        https:\/\/doi.org\/10.1109\/vetecs.2012.6240040\n                        \n                    .","DOI":"10.1109\/vetecs.2012.6240040"},{"key":"5105_CR25","doi-asserted-by":"crossref","unstructured":"Andersson, A., Tenhunen, M., & Ygge, F. (2000). Integer programming for combinatorial auction winner determination. In Proceedings of fourth international conference on multi-agent systems (pp. 39\u201346).","DOI":"10.1109\/ICMAS.2000.858429"},{"key":"5105_CR26","doi-asserted-by":"crossref","unstructured":"Ykhlef, M., & Alqifari, R. (2015). A new hybrid algorithm to solve winner determination problem in multiunit double internet auction. Mathematical Problems in Engineering. \n                        http:\/\/doi.org\/10.1155\/2015\/639787\n                        \n                    .","DOI":"10.1155\/2015\/639787"},{"issue":"6","key":"5105_CR27","doi-asserted-by":"crossref","first-page":"1315","DOI":"10.1109\/TMC.2014.2343976","volume":"14","author":"H Huang","year":"2015","unstructured":"Huang, H., Sun, Y., Li, X. Y., et al. (2015). Truthful auction mechanisms with performance guarantee in secondary spectrum markets. IEEE Transactions on Mobile Computing, 14(6), 1315\u20131329.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"5105_CR28","doi-asserted-by":"publisher","unstructured":"Achour, K., Slaouti, L. & Boughaci, D. (2010). A metacomputing approach for the winner determination problem in combinatorial auctions. 2010 International conference on machine and Web intelligence, Algiers (pp. 485\u2013488). \n                        https:\/\/doi.org\/10.1109\/icmwi.2010.5647909\n                        \n                    .","DOI":"10.1109\/icmwi.2010.5647909"},{"issue":"21","key":"5105_CR29","doi-asserted-by":"crossref","first-page":"5637","DOI":"10.1109\/TSP.2015.2458780","volume":"63","author":"J Zou","year":"2015","unstructured":"Zou, J., Wu, Q., Xiong, H., et al. (2015). Dynamic spectrum access and power allocation for cooperative cognitive radio networks. IEEE Transactions on Signal Processing, 63(21), 5637\u20135649.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"5105_CR30","doi-asserted-by":"crossref","unstructured":"Gardellin, V., Das, S., & Lenzini, L. (2010). A fully distributed game theoretic approach to guarantee self-coexistence among wrans. In INFOCOM IEEE conference on computer communications workshops (pp. 1\u20136). \n                        http:\/\/doi.org\/10.1109\/INFCOMW.2010.5466713\n                        \n                    .","DOI":"10.1109\/INFCOMW.2010.5466713"},{"key":"5105_CR31","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1007\/s11277-016-3216-x","volume":"88","author":"Y Zou","year":"2016","unstructured":"Zou, Y., & Yoo, S. J. (2016). Wireless Personal Communications, 88, 871. \n                        https:\/\/doi.org\/10.1007\/s11277-016-3216-x\n                        \n                    .","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"5105_CR32","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/LCOMM.2015.2499286","volume":"20","author":"A Sharifi","year":"2016","unstructured":"Sharifi, A., & Niya, M. J. M. (2016). Defense against ssdf attack in cognitive radio net- works: Attack-aware collaborative spectrum sensing approach. IEEE Communications Letters, 20(1), 93\u201396. \n                        https:\/\/doi.org\/10.1109\/LCOMM.2015.2499286\n                        \n                    .","journal-title":"IEEE Communications Letters"},{"issue":"12","key":"5105_CR33","first-page":"35","volume":"3","author":"P Subbulakshmi","year":"2016","unstructured":"Subbulakshmi, P., & Vimal, S. (2016). Secure data packet transmission in manet using enhanced identity-based cryptography (EIBC). International Journal of New Technologies in Science and Engineering, 3(12), 35\u201342.","journal-title":"International Journal of New Technologies in Science and Engineering"},{"issue":"3","key":"5105_CR34","doi-asserted-by":"publisher","first-page":"1810","DOI":"10.1109\/JSEN.2014.2366642","volume":"15","author":"M Ghaznavi","year":"2015","unstructured":"Ghaznavi, M., & Jamshidi, A. (2015). A reliable spectrum sensing method in the presence of malicious sensors in distributed cognitive radio network. IEEE Sensors Journal, 15(3), 1810\u20131816. \n                        https:\/\/doi.org\/10.1109\/JSEN.2014.2366642\n                        \n                    .","journal-title":"IEEE Sensors Journal"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-5105-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-5105-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-5105-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,9,3]],"date-time":"2018-09-03T06:27:44Z","timestamp":1535956064000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-5105-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,15]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["5105"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-5105-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2017,12,15]]}}}