{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T11:49:04Z","timestamp":1751456944538},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,4,13]],"date-time":"2020-04-13T00:00:00Z","timestamp":1586736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,13]],"date-time":"2020-04-13T00:00:00Z","timestamp":1586736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s11277-020-07354-7","type":"journal-article","created":{"date-parts":[[2020,4,13]],"date-time":"2020-04-13T04:02:34Z","timestamp":1586750554000},"page":"123-147","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Differential Evolution Based Reliable Cooperative Spectrum Sensing in the Presence of Malicious Users"],"prefix":"10.1007","volume":"114","author":[{"given":"Noor","family":"Gul","sequence":"first","affiliation":[]},{"given":"Ijaz Mansoor","family":"Qureshi","sequence":"additional","affiliation":[]},{"given":"Muhammad Sajjad","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Atif","family":"Elahi","sequence":"additional","affiliation":[]},{"given":"Sadiq","family":"Akbar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,13]]},"reference":[{"issue":"2","key":"7354_CR1","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1109\/JSAC.2004.839380","volume":"23","author":"S Haykin","year":"2005","unstructured":"Haykin, S. (2005). Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications, 23(2), 201\u2013220.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"4","key":"7354_CR2","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MCOM.2008.4481338","volume":"46","author":"A Ghasemi","year":"2008","unstructured":"Ghasemi, A., & Sousa, E. S. (2008). Spectrum sensing in cognitive radio networks: Requirements, challenges and design trade-offs. Communications Magazine, IEEE, 46(4), 32\u201339.","journal-title":"Communications Magazine, IEEE"},{"issue":"4","key":"7354_CR3","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/MWC.2010.5547921","volume":"17","author":"L Giupponi","year":"2010","unstructured":"Giupponi, L., Galindo-Serrano, A., Blasco, P., & Dohler, M. (2010). Docitive networks: An emerging paradigm for dynamic spectrum management [dynamic spectrum management]. IEEE Wireless Commun., 17(4), 47\u201354.","journal-title":"IEEE Wireless Commun."},{"key":"7354_CR4","doi-asserted-by":"crossref","unstructured":"Cabric, D., Mishra, S. M., & Brodersen, R. W. (2004). Implementation issues in spectrum sensing for cognitive radios. In Conference record of the thirty-eighth asilomar conference on signals, systems and computers, 2004 (Vol. 1, pp. 772\u2013776).","DOI":"10.1109\/ACSSC.2004.1399240"},{"key":"7354_CR5","doi-asserted-by":"crossref","unstructured":"Tandra, R., & Sahai, A. (2005). Fundamental limits on detection in low SNR under noise uncertainty. In 2005 international conference on wireless networks, communications and mobile computing (Vol. 1, pp. 464\u2013469).","DOI":"10.1109\/WIRLES.2005.1549453"},{"issue":"4","key":"7354_CR6","first-page":"1286","volume":"E95\u2013B","author":"KV-V Hiep","year":"2012","unstructured":"Hiep, K. V.-V. (2012). A robust cooperative spectrum sensing based on Kullback-Leibler divergence. IEICE Transactions on Communications, E95\u2013B(4), 1286\u20131290.","journal-title":"IEICE Transactions on Communications"},{"issue":"1","key":"7354_CR7","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/s11277-016-3331-8","volume":"90","author":"AA Sharifi","year":"2016","unstructured":"Sharifi, A. A., & Niya, J. M. (2016). Securing collaborative spectrum sensing against malicious attackers in cognitive radio networks. Wireless Personal Communications, 90(1), 75\u201391.","journal-title":"Wireless Personal Communications"},{"key":"7354_CR8","volume-title":"Genetic algorithms in wireless networking: Techniques, applications, and issues","author":"U Mehboob","year":"2016","unstructured":"Mehboob, U., Qadir, J., Ali, S., & Vasilakos, A. (2016). Genetic algorithms in wireless networking: Techniques, applications, and issues. Berlin: Springer."},{"key":"7354_CR9","doi-asserted-by":"publisher","unstructured":"Bhattacharjee, S. (2015). Optimization of probability of false alarm and probability of detection in cognitive radio networks using GA. In Proceedings of ReTIS\u201915\u20142nd IEEE international conference on recent trends in information systems, Kolkata, India. https:\/\/doi.org\/10.1109\/retis.2015.7232852.","DOI":"10.1109\/retis.2015.7232852"},{"issue":"2","key":"7354_CR10","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1007\/s11277-014-1915-8","volume":"79","author":"M Akbari","year":"2014","unstructured":"Akbari, M., & Ghanbarisabagh, M. (2014). A novel evolutionary-based cooperative spectrum sensing mechanism for cognitive radio networks. Wireless Personal Communications, 79(2), 1017\u20131030. https:\/\/doi.org\/10.1007\/s11277-014-1915-8.","journal-title":"Wireless Personal Communications"},{"key":"7354_CR11","doi-asserted-by":"crossref","first-page":"2449","DOI":"10.1007\/s11276-018-1675-6","volume":"5","author":"M Fathy","year":"2019","unstructured":"Fathy, M., Tammam, A., & Saafan, A. (2019). Influence of relaying malicious node within cooperative sensing in cognitive radio network. Wireless Network, 5, 2449\u20132458.","journal-title":"Wireless Network"},{"issue":"2","key":"7354_CR12","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1080\/03772063.2015.1083907","volume":"62","author":"AA Sharifi","year":"2016","unstructured":"Sharifi, A. A., Sharifi, M., & MuseviNiya, M. J. (2016). Collaborative spectrum sensing under primary user emulation attack in cognitive radio networks. IETE Journal of Research, 62(2), 205\u2013211.","journal-title":"IETE Journal of Research"},{"key":"7354_CR13","doi-asserted-by":"crossref","unstructured":"Abrardo, A., Barni, M. Kallas, K., & Tondi, B. (2018). Decision fusion with unbalanced priors under synchronized byzantine attacks\u202f: A message-passing approach. In 2018 Asia-Pacific signal and information processing association annual summit and conference (APSIPA ASC) (pp. 1160\u20131167).","DOI":"10.23919\/APSIPA.2018.8659667"},{"key":"7354_CR14","unstructured":"Gupta, N., Dhurandher, S. K., Member, S., & Sehgal, A. (2019). A contract theory approach-based scheme to encourage secondary users for cooperative sensing in cognitive radio networks. IEEE Systems Journal 1\u201311."},{"issue":"22","key":"7354_CR15","doi-asserted-by":"crossref","first-page":"5850","DOI":"10.1109\/TSP.2019.2946020","volume":"67","author":"X Cao","year":"2019","unstructured":"Cao, X., Lai, L., & Member, S. (2019). Distributed gradient descent algorithm robust to an arbitrary number of byzantine attackers. IEEE Transactions on Signal Processing, 67(22), 5850\u20135864.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"2","key":"7354_CR16","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1109\/TVT.2018.2889338","volume":"68","author":"L Zhang","year":"2019","unstructured":"Zhang, L., Ding, G., & Member, S. (2019). Detecting abnormal power emission for orderly spectrum usage B. generalized likelihood ratio detector with unknown. IEEE Transactions on Vehicular Technology, 68(2), 1989\u20131992.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"7354_CR17","first-page":"1","volume":"2019","author":"S Lee","year":"2019","unstructured":"Lee, S., Zhang, Y., Yoon, S., & Song, I. (2019). Order statistics and recursive updating with aging factor for cooperative cognitive radio networks under SSDF attacks. ICT Express, 2019, 1\u20134.","journal-title":"ICT Express"},{"issue":"10","key":"7354_CR18","doi-asserted-by":"crossref","first-page":"1696","DOI":"10.1109\/LCOMM.2019.2931974","volume":"23","author":"Z Sun","year":"2019","unstructured":"Sun, Z., Xu, Z., Hammad, M. Z., Ning, X., Wang, Q., & Guo, L. (2019). Defending against massive SSDF attacks from a novel perspective of honest secondary users. IEEE Communications Letters, 23(10), 1696\u20131699.","journal-title":"IEEE Communications Letters"},{"issue":"2","key":"7354_CR19","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1109\/TIFS.2016.2622000","volume":"12","author":"M Grissa","year":"2017","unstructured":"Grissa, M., Member, S., & Yavuz, A. A. (2017). Preserving the location privacy of secondary users in cooperative spectrum sensing. IEEE Transactions on Information Forensics and Security, 12(2), 418\u2013431.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7354_CR20","doi-asserted-by":"crossref","unstructured":"Grissa, M., Yavuz, A., & Hamdaoui, B. (2016). An efficient technique for protecting location privacy of cooperative spectrum sensing users. In 2016 IEEE conference on computer communications workshops (INFOCOM WKSHPS) (pp. 915\u2013920).","DOI":"10.1109\/INFCOMW.2016.7562209"},{"issue":"9","key":"7354_CR21","doi-asserted-by":"crossref","first-page":"269","DOI":"10.14257\/ijhit.2015.8.9.25","volume":"8","author":"H Du","year":"2015","unstructured":"Du, H., Fu, S., & Chu, H. (2015). A credibility-based defense SSDF attacks scheme for the expulsion of malicious users in cognitive radio. International Journal of hybrid information Technology, 8(9), 269\u2013280.","journal-title":"International Journal of hybrid information Technology"},{"issue":"1","key":"7354_CR22","first-page":"78","volume":"8","author":"AA Sharifi","year":"2019","unstructured":"Sharifi, A. A. (2019). An effective and optimal fusion rule in the presence of probabilistic spectrum sensing data falsification attack. Journal of Communication Engineering, 8(1), 78\u201392.","journal-title":"Journal of Communication Engineering"},{"issue":"8","key":"7354_CR23","doi-asserted-by":"crossref","first-page":"5244","DOI":"10.1109\/TWC.2017.2707407","volume":"16","author":"H Chen","year":"2017","unstructured":"Chen, H., Zhou, M., Xie, L., & Li, J. (2017). Cooperative spectrum sensing with M-ary quantized data in cognitive radio networks under SSDF attacks. IEEE Transactions on Wireless Communications, 16(8), 5244\u20135257.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"2","key":"7354_CR24","first-page":"1","volume":"18","author":"J Feng","year":"2018","unstructured":"Feng, J., Zhang, M., Xiao, Y., & Yue, H. (2018). Securing cooperative spectrum sensing against collusive SSDF attack using XOR distance analysis in cognitive radio networks. Sensors (Switzerland), 18(2), 1\u201314.","journal-title":"Sensors (Switzerland)"},{"issue":"9","key":"7354_CR25","doi-asserted-by":"crossref","first-page":"8276","DOI":"10.1109\/TVT.2018.2841362","volume":"67","author":"J Feng","year":"2018","unstructured":"Feng, J., Li, S., Lv, S., Wang, H., & Fu, A. (2018). Securing cooperative spectrum sensing against collusive false feedback attack in cognitive radio networks. IEEE Transactions on Vehicular Technology, 67(9), 8276\u20138287.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"7354_CR26","first-page":"1","volume":"12","author":"Y Fu","year":"2019","unstructured":"Fu, Y., & He, Z. (2019). Bayesian-inference-based sliding window trust model against probabilistic SSDF attack. IEEE Systems Journal, 12, 1\u201312.","journal-title":"IEEE Systems Journal"},{"key":"7354_CR27","doi-asserted-by":"crossref","unstructured":"Shrivastava, S., John, S., Rajesh, A., & Bora, P. K. (2018). Preventing collusion attacks in cooperative spectrum sensing. In International conference on signal processing and communications (SPCOM) (pp. 90\u201394).","DOI":"10.1109\/SPCOM.2018.8724473"},{"key":"7354_CR28","first-page":"1","volume":"2019","author":"F Zhao","year":"2019","unstructured":"Zhao, F., Li, S., & Feng, J. (2019). Securing cooperative spectrum sensing against DC-SSDF attack using trust fluctuation clustering analysis in cognitive radio networks. Wireless Communications and Mobile Computing, 2019, 1\u201311.","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"9","key":"7354_CR29","first-page":"1","volume":"15","author":"R Wan","year":"2019","unstructured":"Wan, R., Ding, L., Xiong, N., & Zhou, X. (2019). Mitigation strategy against spectrum- sensing data falsification attack in cognitive radio sensor networks. International Journal of Distributed Sensor Networks, 15(9), 1\u201312.","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"7354_CR30","unstructured":"Luo, Z., Zhao, S., Lu, Z., Xu, J., & Sagduyu, Y. E. (2019). When attackers meet AI\u202f: Learning-empowered attacks in cooperative spectrum sensing. 1\u201315."},{"issue":"8","key":"7354_CR31","doi-asserted-by":"crossref","first-page":"e0183387","DOI":"10.1371\/journal.pone.0183387","volume":"12","author":"N Gul","year":"2017","unstructured":"Gul, N., Qureshi, I. M., Omar, A., Elahi, A., & Khan, M. S. (2017). History based forward and feedback mechanism in cooperative spectrum sensing including malicious users in cognitive radio network. PLoS ONE, 12(8), e0183387.","journal-title":"PLoS ONE"},{"key":"7354_CR32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2018\/3153915","volume":"2018","author":"N Gul","year":"2018","unstructured":"Gul, N., Qureshi, I. M., Akbar, S., Kamran, M., & Rasool, I. (2018). One-to-many relationship based kullbackLeibler divergence against malicious users in cooperative spectrum sensing. Wireless Communications and Mobile Computing, 2018, 1\u201314.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"7354_CR33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2018\/2346317","volume":"2018","author":"N Gul","year":"2018","unstructured":"Gul, N., Qureshi, I. M., Elahi, A., & Rasool, I. (2018). Defense against malicious users in cooperative spectrum sensing using genetic algorithm. International Journal of Antennas and Propagation, 2018, 1\u201311.","journal-title":"International Journal of Antennas and Propagation"},{"key":"7354_CR34","doi-asserted-by":"crossref","unstructured":"Gul, N., Naveed, A., Elahi, A., Khattak, T., & Qureshi, I. (2017). A combination of double sided neighbor distance and genetic algorithm in cooperative spectrum sensing against malicious users. In Proceedings of 2017 14th international bhurban conference on applied sciences & technology (IBCAST) (pp. 746\u2013753).","DOI":"10.1109\/IBCAST.2017.7868137"},{"key":"7354_CR35","first-page":"1","volume":"0123456789","author":"N Gul","year":"2019","unstructured":"Gul, N., Mansoor, I., Aqdas, Q., Atif, N., & Imtiaz, E. (2019). Secured soft combination schemes against malicious\u2014users in cooperative spectrum sensing. Wireless Personal Communications, 0123456789, 1\u201320.","journal-title":"Wireless Personal Communications"},{"issue":"6","key":"7354_CR36","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1587\/elex.9.436","volume":"9","author":"M Akbari","year":"2012","unstructured":"Akbari, M., Manesh, M. R., Saleh, A. A., & Ismail, M. (2012). Improved soft fusion based cooperative spectrum sensing using particle swarm optimization. IEICE Electronics Express, 9(6), 436\u2013442.","journal-title":"IEICE Electronics Express"},{"key":"7354_CR37","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/JSTSP.2007.914882","volume":"2","author":"Z Quan","year":"2008","unstructured":"Quan, Z., Cui, S., & Sayed, A. H. (2008). Optimal linear cooperation for spectrum sensing in cognitive radio network. IEEE Journal of Selected Topics in Signal Processing, 2, 28\u201340m.","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"7354_CR38","doi-asserted-by":"publisher","unstructured":"Zainab, A., & Sinha, P. (2016). A survey of cognitive radio reconfigurable antenna design and proposed design using genetic algorithm. In IEEE students\u2019 conference on electrical, electronics and computer science, Bhopal, India (p. 1\u20136). https:\/\/doi.org\/10.1109\/sceecs.2016.7509263.","DOI":"10.1109\/sceecs.2016.7509263"},{"issue":"1","key":"7354_CR39","first-page":"53","volume":"12","author":"D Karaboga","year":"2004","unstructured":"Karaboga, D., & Okdem, S. (2004). A simple and global optimization algorithm for engineering problems: differential evolution algorithm. Turkish Journal of Electrical Engineering & Computer Sciences, 12(1), 53\u201360.","journal-title":"Turkish Journal of Electrical Engineering & Computer Sciences"},{"key":"7354_CR40","unstructured":"Veterstrom, J., & Thomsen, R. (2004). A comparative study of differential evolution, particle swarm optimization, and evolutionary algorithms on problems. In IEEE congress on evolutionary computation (pp. 980\u2013987)."},{"key":"7354_CR41","unstructured":"Storn, R., & Price, K. V. (1995). Differential evolution: A simple and efficient adaptive scheme for global optimization over continuous spaces. ICSI, USA, Tech. Rep. TR-95-012, 1995 [Online]. Available: http:\/\/icsi.berkeley.edu\/\u223cstorn\/litera.html."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07354-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07354-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07354-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T23:37:58Z","timestamp":1618270678000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07354-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,13]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["7354"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07354-7","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,13]]},"assertion":[{"value":"13 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}