{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T23:43:59Z","timestamp":1772667839999,"version":"3.50.1"},"reference-count":137,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1405670"],"award-info":[{"award-number":["CNS-1405670"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Carl-Zeiss Foundation, Germany"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2015]]},"DOI":"10.1109\/comst.2014.2380998","type":"journal-article","created":{"date-parts":[[2015,1,6]],"date-time":"2015-01-06T14:34:58Z","timestamp":1420554898000},"page":"1023-1043","source":"Crossref","is-referenced-by-count":187,"title":["Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey"],"prefix":"10.1109","volume":"17","author":[{"given":"Rajesh K.","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Danda B.","family":"Rawat","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070405"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2007.05775"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5751298"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523806"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523802"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481340"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080104"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523805"},{"key":"ref34","first-page":"29","article-title":"Physical layer security and its applications: A survey","author":"sharma","year":"2013","journal-title":"Security Privacy Trust Resource Management in Mobile and Wireless Communications"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.011812.110927"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.071812.100729"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523804"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4396947"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(99)00064-X"},{"key":"ref21","first-page":"338","article-title":"Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method","volume":"5","author":"kurosawa","year":"2007","journal-title":"Int J Netw Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2010.0582"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5675780"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6655320"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.121102"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.131130"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.272"},{"key":"ref50","first-page":"154","article-title":"Detecting multi-channel wireless microphone user emulation attacks in white space with noise","author":"shan","year":"0","journal-title":"Proc 8th Int Conf CROWNCOM"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2012.6239877"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.03.092240"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2012.6240040"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2273305"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2262008"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.091510.100315"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2012.6478149"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638195"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654972"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2007.05776"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.839380"},{"key":"ref3","author":"goldman","year":"2012","journal-title":"Sorry America Your Wireless Airwaves Are Full"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/98.788210"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.05.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2091277"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110420"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.041311.100626"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.032511.00097"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2010.5457897"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/WCL.2012.050112.120059"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2013-215"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/815959"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.041913.120516"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6393525"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.24"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.121009"},{"key":"ref127","first-page":"342","article-title":"Detection of collaborative SSDF attacks using abnormality detection algorithm in cognitive radio networks","author":"wang","year":"0","journal-title":"Proc IEEE Int Conf Commun Workshops"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523809"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523801"},{"key":"ref124","first-page":"148","article-title":"Optimizing scanning strategies: Selecting scanning bandwidth in adversarial RF environments","author":"garnaev","year":"0","journal-title":"Proc 8th Int Conf CROWNCOM"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.062113.130759"},{"key":"ref72","doi-asserted-by":"crossref","first-page":"2196","DOI":"10.1109\/JSAC.2013.131119","article-title":"HMM-based malicious user detection for robust collaborative spectrum sensing","volume":"31","author":"he","year":"2013","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref129","first-page":"194","article-title":"Secrecy in cognitive radio networks: Turning foes to allies","author":"khalil","year":"0","journal-title":"Proc Int Symp Modeling Optim Mobile Ad Hoc WiOpt"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.191"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503425"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/261264"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2158422"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2012.6502523"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2148715"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1201\/EBK1420077759-c6"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2292903"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6272427"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2159376"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503255"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2158538"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/SDR.2006.4286332"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2012.6478143"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2008.4797562"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.031313.121551"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2012.6399208"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.640"},{"key":"ref63","first-page":"603","article-title":"An adaptive deviation-tolerant secure scheme for distributed cooperative spectrum sensing","author":"liu","year":"0","journal-title":"Proc IEEE Global Telecommun Conf"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654927"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503888"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2181839"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.252"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.061510.090395"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6155873"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654929"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.05.001"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2010.0553"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.151"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.137"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2105479"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.60"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.04.090746"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654849"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/APS.2011.5996545"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.4108\/icst.crowncom.2012.248580"},{"key":"ref91","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/TIFS.2010.2052253","article-title":"Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis","volume":"5","author":"wallace","year":"2010","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523803"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.809559"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523807"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832552"},{"key":"ref112","author":"aliprantis","year":"0","journal-title":"Games and Decision Making"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1155\/2011\/242304"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2011.0638"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2013.6633742"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684353"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2147314"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523808"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.04.004"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862321"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1201\/b14574-10"},{"key":"ref14","author":"rawat","year":"2013","journal-title":"Security Privacy Trust Resource Management in Mobile and Wireless Communications"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122211.00162"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2208211"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.2307\/1969529"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2151188"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1049\/ip-i-2.1990.0009","article-title":"security considerations in communications systems and networks","volume":"137","author":"benjamin","year":"1990","journal-title":"IEE Proceedings I - Communications Speech and Vision"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/MEDIACOM.2010.33"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2148714"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060869"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2173629"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2010.0573"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2180527"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110418"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60960-027-3.ch016"},{"key":"ref116","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1109\/TIFS.2011.2144585","article-title":"An information secrecy game in cognitive radio networks","volume":"6","author":"wu","year":"2011","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref80","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1561\/0100000036","article-title":"Information theoretic security","volume":"5","author":"liang","year":"2009","journal-title":"Found Trends Commun Inf Theory"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654966"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654835"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.809560"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120102"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110419"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2202228"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.111213.130235"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.809563"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/7110413\/06985519.pdf?arnumber=6985519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:30:08Z","timestamp":1641987008000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6985519\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":137,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/comst.2014.2380998","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}