{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T10:53:59Z","timestamp":1772794439772,"version":"3.50.1"},"reference-count":126,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"publisher","award":["2037777"],"award-info":[{"award-number":["2037777"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"publisher","award":["1916902"],"award-info":[{"award-number":["1916902"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-20-1-0141"],"award-info":[{"award-number":["W911NF-20-1-0141"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006822","name":"Virginia Commonwealth Cyber Initiative","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006822","id-type":"DOI","asserted-by":"publisher"}]},{"name":"InterDigital"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2021,4,15]]},"DOI":"10.1109\/jiot.2021.3064583","type":"journal-article","created":{"date-parts":[[2021,3,8]],"date-time":"2021-03-08T22:03:30Z","timestamp":1615241010000},"page":"6498-6518","source":"Crossref","is-referenced-by-count":21,"title":["Challenges and New Directions in Securing Spectrum Access Systems"],"prefix":"10.1109","volume":"8","author":[{"given":"Shanghao","family":"Shi","sequence":"first","affiliation":[]},{"given":"Yang","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Wenjing","family":"Lou","sequence":"additional","affiliation":[]},{"given":"Chonggang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Y. Thomas","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Jeffrey H.","family":"Reed","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SDR.2006.4286333"},{"key":"ref38","author":"luo","year":"2019","journal-title":"When attackers meet AI Learning-empowered attacks in cooperative spectrum sensing"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.640"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2181839"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963004"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2422735"},{"key":"ref37","article-title":"Using classification to protect the integrity of spectrum measurements in white space networks","author":"fatemieh","year":"2011","journal-title":"Proc NDSS"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654927"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5198638"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.251"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3323679.3326527"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2017-7"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848218"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737630"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2914052"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737533"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433187"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2301972"},{"key":"ref101","author":"goodfellow","year":"2014","journal-title":"Explaining and Harnessing Adversarial Examples"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061975"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599832"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2019.8935740"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524587"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249548"},{"key":"ref59","first-page":"1","article-title":"Intel SGX explained","volume":"2016","author":"costan","year":"2016","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218594"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484322"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.55"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"ref53","first-page":"111","article-title":"Robust de-anonymization of large sparse datasets","author":"narayanan","year":"2008","journal-title":"Prof IEEE Symp Security and Privacy (SP)"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0169"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2010.12.003"},{"key":"ref4","year":"2019","journal-title":"Cisco Visual Networking Index Global Mobile Data Traffic Forecast Update"},{"key":"ref3","year":"2015","journal-title":"5G White Paper"},{"key":"ref6","year":"2019","journal-title":"Emerging technologies and their expected impact on non-federal spectrum demand"},{"key":"ref5","year":"2019","journal-title":"Research and Development Priorities for American Leadership in Wireless Communications"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2013022"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567084"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481338"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7432144"},{"key":"ref46","year":"2016","journal-title":"Signaling Protocols and Procedures for Citizens Broadband Radio Service (CBRS) Spectrum Access System (SAS)&#x2014;Citizens Broadband Radio Service Device (CBSD) Interface Technical Specification Version V1 0 1"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2310883"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2014.6817800"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.9"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6393525"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2208211"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2693965"},{"key":"ref43","year":"2017","journal-title":"Requirements for Commercial Operation in the U S 3550&#x2013;3700 MHz Citizens Broadband Radio Service Band Version V2 0 0"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2010.5457846"},{"key":"ref125","year":"2016","journal-title":"OFR Electronic Code of Federal Regulations Title 47 Telecommunication Part 96&#x2014;Citizens Broadband Radio Service"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/2897350.2897352"},{"key":"ref73","author":"palmer","year":"2019","journal-title":"FCC Eyes Blockchain to Better Manage Scarce Wireless Spectrums"},{"key":"ref72","year":"2020","journal-title":"Signaling Protocols and Procedures for Citizens Broadband Radio Service (CBRS) Spectrum Access System (SAS)&#x2014;SAS Interface Technical Specification Version V1 3 2"},{"key":"ref71","first-page":"173","article-title":"Practical Byzantine fault tolerance","volume":"99","author":"castro","year":"1999","journal-title":"Proc OSDI"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2969706"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149093"},{"key":"ref77","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref74","first-page":"128","article-title":"Analysis of blockchain use cases in the citizens broadband radio service spectrum sharing concept","author":"yrj\u00f6l\u00e4","year":"2017","journal-title":"Proc 2nd Int Conf Cogn Radio Oriented Wireless Netw Commun"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885750"},{"key":"ref78","author":"wood","year":"2014","journal-title":"Ethereum A Secure Decentralised Generalised Transaction Ledger"},{"key":"ref79","first-page":"106","article-title":"On scaling decentralized blockchains","author":"croman","year":"2016","journal-title":"Proc Int Conf Financ Cryptogr Data Security"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485838"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3231594"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3140659.3080208"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1456455.1456460"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813670"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978335"},{"key":"ref68","first-page":"11","article-title":"Software grand exposure: SGX cache attacks are practical","author":"brasser","year":"2017","journal-title":"Proc 11th USENIX Workshop Offensive Technol (WOOT)"},{"key":"ref2","year":"2018","journal-title":"Presidential Memorandum on Developing a Sustainable Spectrum Strategy for America's Future"},{"key":"ref69","first-page":"991","article-title":"Foreshadow: Extracting the keys to the intel SGX kingdom with transient out-of-order execution","author":"van bulck","year":"2018","journal-title":"Proc 27th USENIX Security Symp (USENIX Security)"},{"key":"ref1","year":"2012","journal-title":"Report to the President Realizing the Full Potential of Government-held Spectrum to Spur Economic Growth"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2858821"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.6069707"},{"key":"ref108","author":"tram\u00e8r","year":"2017","journal-title":"Ensemble adversarial training Attacks and defenses"},{"key":"ref94","year":"2020","journal-title":"CBRS Communications Security Technical Specification Version V1 2 0"},{"key":"ref107","author":"carlini","year":"2016","journal-title":"Defensive distillation is not robust to adversarial examples"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39701-1_36"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2008.4797562"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140444"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2605799"},{"key":"ref104","author":"feinman","year":"2017","journal-title":"Detecting adversarial samples from artifacts"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2535906"},{"key":"ref103","author":"madry","year":"2017","journal-title":"Towards deep learning models resistant to adversarial attacks"},{"key":"ref102","author":"szegedy","year":"2013","journal-title":"Intriguing properties of neural networks"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.1986.1143830"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/29.32276"},{"key":"ref110","year":"2017","journal-title":"CBRS Operational Security Version V1 0 0"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7179044"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2018.8403655"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.061510.090395"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481340"},{"key":"ref10","author":"wyglinski","year":"2009","journal-title":"Cognitive Radio Communications and Networks Principles and Practice"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090109"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2008.31"},{"key":"ref13","author":"mueck","year":"2015","journal-title":"Spectrum sharing Licensed shared access (LSA) and spectrum access system (SAS)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841962"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref118","year":"2019","journal-title":"Operations for Citizens Broadband Radio Service (CBRS) GAA Spectrum Coordination-Approach 1 Technical Report Version V1 0 0"},{"key":"ref16","first-page":"173","article-title":"$p^{2}$\n-SAS: Privacy-preserving centralized dynamic spectrum access system","volume":"35","author":"dou","year":"2017","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref82","first-page":"185","article-title":"Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts","author":"cheng","year":"2019","journal-title":"Proc IEEE Eur Symp Security Privacy (EuroS&P)"},{"key":"ref117","year":"2019","journal-title":"Operations for Citizens Broadband Radio Service (CBRS) GAA Spectrum Coordination-Approach 1 Technical Report Version V1 0 0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.75"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243853"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref84","author":"bowman","year":"2018","journal-title":"Private Data Objects an Overview"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2929147"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref83","first-page":"1353","article-title":"Arbitrum: Scalable, private smart contracts","author":"kalodner","year":"2018","journal-title":"Proc 27th USENIX Security Symp"},{"key":"ref114","year":"2000","journal-title":"WebTrust Principles and Criteria for Certification Authorities"},{"key":"ref113","year":"2016","journal-title":"CBRS Communications Security Technical Specification Version V1 2 0"},{"key":"ref116","year":"2019","journal-title":"Operations for Citizens Broadband Radio Service (CBRS) GAA Spectrum Coordination-Approach 1 Technical Report Version V1 0 0"},{"key":"ref80","first-page":"112","article-title":"The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication","author":"vukoli?","year":"2015","journal-title":"Proc Int Workshop Open Problems Netw Security"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5246"},{"key":"ref120","year":"2021","journal-title":"Spectrum collaboration challenge (SC2)"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998422"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2019.8935725"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978326"},{"key":"ref123","author":"ellis","year":"2017","journal-title":"Chainlink a decentralized oracle network"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59013-0_30"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417243"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/1824766.1824772"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041110.00022"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6488907\/9398162\/9372931-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9398162\/09372931.pdf?arnumber=9372931","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:41Z","timestamp":1652194421000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9372931\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,15]]},"references-count":126,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3064583","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,15]]}}}