{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:14:56Z","timestamp":1761401696229,"version":"3.37.3"},"reference-count":91,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2014,3,1]],"date-time":"2014-03-01T00:00:00Z","timestamp":1393632000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"European Union\u2019s Seventh Framework Programme","award":["609094","612361"],"award-info":[{"award-number":["609094","612361"]}]},{"name":"European Union\u2019s Seventh Framework Programme","award":["609094","612361"],"award-info":[{"award-number":["609094","612361"]}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2014,3,1]]},"abstract":"<jats:p> Wireless sensor networks (WSNs) have gained a lot of attention recently due to the potential they provide for developing a plethora of cost-efficient applications. Although research on WSNs has been performed for more than a decade, only recently has the explosion of their potential applicability been identified. However, due to the fact that the wireless spectrum becomes congested in the unlicensed bands, there is a need for a next generation of WSNs, utilizing the advantages of cognitive radio (CR) technology for identifying and accessing the free spectrum bands. Thus, the next generation of wireless sensor networks is the cognitive wireless sensor networks (CWSNs). For the successful adoption of CWSNs, they have to be trustworthy and secure. Although the concept of CWSNs is quite new, a lot of work in the area of security and privacy has been done until now, and this work attempts to present an overview of the most important works for securing the CWSNs. Moreover, a discussion regarding open research issues is also given in the end of this work. <\/jats:p>","DOI":"10.1155\/2014\/393248","type":"journal-article","created":{"date-parts":[[2014,3,30]],"date-time":"2014-03-30T07:58:38Z","timestamp":1396166318000},"page":"393248","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":13,"title":["Securing Cognitive Wireless Sensor Networks: A Survey"],"prefix":"10.1177","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2657-9164","authenticated-orcid":false,"given":"Alexandros","family":"Fragkiadakis","sequence":"first","affiliation":[{"name":"Institute of Computer Science, Foundation for Research and Technology-Hellas, Heraklion, 71110 Crete, Greece"}]},{"given":"Vangelis","family":"Angelakis","sequence":"additional","affiliation":[{"name":"Department of Science and Technology, Link\u00f6ping University, 58183 Link\u00f6ping, Sweden"}]},{"given":"Elias Z.","family":"Tragos","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, Foundation for Research and Technology-Hellas, Heraklion, 71110 Crete, Greece"}]}],"member":"179","published-online":{"date-parts":[[2014,3,27]]},"reference":[{"key":"B1-2014-393248","doi-asserted-by":"publisher","DOI":"10.1108\/17427371211221072"},{"first-page":"1","volume-title":"Proceedings of the 14th International Symposium and Workshops on aWorld of Wireless, Mobile and Multimedia Networks (WoWMoM '13)","author":"Fragkiadakis A.","key":"B2-2014-393248"},{"key":"B3-2014-393248","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"B5-2014-393248","series-title":"Springer Series on Chemical Sensors and Biosensors","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1007\/5346_2012_40","volume-title":"Autonomous Sensor Networks","volume":"13","author":"Winkler M.","year":"2013"},{"key":"B6-2014-393248","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2012.05.001"},{"key":"B7-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2065210"},{"key":"B8-2014-393248","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2010.0129"},{"volume-title":"Proceedings of the Solid-State Circuits Conference Digest of Technical Papers (ISSCC '12)","author":"Fan Zhang E. A.","key":"B9-2014-393248"},{"key":"B10-2014-393248","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28169-3_12"},{"key":"B11-2014-393248","doi-asserted-by":"publisher","DOI":"10.1145\/1089733.1089736"},{"key":"B12-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6384461"},{"key":"B13-2014-393248","doi-asserted-by":"publisher","DOI":"10.5121\/ijwmn.2010.2203"},{"key":"B14-2014-393248","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/601321"},{"volume-title":"Proceedings of the 3rd Workshop on Embedded Networked Sensors","author":"Zhou J. A. S. G.","key":"B15-2014-393248"},{"key":"B16-2014-393248","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2008.06.003"},{"first-page":"359","volume-title":"Proceedings of the 25th IEEE International Real-Time Systems Symposium (RTSS '04)","author":"Abdelzaher T. F.","key":"B17-2014-393248"},{"first-page":"133","volume-title":"Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN '09)","author":"Iwanicki K.","key":"B18-2014-393248"},{"key":"B19-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6163597"},{"key":"B20-2014-393248","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.01.001"},{"key":"B21-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.839380"},{"key":"B22-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2007.201"},{"issue":"2","key":"B23-2014-393248","volume":"23","author":"Lindgren O. S. A.","year":"2003","journal-title":"SIGMOBILE Mobile Computing Communications Review"},{"key":"B24-2014-393248","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.05.001"},{"key":"B25-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2009.5191144"},{"key":"B26-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2010.2051327"},{"key":"B27-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.121112.00047"},{"key":"B28-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2011.2128355"},{"volume-title":"Proceedings of the Global Communications Conference (GLOBECOM '12)","author":"Xu Y.","key":"B29-2014-393248"},{"key":"B30-2014-393248","doi-asserted-by":"publisher","DOI":"10.1049\/iet-wss.2013.0006"},{"first-page":"1","volume-title":"Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications (WPMC '13)","author":"Tragos E.","key":"B31-2014-393248"},{"key":"B32-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2007.34"},{"key":"B33-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962602"},{"key":"B34-2014-393248","doi-asserted-by":"publisher","DOI":"10.1145\/1868589.1868600"},{"key":"B35-2014-393248","doi-asserted-by":"publisher","DOI":"10.1145\/2069063.2069076"},{"key":"B36-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2006.26"},{"key":"B37-2014-393248","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182866"},{"key":"B38-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090205"},{"volume-title":"Proceedings of the Future Network and Mobile Summit","author":"Fragkiadakis A. G.","key":"B39-2014-393248"},{"key":"B40-2014-393248","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-1499-2012-73","volume":"2012","author":"Fragkiadakis A.","year":"2012","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"B41-2014-393248","doi-asserted-by":"publisher","DOI":"10.1080\/15501320600692044"},{"first-page":"1","volume-title":"Proceedings of the 8th international conference on Recent Advances in Intrusion Detection (RAID '05)","author":"Guo F.","key":"B42-2014-393248"},{"key":"B43-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2005.1577958"},{"key":"B44-2014-393248","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/48\/1\/245"},{"key":"B45-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2009.090516"},{"first-page":"1","volume-title":"proceedings of the International Symposium and Workshops on a World of Wireless, Mobile and Multimedia Networks (WoWMom '12)","author":"Buttyan L.","key":"B46-2014-393248"},{"key":"B47-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122211.00162"},{"key":"B48-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080104"},{"key":"B49-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090109"},{"key":"B50-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5425758"},{"volume-title":"Proceedings of the 11th International Conference on Information Fusion (FUSION '08)","author":"Tian Z.","key":"B51-2014-393248"},{"key":"B52-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2009.5054704"},{"key":"B53-2014-393248","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.2341"},{"key":"B54-2014-393248","doi-asserted-by":"crossref","unstructured":"Cakiroglou M., Ozcerit T.Jamming detection mechanisms for wireless sensor networks2008Proceedings of the 3rd International Conference on Scalable Information Systems","DOI":"10.4108\/ICST.INFOSCALE2008.3484"},{"first-page":"191","volume-title":"Proceedings of the 4th International Conference on Mobile Systems, Applications and Services","author":"Sheth A.","key":"B55-2014-393248"},{"first-page":"46","volume-title":"Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing","author":"Xu W.","key":"B56-2014-393248"},{"key":"B57-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2007.4292818"},{"key":"B58-2014-393248","doi-asserted-by":"publisher","DOI":"10.1145\/1464420.1464426"},{"key":"B59-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.926510"},{"key":"B60-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2007.239"},{"key":"B61-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2006.27"},{"key":"B62-2014-393248","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.07.013"},{"key":"B63-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2026454"},{"first-page":"1","volume-title":"Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS '06)","author":"Yu B.","key":"B64-2014-393248"},{"key":"B65-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2007.4496866"},{"key":"B66-2014-393248","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/205920"},{"key":"B67-2014-393248","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77871-4_14"},{"key":"B68-2014-393248","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.04.025"},{"key":"B69-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2007.4444082"},{"first-page":"545","volume-title":"Proceedings of the World Academy of Science, Engineering and Technology","author":"Tun Z.","key":"B70-2014-393248"},{"key":"B71-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.21"},{"key":"B72-2014-393248","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_19"},{"first-page":"156","volume-title":"Proceedings of the IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD '12)","author":"Mihovska A.","key":"B73-2014-393248"},{"key":"B74-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5198911"},{"key":"B75-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2009.5403815"},{"key":"B76-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.24"},{"key":"B77-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2007.209"},{"key":"B78-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2010.5496102"},{"first-page":"1876","volume-title":"Proceedings of the 27th Conference on Computer Communications (INFOCOM '08)","author":"Chen R.","key":"B79-2014-393248"},{"key":"B80-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2010.5494003"},{"first-page":"117","volume-title":"Proceedings of the Workshop on World-Sensor-Web (WSW '06), 2006","author":"Burke J.","key":"B81-2014-393248"},{"key":"B82-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6393525"},{"volume-title":"Proceedings of the NDSS Symposium","author":"Shi E.","key":"B83-2014-393248"},{"key":"B84-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2009.4912864"},{"key":"B85-2014-393248","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378624"},{"first-page":"280","volume-title":"Proceedings of the 6th International Conference on Pervasive Computing","author":"Kapadia A.","key":"B86-2014-393248"},{"key":"B87-2014-393248","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"B88-2014-393248","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-4221-8.ch011"},{"key":"B89-2014-393248","doi-asserted-by":"publisher","DOI":"10.1109\/PERSER.2007.4283904"},{"first-page":"11:1","volume-title":"Proceedings of the 14th Workshop on Mobile Computing Systems and Applications","author":"Chakraborty S.","key":"B90-2014-393248"},{"first-page":"31","volume-title":"Proceedings of the 1st International Conference on Mobile Systems, Applications and Services","author":"Gruteser M.","key":"B91-2014-393248"},{"first-page":"88","volume-title":"Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04)","author":"Ozturk C.","key":"B92-2014-393248"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2014\/393248","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2014\/393248","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2014\/393248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T16:25:42Z","timestamp":1621182342000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2014\/393248"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,1]]},"references-count":91,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,3,1]]}},"alternative-id":["10.1155\/2014\/393248"],"URL":"https:\/\/doi.org\/10.1155\/2014\/393248","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2014,3,1]]}}}