{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:22:32Z","timestamp":1740140552891,"version":"3.37.3"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,8,27]],"date-time":"2013-08-27T00:00:00Z","timestamp":1377561600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1186\/1687-1499-2013-215","type":"journal-article","created":{"date-parts":[[2013,8,27]],"date-time":"2013-08-27T04:15:10Z","timestamp":1377576910000},"source":"Crossref","is-referenced-by-count":11,"title":["PUE attack detection in CWSNs using anomaly detection techniques"],"prefix":"10.1186","volume":"2013","author":[{"given":"Javier","family":"Blesa","sequence":"first","affiliation":[]},{"given":"Elena","family":"Romero","sequence":"additional","affiliation":[]},{"given":"Alba","family":"Rozas","sequence":"additional","affiliation":[]},{"given":"Alvaro","family":"Araujo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,8,27]]},"reference":[{"key":"802_CR1","first-page":"305","volume-title":"18th IEEE International Conference on Network Protocols (ICNP), 2010","author":"J Huang","year":"2010","unstructured":"Huang J, Xing G, Zhou G, Zhou R: Beyond co-existence: exploiting WiFi white space for Zigbee performance assurance. In 18th IEEE International Conference on Network Protocols (ICNP), 2010. Kyoto; 5\u20138 October 2010:305-314."},{"key":"802_CR2","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/SDR.2006.4286333","volume-title":"1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks, SDR \u201906","author":"R Chen","year":"2006","unstructured":"Chen R, Park JM: Ensuring trustworthy spectrum sensing in cognitive radio networks. In 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks, SDR \u201906. Reston; 25 September 2006:110-119."},{"key":"802_CR3","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/JSAC.2008.080104","volume":"26","author":"R Chen","year":"2008","unstructured":"Chen R, Park JM, Reed J: Defense against primary user emulation attacks in cognitive radio networks. Selected Areas Commun., IEEE J 2008, 26: 25-37.","journal-title":"Selected Areas Commun., IEEE J"},{"key":"802_CR4","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/PCCC.2009.5403815","volume-title":"IEEE 28th International Performance Computing and Communications Conference (IPCCC), 2009","author":"Z Chen","year":"2009","unstructured":"Chen Z, Cooklev T, Chen C, Pomalaza-Raez C: Modeling primary user emulation attacks and defenses in cognitive radio networks. In IEEE 28th International Performance Computing and Communications Conference (IPCCC), 2009. Scottsdale; 14\u201316 December 2009:208-215."},{"key":"802_CR5","first-page":"1","volume-title":"IEEE International Conference on Communications, 2009. ICC \u201909","author":"Z Jin","year":"2009","unstructured":"Jin Z, Anand S, Subbalakshmi K: Detecting primary user emulation attacks in dynamic spectrum access networks. In IEEE International Conference on Communications, 2009. ICC \u201909. Dresden; 14\u201318 June 2009:1-5."},{"key":"802_CR6","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1109\/WCNC.2011.5779201","volume-title":"IEEE Wireless Communications and Networking Conference (WCNC), 2011","author":"Z Yuan","year":"2011","unstructured":"Yuan Z, Niyato D, Li H, Han Z: Defense against primary user emulation attacks using belief propagation of location information in cognitive radio networks. In IEEE Wireless Communications and Networking Conference (WCNC), 2011. Cancun; 28\u201331 March 2011:599-604."},{"key":"802_CR7","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1109\/CMC.2010.26","volume-title":"International Conference on Communications and Mobile Computing (CMC), 2010, Volume 2","author":"L Huang","year":"2010","unstructured":"Huang L, Xie L, Yu H, Wang W, Yao Y: Anti-PUE attack based on joint position verification in cognitive radio networks. In International Conference on Communications and Mobile Computing (CMC), 2010, Volume 2. Shenzhen; 12\u201314 April 2010:169-173."},{"key":"802_CR8","first-page":"1","volume-title":"5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009. WiCom \u201909","author":"C Zhao","year":"2009","unstructured":"Zhao C, Wang W, Huang L, Yao Y: Anti-PUE attack base on the transmitter fingerprint identification in cognitive radio. In 5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009. WiCom \u201909. Beijing; 24\u201326 September 2009:1-5."},{"key":"802_CR9","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1109\/AINA.2012.84","volume-title":"IEEE 26th International Conference on Advanced Information Networking and Applications, 2012","author":"D Hao","year":"2012","unstructured":"Hao D, Sakurai K: A differential game approach to mitigating primary user emulation attacks in cognitive radio networks. In IEEE 26th International Conference on Advanced Information Networking and Applications, 2012. Fukuoka-shi; 26\u201329 March 2012:495-502."},{"issue":"3","key":"802_CR10","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MNET.2011.5772056","volume":"25","author":"Q Wang","year":"2011","unstructured":"Wang Q: Packet traffic: a good data source for wireless sensor network modeling and anomaly detection. Netw., IEEE 2011, 25(3):15-21.","journal-title":"Netw., IEEE"},{"key":"802_CR11","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1109\/ISECS.2010.53","volume-title":"Third International Symposium on Electronic Commerce and Security (ISECS), 2010","author":"Y Liu","year":"2010","unstructured":"Liu Y, Han K: Behavior-based attack detection and reporting in wireless sensor networks. In Third International Symposium on Electronic Commerce and Security (ISECS), 2010. Guangzhou; 29\u201331 July 2010:209-212."},{"key":"802_CR12","first-page":"138","volume-title":"IEEE 29th International Performance Computing and Communications Conference (IPCCC), 2010","author":"F Wang","year":"2010","unstructured":"Wang F, Gao J: Behavior monitoring framework in large-scale wireless sensor networks. In IEEE 29th International Performance Computing and Communications Conference (IPCCC), 2010. Albuquerque; 9\u201311 December 2010:138-145."},{"key":"802_CR13","first-page":"451","volume-title":"21st International Conference on Advanced Information Networking and Applications Workshops, 2007, AINAW \u201907, Volume 1","author":"Q Wang","year":"2007","unstructured":"Wang Q, Zhang T: Detecting anomaly node behavior in wireless sensor networks. In 21st International Conference on Advanced Information Networking and Applications Workshops, 2007, AINAW \u201907, Volume 1. Niagara Falls, Ontario; 21\u201323 May 2007:451-456."},{"issue":"4","key":"802_CR14","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MWC.2008.4599219","volume":"15","author":"S Rajasegarar","year":"2008","unstructured":"Rajasegarar S, Leckie C, Palaniswami M: Anomaly detection in wireless sensor networks. Wireless Commun., IEEE 2008, 15(4):34-40.","journal-title":"Wireless Commun., IEEE"},{"key":"802_CR15","volume-title":"5th International Symposium of Ubiquitous Computing and Ambient Intelligence, 2011, UCAMI 2011","author":"J Blesa","year":"2011","unstructured":"Blesa J, Romero E, Vallejo JC, Villanueva D, Araujo A: A cognitive simulator for wireless sensor networks. In 5th International Symposium of Ubiquitous Computing and Ambient Intelligence, 2011, UCAMI 2011. Riviera Maya; 6\u20139 December 2011."},{"key":"802_CR16","first-page":"1","volume-title":"Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques, SIMUTools \u201810, ICST","author":"D Pediaditakis","year":"2010","unstructured":"Pediaditakis D, Tselishchev Y, Boulis A: Performance and scalability evaluation of the Castalia wireless sensor network simulator. In Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques, SIMUTools \u201810, ICST. Torremolinos; March 2010:1-6. \n                    http:\/\/dx.doi.org\/10.4108\/ICST.SIMUTOOLS2010.8727"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2013-215\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-215.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-215.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,22]],"date-time":"2019-01-22T07:18:32Z","timestamp":1548141512000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2013-215"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,27]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["802"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2013-215","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2013,8,27]]},"article-number":"215"}}