{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T15:15:10Z","timestamp":1648826110449},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,1,8]],"date-time":"2015-01-08T00:00:00Z","timestamp":1420675200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1186\/1687-1499-2015-4","type":"journal-article","created":{"date-parts":[[2015,6,18]],"date-time":"2015-06-18T03:29:31Z","timestamp":1434598171000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Exploiting and defending trust models in cooperative spectrum sensing"],"prefix":"10.1186","volume":"2015","author":[{"given":"David S","family":"Jackson","sequence":"first","affiliation":[]},{"given":"Wanyu","family":"Zang","sequence":"additional","affiliation":[]},{"given":"Qijun","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,1,8]]},"reference":[{"issue":"13","key":"1089_CR1","doi-asserted-by":"publisher","first-page":"2127","DOI":"10.1016\/j.comnet.2006.05.001","volume":"50","author":"IF Akyildiz","year":"2006","unstructured":"Akyildiz IF, Lee W-Y, Vuran MC, Mohanty S: Next generation\/dynamic spectrum access\/cognitive radio wireless networks: a survey.Compu. Netw 2006,50(13):2127\u20132159. 10.1016\/j.comnet.2006.05.001","journal-title":"Compu. Netw"},{"issue":"1","key":"1089_CR2","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/MWC.2012.6155873","volume":"19","author":"M Song","year":"2012","unstructured":"Song M, Xin C, Zhao Y, Cheng X: Dynamic spectrum access: from cognitive radio to network radio.IEEE Wireless Commun 2012,19(1):23\u201329.","journal-title":"IEEE Wireless Commun"},{"key":"1089_CR3","volume-title":"Spectrum Shortage Will Strike in 2013 Tech News and Analysis.","author":"S Higginbotham","year":"2013","unstructured":"Higginbotham S: Spectrum Shortage Will Strike in 2013 Tech News and Analysis. 2013. http:\/\/gigaom.com\/2010\/02\/17\/analyst-spectrum-shortage-will-strike-in-2013\/"},{"issue":"11","key":"1089_CR4","doi-asserted-by":"publisher","first-page":"2483","DOI":"10.1109\/JSAC.2013.131103","volume":"31","author":"W Li","year":"2013","unstructured":"Li W, Cheng X, Jing T, Cui Y, Xing K, Wang W: Spectrum assignment and sharing for delay minimization in multi-hop multi-flow CRNs.IEEE J. Selected Areas Commun. (JSAC) 2013,31(11):2483\u20132493.","journal-title":"IEEE J. Selected Areas Commun. (JSAC)"},{"issue":"4","key":"1089_CR5","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MCOM.2008.4481340","volume":"46","author":"R Chen","year":"2008","unstructured":"Chen R, Park J-M, Hou Y, Reed J: Toward secure distributed spectrum sensing in cognitive radio networks.IEEE Commun. Mag 2008,46(4):50\u201355.","journal-title":"IEEE Commun. Mag"},{"key":"1089_CR6","first-page":"1","volume-title":"Cognitive Radio Oriented Wireless Networks and Communications, 2008. CrownCom 2008. 3rd International Conference on","author":"T Clancy","year":"2008","unstructured":"Clancy T, Goergen N: Security in cognitive radio networks: threats and mitigation.Cognitive Radio Oriented Wireless Networks and Communications, 2008. CrownCom 2008. 3rd International Conference on 2008, 1\u20138."},{"issue":"2","key":"1089_CR7","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MWC.2013.6507399","volume":"20","author":"X Xing","year":"2013","unstructured":"Xing X, Jing T, Cheng W, Huo Y, Cheng X: Spectrum prediction in cognitive radio networks.IEEE Wireless Commun 2013,20(2):90\u201396.","journal-title":"IEEE Wireless Commun"},{"key":"1089_CR8","unstructured":"Xing X, Jing T, Huo Y, Li H, Cheng X: Channel quality prediction based on Bayesian inference in cognitive radio networks.IEEE INFOCOM, April 14\u201319 20131465\u20131473."},{"key":"1089_CR9","doi-asserted-by":"crossref","unstructured":"Shellhammer SJ, SS N, Tandra R, Tomcik J: Performance of power detector sensors of DTV signals in IEEE 802.22 WRANs.Proceedings of the First International Workshop on Technology and Policy for Accessing Spectrum, ser TAPAS \u201806 (ACM, NY, USA, 2006). [Online]. Available: http:\/\/doi.acm.org\/10.1145\/1234388.1234392","DOI":"10.1145\/1234388.1234392"},{"issue":"1","key":"1089_CR10","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSTSP.2010.2093210","volume":"5","author":"B Wang","year":"2011","unstructured":"Wang B, Liu K: Advances in cognitive radio networks: a survey.IEEE J Sel. Topics Signal Process 2011,5(1):5\u201323.","journal-title":"IEEE J Sel. Topics Signal Process"},{"key":"1089_CR11","unstructured":"Jing T, Chen X, Huo Y, Cheng X: Achievable transmission capacity of cognitive mesh networks with different media access control.IEEE INFOCOM, March 25\u201330, 20121764\u20131772."},{"key":"1089_CR12","unstructured":"Li H, Cheng X, Li K, Xing X, Jing T: Utility-based cooperative spectrum sensing scheduling in cognitive radio networks.IEEE INFOCOM Mini-Conference, April 14\u201319, 2013165\u2013169."},{"key":"1089_CR13","doi-asserted-by":"crossref","unstructured":"Chen R, Park J-M, Bian K: Robust distributed spectrum sensing in cognitive radio networks.INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, April 20081876\u20131884.","DOI":"10.1109\/INFOCOM.2007.251"},{"key":"1089_CR14","doi-asserted-by":"crossref","unstructured":"Kaligineedi P, Khabbazian M, Bhargava V: Secure cooperative sensing techniques for cognitive radio systems.Communications, 2008. ICC \u201808. IEEE International Conference on, May 20083406\u20133410.","DOI":"10.1109\/ICC.2008.640"},{"issue":"2","key":"1089_CR15","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/JCN.2009.6391387","volume":"11","author":"F Zhu","year":"2009","unstructured":"Zhu F, Seo S-W: Enhanced robust cooperative spectrum sensing in cognitive radio.J. Commun. Netw 2009,11(2):122\u2013133.","journal-title":"J. Commun. Netw"},{"key":"1089_CR16","volume-title":"Future Network and Mobile Summit 2011 Conference Proceedings","author":"K Arshad","year":"2011","unstructured":"Arshad K, Moessner K: Robust collaborative spectrum sensing based on beta reputation system.Future Network and Mobile Summit 2011 Conference Proceedings 2011."},{"key":"1089_CR17","doi-asserted-by":"crossref","unstructured":"Bhattacharjee S, Debroy S, Chatterjee M: Trust computation through anomaly monitoring in distributed cognitive radio networks.Personal Indoor and Mobile Radio Communications (PIMRC) 2011 IEEE 22nd International Symposium on, Sept 2011593\u2013597.","DOI":"10.1109\/PIMRC.2011.6140031"},{"key":"1089_CR18","doi-asserted-by":"crossref","unstructured":"Chen R, Park J-M: Ensuring trustworthy spectrum sensing in cognitive radio networks.Networking Technologies for Software Defined Radio Networks, 2006. SDR \u201806.1st IEEE Workshop on, Sept 2006110\u2013119.","DOI":"10.1109\/SDR.2006.4286333"},{"issue":"10","key":"1089_CR19","doi-asserted-by":"publisher","first-page":"1434","DOI":"10.1109\/TMC.2010.252","volume":"10","author":"A Min","year":"2011","unstructured":"Min A, Shin K, Hu X: Secure cooperative sensing in IEEE 802.22 WRANs using shadow fading correlation.IEEE Trans. Mobile Comput 2011,10(10):1434\u20131447.","journal-title":"IEEE Trans. Mobile Comput"},{"key":"1089_CR20","doi-asserted-by":"crossref","unstructured":"Feng J, Zhang Y, Lu G, Zhang L: Defend against collusive SSDF attack using trust in cooperative spectrum sensing environment.Trust, Security and Privacy in Computing and Communications (TrustCom) 2013 12th IEEE International Conference on, July 20131656\u20131661.","DOI":"10.1109\/TrustCom.2013.205"},{"key":"1089_CR21","unstructured":"Lai J, Dutkiewicz E, Liu RP, Vesilo R: Comparison of cooperative spectrum sensing strategies in distributed cognitive radio networks.Global Communications Conference (GLOBECOM) 2012 IEEE, Dec 20121513\u20131518."},{"key":"1089_CR22","doi-asserted-by":"crossref","unstructured":"Akbari M, Falahati A: Ssdf protection in cooperative spectrum sensing employing a computational trust evaluation algorithm.Telecommunications (IST) 2010 5th International Symposium on, December 201023\u201328.","DOI":"10.1109\/ISTEL.2010.5733992"},{"issue":"3","key":"1089_CR23","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/LCOMM.2010.03.092240","volume":"14","author":"K Zeng","year":"2010","unstructured":"Zeng K, Paweczak P, Cabric D: Reputation-based cooperative spectrum sensing with trusted nodes assistance.IEEE Commun. Lett 2010,14(3):226\u2013228.","journal-title":"IEEE Commun. Lett"},{"key":"1089_CR24","doi-asserted-by":"crossref","unstructured":"Min A, Shin K, Hu X: Attack-tolerant distributed sensing for dynamic spectrum access networks.Network Protocols, 2009. ICNP 2009. 17th IEEE International Conference on, Oct. 2009294\u2013303.","DOI":"10.1109\/ICNP.2009.5339675"},{"key":"1089_CR25","doi-asserted-by":"crossref","unstructured":"Liu S, Chen Y, Trappe W, Greenstein LJ: Aldo: An anomaly detection framework for dynamic spectrum access networks.INFOCOM, (IEEE, 2009)675\u2013683.","DOI":"10.1109\/INFCOM.2009.5061975"},{"key":"1089_CR26","volume-title":"NSF Workshop","author":"GMDR Peter Steenkiste","year":"2009","unstructured":"Peter Steenkiste GMDR, Sicker D: Future directions in cognitive radio network research.NSF Workshop 2009."},{"key":"1089_CR27","first-page":"82","volume-title":"IPSN","author":"N Patwari","year":"2008","unstructured":"Patwari N, Agrawal P: Effects of correlated shadowing: connectivity, localization, and RF tomography.IPSN 2008, 82\u201393."},{"key":"1089_CR28","volume-title":"Statistical distributions: M Evans, N. Hastings & B. Peacock","author":"G Trenkler","year":"1993","unstructured":"Trenkler G: Statistical distributions: M Evans, N. Hastings & B. Peacock. New: John Wiley; 1993. isbn 0\u2013471\u201355951, [pound sign] 24.95,\u201d Computational Statistics & Data Analysis, vol. 19, no. 4 (1995), pp. 483\u2013484, [Online]. Available: http:\/\/EconPapers.repec.org\/RePEc:eee:csdana:v:19:y:1995:i:4:p:483-484"},{"key":"1089_CR29","unstructured":"Forkel I, Schinnenburg M, Ang M: Generation of two-dimensional correlated shadowing for mobile radio network simulation.Proceedings of The 7th International Symposium on Wireless Personal Multimedia Communications, WPMC 2004, Abano Terme (Padova, Italy, Sep 2004)5\u20135. [Online]. Available: http:\/\/www.comnets.rwth-aachen.de"},{"key":"1089_CR30","volume-title":"Electronic Warfare and Radar Systems Engineering Handbook","author":"AIR-4.5, AD","year":"1999","unstructured":"AIR-4.5, AD: Electronic Warfare and Radar Systems Engineering Handbook. Washington, DC 20361: Naval Air Systems Command; 1999."},{"key":"1089_CR31","doi-asserted-by":"crossref","unstructured":"Bauer K, McCoy D, Anderson E, Breitenbach M, Grudic G, Grunwald D, Sicker D: The directional attack on wireless localization: how to spoof your location with a tin can.Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, 30 2009-Dec. 4 20091\u20136.","DOI":"10.1109\/GLOCOM.2009.5425737"},{"key":"1089_CR32","volume-title":"Networks: An Introduction","author":"MEJ Newman","year":"2011","unstructured":"Newman MEJ: Networks: An Introduction. Oxford: Oxford University Press; 2011."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2015-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2015-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2015-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T01:57:14Z","timestamp":1566871034000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2015-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,8]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["1089"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2015-4","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1,8]]},"assertion":[{"value":"1 September 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 November 2014","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2015","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"4"}}