{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:20:52Z","timestamp":1753600852424},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,4,7]],"date-time":"2014-04-07T00:00:00Z","timestamp":1396828800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["EURASIP J. Adv. Signal Process."],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1186\/1687-6180-2014-48","type":"journal-article","created":{"date-parts":[[2014,4,7]],"date-time":"2014-04-07T20:00:08Z","timestamp":1396900808000},"source":"Crossref","is-referenced-by-count":8,"title":["Security management based on trust determination in cognitive radio networks"],"prefix":"10.1186","volume":"2014","author":[{"given":"Jianwu","family":"Li","sequence":"first","affiliation":[]},{"given":"Zebing","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Zhiqing","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Zhiyong","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,7]]},"reference":[{"key":"611_CR1","unstructured":"Spectrum Efficiency Working Group: Spectrum policy task force report, Federal Communications Commission. (2002) \n                    http:\/\/www.fcc.gov\/sptf\/files\/SEWGFinalReport_1.pdf"},{"key":"611_CR2","doi-asserted-by":"publisher","first-page":"3661","DOI":"10.1007\/s11434-012-9909-y","volume":"57","author":"P Zhang","year":"2012","unstructured":"Zhang P: In the development of wireless cognitive science. Chin. Sci. Bull 2012, 57: 3661-3661.","journal-title":"Chin. Sci. Bull"},{"key":"611_CR3","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/JSAC.2008.080104","volume":"26","author":"R Chen","year":"2008","unstructured":"Chen R, Park JM, Reed J: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Selected Areas Commun 2008, 26: 25-37.","journal-title":"IEEE J. Selected Areas Commun"},{"key":"611_CR4","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1109\/SURV.2011.122211.00162","volume":"15","author":"AG Fragkiadakis","year":"2013","unstructured":"Fragkiadakis AG, Tragos EZ, Askoxylakis IG: A survey on security threats and detection techniques in cognitive radio networks. IEEE Commun. Surv. Tutorials 2013, 15: 428-445.","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"611_CR5","first-page":"1","volume-title":"Proc. ICC","author":"Z Jin","year":"2009","unstructured":"Jin Z, Subbalakshmi KP: Detecting primary user emulation attacks in dynamic spectrum access networks. Proc. ICC 2009, 1-5."},{"key":"611_CR6","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1049\/iet-com.2010.0573","volume":"6","author":"Y Tan","year":"2012","unstructured":"Tan Y, Sengupta S, Subbalakshmi KP: Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach. IET Commun 2012, 6: 964-973. 10.1049\/iet-com.2010.0573","journal-title":"IET Commun"},{"key":"611_CR7","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/JSAC.2011.110419","volume":"29","author":"Y Tan","year":"2011","unstructured":"Tan Y, Sengupta S, Subbalakshmi KP: Analysis of coordinated denial-of-service attacks in IEEE 802.22 networks. IEEE J. Selected Areas Commun 2011, 29: 890-902.","journal-title":"IEEE J. Selected Areas Commun"},{"key":"611_CR8","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1109\/MCOM.2013.6495776","volume":"51","author":"S Sengupta","year":"2013","unstructured":"Sengupta S, Subbalakshmi KP: Open research issues in multi-hop cognitive radio networks. IEEE Commun. Mag 2013, 51: 168-176.","journal-title":"IEEE Commun. Mag"},{"key":"611_CR9","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MCOM.2008.4481340","volume":"46","author":"R Chen","year":"2008","unstructured":"Chen R, Park JM, Hou T, Reed J: Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Commun. Mag 2008, 46: 50-55.","journal-title":"IEEE Commun. Mag"},{"key":"611_CR10","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/JCN.2009.6391387","volume":"11","author":"F Zhu","year":"2009","unstructured":"Zhu F, Seo S: Enhanced robust cooperative spectrum sensing in cognitive radio. J. Commun. Netw 2009, 11: 122-133.","journal-title":"J. Commun. Netw"},{"key":"611_CR11","first-page":"1","volume-title":"Proc. Milcom","author":"F Yu","year":"2009","unstructured":"Yu F, Huang M, Li Z, Mason P: Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios. Proc. Milcom 2009, 1-7."},{"key":"611_CR12","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1109\/TWC.2012.122212.111638","volume":"12","author":"Q Wu","year":"2013","unstructured":"Wu Q, Ding G, Wang J, Yao Y: Spatial-temporal opportunity detection for spectrum-heterogeneous cognitive radio networks: two-dimensional sensing. IEEE Trans. Wireless Commun 2013, 12: 516-526.","journal-title":"IEEE Trans. Wireless Commun"},{"key":"611_CR13","doi-asserted-by":"publisher","first-page":"3996","DOI":"10.1109\/TVT.2013.2262008","volume":"62","author":"J Wang","year":"2013","unstructured":"Wang J, Yao J, Wu Q: Stealthy-attacker detection with a multidimensional feature vector for collaborative spectrum sensing. IEEE Trans. Vehicular Technol 2013, 62: 3996-4009.","journal-title":"IEEE Trans. Vehicular Technol"},{"key":"611_CR14","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/MSP.2013.2251071","volume":"30","author":"G Ding","year":"2013","unstructured":"Ding G, Wu Q, Yao Y, Wang J, Chen Y: Kernel-based learning for statistical signal processing in cognitive radio networks. IEEE Signal Process. Mag 2013, 30: 126-136.","journal-title":"IEEE Signal Process. Mag"},{"key":"611_CR15","first-page":"1","volume-title":"IEEE Globecom 2008","author":"J Zhang","year":"2008","unstructured":"Zhang J, Varadharajan V: A new security scheme for wireless sensor networks. IEEE Globecom 2008 2008, 1-5."},{"key":"611_CR16","doi-asserted-by":"publisher","first-page":"2676","DOI":"10.1049\/iet-com.2011.0638","volume":"6","author":"H Sakran","year":"2012","unstructured":"Sakran H, Shokair M, Nasr O, El-Rabaie S, El-Azm AA: Proposed relay selection scheme for physical layer security in cognitive radio networks. IET Commun 2012, 6: 2676-2687. 10.1049\/iet-com.2011.0638","journal-title":"IET Commun"},{"key":"611_CR17","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MNET.2013.6523804","volume":"27","author":"C Chen","year":"2013","unstructured":"Chen C, Song M, Xin C, Backens J: A game-theoretical anti-jamming scheme for cognitive radio networks. IEEE Netw 2013, 27: 22-27.","journal-title":"IEEE Netw"},{"key":"611_CR18","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MNET.2013.6523808","volume":"27","author":"M Jo","year":"2013","unstructured":"Jo M, Han L, Kim D, In HP: Selfish attack and detection in cognitive radio ad-hoc networks. IEEE Netw 2013, 27: 46-50.","journal-title":"IEEE Netw"},{"key":"611_CR19","doi-asserted-by":"publisher","first-page":"4247","DOI":"10.1109\/JSEN.2013.2264161","volume":"13","author":"G Ding","year":"2013","unstructured":"Ding G, Wang J, Wu Q, Song F, Chen Y: Spectrum sensing in opportunity-heterogeneous cognitive sensor networks: how to cooperate? IEEE Sensors J 2013, 13: 4247-4255.","journal-title":"IEEE Sensors J"},{"key":"611_CR20","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/MWC.2012.6393525","volume":"19","author":"Z Gao","year":"2012","unstructured":"Gao Z, Zhu H, Li S, Du S: Security and privacy of collaborative spectrum sensing in cognitive radio networks. IEEE Wireless Commun 2012, 19: 106-112.","journal-title":"IEEE Wireless Commun"},{"key":"611_CR21","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MNET.2013.6523802","volume":"27","author":"RD Pietro","year":"2013","unstructured":"Pietro RD, Oligeri G: Jamming mitigation in cognitive radio networks. IEEE Netw 2013, 27: 10-15.","journal-title":"IEEE Netw"},{"key":"611_CR22","first-page":"1","volume":"34","author":"J Wang","year":"2013","unstructured":"Wang J, Sun B, Niu X, Yang Y: Distributed trust model based on parameter modeling. J. Commun 2013, 34: 1-13.","journal-title":"J. Commun"},{"key":"611_CR23","first-page":"120","volume":"31","author":"Z Shi","year":"2010","unstructured":"Shi Z, Liu J, Wang Z: Dynamic P2P trust model based on time-window feedback mechanism. J. Commun 2010, 31: 120-129.","journal-title":"J. Commun"},{"key":"611_CR24","doi-asserted-by":"publisher","first-page":"1658","DOI":"10.1109\/JSAC.2012.121009","volume":"30","author":"L Duan","year":"2012","unstructured":"Duan L, Min AW, Huang J, Shin KG: Attack prevention for collaborative spectrum sensing in cognitive radio networks. IEEE J. Selected Areas Commun 2012, 30: 1658-1665.","journal-title":"IEEE J. Selected Areas Commun"},{"key":"611_CR25","first-page":"1658","volume":"12","author":"X He","year":"2013","unstructured":"He X, Dai H, Ning P: A Byzantine attack defender in cognitive radio networks: the conditional frequency check. IEEE Trans. Wireless Commun 2013, 12: 1658-1665.","journal-title":"IEEE Trans. Wireless Commun"},{"key":"611_CR26","volume-title":"Modern Cryptography","author":"L Gu","year":"2009","unstructured":"Gu L, Zheng S, Yang Y: Modern Cryptography. Beijing University of Posts and Telecommunications press; 2009. . \n                    http:\/\/www.buptpress.com\/product\/book_content.jsp?pid=4136%26;cid=1%26;pstate=5"},{"key":"611_CR27","first-page":"1283","volume-title":"IEEE Globecom 2012","author":"Z Wei","year":"2012","unstructured":"Wei Z, Feng Z, Zhang Q, Li W: Three regions for space-time spectrum sensing and access in cognitive radio networks. IEEE Globecom 2012 2012, 1283-1288."},{"key":"611_CR28","first-page":"1","volume-title":"VTC Fall 2013","author":"S Liu","year":"2013","unstructured":"Liu S, Ahmad I, Bai Y, Feng Z, Zhang Q, Zhang Y: A novel cooperative sensing based on spatial distance and reliability clustering scheme in cognitive radio system. VTC Fall 2013 2013, 1-5."}],"container-title":["EURASIP Journal on Advances in Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-6180-2014-48\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-6180-2014-48.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-6180-2014-48.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,22]],"date-time":"2019-01-22T01:24:33Z","timestamp":1548120273000},"score":1,"resource":{"primary":{"URL":"https:\/\/asp-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-6180-2014-48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,7]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["611"],"URL":"https:\/\/doi.org\/10.1186\/1687-6180-2014-48","relation":{},"ISSN":["1687-6180"],"issn-type":[{"value":"1687-6180","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,7]]},"article-number":"48"}}