{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T09:04:33Z","timestamp":1772355873848,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,7,2]],"date-time":"2020-07-02T00:00:00Z","timestamp":1593648000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,7,2]],"date-time":"2020-07-02T00:00:00Z","timestamp":1593648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Cognitive radio is an intelligent and adaptive radio that improves the utilization of the spectrum by its opportunistic sharing. However, it is inherently vulnerable to primary user emulation and jamming attacks that degrade the spectrum utilization. In this paper, an algorithm for the detection of primary user emulation and jamming attacks in cognitive radio is proposed. The proposed algorithm is based on the sparse coding of the compressed received signal over a channel-dependent dictionary. More specifically, the convergence patterns in sparse coding according to such a dictionary are used to distinguish between a spectrum hole, a legitimate primary user, and an emulator or a jammer. The process of decision-making is carried out as a machine learning-based classification operation. Extensive numerical experiments show the effectiveness of the proposed algorithm in detecting the aforementioned attacks with high success rates. This is validated in terms of the confusion matrix quality metric. Besides, the proposed algorithm is shown to be superior to energy detection-based machine learning techniques in terms of receiver operating characteristics curves and the areas under these curves.<\/jats:p>","DOI":"10.1186\/s13638-020-01736-y","type":"journal-article","created":{"date-parts":[[2020,7,2]],"date-time":"2020-07-02T13:40:52Z","timestamp":1593697252000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Primary user emulation and jamming attack detection in cognitive radio via sparse coding"],"prefix":"10.1186","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7094-8521","authenticated-orcid":false,"given":"Haji M.","family":"Furqan","sequence":"first","affiliation":[]},{"given":"Mehmet A.","family":"Ayg\u00fcl","sequence":"additional","affiliation":[]},{"given":"Mahmoud","family":"Nazzal","sequence":"additional","affiliation":[]},{"given":"H\u00fcseyin","family":"Arslan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,2]]},"reference":[{"issue":"1","key":"1736_CR1","doi-asserted-by":"publisher","first-page":"126","DOI":"10.3390\/s19010126","volume":"19","author":"Y. Arjoune","year":"2019","unstructured":"Y. Arjoune, N. Kaabouch, A comprehensive survey on spectrum sensing in cognitive radio networks: recent advances, new challenges, and future research directions. Sensors. 19(1), 126 (2019). https:\/\/doi.org\/10.3390\/s19010126.","journal-title":"Sensors"},{"issue":"1","key":"1736_CR2","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/SURV.2009.090109","volume":"11","author":"T. Yucek","year":"2009","unstructured":"T. Yucek, H. Arslan, A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Commun. Surv. Tuts.11(1), 116\u2013130 (2009). https:\/\/doi.org\/10.1109\/surv.2009.090109.","journal-title":"IEEE Commun. Surv. Tuts."},{"issue":"1","key":"1736_CR3","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1109\/SURV.2011.122211.00162","volume":"15","author":"A. G. Fragkiadakis","year":"2013","unstructured":"A. G. Fragkiadakis, E. Z. Tragos, I. G. Askoxylakis, A survey on security threats and detection techniques in cognitive radio networks. IEEE Commun. Surv. Tuts.15(1), 428\u2013445 (2013). https:\/\/doi.org\/10.1109\/surv.2011.122211.00162.","journal-title":"IEEE Commun. Surv. Tuts."},{"issue":"4","key":"1736_CR4","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1109\/JSAC.2011.110418","volume":"29","author":"B. Wang","year":"2011","unstructured":"B. Wang, Y. Wu, K. J. R. Liu, T. C. Clancy, An anti-jamming stochastic game for cognitive radio networks. IEEE J. Sel. Areas Commun.29(4), 877\u2013889 (2011). https:\/\/doi.org\/10.1109\/jsac.2011.110418.","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"1736_CR5","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.jisa.2017.11.010","volume":"38","author":"M. Bouabdellah","year":"2018","unstructured":"M. Bouabdellah, N. Kaabouch, F. E. Bouanani, H. Ben-Azza, Network layer attacks and countermeasures in cognitive radio networks: a survey. J. Inf. Security Appl.38:, 40\u201349 (2018). https:\/\/doi.org\/10.1016\/j.jisa.2017.11.010.","journal-title":"J. Inf. Security Appl."},{"key":"1736_CR6","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-981-10-3226-4_21","volume-title":"Proc. Comp. Commun., Netw. Internet Secur.","author":"D. Chaitanya","year":"2017","unstructured":"D. Chaitanya, K. M. Chari, in Proc. Comp. Commun., Netw. Internet Secur.Performance analysis of PUEA and SSDF attacks in cognitive radio networks (SpringerSingapore, 2017), pp. 219\u2013225. https:\/\/doi.org\/10.1007\/978-981-10-3226-4_21."},{"key":"1736_CR7","doi-asserted-by":"publisher","unstructured":"F. Jin, V. Varadharajan, U. Tupakula, in Proc. IEEE Int. Telecommun. Net. Appl. Conf. (ITNAC). Improved detection of primary user emulation attacks in cognitive radio networks, (2015), pp. 274\u2013279. https:\/\/doi.org\/10.1109\/atnac.2015.7366825.","DOI":"10.1109\/atnac.2015.7366825"},{"issue":"10","key":"1736_CR8","doi-asserted-by":"publisher","first-page":"1850","DOI":"10.1109\/JSAC.2012.121102","volume":"30","author":"Z. Yuan","year":"2012","unstructured":"Z. Yuan, D. Niyato, H. Li, J. B. Song, Z. Han, Defeating primary user emulation attacks using belief propagation in cognitive radio networks. IEEE J. Sel. Areas Commun.30(10), 1850\u20131860 (2012). https:\/\/doi.org\/10.1109\/jsac.2012.121102.","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"1736_CR9","doi-asserted-by":"publisher","unstructured":"L. Qian, X. Li, S. Wei, in Proc. Int. Conf. Computing, Netw. Commun. (ICNC). Cross-layer detection of stealthy jammers in multihop cognitive radio networks, (2013), pp. 1026\u20131030. https:\/\/doi.org\/10.1109\/iccnc.2013.6504232.","DOI":"10.1109\/iccnc.2013.6504232"},{"issue":"8","key":"1736_CR10","doi-asserted-by":"publisher","first-page":"1274","DOI":"10.1049\/iet-com.2013.0568","volume":"8","author":"S. U. Rehman","year":"2014","unstructured":"S. U. Rehman, K. W. Sowerby, C. Coghill, Radio-frequency fingerprinting for mitigating primary user emulation attack in low-end cognitive radios. Inst. Engr. Technol. Commun.8(8), 1274\u20131284 (2014). https:\/\/doi.org\/10.1049\/iet-com.2013.0568.","journal-title":"Inst. Engr. Technol. Commun."},{"key":"1736_CR11","doi-asserted-by":"publisher","unstructured":"W. Chin, C. Tseng, C. Tsai, W. Kao, C. Kao, in Proc. IEEE 75th Veh. Technol. Conf. (VTC Spring). Channel-based detection of primary user emulation attacks in cognitive radios, (2012), pp. 1\u20135. https:\/\/doi.org\/10.1109\/vetecs.2012.6239877.","DOI":"10.1109\/vetecs.2012.6239877"},{"key":"1736_CR12","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-981-10-8968-8_31","volume-title":"Proc. Smart Innov. Commun. Comput. Sci.","author":"Y. Li","year":"2019","unstructured":"Y. Li, X. Ma, M. Wang, H. Chen, L. Xie, in Proc. Smart Innov. Commun. Comput. Sci., ed. by B. K. Panigrahi, M. C. Trivedi, K. K. Mishra, S. Tiwari, and P. K. Singh. Detecting primary user emulation attack based on multipath delay in cognitive radio network (SpringerSingapore, 2019), pp. 361\u2013373. https:\/\/doi.org\/10.1007\/978-981-10-8968-8_31."},{"issue":"3","key":"1736_CR13","doi-asserted-by":"publisher","first-page":"1432","DOI":"10.1109\/TSP.2011.2178407","volume":"60","author":"N. T. Nguyen","year":"2012","unstructured":"N. T. Nguyen, R. Zheng, Z. Han, On identifying primary user emulation attacks in cognitive radio systems using non-parametric Bayesian classification. IEEE Trans. Signal Process. 60(3), 1432\u20131445 (2012). https:\/\/doi.org\/10.1109\/tsp.2011.2178407.","journal-title":"IEEE Trans. Signal Process"},{"issue":"1","key":"1736_CR14","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/JSAC.2008.080104","volume":"26","author":"R. Chen","year":"2008","unstructured":"R. Chen, J. Park, J. H. Reed, Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun.26(1), 25\u201337 (2008). https:\/\/doi.org\/10.1109\/jsac.2008.080104.","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"1736_CR15","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1145\/1287853.1287867","volume-title":"Proc. 13th Annual ACM Int. Conf. Mobile Comput. Netw.","author":"N. Patwari","year":"2007","unstructured":"N. Patwari, S. K. Kasera, in Proc. 13th Annual ACM Int. Conf. Mobile Comput. Netw.Robust location distinction using temporal link signatures (ACM PressNew York, NY, USA, 2007), pp. 111\u2013122. https:\/\/doi.org\/10.1145\/1287853.1287867."},{"key":"1736_CR16","doi-asserted-by":"publisher","unstructured":"W. R. Ghanem, M. Shokair, M. I. Desouky, in Proc. 33rd National Radio Sci. Conf. (NRSC). An improved primary user emulation attack detection in cognitive radio networks based on firefly optimization algorithm, (2016), pp. 178\u2013187. https:\/\/doi.org\/10.1109\/nrsc.2016.7450851.","DOI":"10.1109\/nrsc.2016.7450851"},{"key":"1736_CR17","doi-asserted-by":"publisher","unstructured":"S. Liu, Y. Chen, W. Trappe, L. J. Greenstein, in Proc. IEEE Int. Conf. Comp. Commun. (INFOCOM). ALDO: an anomaly detection framework for dynamic spectrum access networks, (2009), pp. 675\u2013683. https:\/\/doi.org\/10.1109\/infcom.2009.5061975.","DOI":"10.1109\/infcom.2009.5061975"},{"key":"1736_CR18","doi-asserted-by":"publisher","unstructured":"Z. Luo, C. Lou, S. Chen, S. Zheng, S. Li, in Proc. IEEE 11th Int. Symp. Commun. & Inf. Technol. (ISCIT). Specific primary user sensing for wireless security in IEEE 802.22 network, (2011), pp. 18\u201322. https:\/\/doi.org\/10.1109\/iscit.2011.6089728.","DOI":"10.1109\/iscit.2011.6089728"},{"issue":"29","key":"1736_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17485\/ijst\/2016\/v9i29\/89270","volume":"9","author":"S. Arul Selvi","year":"2016","unstructured":"S. Arul Selvi, M. Sundararajan, SVM based two level authentication for primary user emulation attack detection. Indian J. Sci. Technol.9(29), 1\u20138 (2016). https:\/\/doi.org\/10.17485\/ijst\/2016\/v9i29\/89270.","journal-title":"Indian J. Sci. Technol."},{"issue":"2","key":"1736_CR20","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1109\/TVT.2017.2749254","volume":"67","author":"X. Zhang","year":"2018","unstructured":"X. Zhang, Y. Ma, Y. Gao, S. Cui, Real-time adaptively regularized compressive sensing in cognitive radio networks. IEEE Trans. Veh. Technol.67(2), 1146\u20131157 (2018). https:\/\/doi.org\/10.1109\/tvt.2017.2749254.","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"3","key":"1736_CR21","doi-asserted-by":"publisher","first-page":"1527","DOI":"10.1109\/COMST.2017.2664421","volume":"19","author":"J. W. Choi","year":"2017","unstructured":"J. W. Choi, B. Shim, Y. Ding, B. Rao, D. I. Kim, Compressed sensing for wireless communications: useful tips and tricks. IEEE Commun. Surv. Tuts.19(3), 1527\u20131550 (2017). https:\/\/doi.org\/10.1109\/comst.2017.2664421.","journal-title":"IEEE Commun. Surv. Tuts."},{"key":"1736_CR22","doi-asserted-by":"publisher","first-page":"126098","DOI":"10.1109\/ACCESS.2019.2909976","volume":"7","author":"M. Nazzal","year":"2019","unstructured":"M. Nazzal, A. R. Ekti, A. Gorcin, H. Arslan, Exploiting sparsity recovery for compressive spectrum sensing: a machine learning approach. IEEE Access. 7:, 126098\u2013126110 (2019). https:\/\/doi.org\/10.1109\/access.2019.2909976.","journal-title":"IEEE Access"},{"key":"1736_CR23","doi-asserted-by":"publisher","unstructured":"F. Ye, X. Zhang, Y. Li, H. Huang, Primary user localization algorithm based on compressive sensing in cognitive radio networks. Algorithms. 9(2) (2016). https:\/\/doi.org\/10.3390\/a9020025.","DOI":"10.3390\/a9020025"},{"key":"1736_CR24","doi-asserted-by":"publisher","unstructured":"S. Maric, A. Biswas, S. Reisenfeld, in Proc. Int. Conf. Signals Syst. (ICSigSys). A complete algorithm to diagnose and alleviate the effects of physical layer attacks, (2017), pp. 29\u201334. https:\/\/doi.org\/10.1109\/icsigsys.2017.7967058.","DOI":"10.1109\/icsigsys.2017.7967058"},{"key":"1736_CR25","doi-asserted-by":"publisher","unstructured":"M. O. Mughal, T. Nawaz, L. Marcenaro, C. S. Regazzoni, in Proc. IEEE Global Conf. Signal Inf. Process. (GlobalSIP). Cyclostationary-based jammer detection algorithm for wide-band radios using compressed sensing, (2015), pp. 280\u2013284. https:\/\/doi.org\/10.1109\/globalsip.2015.7418201.","DOI":"10.1109\/globalsip.2015.7418201"},{"issue":"2","key":"1736_CR26","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1109\/jstsp.2009.2039178","volume":"4","author":"M. A. Davenport","year":"2010","unstructured":"M. A. Davenport, P. T. Boufounos, M. B. Wakin, R. G. Baraniuk, Signal processing with compressive measurements. IEEE J. Sel. Areas Commun.4(2), 445\u2013460 (2010). https:\/\/doi.org\/10.1109\/jstsp.2009.2039178.","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"1736_CR27","doi-asserted-by":"publisher","unstructured":"E. C. Marques, N. Maciel, N. Naviner, in IEEE Access, 7. A review of sparse recovery algorithms, (2019), pp. 1300\u20131322. https:\/\/doi.org\/10.1109\/access.2018.2886471.","DOI":"10.1109\/access.2018.2886471"},{"issue":"11","key":"1736_CR28","doi-asserted-by":"publisher","first-page":"4311","DOI":"10.1109\/TSP.2006.881199","volume":"54","author":"M. Aharon","year":"2006","unstructured":"M. Aharon, M. Elad, A. Bruckstein, K-SVD: an algorithm for designing overcomplete dictionaries for sparse representation. IEEE Trans. Signal Process. 54(11), 4311\u20134322 (2006). https:\/\/doi.org\/10.1109\/tip.2006.881969.","journal-title":"IEEE Trans. Signal Process"},{"issue":"2","key":"1736_CR29","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/MWC.2016.1500356WC","volume":"24","author":"C. Jiang","year":"2017","unstructured":"C. Jiang, H. Zhang, Y. Ren, Z. Han, K. Chen, L. Hanzo, Machine learning paradigms for next-generation wireless networks. IEEE Wireless Commun.24(2), 98\u2013105 (2017). https:\/\/doi.org\/10.1109\/mwc.2016.1500356wc.","journal-title":"IEEE Wireless Commun."},{"key":"1736_CR30","first-page":"77","volume":"2","author":"M. H. Beale","year":"2010","unstructured":"M. H. Beale, M. T. Hagan, H. B. Demuth, Neural network toolbox. User\u2019s Guide, MathWorks. 2:, 77\u201381 (2010).","journal-title":"User\u2019s Guide, MathWorks"},{"issue":"2","key":"1736_CR31","doi-asserted-by":"publisher","first-page":"1773","DOI":"10.1109\/COMST.2018.2878035","volume":"21","author":"J. M. Hamamreh","year":"2019","unstructured":"J. M. Hamamreh, H. M. Furqan, H. Arslan, Classifications and applications of physical layer security techniques for confidentiality: a comprehensive survey. IEEE Commun. Surv. Tuts.21(2), 1773\u20131828 (2019). https:\/\/doi.org\/10.1109\/comst.2018.2878035.","journal-title":"IEEE Commun. Surv. Tuts."},{"key":"1736_CR32","unstructured":"B. L. Sturm, M. G. Christensen, in Proc. 20th European Signal Process. Conf. (EUSIPCO). Comparison of orthogonal matching pursuit implementations, (2012), pp. 220\u2013224."},{"key":"1736_CR33","doi-asserted-by":"publisher","unstructured":"K. He, J. Sun, in Proc. IEEE Conf. Comput. Vision and Pattern Recognition (CVPR). Convolutional neural networks at constrained time cost, (2015), pp. 5353\u20135360. https:\/\/doi.org\/10.1109\/cvpr.2015.7299173.","DOI":"10.1109\/cvpr.2015.7299173"},{"issue":"7","key":"1736_CR34","doi-asserted-by":"publisher","first-page":"2571","DOI":"10.1109\/TWC.2008.070194","volume":"7","author":"L. Xiao","year":"2008","unstructured":"L. Xiao, L. J. Greenstein, N. B. Mandayam, W. Trappe, Using the physical layer for wireless authentication in time-variant channels. IEEE Trans. Wireless Commun.7(7), 2571\u20132579 (2008). https:\/\/doi.org\/10.1109\/twc.2008.070194.","journal-title":"IEEE Trans. Wireless Commun."},{"key":"1736_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/3178303","volume":"2018","author":"H. M. Furqan","year":"2018","unstructured":"H. M. Furqan, J. M. Hamamreh, H. Arslan, Adaptive OFDM-IM for enhancing physical layer security and spectral efficiency of future wireless networks. Wireless Commun. Mob. Comput.2018:, 1\u20136 (2018). https:\/\/doi.org\/10.1155\/2018\/3178303.","journal-title":"Wireless Commun. Mob. Comput."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-01736-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13638-020-01736-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-01736-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T23:52:11Z","timestamp":1625183531000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-020-01736-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,2]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["1736"],"URL":"https:\/\/doi.org\/10.1186\/s13638-020-01736-y","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,2]]},"assertion":[{"value":"6 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"141"}}