{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:10:05Z","timestamp":1774541405549,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T00:00:00Z","timestamp":1583107200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T00:00:00Z","timestamp":1583107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The study and the detection of possible network attacks are essential for wireless networks, in particular for mobile cognitive radio networks due to its characteristics such as the dynamic spectrum allocation and constant frequency hopping. The primary user emulation attack is one of the most significant attacks in cognitive radio, because it hazards the complete cognitive cycle. The techniques used for the detection of primary user emulation found in the literature are based on a fixed attacker location. However, in a mobile environment, the attacker usually has dynamic locations and this compromises the current applied security techniques and generates inefficient attack detection. Therefore, our work proposes a novel technique using cross-layer design for the detection of primary user emulation with mobility. This attack detection technique was tested with experiments using software-defined radio equipment and mobile phones at indoor scenarios with dynamic locations and with a mobile phone base station built up also with software-defined radio. The obtained results show that the combination of the three utilized techniques, energy detection, motion estimation, and application information analysis, are able to optimize the detection with around 100% of effectiveness for the primary user emulation attack with dynamic location. The proposed technique shows that the energy detection time is around 100 ms and for the processing time of the information analysis in the mobile phone is about 30 s. This result shows a practical and effective approach to detect primary emulation attacks. The proposed technique, to the best of the authors\u2019 knowledge, has not been presented before in the literature with experiments neither with mobility conditions of the attacker as presented in our proposed work.<\/jats:p>","DOI":"10.1186\/s13638-020-1657-0","type":"journal-article","created":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T17:13:04Z","timestamp":1583169184000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Detection of dynamic location primary user emulation on mobile cognitive radio networks using USRP"],"prefix":"10.1186","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1086-3665","authenticated-orcid":false,"given":"Ernesto","family":"Cadena Mu\u00f1oz","sequence":"first","affiliation":[]},{"given":"Enrique","family":"Rodriguez-Colina","sequence":"additional","affiliation":[]},{"given":"Luis Fernando","family":"Pedraza","sequence":"additional","affiliation":[]},{"given":"Ingrid Patricia","family":"Paez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,2]]},"reference":[{"key":"1657_CR1","unstructured":"J. Mitola, Software radios: Survey, critical evaluation and future directions, IEEE Aerosp. Electron. Syst. Mag. 8, 25 (1993). pp. 25-36."},{"key":"1657_CR2","doi-asserted-by":"publisher","unstructured":"L. F. Pedraza, A. Molina, and I. P\u00e1ez, Spectrum occupancy statistics in Bogota-Colombia. Paper presented at IEEE Colombian Conference on Communications and Computing. COLCOM (2013), Medell\u00edn, Colombia. 22-24 Mayo 2013. pp. 1-6. https:\/\/doi.org\/10.1109\/ColComCon.2013.6564815.","DOI":"10.1109\/ColComCon.2013.6564815"},{"key":"1657_CR3","unstructured":"L. F. P. Mart\u00ednez, F. Forero, and I. P. P\u00e1ez, Evaluaci\u00f3n de ocupaci\u00f3n del espectro radioel\u00e9ctrico en Bogot\u00e1-Colombia. Ingenier\u00eda y Ciencia. Vol. 10 (2014). pp. 127\u2013143."},{"key":"1657_CR4","unstructured":"L. Pedraza, C. Hernandez, K. Galeano, E. Rodr\u00edguez, and I. P\u00e1ez, Ocupaci\u00f3n espectral y modelo de radio cognitiva para Bogot\u00e1, (Univ. Dist. Francisco Jos\u00e9 Caldas, 2016)."},{"key":"1657_CR5","doi-asserted-by":"publisher","unstructured":"W. R. Ghanem, R. Essam, and M. Dessouky, Paper presented at 2018 35th Natl. Radio Sci. Conf. NRSC (IEEE, 2018), pp. 309\u2013318. https:\/\/doi.org\/10.1109\/NRSC.2018.8354378.","DOI":"10.1109\/NRSC.2018.8354378"},{"key":"1657_CR6","unstructured":"G. Baldini, T. Sturman, A. R. Biswas, R. Leschhorn, G. Godor, and M. Street, Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead. IEEE Commun. Surv. Tutor. 14 (2012). pp. 355-379."},{"key":"1657_CR7","unstructured":"M. Ghaznavi and A. Jamshidi, Defence against primary user emulation attack using statistical properties of the cognitive radio received power. IET Commun. Vol.11 (2017). pp. 1535\u20131542."},{"key":"1657_CR8","unstructured":"T. N. Le, W.-L. Chin, and W.-C. Kao, Cross-layer design for primary user emulation attacks detection in mobile cognitive radio networks. IEEE Commun. Lett. 19 (2015). pp. 799\u2013802."},{"key":"1657_CR9","doi-asserted-by":"publisher","unstructured":"Y. Li, C. Han, M. Wang, H. Chen, and L. Xie, A primary user emulation attack detection scheme in cognitive radio network with mobile secondary user. Paper presented at 2016 2nd IEEE Int. Conf. Comput. Commun. ICCC (IEEE, 2016), pp. 1076\u20131081. https:\/\/doi.org\/10.1109\/CompComm.2016.7924870.","DOI":"10.1109\/CompComm.2016.7924870"},{"key":"1657_CR10","doi-asserted-by":"publisher","unstructured":"K. Yadav, S. D. Roy, and S. Kundu, Enhanced throughput performance under primary user emulation attack in cognitive radio networks by optimal threshold selection approach. Paper presented at 2018 2nd Int. Conf. Electron. Mater. Eng. Nano-Technol. IEMENTech (IEEE, 2018), pp. 1\u20136. https:\/\/doi.org\/10.1109\/IEMENTECH.2018.8465340.","DOI":"10.1109\/IEMENTECH.2018.8465340"},{"key":"1657_CR11","doi-asserted-by":"publisher","unstructured":"W. F. Fihri, H. El Ghazi, N. Kaabouch, and B. A. El Majd, Bayesian decision model with trilateration for primary user emulation attack localization in cognitive radio networks. Paper presented at 2017 Int. Symp. Netw. Comput. Commun. ISNCC (IEEE, 2017), pp. 1\u20136. https:\/\/doi.org\/10.1109\/ISNCC.2017.8071979.","DOI":"10.1109\/ISNCC.2017.8071979"},{"key":"1657_CR12","doi-asserted-by":"publisher","unstructured":"Y. Peng, F. Xiang, H. Long, and J. Peng, The research of cross-layer architecture design and security for cognitive radio network. Paper presented at Inf. Eng. Electron. Commer. 2009 IEEC09 Int. Symp. On (IEEE, 2009), pp. 603\u2013607. https:\/\/doi.org\/10.1109\/IEEC.2009.133.","DOI":"10.1109\/IEEC.2009.133"},{"key":"1657_CR13","doi-asserted-by":"publisher","unstructured":"H. Wen, S. Li, X. Zhu, and L. Zhou, A framework of the PHY-layer approach to defense against security threats in cognitive radio networks. IEEE Netw. 27 (2013). pp. 34-39. https:\/\/doi.org\/10.1109\/MNET.2013.6523806.","DOI":"10.1109\/MNET.2013.6523806"},{"key":"1657_CR14","doi-asserted-by":"publisher","unstructured":"M. Dabaghchian, A. Alipour-Fanid, K. Zeng, and Q. Wang, Online learning-based optimal primary user emulation attacks in cognitive radio networks. Paper presented at 2016 IEEE Conf. Commun. Netw. Secur. CNS (IEEE, 2016), pp. 100\u2013108. https:\/\/doi.org\/10.1109\/CNS.2016.7860475.","DOI":"10.1109\/CNS.2016.7860475"},{"key":"1657_CR15","doi-asserted-by":"publisher","unstructured":"S. U. Rehman, K. W. Sowerby, and C. Coghill, Radio-frequency fingerprinting for mitigating primary user emulation attack in low-end cognitive radios. IET Commun. 8, 1274 (2014). pp. 1274-1284. https:\/\/doi.org\/10.1049\/iet-com.2013.0568.","DOI":"10.1049\/iet-com.2013.0568"},{"key":"1657_CR16","unstructured":"D. A. Burgess, H. S. Samra, and others, the openbts project (2008). http:\/\/www.openbts.org. Accessed 1 Dec 2019."},{"key":"1657_CR17","unstructured":"M. Iedema, Getting Started with OpenBTS: Build Open Source Mobile Networks (O\u2019Reilly Media, Inc., 2015). ISBN: 9781491924280."},{"key":"1657_CR18","doi-asserted-by":"publisher","unstructured":"J. Hernandez-Guillen, E. Rodriguez-Colina, R. Marcelin-Jimenez, and M. P. Chalke, CRUAM-MAC: A novel cognitive radio MAC protocol for dynamic spectrum access. Paper presented at 2012 IEEE Lat.-Am. Conf. Commun. (IEEE, 2012), pp. 1\u20136. https:\/\/doi.org\/10.1109\/LATINCOM.2012.6505997.","DOI":"10.1109\/LATINCOM.2012.6505997"},{"key":"1657_CR19","doi-asserted-by":"publisher","unstructured":"S. Rizvi, J. Mitchell, and N. Showan, Analysis of security vulnerabilities and threat assessment in Cognitive Radio (CR) networks. Paper presented at Appl. Inf. Commun. Technol. AICT 2014 IEEE 8th Int. Conf. On (IEEE, 2014), pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICAICT.2014.7035911.","DOI":"10.1109\/ICAICT.2014.7035911"},{"key":"1657_CR20","unstructured":"J. Sen, A survey on security and privacy protocols for cognitive wireless sensor networks. Journal of Information and Network Security. Vol. 1. ArXiv Prepr. (2013). pp. 1-30."},{"key":"1657_CR21","doi-asserted-by":"publisher","unstructured":"\u00d6. Cepheli and G. K. Kurt, Physical layer security in cognitive radio networks: A beamforming approach. Paper presented at Commun. Netw. BlackSeaCom 2013 First Int. Black Sea Conf. On (IEEE, 2013), pp. 233\u2013237. https:\/\/doi.org\/10.1109\/BlackSeaCom.2013.6623415.","DOI":"10.1109\/BlackSeaCom.2013.6623415"},{"key":"1657_CR22","doi-asserted-by":"publisher","unstructured":"K. K. Chauhan and A. K. S. Sanger, Survey of Security threats and attacks in cognitive radio networks. Paper presented at Electron. Commun. Syst. ICECS 2014 Int. Conf. On (IEEE, 2014), pp. 1\u20135. https:\/\/doi.org\/10.1109\/ECS.2014.6892537.","DOI":"10.1109\/ECS.2014.6892537"},{"key":"1657_CR23","doi-asserted-by":"publisher","unstructured":"L. Jianwu, F. Zebing, F. Zhiyong, and Z. Ping, A survey of security issues in cognitive radio networks. China Commun. 12, 132 (2015). pp. 132-150. https:\/\/doi.org\/10.1109\/CC.2015.7084371.","DOI":"10.1109\/CC.2015.7084371"},{"key":"1657_CR24","doi-asserted-by":"publisher","unstructured":"R. Yu, Y. Zhang, Y. Liu, S. Gjessing, and M. Guizani, Securing Cognitive Radio Networks against Primary User Emulation Attacks. IEEE Netw. 30 (2016). pp. 62-69. https:\/\/doi.org\/10.1109\/MNET.2016.1200149NM.","DOI":"10.1109\/MNET.2016.1200149NM"},{"key":"1657_CR25","doi-asserted-by":"publisher","unstructured":"A. G. Fragkiadakis, E. Z. Tragos, and I. G. Askoxylakis, A survey on security threats and detection techniques in cognitive radio networks. IEEE Commun. Surv. Tutor. 15, 428 (2013). pp. 428-445. https:\/\/doi.org\/10.1109\/SURV.2011.122211.00162.","DOI":"10.1109\/SURV.2011.122211.00162"},{"key":"1657_CR26","doi-asserted-by":"publisher","unstructured":"D. Pu, Y. Shi, A. V. Ilyashenko, and A. M. Wyglinski, Detecting Primary User Emulation Attack in Cognitive Radio Networks. Paper presented at Glob. Telecommun. Conf. GLOBECOM IEEE (IEEE, 2011), pp. 1\u20135. https:\/\/doi.org\/10.1109\/GLOCOM.2011.6134419.","DOI":"10.1109\/GLOCOM.2011.6134419"},{"key":"1657_CR27","unstructured":"M. Dabaghchian, A. Alipour-Fanid, K. Zeng, Q. Wang, and P. Auer, Online Learning With Randomized Feedback Graphs for Optimal PUE Attacks in Cognitive Radio Networks. IEEEACM Trans. Netw. TON 26 (2018). arXiv:1709.10128. pp. 2268-81."},{"key":"1657_CR28","doi-asserted-by":"publisher","unstructured":"J. Avila, S. Prem, S. Rajapradeepa, and K. Thenmozhi, Authentication Based Primary User Emulation Attack Mitigation in Cognitive Radio. Paper presented at 2018 Int. Conf. Comput. Commun. Inform. ICCCI (IEEE, 2018), pp. 1\u20134. https:\/\/doi.org\/10.1109\/ICCCI.2018.8441397.","DOI":"10.1109\/ICCCI.2018.8441397"},{"key":"1657_CR29","doi-asserted-by":"publisher","unstructured":"M. Khasawneh and A. Agarwal, A survey on security in Cognitive Radio networks. Paper presented at Comput. Sci. Inf. Technol. CSIT 2014 6th Int. Conf. On (IEEE, 2014), pp. 64\u201370. https:\/\/doi.org\/10.1109\/CSIT.2014.6805980.","DOI":"10.1109\/CSIT.2014.6805980"},{"key":"1657_CR30","doi-asserted-by":"publisher","unstructured":"P. K. Niranjane, V. M. Wadhai, S. H. Rajput, and J. B. Helonde, Performance analysis of PUE attacker on Dynamic Spectrum access in cognitive radio. Paper presented at Pervasive Comput. ICPC 2015 Int. Conf. On (IEEE, 2015), pp. 1\u20136. https:\/\/doi.org\/10.1109\/PERVASIVE.2015.7086985.","DOI":"10.1109\/PERVASIVE.2015.7086985"},{"key":"1657_CR31","doi-asserted-by":"publisher","unstructured":"A. N. Akhtar, F. Arif, and A. M. Siddique, Spectrum Decision Framework to Support Cognitive Radio Based IoT in 5G. Cogn. Radio 4G-5G Wirel. Commun. Syst. 73 (2018). pp. 73-92. https:\/\/doi.org\/10.5772\/intechopen.80991.","DOI":"10.5772\/intechopen.80991"},{"key":"1657_CR32","unstructured":"M. A. Shah, S. Zhang, and C. Maple, Cognitive radio networks for Internet of Things: Applications, challenges and future. Paper presented at 2013 19th Int. Conf. Autom. Comput. (IEEE, 2013), pp. 1\u20136.\u00a0"},{"key":"1657_CR33","doi-asserted-by":"publisher","unstructured":"C. Stergiou, K. E. Psannis, B.-G. Kim, and B. Gupta, Secure integration of IoT and cloud computing. Future Gener. Comput. Syst. 78, (2018). pp. 964-975. https:\/\/doi.org\/10.1016\/j.future.2016.11.031.","DOI":"10.1016\/j.future.2016.11.031"},{"key":"1657_CR34","doi-asserted-by":"publisher","unstructured":"A. A. Khan, M. H. Rehmani, and A. Rachedi, Cognitive-radio-based internet of things: Applications, architectures, spectrum related functionalities, and future research directions. IEEE Wirel. Commun. 24 (2017). pp. 17-25. https:\/\/doi.org\/10.1109\/MWC.2017.1600404.","DOI":"10.1109\/MWC.2017.1600404"},{"key":"1657_CR35","doi-asserted-by":"publisher","unstructured":"S. Christos and K. E. Psanis, Recent advances delivered by mobile cloud computing and Internet of Things for Big data applications: A Survey. International Journal of Network Management Vol. 27 (Wiley, 2016). pp. 19-30. https:\/\/doi.org\/10.1002\/nem.1930.","DOI":"10.1002\/nem.1930"},{"key":"1657_CR36","doi-asserted-by":"publisher","unstructured":"S.-C. Lin, C.-Y. Wen, and W. A. Sethares, Two-tier device-based authentication protocol against PUEA attacks for IoT applications. IEEE Trans. Signal Inf. Process. Netw. 4 (2017). pp. 33-47. https:\/\/doi.org\/10.1109\/TSIPN.2017.2723761.","DOI":"10.1109\/TSIPN.2017.2723761"},{"key":"1657_CR37","doi-asserted-by":"publisher","unstructured":"A. P. Plageras, K. E. Psannis, Y. Ishibashi, and B.-G. Kim, IoT-based surveillance system for ubiquitous healthcare . Paper presented at IECON 2016-42nd Annu. Conf. IEEE Ind. Electron. Soc. (IEEE, 2016), pp. 6226\u20136230. https:\/\/doi.org\/10.1109\/IECON.2016.7793281.","DOI":"10.1109\/IECON.2016.7793281"},{"key":"1657_CR38","doi-asserted-by":"publisher","unstructured":"A. P. Plageras, K. E. Psannis, C. Stergiou, H. Wang, and B. B. Gupta, Efficient IoT-based sensor BIG Data collection\u2013processing and analysis in smart buildings. Future Gener. Comput. Syst. 82 (2018). pp. 349-3587. https:\/\/doi.org\/10.1016\/j.future.2017.09.082.","DOI":"10.1016\/j.future.2017.09.082"},{"key":"1657_CR39","doi-asserted-by":"publisher","unstructured":"C. Stergiou and K. E. Psannis, Multimed. Efficient and secure big data delivery in cloud computing. Tools Appl. 76 (2017). pp. 22803-22822. https:\/\/doi.org\/10.1007\/s11042-017-4590-4.","DOI":"10.1007\/s11042-017-4590-4"},{"key":"1657_CR40","doi-asserted-by":"publisher","unstructured":"C. Stergiou, K. E. Psannis, A. P. Plageras, Y. Ishibashi, B.-G. Kim, and others, Algorithms for efficient digital media transmission over IoT and cloud networking. J. Multimed. Inf. Syst. 5 (2018). pp. 27-34. https:\/\/doi.org\/10.9717\/JMIS.2018.5.1.27.","DOI":"10.9717\/JMIS.2018.5.1.27"},{"key":"1657_CR41","doi-asserted-by":"publisher","unstructured":"F. Bao, H. Chen, and L. Xie, Analysis of primary user emulation attack with motional secondary users in cognitive radio networks. Paper presented at 2012 IEEE 23rd Int. Symp. Pers. Indoor Mob. Radio Commun.-PIMRC (IEEE, 2012), pp. 956\u2013961. https:\/\/doi.org\/10.1109\/PIMRC.2012.6362922.","DOI":"10.1109\/PIMRC.2012.6362922"},{"key":"1657_CR42","doi-asserted-by":"publisher","unstructured":"F. Jin, V. Varadharajan, and U. Tupakula, Improved detection of primary user emulation attacks in cognitive radio networks. Paper presented at 2015 Int. Telecommun. Netw. Appl. Conf. ITNAC (2015), pp. 274\u2013279. https:\/\/doi.org\/10.1109\/ATNAC.2015.7366825.","DOI":"10.1109\/ATNAC.2015.7366825"},{"key":"1657_CR43","doi-asserted-by":"publisher","unstructured":"W. F. Fihri, Y. Arjoune, H. El Ghazi, N. Kaabouch, and B. A. El Majd, A particle swarm optimization based algorithm for primary user emulation attack detection. Paper presented at 2018 IEEE 8th Annu. Comput. Commun. Workshop Conf. CCWC (IEEE, 2018), pp. 823\u2013827. https:\/\/doi.org\/10.1109\/CCWC.2018.8301616.","DOI":"10.1109\/CCWC.2018.8301616"},{"key":"1657_CR44","doi-asserted-by":"publisher","unstructured":"G. Li, E. Geng, Z. Ye, Y. Xu, J. Lin, and Y. Pang, Indoor positioning algorithm based on the improved RSSI distance model. Sensors 18, 2820 (2018). pp. 1-15. https:\/\/doi.org\/10.3390\/s18092820.","DOI":"10.3390\/s18092820"},{"key":"1657_CR45","doi-asserted-by":"publisher","unstructured":"M. J. Saber and S. M. S. Sadough, Optimal energy detection in cognitive radio networks in the presence of malicious users. Paper presented at ICCKE 2013 (IEEE, 2013), pp. 173\u2013177. https:\/\/doi.org\/10.1109\/ICCKE.2013.6682814.","DOI":"10.1109\/ICCKE.2013.6682814"},{"key":"1657_CR46","doi-asserted-by":"publisher","unstructured":"E. M. Yousef, H. Y. Soliman, and A. M. Ghuniem, Sensing-Throughput tradeoff with primary user traffic and cooperative sensing in cognitive radio. Paper presented at 2017 2nd Int. Conf. Comput. Commun. Syst. ICCCS (IEEE, 2017), pp. 121\u2013127. https:\/\/doi.org\/10.1109\/CCOMS.2017.8075280.","DOI":"10.1109\/CCOMS.2017.8075280"},{"key":"1657_CR47","doi-asserted-by":"publisher","unstructured":"P. Pandya, A. Durvesh, and N. Parekh, Energy Detection Based Spectrum Sensing for Cognitive Radio Network. Paper presented at 2015 Fifth Int. Conf. Commun. Syst. Netw. Technol. (2015), pp. 201\u2013206. https:\/\/doi.org\/10.1109\/CSNT.2015.264.","DOI":"10.1109\/CSNT.2015.264"},{"key":"1657_CR48","doi-asserted-by":"publisher","unstructured":"M. Abirami, V. Hariharan, M. Sruthi, R. Gandhiraj, and K. Soman, Exploiting GNU radio and USRP: an economical test bed for real time communication systems. Paper presented at 2013 Fourth Int. Conf. Comput. Commun. Netw. Technol. ICCCNT (IEEE, 2013), pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICCCNT.2013.6726630.","DOI":"10.1109\/ICCCNT.2013.6726630"},{"key":"1657_CR49","doi-asserted-by":"publisher","unstructured":"X. Liu, B. G. Evans, and K. Moessner, Comparison of reliability, delay and complexity for standalone cognitive radio spectrum sensing schemes. IET Commun. 7 (2013). pp. 799-813. https:\/\/doi.org\/10.1049\/iet-com.2013.0037.","DOI":"10.1049\/iet-com.2013.0037"},{"key":"1657_CR50","doi-asserted-by":"publisher","unstructured":"L. Lopez-Lopez, M. Cardenas-Juarez, E. Stevens-Navarro, U. Pineda-Rico, A. Arce, and A. G. Orozco-Lugo, Superimposed Training Combined Approach for a Reduced Phase of Spectrum Sensing in Cognitive Radio. Sensors 19, 2425 (2019). pp. 1-24. https:\/\/doi.org\/10.3390\/s19112425.","DOI":"10.3390\/s19112425"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-1657-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-020-1657-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-1657-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,2]],"date-time":"2021-03-02T00:18:15Z","timestamp":1614644295000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-020-1657-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,2]]},"references-count":50,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["1657"],"URL":"https:\/\/doi.org\/10.1186\/s13638-020-1657-0","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,2]]},"assertion":[{"value":"2 September 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 January 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"53"}}