{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T00:28:02Z","timestamp":1769041682289,"version":"3.49.0"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,4,11]],"date-time":"2015-04-11T00:00:00Z","timestamp":1428710400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. on Info. Security"],"published-print":{"date-parts":[[2015,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Currently, there are several ongoing efforts for the definition of new regulation policies, paradigms, and technologies aiming a more efficient usage of the radio spectrum. In this context, cognitive radio (CR) emerges as one of the most promising players by enabling the dynamic access to vacant frequency bands on a non-interference basis. However, the intrinsic characteristic of CR opens new ways for attackers, namely in the context of the effective detection of incumbent or primary users (PUs), the most fundamental and challenging requirement for the successful operation of CR networks. In this article, we provide a global and integrated vision of the main threats affecting CR environments in the context of the detection of primary users, with a particular focus on spectrum sensing data falsification and primary user emulation attacks. We also address solutions and research challenges still required to address such threats. Our discussion aims at being complete and self-contained, while also targeting readers with no specific background on this important topic of CR environments. It is, as far as our knowledge goes, the first work providing a global and clear vision of security threats and countermeasures in the context of primary user detection in CR.<\/jats:p>","DOI":"10.1186\/s13635-015-0021-0","type":"journal-article","created":{"date-parts":[[2015,4,10]],"date-time":"2015-04-10T01:00:57Z","timestamp":1428627657000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["A survey on security attacks and countermeasures with primary user detection in cognitive radio networks"],"prefix":"10.1186","volume":"2015","author":[{"given":"Jos\u00e9","family":"Marinho","sequence":"first","affiliation":[]},{"given":"Jorge","family":"Granjal","sequence":"additional","affiliation":[]},{"given":"Edmundo","family":"Monteiro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,11]]},"reference":[{"issue":"13","key":"21_CR1","doi-asserted-by":"publisher","first-page":"2127","DOI":"10.1016\/j.comnet.2006.05.001","volume":"50","author":"IF Akyildiz","year":"2006","unstructured":"IF Akyildiz, WY Lee, MC Vuran, S Mohanty, NeXt generation\/dynamic spectrum access\/cognitive radio wireless networks: a survey. Comput. Netw. 50(13), 2127\u20132159 (2006)","journal-title":"Comput. Netw."},{"issue":"4","key":"21_CR2","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/98.788210","volume":"6","author":"J Mitola","year":"1999","unstructured":"J Mitola, G Maguire, Cognitive radio: making software radios more personal. IEEE Personal Commun. 6(4), 13\u201318 (1999)","journal-title":"IEEE Personal Commun."},{"issue":"1","key":"21_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-1499-2012-28","volume":"2012","author":"L Lu","year":"2012","unstructured":"L Lu, X Zhou, U Onunkwo, GY Li, Ten years of research in spectrum sensing and sharing in cognitive radio. EURASIP J. Wirel. Commun. Netw. 2012(1), 1\u201316 (2012)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"2","key":"21_CR4","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/s11276-011-0392-1","volume":"18","author":"J Marinho","year":"2012","unstructured":"J Marinho, E Monteiro, Cognitive radio: survey on communication protocols, spectrum decision issues, and future research directions. Wireless Net. 18(2), 147\u2013164 (2012)","journal-title":"Wireless Net."},{"issue":"5","key":"21_CR5","doi-asserted-by":"publisher","first-page":"1022","DOI":"10.1109\/TMC.2013.121","volume":"13","author":"C Xin","year":"2014","unstructured":"C Xin, M Song, Detection of PUE attacks in cognitive radio networks based on signal activity pattern. IEEE Transact. Mobile Comput. 13(5), 1022\u20131034 (2014)","journal-title":"IEEE Transact. Mobile Comput."},{"issue":"1","key":"21_CR6","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1109\/SURV.2011.122211.00162","volume":"15","author":"A Fragkiadakis","year":"2013","unstructured":"A Fragkiadakis, E Tragos, I Askoxylakis, A survey on security threats and detection techniques in cognitive radio networks. IEEE Commun. Surveys Tutorials 15(1), 428\u2013445 (2013)","journal-title":"IEEE Commun. Surveys Tutorials"},{"issue":"12","key":"21_CR7","doi-asserted-by":"publisher","first-page":"3172","DOI":"10.1109\/JPROC.2012.2208211","volume":"100","author":"A Attar","year":"2012","unstructured":"A Attar, H Tang, AV Vasilakos, FR Yu, VCM Leung, A survey of security challenges in cognitive radio networks: solutions and future research directions. Proceedings IEEE 100(12), 3172\u20133186 (2012)","journal-title":"Proceedings IEEE"},{"issue":"2","key":"21_CR8","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1109\/SURV.2011.032511.00097","volume":"14","author":"G Baldini","year":"2012","unstructured":"G Baldini, T Sturman, AR Biswas, R Leschhorn, G Godor, M Street, Security aspects in software defined radio and cognitive radio networks: a survey and a way ahead. IEEE Commun. Surveys Tutorials 14(2), 355\u2013379 (2012)","journal-title":"IEEE Commun. Surveys Tutorials"},{"key":"21_CR9","first-page":"114","volume-title":"Security in Cognitive Radio Networks - A Survey. 12th International Conference on Intelligent Systems Design and Applications, ISDA 2012","author":"AC Sumathi","year":"2012","unstructured":"AC Sumathi, R Vidhyapriya, Security in Cognitive Radio Networks - A Survey. 12th International Conference on Intelligent Systems Design and Applications, ISDA 2012, 2012, pp. 114\u2013118"},{"issue":"2","key":"21_CR10","first-page":"181","volume":"12","author":"W El-hajj","year":"2011","unstructured":"W El-hajj, H Safa, M Guizani, Survey of security issues in cognitive radio networks. J. Internet Tech. 12(2), 181\u2013198 (2011)","journal-title":"J. Internet Tech."},{"issue":"5","key":"21_CR11","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1002\/dac.1102","volume":"23","author":"O Le\u00f3n","year":"2010","unstructured":"O Le\u00f3n, J Hern\u00e1ndez-Serrano, M Soriano, Securing cognitive radio networks. Int. J. Commun. Systems 23(5), 633\u2013652 (2010)","journal-title":"Int. J. Commun. Systems"},{"key":"21_CR12","unstructured":"IEEE 802.22 WRAN WG Website. http:\/\/www.ieee802.org\/22\/. Accessed 31 July 2012."},{"issue":"60","key":"21_CR13","first-page":"1","volume":"2012","author":"P Ren","year":"2012","unstructured":"P Ren, Y Wang, Q Du, J Xu, A survey on dynamic spectrum access protocols for distributed cognitive wireless networks. EURASIP J. Wirel. Commun. Netw. 2012(60), 1\u201321 (2012)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"4","key":"21_CR14","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MWC.2007.4300977","volume":"14","author":"H Celebi","year":"2007","unstructured":"H Celebi, H Arslan, Utilization of location information in cognitive wireless networks. IEEE Wireless Commun. 14(4), 6\u201313 (2007)","journal-title":"IEEE Wireless Commun."},{"key":"21_CR15","first-page":"1","volume-title":"Security in Cognitive Radio Networks: An Example Using the Commercial IEEE 802.22 Standard. IEEE Military Communications Conference, MILCOM 2009","author":"AN Mody","year":"2009","unstructured":"AN Mody, R Reddy, T Kiernan, TX Brown, Security in Cognitive Radio Networks: An Example Using the Commercial IEEE 802.22 Standard. IEEE Military Communications Conference, MILCOM 2009, 2009, pp. 1\u20137"},{"key":"21_CR16","first-page":"1","volume-title":"Security in Cognitive Radio Networks: Threats and Mitigation. IEEE 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, CrownCom 2008","author":"TC Clancy","year":"2008","unstructured":"TC Clancy, N Goergen, Security in Cognitive Radio Networks: Threats and Mitigation. IEEE 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, CrownCom 2008, 2008, pp. 1\u20138"},{"key":"21_CR17","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1016\/j.comnet.2015.01.011","volume":"79","author":"J Soto","year":"2015","unstructured":"J Soto, M Nogueira, A framework for resilient and secure spectrum sensing on cognitive radio networks. Comput. Netw. 79, 313\u2013322 (2015)","journal-title":"Comput. Netw."},{"issue":"5","key":"21_CR18","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1007\/s11276-012-0493-5","volume":"19","author":"J Chen","year":"2013","unstructured":"J Chen, L Jiao, J Wu, X Wang, Compressive spectrum sensing in the cognitive radio networks by exploiting the sparsity of active radios. Wireless Net 19(5), 661\u2013671 (2013)","journal-title":"Wireless Net"},{"issue":"6","key":"21_CR19","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1007\/s11276-012-0530-4","volume":"19","author":"B Lo","year":"2013","unstructured":"B Lo, I Akyildiz, Reinforcement learning for cooperative sensing gain in cognitive radio ad hoc networks. Wireless Net 19(6), 1237\u20131250 (2013)","journal-title":"Wireless Net"},{"key":"21_CR20","first-page":"1","volume":"2010","author":"W Wang","year":"2010","unstructured":"W Wang, H Li, Y Sun, Z Han, Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks. EURASIP J. Adv. Sig. Pr. 2010, 1\u201315 (2010)","journal-title":"EURASIP J. Adv. Sig. Pr."},{"issue":"3","key":"21_CR21","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/LCOMM.2010.03.092240","volume":"14","author":"K Zeng","year":"2010","unstructured":"K Zeng, P Paweczak, D Cabric, Reputation-based cooperative spectrum sensing with trusted nodes assistance. IEEE Commun. Letters 14(3), 226\u2013228 (2010)","journal-title":"IEEE Commun. Letters"},{"key":"21_CR22","first-page":"25","volume-title":"Value-fusion versus decision-fusion for fault-tolerance in collaborative target detection in sensor networks. Proceedings of the Fourth International Conference on Information Fusion","author":"T Clouqueur","year":"2001","unstructured":"T Clouqueur, P Ramanathan, KK Saluja, KC Wang, Value-fusion versus decision-fusion for fault-tolerance in collaborative target detection in sensor networks. Proceedings of the Fourth International Conference on Information Fusion, 2001, pp. 25\u201330"},{"key":"21_CR23","first-page":"1","volume":"2008","author":"AC Malady","year":"2008","unstructured":"AC Malady, C Silva, Clustering methods for distributed spectrum sensing in cognitive radio systems. IEEE Military Commun. Conference MILCOM 2008, 1\u20135 (2008)","journal-title":"IEEE Military Commun. Conference MILCOM"},{"key":"21_CR24","first-page":"17","volume-title":"Collaborative Detection of Spatially Correlated Signals in Sensor Networks. Proceedings of the 2005 International Conference on Telecommunication Systems Modeling and Analysis","author":"A Nasipuri","year":"2005","unstructured":"A Nasipuri, K Li, Collaborative Detection of Spatially Correlated Signals in Sensor Networks. Proceedings of the 2005 International Conference on Telecommunication Systems Modeling and Analysis, 2005, pp. 17\u201320"},{"key":"21_CR25","first-page":"1","volume-title":"Secure Collaborative Sensing for Crowd Sourcing Spectrum Data in White Space Networks. IEEE Symposium on New Frontiers in Dynamic Spectrum","author":"O Fatemieh","year":"2010","unstructured":"O Fatemieh, R Chandra, CA Gunter, Secure Collaborative Sensing for Crowd Sourcing Spectrum Data in White Space Networks. IEEE Symposium on New Frontiers in Dynamic Spectrum, 2010, pp. 1\u201312"},{"issue":"1","key":"21_CR26","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.inffus.2011.08.001","volume":"14","author":"B Khaleghi","year":"2013","unstructured":"B Khaleghi, A Khamis, FO Karray, SN Razavi, Multisensor data fusion: a review of the state-of-the-art. Info Fusion 14(1), 28\u201344 (2013)","journal-title":"Info Fusion"},{"key":"21_CR27","volume-title":"Security in cognitive radio networks, The required evolution in approaches to wireless network security. 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, CrownCom 2008","author":"JL Burbank","year":"2008","unstructured":"JL Burbank, Security in cognitive radio networks, The required evolution in approaches to wireless network security. 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, CrownCom 2008, 2008"},{"issue":"4","key":"21_CR28","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MCOM.2008.4481340","volume":"46","author":"R Chen","year":"2008","unstructured":"R Chen, JM Park, YT Hou, JH Reed, Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Commun. Magazine 46(4), 50\u201355 (2008)","journal-title":"IEEE Commun. Magazine"},{"issue":"6","key":"21_CR29","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1007\/s11276-012-0426-3","volume":"18","author":"CY Chen","year":"2012","unstructured":"CY Chen, YH Chou, HC Chao, CH Lo, Secure centralized spectrum sensing for cognitive radio networks. Wireless Net 18(6), 667\u2013677 (2012)","journal-title":"Wireless Net"},{"issue":"2","key":"21_CR30","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1016\/j.comnet.2011.10.006","volume":"56","author":"H Rif\u00e0-Pous","year":"2012","unstructured":"H Rif\u00e0-Pous, C Garrigues, Authenticating hard decision sensing reports in cognitive radio networks. Comput. Netw. 56(2), 566\u2013576 (2012)","journal-title":"Comput. Netw."},{"issue":"2","key":"21_CR31","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/SURV.2010.021510.00088","volume":"12","author":"Y Zhang","year":"2010","unstructured":"Y Zhang, N Meratnia, P Havinga, Outlier detection techniques for wireless sensor networks: a survey. IEEE Commun. Surveys Tutorials 12(2), 159\u2013170 (2010)","journal-title":"IEEE Commun. Surveys Tutorials"},{"issue":"8","key":"21_CR32","doi-asserted-by":"publisher","first-page":"2521","DOI":"10.1007\/s11276-014-0758-2","volume":"20","author":"C Chen","year":"2014","unstructured":"C Chen, M Song, CS Xin, CoPD: a conjugate prior based detection scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks. Wireless Net 20(8), 2521\u20132528 (2014)","journal-title":"Wireless Net"},{"key":"21_CR33","first-page":"294","volume-title":"Attack-tolerant distributed sensing for dynamic spectrum access networks. 17th IEEE International Conference on Network Protocols, ICNP 2009","author":"AW Min","year":"2009","unstructured":"AW Min, KG Shin, X Hu, Attack-tolerant distributed sensing for dynamic spectrum access networks. 17th IEEE International Conference on Network Protocols, ICNP 2009, 2009, p. 294"},{"key":"21_CR34","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/CNS.2014.6997465","volume-title":"Trust-based data fusion mechanism design in cognitive radio networks. 2014 IEEE Conference on Communications and Network Security, CNS","author":"J Wang","year":"2014","unstructured":"J Wang, IR Chen, Trust-based data fusion mechanism design in cognitive radio networks. 2014 IEEE Conference on Communications and Network Security, CNS, 2014, pp. 53\u201359"},{"key":"21_CR35","first-page":"1","volume-title":"Catching Attacker(s) for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach","author":"H Li","year":"2010","unstructured":"H Li, Z Han, Catching Attacker(s) for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach (Spectrum, IEEE Symposium on New Frontiers in Dynamic, 2010), pp. 1\u201312"},{"key":"21_CR36","first-page":"4856","volume-title":"A robust malicious user detection scheme in cooperative spectrum sensing. 2012 IEEE Global Communications Conference, GLOBECOM","author":"C Chen","year":"2012","unstructured":"C Chen, M Song, C Xin, M Alam, A robust malicious user detection scheme in cooperative spectrum sensing. 2012 IEEE Global Communications Conference, GLOBECOM, 2012, pp. 4856\u20134861"},{"key":"21_CR37","first-page":"1","volume-title":"Cooperative boundary detection for spectrum sensing using dedicated wireless sensor networks. IEEE International Conference on Computer Communications, INFOCOM","author":"Y Yang","year":"2010","unstructured":"Y Yang, Y Liu, Q Zhang, L Ni, Cooperative boundary detection for spectrum sensing using dedicated wireless sensor networks. IEEE International Conference on Computer Communications, INFOCOM, 2010, pp. 1\u20139"},{"key":"21_CR38","first-page":"836","volume-title":"Malicious node detection in wireless sensor networks using weighted trust evaluation. Proceedings of the 2008 Spring Simulation Multiconference","author":"M Atakli","year":"2008","unstructured":"M Atakli, H Hu, Y Chen, WS Ku, Z Su, Malicious node detection in wireless sensor networks using weighted trust evaluation. Proceedings of the 2008 Spring Simulation Multiconference, 2008, p. 836"},{"key":"21_CR39","volume-title":"Peer identification in wireless and sensor networks using signal properties. IEEE International Conference on Mobile Adhoc and Sensor Systems Conference","author":"T Suen","year":"2005","unstructured":"T Suen, A Yasinsac, Peer identification in wireless and sensor networks using signal properties. IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005"},{"issue":"1","key":"21_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-6180-2014-1","volume":"2014","author":"J Li","year":"2014","unstructured":"J Li, Z Feng, Z Wei, Z Feng, P Zhang, Security management based on trust determination in cognitive radio networks. EURASIP J. Adv. Sig. Pr 2014(1), 1\u201316 (2014)","journal-title":"EURASIP J. Adv. Sig. Pr"},{"issue":"6","key":"21_CR41","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1002\/sec.810","volume":"7","author":"L Tingting","year":"2014","unstructured":"L Tingting, S Feng, Research on hidden malicious user detection problem. Sec. Commun. Net. 7(6), 958\u2013963 (2014)","journal-title":"Sec. Commun. Net."},{"key":"21_CR42","volume-title":"Security in cognitive wireless sensor networks. Challenges and open problems. EURASIP Journal on Wireless Communications and Networking 2012","author":"A Araujo","year":"2012","unstructured":"A Araujo, J Blesa, E Romero, D Villanueva, Security in cognitive wireless sensor networks. Challenges and open problems. EURASIP Journal on Wireless Communications and Networking 2012, 2012"},{"issue":"2","key":"21_CR43","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/1621076.1621084","volume":"13","author":"Z Jin","year":"2009","unstructured":"Z Jin, S Anand, KP Subbalakshmi, Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing mobile computing and communications. ACM SIGMOBILE Mobile Comput. Commun. Rev 13(2), 74\u201385 (2009)","journal-title":"ACM SIGMOBILE Mobile Comput. Commun. Rev"},{"issue":"10","key":"21_CR44","doi-asserted-by":"publisher","first-page":"1850","DOI":"10.1109\/JSAC.2012.121102","volume":"30","author":"Z Yuan","year":"2012","unstructured":"Z Yuan, D Niyato, H Li, JB Song, Z Han, Defeating primary user emulation attacks using belief propagation in cognitive radio networks. IEEE J. Selec. Areas Commun 30(10), 1850\u20131860 (2012)","journal-title":"IEEE J. Selec. Areas Commun"},{"key":"21_CR45","first-page":"112","volume-title":"A mitigation strategy against malicious primary user emulation attack in cognitive radio networks. 2014 IEEE International Conference on Emerging Technologies, ICET","author":"B Naqvi","year":"2014","unstructured":"B Naqvi, S Murtaza, B Aslam, A mitigation strategy against malicious primary user emulation attack in cognitive radio networks. 2014 IEEE International Conference on Emerging Technologies, ICET, 2014, pp. 112\u2013117"},{"key":"21_CR46","volume-title":"Smart primary user emulation in cognitive radio networks: defence strategies against radio aware attacks and robust spectrum sensing. Transactions on Emerging Telecommunications Technologies 2014","author":"M Haghighat","year":"2014","unstructured":"M Haghighat, SMS Sadough, Smart primary user emulation in cognitive radio networks: defence strategies against radio aware attacks and robust spectrum sensing. Transactions on Emerging Telecommunications Technologies 2014, 2014. doi:10.1002\/ett.2848"},{"key":"21_CR47","first-page":"6216","volume":"1308","author":"R Yu","year":"2013","unstructured":"R Yu, Y Zhang, Y Liu, S Gjessing, M Guizani, Securing cognitive radio networks against primary user emulation attacks. arXiv preprint arXiv 1308, 6216 (2013)","journal-title":"arXiv preprint arXiv"},{"issue":"1","key":"21_CR48","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/JSAC.2008.080104","volume":"26","author":"R Chen","year":"2008","unstructured":"R Chen, JM Park, JH Reed, Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Selec. Areas Com 26(1), 25\u201337 (2008)","journal-title":"IEEE J. Selec. Areas Com"},{"key":"21_CR49","first-page":"110","volume-title":"Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks. 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks, SDR \u201906","author":"R Chen","year":"2006","unstructured":"R Chen, JM Park, Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks. 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks, SDR \u201906, 2006, pp. 110\u2013119"},{"issue":"4","key":"21_CR50","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MNET.2004.1316758","volume":"18","author":"D Niculescu","year":"2004","unstructured":"D Niculescu, Positioning in ad hoc sensor networks. IEEE Net 18(4), 24\u201329 (2004)","journal-title":"IEEE Net"},{"issue":"7","key":"21_CR51","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1080\/09511920601182217","volume":"22","author":"F Franceschini","year":"2009","unstructured":"F Franceschini, M Galetto, D Maisano, L Mastrogiacomo, A review of localization algorithms for distributed wireless sensor networks in manufacturing. Int. J. Comput. Integ. Manufac 22(7), 698\u2013716 (2009)","journal-title":"Int. J. Comput. Integ. Manufac"},{"key":"21_CR52","first-page":"3070","volume-title":"A walking beacon-assisted localization in wireless sensor networks. IEEE International Conference on Communications, ICC\u201907","author":"B Xiao","year":"2007","unstructured":"B Xiao, H Chen, S Zhou, A walking beacon-assisted localization in wireless sensor networks. IEEE International Conference on Communications, ICC\u201907, 2007, pp. 3070\u20133075"},{"key":"21_CR53","volume-title":"Security Challenges in Cognitive Radio Networks. Proceedings of the World Congress on Engineering","author":"H Idoudi","year":"2014","unstructured":"H Idoudi, K Daimi, M Saed, Security Challenges in Cognitive Radio Networks. Proceedings of the World Congress on Engineering, 2014"},{"issue":"14","key":"21_CR54","doi-asserted-by":"publisher","first-page":"3374","DOI":"10.1016\/j.comnet.2012.05.008","volume":"56","author":"O Le\u00f3n","year":"2012","unstructured":"O Le\u00f3n, J Hern\u00e1ndez-Serrano, M Soriano, Cooperative detection of primary user emulation attacks in CRNs. Comput. Netw. 56(14), 3374\u20133384 (2012)","journal-title":"Comput. Netw."},{"issue":"1","key":"21_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-1499-2013-1","volume":"2013","author":"J Blesa","year":"2013","unstructured":"J Blesa, E Romero, A Rozas, A Araujo, PUE attack detection in CWSNs using anomaly detection techniques. EURASIP J. Wireless Com. Net. 2013(1), 1\u201313 (2013)","journal-title":"EURASIP J. Wireless Com. Net."},{"key":"21_CR56","first-page":"674","volume-title":"A New Method to Detect Primary User Emulation Attacks in Cognitive Radio Networks. 3rd International Conference on Computer Science and Service System, CSSS 2014","author":"P Kai","year":"2014","unstructured":"P Kai, Z Fanzi, Z Qingguang, A New Method to Detect Primary User Emulation Attacks in Cognitive Radio Networks. 3rd International Conference on Computer Science and Service System, CSSS 2014, 2014, pp. 674\u2013677"},{"key":"21_CR57","first-page":"2037","volume-title":"Location in distributed ad-hoc wireless sensor networks. IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP\u201901","author":"C Savarese","year":"2001","unstructured":"C Savarese, JM Rabaey, J Beutel, Location in distributed ad-hoc wireless sensor networks. IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP\u201901, 2001, pp. 2037\u20132040"},{"issue":"7","key":"21_CR58","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1002\/sec.372","volume":"5","author":"M Kim","year":"2012","unstructured":"M Kim, MY Chung, H Choo, VeriEST: verification via primary user emulation signal-based test for secure distributed spectrum sensing in cognitive radio networks. Sec. Com. Net 5(7), 776\u2013788 (2012)","journal-title":"Sec. Com. Net"},{"key":"21_CR59","first-page":"2935","volume-title":"A physical layer authentication scheme for countering primary user emulation attack","author":"KM Borle","year":"2013","unstructured":"KM Borle, B Chen, W Du, A physical layer authentication scheme for countering primary user emulation attack (IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP, 2013), pp. 2935\u20132939"},{"issue":"5","key":"21_CR60","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1109\/TIFS.2014.2310355","volume":"9","author":"A Alahmadi","year":"2014","unstructured":"A Alahmadi, M Abdelhakim, J Ren, T Li, Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard. IEEE Transac. Info. Forensics Sec 9(5), 772\u2013781 (2014)","journal-title":"IEEE Transac. Info. Forensics Sec"},{"key":"21_CR61","first-page":"286","volume-title":"Authenticating Primary Users\u2019 Signals in Cognitive Radio Networks via Integrated Cryptography and Wireless Link Signatures. 2010 IEEE Symposium on Security and Privacy","author":"Y Liu","year":"2010","unstructured":"Y Liu, P Ning, H Dai, Authenticating Primary Users\u2019 Signals in Cognitive Radio Networks via Integrated Cryptography and Wireless Link Signatures. 2010 IEEE Symposium on Security and Privacy, 2010, pp. 286\u2013301"},{"key":"21_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2012\/716476","volume":"2012","author":"VT Nguyen","year":"2012","unstructured":"VT Nguyen, F Villain, YL Guillou, Cognitive radio RF: overview and challenges. VLSI Design 2012, 1\u201313 (2012). doi:10.1155\/2012\/716476","journal-title":"VLSI Design"}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-015-0021-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13635-015-0021-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-015-0021-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-015-0021-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,8]],"date-time":"2024-06-08T09:11:27Z","timestamp":1717837887000},"score":1,"resource":{"primary":{"URL":"https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/s13635-015-0021-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,11]]},"references-count":62,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["21"],"URL":"https:\/\/doi.org\/10.1186\/s13635-015-0021-0","relation":{},"ISSN":["1687-417X"],"issn-type":[{"value":"1687-417X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,11]]},"assertion":[{"value":"16 December 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 March 2015","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2015","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"4"}}