{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:12:40Z","timestamp":1767262360692,"version":"3.28.0"},"reference-count":49,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.23919\/iconac.2017.8082089","type":"proceedings-article","created":{"date-parts":[[2017,11,2]],"date-time":"2017-11-02T21:36:33Z","timestamp":1509658593000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["A review: Security challenges in cognitive radio networks"],"prefix":"10.23919","author":[{"given":"Muhammad Waseem","family":"Akram","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Salman","sequence":"additional","affiliation":[]},{"given":"Munam Ali","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Mian Muhammad","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523804"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2012.84"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567084"},{"key":"ref32","first-page":"312","volume":"3","author":"das","year":"2013","journal-title":"Primary User Emulation Attack in Cognitive Radio Networks A Survey"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2011.18"},{"key":"ref30","first-page":"1","volume":"19","author":"tague","year":"2011","journal-title":"Jamming-Aware Traffic Allocation to Multiple Routing paths using Portfolio Selection"},{"key":"ref37","first-page":"26","article-title":"Collaborative spectrum sensing in cognitive radio networks","volume":"59","author":"tu","year":"2011","journal-title":"Commun Soc"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2010.12.003"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1109\/TIFS.2011.2144585","article-title":"An information secrecy game in cognitive radio networks","volume":"6","author":"wu","year":"2011","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120102"},{"key":"ref28","first-page":"34","author":"thakre","year":"2014","journal-title":"Security Threats and Detection Technique in Cognitive Radio Network With Sensing Strategies"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.10.001"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1155\/2011\/242304"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1109\/TMC.2011.69","article-title":"Spectrum-Aware Mobility Management in Cognitive Radio Cellular Networks","volume":"11","author":"lee","year":"2012","journal-title":"IEEE Trans Mob Comput"},{"key":"ref1","first-page":"1002","volume":"2","author":"khare","year":"2013","journal-title":"Attacks & Preventions of Cognitive Radio Network-A Survey"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122211.00162"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684069"},{"key":"ref21","first-page":"350","volume":"6","author":"nithyakala","year":"2015","journal-title":"Evaluating the effect of jammers on Cognitive Radio Networks using Markov Models"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/393248"},{"key":"ref23","first-page":"1750","volume":"12","author":"yuan","year":"2013","journal-title":"Routing-Toward-Primary-User Attack and Belief Propagation Based Defense in Cognitive Radio Networks"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4103\/0256-4602.110553"},{"key":"ref25","first-page":"2013","article-title":"Mrakov Chain Monte Carlo Based Internal Attack Evaluation for Wireless Sensor Network","volume":"13","author":"ahmed","year":"2013","journal-title":"IJCSNS"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523805"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.9.12.916-922"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041110.00022"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.011812.110927"},{"key":"ref13","first-page":"13","article-title":"Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey","volume":"16","author":"mukherjee","year":"2010","journal-title":"Submitted to IEEE Trans Inf Th"},{"key":"ref14","first-page":"1","article-title":"On Secrecy Performance of Antenna Selection Aided MIMO Systems Against Eavesdropping","volume":"9545","author":"zhu","year":"2015","journal-title":"IEEE Trans Veh Technol"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503888"},{"key":"ref16","first-page":"1","author":"el-hajj","year":"0","journal-title":"2 Brief Overview of Cognitive Radio Technology"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503425"},{"key":"ref18","volume":"4","author":"packard","year":"2015","journal-title":"COUNTER MEASURES FOR LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CSIT.2014.6805980"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"530","DOI":"10.17485\/ijst\/2014\/v7i4.18","article-title":"Attacks in cognitive radio networks (CRN)-A survey","volume":"7","author":"bhagavathy nanthini","year":"2014","journal-title":"Proc of Indian Journal of Science and Technology"},{"key":"ref3","first-page":"516","article-title":"Simulation based evaluation of DDH-MAC protocol for Cognitive Radio Networks","author":"muhammad","year":"2016","journal-title":"2016 22nd International Conference on Automation and Computing (ICAC) ICAC"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6211495"},{"key":"ref5","first-page":"763","author":"wankhede","year":"2015","journal-title":"Design Approach for Cross Layer Attacks Defence in Cognitive Radio"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7166193"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2013.06.003"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523807"},{"key":"ref9","first-page":"900","article-title":"Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks","author":"yan","year":"2012","journal-title":"Proc -IEEE INFOCOM"},{"key":"ref46","first-page":"1702","volume":"8","author":"irianto","year":"2014","journal-title":"An Investigation of Performance versus Security in Cognitive Radio Networks with Supporting Cloud Platforms"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2012-48"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2301972"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523802"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.4103\/0256-4602.78089"},{"key":"ref41","first-page":"65","article-title":"Behavioural Modelling of WSN MAC Layer Security Attacks: A Sequential UML Approach","author":"pawar","year":"2012","journal-title":"J Cyber Security and Mobility"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2380998"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523809"}],"event":{"name":"2017 23rd International Conference on Automation and Computing (ICAC)","start":{"date-parts":[[2017,9,7]]},"location":"Huddersfield, United Kingdom","end":{"date-parts":[[2017,9,8]]}},"container-title":["2017 23rd International Conference on Automation and Computing (ICAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8067274\/8081956\/08082089.pdf?arnumber=8082089","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T00:59:56Z","timestamp":1603241996000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8082089\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":49,"URL":"https:\/\/doi.org\/10.23919\/iconac.2017.8082089","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}