{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T17:08:46Z","timestamp":1725988126953},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319988269"},{"type":"electronic","value":"9783319988276"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98827-6_6","type":"book-chapter","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T15:48:21Z","timestamp":1534780101000},"page":"72-82","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Performance Analysis of a Collaborative DSA-Based Network with Malicious Nodes"],"prefix":"10.1007","author":[{"given":"Augustine","family":"Takyi","sequence":"first","affiliation":[]},{"given":"Melissa","family":"Densmore","sequence":"additional","affiliation":[]},{"given":"Senka","family":"Hadzic","sequence":"additional","affiliation":[]},{"given":"David","family":"Johnson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,21]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Kaligineedi, P., Khabbazian, M., Bhargava, V.K.: Secure cooperative sensing techniques for cognitive radio systems. In: 2008 IEEE International Conference on Communications, pp. 3406\u20133410 (2008)","DOI":"10.1109\/ICC.2008.640"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Yu, F.R., et al.: Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios. In: 2009 Military Communications Conference, MILCOM 2009. IEEE (2009)","DOI":"10.1109\/MILCOM.2009.5379832"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Chen, R., Park, J.-M., Bian, K.: Robust distributed spectrum sensing in cognitive radio networks. In: INFOCOM 2008, The 27th Conference on Computer Communications. IEEE (2008)","DOI":"10.1109\/INFOCOM.2008.251"},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-319-08747-4_6","volume-title":"White Space Communication","author":"L Mfupe","year":"2015","unstructured":"Mfupe, L., Mekuria, F., Montsi, L., Mzyece, M.: Geo-location white space spectrum databases: review of models and design of a dynamic spectrum access coexistence planner and manager. In: Mishra, A., Johnson, D. (eds.) White Space Communication, pp. 153\u2013194. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-08747-4_6"},{"issue":"1","key":"6_CR5","first-page":"22","volume":"9","author":"MS Bouassida","year":"2009","unstructured":"Bouassida, M.S., et al.: Sybil nodes detection based on received signal strength variations within VANET. Int. J. Netw. Secur. 9(1), 22\u201333 (2009)","journal-title":"Int. J. Netw. Secur."},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Othman, A.K., Adams, A.E., Tsimenidis, C.C.: Node discovery protocol and localization for distributed underwater acoustic networks. In: 2006 International Conference on Internet and Web Applications and Services\/Advanced International Conference on Telecommunications, AICT-ICIW 2006. IEEE (2006)","DOI":"10.1109\/AICT-ICIW.2006.138"},{"key":"6_CR7","unstructured":"Takyi, A., Densmore, M., Johnson, D.: Collaborative neighbour monitoring in TV white space network. In: Proceedings Southern Africa Telecommunication Networks and Applications Conference (SATNAC 2016), George, South Africa (2016)"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Jin, Z., Anand, S., Subbalakshmi, K.P.: Detecting primary user emulation attacks in dynamic spectrum access networks. In: 2009 IEEE International Conference on Communications, ICC 2009. IEEE (2009)","DOI":"10.1109\/ICC.2009.5198911"},{"key":"6_CR9","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-319-24540-9_26","volume-title":"Cognitive Radio Oriented Wireless Networks","author":"SK Sharma","year":"2015","unstructured":"Sharma, S.K., Chatzinotas, S., Ottersten, B.: Cooperative spectrum sensing for heterogeneous sensor networks using multiple decision statistics. In: Weichold, M., Hamdi, M., Shakir, M.Z., Abdallah, M., Karagiannidis, G.K., Ismail, M. (eds.) CrownCom 2015. LNICST, vol. 156, pp. 321\u2013333. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-24540-9_26"},{"key":"6_CR10","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-319-24540-9_18","volume-title":"Cognitive Radio Oriented Wireless Networks","author":"M Jain","year":"2015","unstructured":"Jain, M., Kumar, V., Gangopadhyay, R., Debnath, S.: Cooperative spectrum sensing using improved p-norm detector in generalized $$\\kappa $$-$$\\mu $$ fading channel. In: Weichold, M., Hamdi, M., Shakir, M., Abdallah, M., Karagiannidis, G., Ismail, M. (eds.) CrownCom 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 156, pp. 225\u2013234. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-24540-9_18"},{"key":"6_CR11","unstructured":"Pinifolo, J., et al.: Successful deployment and key applications of television white space networks (TVWS) in Malawi. In: Proceedings and Report of the 7th UbuntuNet Alliance Annual Conference, pp. 347\u2013354 (2014)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","e-Infrastructure and e-Services for Developing Countries"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98827-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T15:52:04Z","timestamp":1534780324000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98827-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319988269","9783319988276"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98827-6_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}