{"id":"https://openalex.org/W2035736016","doi":"https://doi.org/10.1109/glocom.2011.6134059","title":"Using Sybil Identities for Primary User Emulation and Byzantine Attacks in DSA Networks","display_name":"Using Sybil Identities for Primary User Emulation and Byzantine Attacks in DSA Networks","publication_year":2011,"publication_date":"2011-12-01","ids":{"openalex":"https://openalex.org/W2035736016","doi":"https://doi.org/10.1109/glocom.2011.6134059","mag":"2035736016"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2011.6134059","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2011.6134059","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE Global Telecommunications Conference - GLOBECOM 2011","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029358513","display_name":"Yi-Fei Tan","orcid":"https://orcid.org/0000-0002-9030-1434"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yi Tan","raw_affiliation_strings":["Department of ECE, Stevens Institute of Technology, Hoboken, NJ, USA","[Dept. of ECE, Stevens Inst. of Technol., Hoboken, NJ, USA]"],"affiliations":[{"raw_affiliation_string":"Department of ECE, Stevens Institute of Technology, Hoboken, NJ, USA","institution_ids":["https://openalex.org/I108468826"]},{"raw_affiliation_string":"[Dept. of ECE, Stevens Inst. of Technol., Hoboken, NJ, USA]","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111009042","display_name":"Kai Hong","orcid":null},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kai Hong","raw_affiliation_strings":["Department of ECE, Stevens Institute of Technology, Hoboken, NJ, USA","[Dept. of ECE, Stevens Inst. of Technol., Hoboken, NJ, USA]"],"affiliations":[{"raw_affiliation_string":"Department of ECE, Stevens Institute of Technology, Hoboken, NJ, USA","institution_ids":["https://openalex.org/I108468826"]},{"raw_affiliation_string":"[Dept. of ECE, Stevens Inst. of Technol., Hoboken, NJ, USA]","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100748443","display_name":"Shubhashis Sengupta","orcid":"https://orcid.org/0009-0003-8298-0216"},"institutions":[{"id":"https://openalex.org/I174216632","display_name":"City University of New York","ror":"https://ror.org/00453a208","country_code":"US","type":"education","lineage":["https://openalex.org/I174216632"]},{"id":"https://openalex.org/I92507152","display_name":"John Jay College of Criminal Justice","ror":"https://ror.org/01p9rc392","country_code":"US","type":"education","lineage":["https://openalex.org/I92507152"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S. Sengupta","raw_affiliation_strings":["Department of Mathematics & Computer Science, John Jay College of Criminal Justice, CUNY, New York, NY, USA","Dept. of Math. & Comp. Sci, CUNY, New York, NY, USA"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics & Computer Science, John Jay College of Criminal Justice, CUNY, New York, NY, USA","institution_ids":["https://openalex.org/I92507152"]},{"raw_affiliation_string":"Dept. of Math. & Comp. Sci, CUNY, New York, NY, USA","institution_ids":["https://openalex.org/I174216632"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033041089","display_name":"K. P. Subbalakshmi","orcid":"https://orcid.org/0000-0002-1670-9378"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"K. P. Subbalakshmi","raw_affiliation_strings":["Department of ECE, Stevens Institute of Technology, Hoboken, NJ, USA","[Dept. of ECE, Stevens Inst. of Technol., Hoboken, NJ, USA]"],"affiliations":[{"raw_affiliation_string":"Department of ECE, Stevens Institute of Technology, Hoboken, NJ, USA","institution_ids":["https://openalex.org/I108468826"]},{"raw_affiliation_string":"[Dept. of ECE, Stevens Inst. of Technol., Hoboken, NJ, USA]","institution_ids":["https://openalex.org/I108468826"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5029358513"],"corresponding_institution_ids":["https://openalex.org/I108468826"],"apc_list":null,"apc_paid":null,"fwci":3.8508,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.93410766,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10579","display_name":"Cognitive Radio Networks and Spectrum Sensing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10579","display_name":"Cognitive Radio Networks and Spectrum Sensing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/emulation","display_name":"Emulation","score":0.7834193706512451},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.7538527846336365},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7505786418914795},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6243107318878174},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.619432806968689},{"id":"https://openalex.org/keywords/sybil-attack","display_name":"Sybil attack","score":0.5268477201461792},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.4968562424182892},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.44368916749954224},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.12610852718353271}],"concepts":[{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.7834193706512451},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.7538527846336365},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7505786418914795},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6243107318878174},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.619432806968689},{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.5268477201461792},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.4968562424182892},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.44368916749954224},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.12610852718353271},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocom.2011.6134059","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2011.6134059","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE Global Telecommunications Conference - GLOBECOM 2011","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8199999928474426,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2107069798","https://openalex.org/W2113475003","https://openalex.org/W2119730880","https://openalex.org/W2120636900","https://openalex.org/W2122383392","https://openalex.org/W2143924635","https://openalex.org/W2144369278","https://openalex.org/W2165491783","https://openalex.org/W2538656629"],"related_works":["https://openalex.org/W2883256816","https://openalex.org/W2171408034","https://openalex.org/W3003320923","https://openalex.org/W2106140982","https://openalex.org/W2154523322","https://openalex.org/W2176322038","https://openalex.org/W1970444427","https://openalex.org/W2050761665","https://openalex.org/W1975601996","https://openalex.org/W2168083929"],"abstract_inverted_index":{"In":[0,20],"this":[1,21,57],"paper,":[2],"we":[3],"investigate":[4],"a":[5,115],"new":[6],"type":[7],"of":[8,48,81,89,139],"denialof-":[9],"service":[10],"attack":[11,58,69,76,104,133],"in":[12,59,118],"dynamic":[13],"spectrum":[14],"access":[15],"networks":[16],"-":[17],"Sybilenabled":[18],"attack.":[19],"attack,":[22],"the":[23,28,44,49,74,79,82,86,97,100,119,131,137,142],"attacker":[24],"not":[25],"only":[26],"launches":[27],"primary":[29],"user":[30],"emulation":[31],"(PUE)":[32],"attacks":[33,140],"but":[34],"also":[35],"creates":[36],"and":[37,68,113,125,135],"infiltrates":[38],"multiple":[39],"Sybil":[40,90],"identities":[41],"to":[42,64,95,129],"compromise":[43],"decision":[45],"making":[46],"process":[47],"secondary":[50,101,143],"network":[51,120],"via":[52],"Byzantine":[53],"attacks.":[54],"We":[55,71],"implement":[56],"our":[60],"cognitive":[61],"radio":[62],"testbed":[63],"show":[65],"its":[66],"feasibility":[67],"impact.":[70],"further":[72],"analyze":[73],"optimal":[75,87,132],"strategy":[77,134],"from":[78],"perspective":[80],"malicious":[83],"attacker,":[84],"i.e.,":[85],"allocation":[88],"interfaces":[91],"for":[92],"different":[93,110],"attacks,":[94],"maximize":[96],"impact":[98,138],"on":[99,141],"network.":[102,144],"The":[103],"models":[105],"are":[106,127],"analyzed":[107],"under":[108],"two":[109],"scenarios:":[111],"with":[112],"without":[114],"reputation":[116],"system":[117],"fusion":[121],"center.":[122],"Numerical":[123],"analysis":[124],"simulations":[126],"conducted":[128],"solve":[130],"demonstrate":[136]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
