{"id":"https://openalex.org/W4407784015","doi":"https://doi.org/10.1109/comsnets63942.2025.10885683","title":"Trust-Based Security Solution for Attack Detection in Cognitive Radio Sensor Networks","display_name":"Trust-Based Security Solution for Attack Detection in Cognitive Radio Sensor Networks","publication_year":2025,"publication_date":"2025-01-06","ids":{"openalex":"https://openalex.org/W4407784015","doi":"https://doi.org/10.1109/comsnets63942.2025.10885683"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets63942.2025.10885683","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets63942.2025.10885683","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107495049","display_name":"Prathana Saikia","orcid":"https://orcid.org/0000-0001-7109-580X"},"institutions":[{"id":"https://openalex.org/I126601174","display_name":"Tezpur University","ror":"https://ror.org/005x56091","country_code":"IN","type":"education","lineage":["https://openalex.org/I126601174"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Prathana Saikia","raw_affiliation_strings":["Tezpur University,Department of CSE,Assam,India"],"affiliations":[{"raw_affiliation_string":"Tezpur University,Department of CSE,Assam,India","institution_ids":["https://openalex.org/I126601174"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062707738","display_name":"Sanjib K. Deka","orcid":"https://orcid.org/0000-0002-3009-1236"},"institutions":[{"id":"https://openalex.org/I126601174","display_name":"Tezpur University","ror":"https://ror.org/005x56091","country_code":"IN","type":"education","lineage":["https://openalex.org/I126601174"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sanjib K. Deka","raw_affiliation_strings":["Tezpur University,Department of CSE,Assam,India"],"affiliations":[{"raw_affiliation_string":"Tezpur University,Department of CSE,Assam,India","institution_ids":["https://openalex.org/I126601174"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101694356","display_name":"M. Kalpana Devi","orcid":"https://orcid.org/0000-0002-7001-4243"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Monisha Devi","raw_affiliation_strings":["Grijananda Chowdhury University,Department of CSE,Assam,India"],"affiliations":[{"raw_affiliation_string":"Grijananda Chowdhury University,Department of CSE,Assam,India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5107495049"],"corresponding_institution_ids":["https://openalex.org/I126601174"],"apc_list":null,"apc_paid":null,"fwci":1.5567,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.80499331,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"632","last_page":"640"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.8424000144004822,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.8424000144004822,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10579","display_name":"Cognitive Radio Networks and Spectrum Sensing","score":0.7721999883651733,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cognitive-radio","display_name":"Cognitive radio","score":0.8220612406730652},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6494125127792358},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5566573143005371},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5099664926528931},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35994091629981995},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2417113184928894},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.0936272144317627}],"concepts":[{"id":"https://openalex.org/C149946192","wikidata":"https://www.wikidata.org/wiki/Q3235733","display_name":"Cognitive radio","level":3,"score":0.8220612406730652},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6494125127792358},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5566573143005371},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5099664926528931},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35994091629981995},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2417113184928894},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0936272144317627}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comsnets63942.2025.10885683","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets63942.2025.10885683","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2070291375","https://openalex.org/W2118314698","https://openalex.org/W2118569014","https://openalex.org/W2192134210","https://openalex.org/W2436327638","https://openalex.org/W2522100590","https://openalex.org/W2646522505","https://openalex.org/W2914337503","https://openalex.org/W2922820438","https://openalex.org/W2965568386","https://openalex.org/W3005301866","https://openalex.org/W3005834336","https://openalex.org/W3033250580","https://openalex.org/W3046104196","https://openalex.org/W3048393000","https://openalex.org/W3158422512","https://openalex.org/W3163015337","https://openalex.org/W4205305019","https://openalex.org/W4206420230","https://openalex.org/W4402830210"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2559261346","https://openalex.org/W4280609833","https://openalex.org/W2136943174","https://openalex.org/W1973979964","https://openalex.org/W4235820682","https://openalex.org/W185479762","https://openalex.org/W1968709058"],"abstract_inverted_index":{"Cognitive":[0,21,28],"Radio":[1,22,29],"Networks":[2,24],"(CRNs)":[3],"play":[4],"a":[5,115,133,161],"vital":[6],"role":[7],"in":[8,45,186],"enabling":[9],"dynamic":[10],"spectrum":[11,19,33],"sharing,":[12],"effectively":[13],"addressing":[14],"the":[15,37,75,100,139,145,148,174,179,183],"challenges":[16],"of":[17,27,39,85,188],"wireless":[18],"scarcity.":[20],"Sensor":[23],"(CRSNs),":[25],"consisting":[26],"(CR)":[30],"devices,":[31],"optimize":[32],"allocation":[34],"to":[35,51,54,65,71,137,166],"enhance":[36,74],"deployment":[38],"sensor-based":[40],"devices.":[41],"However,":[42],"security":[43],"vulnerabilities":[44,70],"CRSNs":[46],"create":[47],"opportunities":[48],"for":[49,157],"attackers":[50],"exploit,":[52],"leading":[53],"malicious":[55,79,86,168],"activities":[56],"that":[57,81,120,178],"degrade":[58],"overall":[59],"performance.":[60,77],"Therefore,":[61],"it":[62],"is":[63,88,118,135,164],"crucial":[64],"detect":[66],"and":[67,73,96,124,150,198],"mitigate":[68],"these":[69],"maintain":[72],"network":[76],"Identifying":[78],"nodes":[80],"exhibit":[82],"low":[83],"levels":[84],"activity":[87],"particularly":[89],"challenging.":[90],"This":[91],"work":[92],"addresses":[93],"selective":[94,104],"forwarding":[95,105,154],"ON-OFF":[97,101],"attacks,":[98],"where":[99],"attack":[102],"exhibits":[103],"behavior":[106],"during":[107],"its":[108],"ON":[109],"phase.":[110],"To":[111],"address":[112],"this":[113],"issue,":[114],"trust":[116,127,131,159],"mechanism":[117],"proposed":[119,180],"incorporates":[121],"both":[122],"direct":[123,130],"indirect":[125,158],"(recommendation-based)":[126],"evaluations.":[128],"In":[129],"evaluation,":[132,160],"technique":[134,163],"developed":[136],"calculate":[138],"behavioral":[140],"expectancy":[141],"factor":[142],"by":[143],"analyzing":[144],"difference":[146],"between":[147],"actual":[149],"expected":[151],"data":[152],"packet":[153,195,201],"rates.":[155],"Whereas,":[156],"filtering":[162],"introduced":[165],"discard":[167],"recommendations":[169],"from":[170],"badmouthing":[171],"attackers.":[172],"Finally,":[173],"simulation":[175],"results":[176],"demonstrate":[177],"approach":[181],"outperforms":[182],"existing":[184],"method":[185],"terms":[187],"detection":[189,191],"ratio,":[190,197],"efficiency,":[192],"relative":[193,199],"average":[194,200],"delivery":[196],"drop":[202],"ratio.":[203]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
