{"id":"https://openalex.org/W7125691788","doi":"https://doi.org/10.1186/s42400-025-00433-x","title":"Security issues in software-defined radio: a review","display_name":"Security issues in software-defined radio: a review","publication_year":2026,"publication_date":"2026-01-27","ids":{"openalex":"https://openalex.org/W7125691788","doi":"https://doi.org/10.1186/s42400-025-00433-x"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00433-x","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00433-x","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00433-x.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00433-x.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123845895","display_name":"Tong Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I2800710378","display_name":"Naval University of Engineering","ror":"https://ror.org/056vyez31","country_code":"CN","type":"education","lineage":["https://openalex.org/I2800710378"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tong Wu","raw_affiliation_strings":["Department of Information Security, Naval University of Engineering, Wuhan, 430033, Hubei, People\u2019s Republic of China"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, Naval University of Engineering, Wuhan, 430033, Hubei, People\u2019s Republic of China","institution_ids":["https://openalex.org/I2800710378"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123841393","display_name":"Xueguang Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I2800710378","display_name":"Naval University of Engineering","ror":"https://ror.org/056vyez31","country_code":"CN","type":"education","lineage":["https://openalex.org/I2800710378"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xueguang Zhou","raw_affiliation_strings":["Department of Information Security, Naval University of Engineering, Wuhan, 430033, Hubei, People\u2019s Republic of China"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, Naval University of Engineering, Wuhan, 430033, Hubei, People\u2019s Republic of China","institution_ids":["https://openalex.org/I2800710378"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123857133","display_name":"Wei Fu","orcid":null},"institutions":[{"id":"https://openalex.org/I2800710378","display_name":"Naval University of Engineering","ror":"https://ror.org/056vyez31","country_code":"CN","type":"education","lineage":["https://openalex.org/I2800710378"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Fu","raw_affiliation_strings":["Department of Information Security, Naval University of Engineering, Wuhan, 430033, Hubei, People\u2019s Republic of China"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, Naval University of Engineering, Wuhan, 430033, Hubei, People\u2019s Republic of China","institution_ids":["https://openalex.org/I2800710378"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5123845895"],"corresponding_institution_ids":["https://openalex.org/I2800710378"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15982906,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10579","display_name":"Cognitive Radio Networks and Spectrum Sensing","score":0.17749999463558197,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10579","display_name":"Cognitive Radio Networks and Spectrum Sensing","score":0.17749999463558197,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13905","display_name":"Telecommunications and Broadcasting Technologies","score":0.08009999990463257,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.07280000299215317,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.6899999976158142},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6445000171661377},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.5893999934196472},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.573199987411499},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.521399974822998},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.5123999714851379},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.4887000024318695},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4262000024318695},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.4018000066280365}],"concepts":[{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.6899999976158142},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.685699999332428},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6445000171661377},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.5893999934196472},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.573199987411499},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5695000290870667},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.521399974822998},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.5123999714851379},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.4887000024318695},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4262000024318695},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.4018000066280365},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3919000029563904},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.387800008058548},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.38609999418258667},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.3671000003814697},{"id":"https://openalex.org/C52420254","wikidata":"https://www.wikidata.org/wiki/Q7445028","display_name":"Security convergence","level":5,"score":0.34459999203681946},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.3418000042438507},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.314300000667572},{"id":"https://openalex.org/C77109596","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Application security","level":5,"score":0.3003999888896942},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.30000001192092896},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.2718000113964081},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.27059999108314514},{"id":"https://openalex.org/C151423352","wikidata":"https://www.wikidata.org/wiki/Q5154228","display_name":"Communications security","level":3,"score":0.2687999904155731},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.25929999351501465},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.2549999952316284}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00433-x","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00433-x","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00433-x.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:28e6160cab5e4bea867b727142349baa","is_oa":true,"landing_page_url":"https://doaj.org/article/28e6160cab5e4bea867b727142349baa","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1, Pp 1-26 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00433-x","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00433-x","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00433-x.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3085993365","display_name":null,"funder_award_id":"(Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5377421199","display_name":null,"funder_award_id":"62276273","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7125691788.pdf","grobid_xml":"https://content.openalex.org/works/W7125691788.grobid-xml"},"referenced_works_count":114,"referenced_works":["https://openalex.org/W1516224035","https://openalex.org/W1587996829","https://openalex.org/W1974286033","https://openalex.org/W2008760546","https://openalex.org/W2013019406","https://openalex.org/W2015805722","https://openalex.org/W2028913833","https://openalex.org/W2061992737","https://openalex.org/W2082214659","https://openalex.org/W2097531528","https://openalex.org/W2098432861","https://openalex.org/W2141672845","https://openalex.org/W2161067956","https://openalex.org/W2163193804","https://openalex.org/W2194733473","https://openalex.org/W2248880261","https://openalex.org/W2280566217","https://openalex.org/W2539193117","https://openalex.org/W2776450406","https://openalex.org/W2782508951","https://openalex.org/W2809555306","https://openalex.org/W2901442573","https://openalex.org/W2913285517","https://openalex.org/W2918566670","https://openalex.org/W2959781946","https://openalex.org/W2964683491","https://openalex.org/W3011424526","https://openalex.org/W3066307143","https://openalex.org/W3158114216","https://openalex.org/W3158658439","https://openalex.org/W3159368492","https://openalex.org/W3172698965","https://openalex.org/W3185603648","https://openalex.org/W3191777066","https://openalex.org/W3208113910","https://openalex.org/W4200301552","https://openalex.org/W4200362451","https://openalex.org/W4205366289","https://openalex.org/W4206504716","https://openalex.org/W4210944412","https://openalex.org/W4213209045","https://openalex.org/W4220653823","https://openalex.org/W4220655957","https://openalex.org/W4226048085","https://openalex.org/W4240584738","https://openalex.org/W4285100823","https://openalex.org/W4288057758","https://openalex.org/W4288063820","https://openalex.org/W4288623681","https://openalex.org/W4290998496","https://openalex.org/W4307446771","https://openalex.org/W4310732156","https://openalex.org/W4311594460","https://openalex.org/W4312460360","https://openalex.org/W4313484739","https://openalex.org/W4313490624","https://openalex.org/W4320493555","https://openalex.org/W4321843488","https://openalex.org/W4322502666","https://openalex.org/W4327767828","https://openalex.org/W4366153244","https://openalex.org/W4376312606","https://openalex.org/W4376644880","https://openalex.org/W4377234855","https://openalex.org/W4378901133","https://openalex.org/W4379052327","https://openalex.org/W4382565500","https://openalex.org/W4382933779","https://openalex.org/W4384026296","https://openalex.org/W4384161756","https://openalex.org/W4386013082","https://openalex.org/W4386326439","https://openalex.org/W4386781163","https://openalex.org/W4387489906","https://openalex.org/W4388340766","https://openalex.org/W4389332120","https://openalex.org/W4389428556","https://openalex.org/W4389924098","https://openalex.org/W4391363041","https://openalex.org/W4391724823","https://openalex.org/W4391766944","https://openalex.org/W4391929299","https://openalex.org/W4392622073","https://openalex.org/W4392753678","https://openalex.org/W4392860920","https://openalex.org/W4392901758","https://openalex.org/W4392911138","https://openalex.org/W4393379868","https://openalex.org/W4394786938","https://openalex.org/W4395069637","https://openalex.org/W4398186356","https://openalex.org/W4399310755","https://openalex.org/W4400051149","https://openalex.org/W4400071599","https://openalex.org/W4400277396","https://openalex.org/W4400277844","https://openalex.org/W4400447325","https://openalex.org/W4400574640","https://openalex.org/W4401220868","https://openalex.org/W4401870938","https://openalex.org/W4402192096","https://openalex.org/W4402263879","https://openalex.org/W4402350002","https://openalex.org/W4402808824","https://openalex.org/W4402835689","https://openalex.org/W4402841168","https://openalex.org/W4403277316","https://openalex.org/W4403758906","https://openalex.org/W4403969669","https://openalex.org/W4404562906","https://openalex.org/W4404688156","https://openalex.org/W4405183104","https://openalex.org/W4405269753","https://openalex.org/W4406874965"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Due":[1],"to":[2],"its":[3,45,72],"high":[4],"data":[5,58],"transmission":[6],"rates,":[7],"low":[8],"power":[9],"consumption,":[10],"and":[11,28,42,68,75,77,86,94],"excellent":[12],"scalability,":[13],"software-defined":[14],"radio":[15],"(SDR)":[16],"has":[17],"increasingly":[18],"been":[19],"applied":[20],"in":[21],"various":[22],"fields,":[23],"such":[24],"as":[25],"emergency":[26],"communications":[27],"the":[29,40],"internet":[30],"of":[31,36,44,82],"things.":[32],"The":[33],"successful":[34],"deployment":[35],"SDR":[37,83],"depends":[38],"on":[39,79],"design":[41],"implementation":[43],"security":[46,49,69,73,84],"mechanisms.":[47],"However,":[48],"threats":[50],"may":[51],"compromise":[52],"fundamental":[53],"functions":[54],"through":[55],"application":[56],"management,":[57],"configuration,":[59],"or":[60],"transmission.":[61],"This":[62],"paper":[63],"presents":[64],"SDR\u2019s":[65],"basic":[66],"architecture":[67],"structure,":[70],"analyzes":[71],"requirements":[74],"threats,":[76],"elaborates":[78],"a":[80],"series":[81],"detection":[85],"protection":[87],"techniques,":[88],"proposing":[89],"several":[90],"future":[91],"development":[92],"directions":[93],"challenges.":[95]},"counts_by_year":[],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2026-01-27T00:00:00"}
