CM Chao, WC Lee, CX Wang… - … on Computing and …, 2018 - ieeexplore.ieee.org
In cognitive radio networks (CRNs), secondary users (SUs) are vulnerable to malicious
attacks because an SU node's opportunistic access cannot be protected from adversaries …