Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks
Cognitive radio ad hoc networks are commonly perceived as ideal ad hoc environments where cognitive radio technology enables secondary users (SUs) to utilize scarce spectrum resources in a dynamic manner. Cooperative spectrum sensing (CSS) is the key function of cognitive radio technology to identif...
Ausführliche Beschreibung
Autor*in: |
Feng, Jingyu [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2016transfer abstract |
---|
Schlagwörter: |
---|
Umfang: |
10 |
---|
Übergeordnetes Werk: |
Enthalten in: Claude C. Roy, MD, October 21, 1928–July 2, 2015 - Alvarez, Fernando ELSEVIER, 2015, London |
---|---|
Übergeordnetes Werk: |
volume:72 ; year:2016 ; pages:140-149 ; extent:10 |
Links: |
---|
DOI / URN: |
10.1016/j.jnca.2016.06.007 |
---|
Katalog-ID: |
ELV035496479 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | ELV035496479 | ||
003 | DE-627 | ||
005 | 20230625204452.0 | ||
007 | cr uuu---uuuuu | ||
008 | 180603s2016 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/j.jnca.2016.06.007 |2 doi | |
028 | 5 | 2 | |a GBVA2016019000003.pica |
035 | |a (DE-627)ELV035496479 | ||
035 | |a (ELSEVIER)S1084-8045(16)30126-6 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | |a 004 | |
082 | 0 | 4 | |a 004 |q DE-600 |
082 | 0 | 4 | |a 610 |q VZ |
082 | 0 | 4 | |a 570 |q VZ |
084 | |a BIODIV |q DE-30 |2 fid | ||
084 | |a 35.70 |2 bkl | ||
084 | |a 42.12 |2 bkl | ||
084 | |a 42.15 |2 bkl | ||
100 | 1 | |a Feng, Jingyu |e verfasserin |4 aut | |
245 | 1 | 0 | |a Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks |
264 | 1 | |c 2016transfer abstract | |
300 | |a 10 | ||
336 | |a nicht spezifiziert |b zzz |2 rdacontent | ||
337 | |a nicht spezifiziert |b z |2 rdamedia | ||
338 | |a nicht spezifiziert |b zu |2 rdacarrier | ||
520 | |a Cognitive radio ad hoc networks are commonly perceived as ideal ad hoc environments where cognitive radio technology enables secondary users (SUs) to utilize scarce spectrum resources in a dynamic manner. Cooperative spectrum sensing (CSS) is the key function of cognitive radio technology to identify the available spectrum. However, the nature of aggregating data makes CSS offer opportunities for malicious SUs. Recently, a lot of efforts have been paid to combating spectrum sensing data falsification (SSDF) threat, but little attention to the multi-hop architecture of cognitive radio ad hoc networks. In this paper, we report the discovery of a novel attack called spectrum sensing data hijack (SSDH), in which attackers disguise as routers to hijack and tamper with spectrum sensing data during the transmission. Our simulations show that this new attack needs much less cost to manipulate CSS and has a much higher success rate compared with SSDF attack. We conduct an in-depth investigation on SSDH and propose a two-level defense scheme from the design ideas of IBC signature-verification and neighbor monitor. We also perform simulations to validate our approach. The results show that our defense scheme can significantly reduce the SSDH attack success ratio. | ||
520 | |a Cognitive radio ad hoc networks are commonly perceived as ideal ad hoc environments where cognitive radio technology enables secondary users (SUs) to utilize scarce spectrum resources in a dynamic manner. Cooperative spectrum sensing (CSS) is the key function of cognitive radio technology to identify the available spectrum. However, the nature of aggregating data makes CSS offer opportunities for malicious SUs. Recently, a lot of efforts have been paid to combating spectrum sensing data falsification (SSDF) threat, but little attention to the multi-hop architecture of cognitive radio ad hoc networks. In this paper, we report the discovery of a novel attack called spectrum sensing data hijack (SSDH), in which attackers disguise as routers to hijack and tamper with spectrum sensing data during the transmission. Our simulations show that this new attack needs much less cost to manipulate CSS and has a much higher success rate compared with SSDF attack. We conduct an in-depth investigation on SSDH and propose a two-level defense scheme from the design ideas of IBC signature-verification and neighbor monitor. We also perform simulations to validate our approach. The results show that our defense scheme can significantly reduce the SSDH attack success ratio. | ||
650 | 7 | |a Ad hoc |2 Elsevier | |
650 | 7 | |a Cooperative spectrum sensing |2 Elsevier | |
650 | 7 | |a Hijack |2 Elsevier | |
650 | 7 | |a Cognitive radio |2 Elsevier | |
650 | 7 | |a Trust |2 Elsevier | |
700 | 1 | |a Lu, Guangyue |4 oth | |
700 | 1 | |a Wang, Honggang |4 oth | |
700 | 1 | |a Wang, Xuanhong |4 oth | |
773 | 0 | 8 | |i Enthalten in |n Academic Press |a Alvarez, Fernando ELSEVIER |t Claude C. Roy, MD, October 21, 1928–July 2, 2015 |d 2015 |g London |w (DE-627)ELV013451553 |
773 | 1 | 8 | |g volume:72 |g year:2016 |g pages:140-149 |g extent:10 |
856 | 4 | 0 | |u https://doi.org/10.1016/j.jnca.2016.06.007 |3 Volltext |
912 | |a GBV_USEFLAG_U | ||
912 | |a GBV_ELV | ||
912 | |a SYSFLAG_U | ||
912 | |a FID-BIODIV | ||
912 | |a SSG-OLC-PHA | ||
912 | |a GBV_ILN_40 | ||
936 | b | k | |a 35.70 |j Biochemie: Allgemeines |q VZ |
936 | b | k | |a 42.12 |j Biophysik |q VZ |
936 | b | k | |a 42.15 |j Zellbiologie |q VZ |
951 | |a AR | ||
952 | |d 72 |j 2016 |h 140-149 |g 10 | ||
953 | |2 045F |a 004 |
author_variant |
j f jf |
---|---|
matchkey_str |
fengjingyuluguangyuewanghonggangwangxuan:2016----:uprigeuepcrmesndttasisoaantshtakno |
hierarchy_sort_str |
2016transfer abstract |
bklnumber |
35.70 42.12 42.15 |
publishDate |
2016 |
allfields |
10.1016/j.jnca.2016.06.007 doi GBVA2016019000003.pica (DE-627)ELV035496479 (ELSEVIER)S1084-8045(16)30126-6 DE-627 ger DE-627 rakwb eng 004 004 DE-600 610 VZ 570 VZ BIODIV DE-30 fid 35.70 bkl 42.12 bkl 42.15 bkl Feng, Jingyu verfasserin aut Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks 2016transfer abstract 10 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Cognitive radio ad hoc networks are commonly perceived as ideal ad hoc environments where cognitive radio technology enables secondary users (SUs) to utilize scarce spectrum resources in a dynamic manner. Cooperative spectrum sensing (CSS) is the key function of cognitive radio technology to identify the available spectrum. However, the nature of aggregating data makes CSS offer opportunities for malicious SUs. Recently, a lot of efforts have been paid to combating spectrum sensing data falsification (SSDF) threat, but little attention to the multi-hop architecture of cognitive radio ad hoc networks. In this paper, we report the discovery of a novel attack called spectrum sensing data hijack (SSDH), in which attackers disguise as routers to hijack and tamper with spectrum sensing data during the transmission. Our simulations show that this new attack needs much less cost to manipulate CSS and has a much higher success rate compared with SSDF attack. We conduct an in-depth investigation on SSDH and propose a two-level defense scheme from the design ideas of IBC signature-verification and neighbor monitor. We also perform simulations to validate our approach. The results show that our defense scheme can significantly reduce the SSDH attack success ratio. Cognitive radio ad hoc networks are commonly perceived as ideal ad hoc environments where cognitive radio technology enables secondary users (SUs) to utilize scarce spectrum resources in a dynamic manner. Cooperative spectrum sensing (CSS) is the key function of cognitive radio technology to identify the available spectrum. However, the nature of aggregating data makes CSS offer opportunities for malicious SUs. Recently, a lot of efforts have been paid to combating spectrum sensing data falsification (SSDF) threat, but little attention to the multi-hop architecture of cognitive radio ad hoc networks. In this paper, we report the discovery of a novel attack called spectrum sensing data hijack (SSDH), in which attackers disguise as routers to hijack and tamper with spectrum sensing data during the transmission. Our simulations show that this new attack needs much less cost to manipulate CSS and has a much higher success rate compared with SSDF attack. We conduct an in-depth investigation on SSDH and propose a two-level defense scheme from the design ideas of IBC signature-verification and neighbor monitor. We also perform simulations to validate our approach. The results show that our defense scheme can significantly reduce the SSDH attack success ratio. Ad hoc Elsevier Cooperative spectrum sensing Elsevier Hijack Elsevier Cognitive radio Elsevier Trust Elsevier Lu, Guangyue oth Wang, Honggang oth Wang, Xuanhong oth Enthalten in Academic Press Alvarez, Fernando ELSEVIER Claude C. Roy, MD, October 21, 1928–July 2, 2015 2015 London (DE-627)ELV013451553 volume:72 year:2016 pages:140-149 extent:10 https://doi.org/10.1016/j.jnca.2016.06.007 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV SSG-OLC-PHA GBV_ILN_40 35.70 Biochemie: Allgemeines VZ 42.12 Biophysik VZ 42.15 Zellbiologie VZ AR 72 2016 140-149 10 045F 004 |
spelling |
10.1016/j.jnca.2016.06.007 doi GBVA2016019000003.pica (DE-627)ELV035496479 (ELSEVIER)S1084-8045(16)30126-6 DE-627 ger DE-627 rakwb eng 004 004 DE-600 610 VZ 570 VZ BIODIV DE-30 fid 35.70 bkl 42.12 bkl 42.15 bkl Feng, Jingyu verfasserin aut Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks 2016transfer abstract 10 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Cognitive radio ad hoc networks are commonly perceived as ideal ad hoc environments where cognitive radio technology enables secondary users (SUs) to utilize scarce spectrum resources in a dynamic manner. Cooperative spectrum sensing (CSS) is the key function of cognitive radio technology to identify the available spectrum. However, the nature of aggregating data makes CSS offer opportunities for malicious SUs. Recently, a lot of efforts have been paid to combating spectrum sensing data falsification (SSDF) threat, but little attention to the multi-hop architecture of cognitive radio ad hoc networks. In this paper, we report the discovery of a novel attack called spectrum sensing data hijack (SSDH), in which attackers disguise as routers to hijack and tamper with spectrum sensing data during the transmission. Our simulations show that this new attack needs much less cost to manipulate CSS and has a much higher success rate compared with SSDF attack. We conduct an in-depth investigation on SSDH and propose a two-level defense scheme from the design ideas of IBC signature-verification and neighbor monitor. We also perform simulations to validate our approach. The results show that our defense scheme can significantly reduce the SSDH attack success ratio. Cognitive radio ad hoc networks are commonly perceived as ideal ad hoc environments where cognitive radio technology enables secondary users (SUs) to utilize scarce spectrum resources in a dynamic manner. Cooperative spectrum sensing (CSS) is the key function of cognitive radio technology to identify the available spectrum. However, the nature of aggregating data makes CSS offer opportunities for malicious SUs. Recently, a lot of efforts have been paid to combating spectrum sensing data falsification (SSDF) threat, but little attention to the multi-hop architecture of cognitive radio ad hoc networks. In this paper, we report the discovery of a novel attack called spectrum sensing data hijack (SSDH), in which attackers disguise as routers to hijack and tamper with spectrum sensing data during the transmission. Our simulations show that this new attack needs much less cost to manipulate CSS and has a much higher success rate compared with SSDF attack. We conduct an in-depth investigation on SSDH and propose a two-level defense scheme from the design ideas of IBC signature-verification and neighbor monitor. We also perform simulations to validate our approach. The results show that our defense scheme can significantly reduce the SSDH attack success ratio. Ad hoc Elsevier Cooperative spectrum sensing Elsevier Hijack Elsevier Cognitive radio Elsevier Trust Elsevier Lu, Guangyue oth Wang, Honggang oth Wang, Xuanhong oth Enthalten in Academic Press Alvarez, Fernando ELSEVIER Claude C. Roy, MD, October 21, 1928–July 2, 2015 2015 London (DE-627)ELV013451553 volume:72 year:2016 pages:140-149 extent:10 https://doi.org/10.1016/j.jnca.2016.06.007 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV SSG-OLC-PHA GBV_ILN_40 35.70 Biochemie: Allgemeines VZ 42.12 Biophysik VZ 42.15 Zellbiologie VZ AR 72 2016 140-149 10 045F 004 |
allfields_unstemmed |
10.1016/j.jnca.2016.06.007 doi GBVA2016019000003.pica (DE-627)ELV035496479 (ELSEVIER)S1084-8045(16)30126-6 DE-627 ger DE-627 rakwb eng 004 004 DE-600 610 VZ 570 VZ BIODIV DE-30 fid 35.70 bkl 42.12 bkl 42.15 bkl Feng, Jingyu verfasserin aut Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks 2016transfer abstract 10 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Cognitive radio ad hoc networks are commonly perceived as ideal ad hoc environments where cognitive radio technology enables secondary users (SUs) to utilize scarce spectrum resources in a dynamic manner. Cooperative spectrum sensing (CSS) is the key function of cognitive radio technology to identify the available spectrum. However, the nature of aggregating data makes CSS offer opportunities for malicious SUs. Recently, a lot of efforts have been paid to combating spectrum sensing data falsification (SSDF) threat, but little attention to the multi-hop architecture of cognitive radio ad hoc networks. In this paper, we report the discovery of a novel attack called spectrum sensing data hijack (SSDH), in which attackers disguise as routers to hijack and tamper with spectrum sensing data during the transmission. Our simulations show that this new attack needs much less cost to manipulate CSS and has a much higher success rate compared with SSDF attack. We conduct an in-depth investigation on SSDH and propose a two-level defense scheme from the design ideas of IBC signature-verification and neighbor monitor. We also perform simulations to validate our approach. The results show that our defense scheme can significantly reduce the SSDH attack success ratio. Cognitive radio ad hoc networks are commonly perceived as ideal ad hoc environments where cognitive radio technology enables secondary users (SUs) to utilize scarce spectrum resources in a dynamic manner. Cooperative spectrum sensing (CSS) is the key function of cognitive radio technology to identify the available spectrum. However, the nature of aggregating data makes CSS offer opportunities for malicious SUs. Recently, a lot of efforts have been paid to combating spectrum sensing data falsification (SSDF) threat, but little attention to the multi-hop architecture of cognitive radio ad hoc networks. In this paper, we report the discovery of a novel attack called spectrum sensing data hijack (SSDH), in which attackers disguise as routers to hijack and tamper with spectrum sensing data during the transmission. Our simulations show that this new attack needs much less cost to manipulate CSS and has a much higher success rate compared with SSDF attack. We conduct an in-depth investigation on SSDH and propose a two-level defense scheme from the design ideas of IBC signature-verification and neighbor monitor. We also perform simulations to validate our approach. The results show that our defense scheme can significantly reduce the SSDH attack success ratio. Ad hoc Elsevier Cooperative spectrum sensing Elsevier Hijack Elsevier Cognitive radio Elsevier Trust Elsevier Lu, Guangyue oth Wang, Honggang oth Wang, Xuanhong oth Enthalten in Academic Press Alvarez, Fernando ELSEVIER Claude C. Roy, MD, October 21, 1928–July 2, 2015 2015 London (DE-627)ELV013451553 volume:72 year:2016 pages:140-149 extent:10 https://doi.org/10.1016/j.jnca.2016.06.007 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV SSG-OLC-PHA GBV_ILN_40 35.70 Biochemie: Allgemeines VZ 42.12 Biophysik VZ 42.15 Zellbiologie VZ AR 72 2016 140-149 10 045F 004 |
allfieldsGer |
10.1016/j.jnca.2016.06.007 doi GBVA2016019000003.pica (DE-627)ELV035496479 (ELSEVIER)S1084-8045(16)30126-6 DE-627 ger DE-627 rakwb eng 004 004 DE-600 610 VZ 570 VZ BIODIV DE-30 fid 35.70 bkl 42.12 bkl 42.15 bkl Feng, Jingyu verfasserin aut Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks 2016transfer abstract 10 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Cognitive radio ad hoc networks are commonly perceived as ideal ad hoc environments where cognitive radio technology enables secondary users (SUs) to utilize scarce spectrum resources in a dynamic manner. Cooperative spectrum sensing (CSS) is the key function of cognitive radio technology to identify the available spectrum. However, the nature of aggregating data makes CSS offer opportunities for malicious SUs. Recently, a lot of efforts have been paid to combating spectrum sensing data falsification (SSDF) threat, but little attention to the multi-hop architecture of cognitive radio ad hoc networks. In this paper, we report the discovery of a novel attack called spectrum sensing data hijack (SSDH), in which attackers disguise as routers to hijack and tamper with spectrum sensing data during the transmission. Our simulations show that this new attack needs much less cost to manipulate CSS and has a much higher success rate compared with SSDF attack. We conduct an in-depth investigation on SSDH and propose a two-level defense scheme from the design ideas of IBC signature-verification and neighbor monitor. We also perform simulations to validate our approach. The results show that our defense scheme can significantly reduce the SSDH attack success ratio. Cognitive radio ad hoc networks are commonly perceived as ideal ad hoc environments where cognitive radio technology enables secondary users (SUs) to utilize scarce spectrum resources in a dynamic manner. Cooperative spectrum sensing (CSS) is the key function of cognitive radio technology to identify the available spectrum. However, the nature of aggregating data makes CSS offer opportunities for malicious SUs. Recently, a lot of efforts have been paid to combating spectrum sensing data falsification (SSDF) threat, but little attention to the multi-hop architecture of cognitive radio ad hoc networks. In this paper, we report the discovery of a novel attack called spectrum sensing data hijack (SSDH), in which attackers disguise as routers to hijack and tamper with spectrum sensing data during the transmission. Our simulations show that this new attack needs much less cost to manipulate CSS and has a much higher success rate compared with SSDF attack. We conduct an in-depth investigation on SSDH and propose a two-level defense scheme from the design ideas of IBC signature-verification and neighbor monitor. We also perform simulations to validate our approach. The results show that our defense scheme can significantly reduce the SSDH attack success ratio. Ad hoc Elsevier Cooperative spectrum sensing Elsevier Hijack Elsevier Cognitive radio Elsevier Trust Elsevier Lu, Guangyue oth Wang, Honggang oth Wang, Xuanhong oth Enthalten in Academic Press Alvarez, Fernando ELSEVIER Claude C. Roy, MD, October 21, 1928–July 2, 2015 2015 London (DE-627)ELV013451553 volume:72 year:2016 pages:140-149 extent:10 https://doi.org/10.1016/j.jnca.2016.06.007 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV SSG-OLC-PHA GBV_ILN_40 35.70 Biochemie: Allgemeines VZ 42.12 Biophysik VZ 42.15 Zellbiologie VZ AR 72 2016 140-149 10 045F 004 |
allfieldsSound |
10.1016/j.jnca.2016.06.007 doi GBVA2016019000003.pica (DE-627)ELV035496479 (ELSEVIER)S1084-8045(16)30126-6 DE-627 ger DE-627 rakwb eng 004 004 DE-600 610 VZ 570 VZ BIODIV DE-30 fid 35.70 bkl 42.12 bkl 42.15 bkl Feng, Jingyu verfasserin aut Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks 2016transfer abstract 10 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Cognitive radio ad hoc networks are commonly perceived as ideal ad hoc environments where cognitive radio technology enables secondary users (SUs) to utilize scarce spectrum resources in a dynamic manner. Cooperative spectrum sensing (CSS) is the key function of cognitive radio technology to identify the available spectrum. However, the nature of aggregating data makes CSS offer opportunities for malicious SUs. Recently, a lot of efforts have been paid to combating spectrum sensing data falsification (SSDF) threat, but little attention to the multi-hop architecture of cognitive radio ad hoc networks. In this paper, we report the discovery of a novel attack called spectrum sensing data hijack (SSDH), in which attackers disguise as routers to hijack and tamper with spectrum sensing data during the transmission. Our simulations show that this new attack needs much less cost to manipulate CSS and has a much higher success rate compared with SSDF attack. We conduct an in-depth investigation on SSDH and propose a two-level defense scheme from the design ideas of IBC signature-verification and neighbor monitor. We also perform simulations to validate our approach. The results show that our defense scheme can significantly reduce the SSDH attack success ratio. Cognitive radio ad hoc networks are commonly perceived as ideal ad hoc environments where cognitive radio technology enables secondary users (SUs) to utilize scarce spectrum resources in a dynamic manner. Cooperative spectrum sensing (CSS) is the key function of cognitive radio technology to identify the available spectrum. However, the nature of aggregating data makes CSS offer opportunities for malicious SUs. Recently, a lot of efforts have been paid to combating spectrum sensing data falsification (SSDF) threat, but little attention to the multi-hop architecture of cognitive radio ad hoc networks. In this paper, we report the discovery of a novel attack called spectrum sensing data hijack (SSDH), in which attackers disguise as routers to hijack and tamper with spectrum sensing data during the transmission. Our simulations show that this new attack needs much less cost to manipulate CSS and has a much higher success rate compared with SSDF attack. We conduct an in-depth investigation on SSDH and propose a two-level defense scheme from the design ideas of IBC signature-verification and neighbor monitor. We also perform simulations to validate our approach. The results show that our defense scheme can significantly reduce the SSDH attack success ratio. Ad hoc Elsevier Cooperative spectrum sensing Elsevier Hijack Elsevier Cognitive radio Elsevier Trust Elsevier Lu, Guangyue oth Wang, Honggang oth Wang, Xuanhong oth Enthalten in Academic Press Alvarez, Fernando ELSEVIER Claude C. Roy, MD, October 21, 1928–July 2, 2015 2015 London (DE-627)ELV013451553 volume:72 year:2016 pages:140-149 extent:10 https://doi.org/10.1016/j.jnca.2016.06.007 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV SSG-OLC-PHA GBV_ILN_40 35.70 Biochemie: Allgemeines VZ 42.12 Biophysik VZ 42.15 Zellbiologie VZ AR 72 2016 140-149 10 045F 004 |
language |
English |
source |
Enthalten in Claude C. Roy, MD, October 21, 1928–July 2, 2015 London volume:72 year:2016 pages:140-149 extent:10 |
sourceStr |
Enthalten in Claude C. Roy, MD, October 21, 1928–July 2, 2015 London volume:72 year:2016 pages:140-149 extent:10 |
format_phy_str_mv |
Article |
bklname |
Biochemie: Allgemeines Biophysik Zellbiologie |
institution |
findex.gbv.de |
topic_facet |
Ad hoc Cooperative spectrum sensing Hijack Cognitive radio Trust |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
Claude C. Roy, MD, October 21, 1928–July 2, 2015 |
authorswithroles_txt_mv |
Feng, Jingyu @@aut@@ Lu, Guangyue @@oth@@ Wang, Honggang @@oth@@ Wang, Xuanhong @@oth@@ |
publishDateDaySort_date |
2016-01-01T00:00:00Z |
hierarchy_top_id |
ELV013451553 |
dewey-sort |
14 |
id |
ELV035496479 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV035496479</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230625204452.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">180603s2016 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.jnca.2016.06.007</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">GBVA2016019000003.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV035496479</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S1084-8045(16)30126-6</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">610</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">570</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">BIODIV</subfield><subfield code="q">DE-30</subfield><subfield code="2">fid</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">35.70</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">42.12</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">42.15</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Feng, Jingyu</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2016transfer abstract</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">10</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cognitive radio ad hoc networks are commonly perceived as ideal ad hoc environments where cognitive radio technology enables secondary users (SUs) to utilize scarce spectrum resources in a dynamic manner. Cooperative spectrum sensing (CSS) is the key function of cognitive radio technology to identify the available spectrum. However, the nature of aggregating data makes CSS offer opportunities for malicious SUs. Recently, a lot of efforts have been paid to combating spectrum sensing data falsification (SSDF) threat, but little attention to the multi-hop architecture of cognitive radio ad hoc networks. In this paper, we report the discovery of a novel attack called spectrum sensing data hijack (SSDH), in which attackers disguise as routers to hijack and tamper with spectrum sensing data during the transmission. Our simulations show that this new attack needs much less cost to manipulate CSS and has a much higher success rate compared with SSDF attack. We conduct an in-depth investigation on SSDH and propose a two-level defense scheme from the design ideas of IBC signature-verification and neighbor monitor. We also perform simulations to validate our approach. The results show that our defense scheme can significantly reduce the SSDH attack success ratio.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cognitive radio ad hoc networks are commonly perceived as ideal ad hoc environments where cognitive radio technology enables secondary users (SUs) to utilize scarce spectrum resources in a dynamic manner. Cooperative spectrum sensing (CSS) is the key function of cognitive radio technology to identify the available spectrum. However, the nature of aggregating data makes CSS offer opportunities for malicious SUs. Recently, a lot of efforts have been paid to combating spectrum sensing data falsification (SSDF) threat, but little attention to the multi-hop architecture of cognitive radio ad hoc networks. In this paper, we report the discovery of a novel attack called spectrum sensing data hijack (SSDH), in which attackers disguise as routers to hijack and tamper with spectrum sensing data during the transmission. Our simulations show that this new attack needs much less cost to manipulate CSS and has a much higher success rate compared with SSDF attack. We conduct an in-depth investigation on SSDH and propose a two-level defense scheme from the design ideas of IBC signature-verification and neighbor monitor. We also perform simulations to validate our approach. The results show that our defense scheme can significantly reduce the SSDH attack success ratio.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Ad hoc</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cooperative spectrum sensing</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hijack</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cognitive radio</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Trust</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lu, Guangyue</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Honggang</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Xuanhong</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Academic Press</subfield><subfield code="a">Alvarez, Fernando ELSEVIER</subfield><subfield code="t">Claude C. Roy, MD, October 21, 1928–July 2, 2015</subfield><subfield code="d">2015</subfield><subfield code="g">London</subfield><subfield code="w">(DE-627)ELV013451553</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:72</subfield><subfield code="g">year:2016</subfield><subfield code="g">pages:140-149</subfield><subfield code="g">extent:10</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.jnca.2016.06.007</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">FID-BIODIV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-PHA</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">35.70</subfield><subfield code="j">Biochemie: Allgemeines</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">42.12</subfield><subfield code="j">Biophysik</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">42.15</subfield><subfield code="j">Zellbiologie</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">72</subfield><subfield code="j">2016</subfield><subfield code="h">140-149</subfield><subfield code="g">10</subfield></datafield><datafield tag="953" ind1=" " ind2=" "><subfield code="2">045F</subfield><subfield code="a">004</subfield></datafield></record></collection>
|
author |
Feng, Jingyu |
spellingShingle |
Feng, Jingyu ddc 004 ddc 610 ddc 570 fid BIODIV bkl 35.70 bkl 42.12 bkl 42.15 Elsevier Ad hoc Elsevier Cooperative spectrum sensing Elsevier Hijack Elsevier Cognitive radio Elsevier Trust Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks |
authorStr |
Feng, Jingyu |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)ELV013451553 |
format |
electronic Article |
dewey-ones |
004 - Data processing & computer science 610 - Medicine & health 570 - Life sciences; biology |
delete_txt_mv |
keep |
author_role |
aut |
collection |
elsevier |
remote_str |
true |
illustrated |
Not Illustrated |
topic_title |
004 004 DE-600 610 VZ 570 VZ BIODIV DE-30 fid 35.70 bkl 42.12 bkl 42.15 bkl Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks Ad hoc Elsevier Cooperative spectrum sensing Elsevier Hijack Elsevier Cognitive radio Elsevier Trust Elsevier |
topic |
ddc 004 ddc 610 ddc 570 fid BIODIV bkl 35.70 bkl 42.12 bkl 42.15 Elsevier Ad hoc Elsevier Cooperative spectrum sensing Elsevier Hijack Elsevier Cognitive radio Elsevier Trust |
topic_unstemmed |
ddc 004 ddc 610 ddc 570 fid BIODIV bkl 35.70 bkl 42.12 bkl 42.15 Elsevier Ad hoc Elsevier Cooperative spectrum sensing Elsevier Hijack Elsevier Cognitive radio Elsevier Trust |
topic_browse |
ddc 004 ddc 610 ddc 570 fid BIODIV bkl 35.70 bkl 42.12 bkl 42.15 Elsevier Ad hoc Elsevier Cooperative spectrum sensing Elsevier Hijack Elsevier Cognitive radio Elsevier Trust |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
zu |
author2_variant |
g l gl h w hw x w xw |
hierarchy_parent_title |
Claude C. Roy, MD, October 21, 1928–July 2, 2015 |
hierarchy_parent_id |
ELV013451553 |
dewey-tens |
000 - Computer science, knowledge & systems 610 - Medicine & health 570 - Life sciences; biology |
hierarchy_top_title |
Claude C. Roy, MD, October 21, 1928–July 2, 2015 |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)ELV013451553 |
title |
Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks |
ctrlnum |
(DE-627)ELV035496479 (ELSEVIER)S1084-8045(16)30126-6 |
title_full |
Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks |
author_sort |
Feng, Jingyu |
journal |
Claude C. Roy, MD, October 21, 1928–July 2, 2015 |
journalStr |
Claude C. Roy, MD, October 21, 1928–July 2, 2015 |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works 600 - Technology 500 - Science |
recordtype |
marc |
publishDateSort |
2016 |
contenttype_str_mv |
zzz |
container_start_page |
140 |
author_browse |
Feng, Jingyu |
container_volume |
72 |
physical |
10 |
class |
004 004 DE-600 610 VZ 570 VZ BIODIV DE-30 fid 35.70 bkl 42.12 bkl 42.15 bkl |
format_se |
Elektronische Aufsätze |
author-letter |
Feng, Jingyu |
doi_str_mv |
10.1016/j.jnca.2016.06.007 |
dewey-full |
004 610 570 |
title_sort |
supporting secure spectrum sensing data transmission against ssdh attack in cognitive radio ad hoc networks |
title_auth |
Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks |
abstract |
Cognitive radio ad hoc networks are commonly perceived as ideal ad hoc environments where cognitive radio technology enables secondary users (SUs) to utilize scarce spectrum resources in a dynamic manner. Cooperative spectrum sensing (CSS) is the key function of cognitive radio technology to identify the available spectrum. However, the nature of aggregating data makes CSS offer opportunities for malicious SUs. Recently, a lot of efforts have been paid to combating spectrum sensing data falsification (SSDF) threat, but little attention to the multi-hop architecture of cognitive radio ad hoc networks. In this paper, we report the discovery of a novel attack called spectrum sensing data hijack (SSDH), in which attackers disguise as routers to hijack and tamper with spectrum sensing data during the transmission. Our simulations show that this new attack needs much less cost to manipulate CSS and has a much higher success rate compared with SSDF attack. We conduct an in-depth investigation on SSDH and propose a two-level defense scheme from the design ideas of IBC signature-verification and neighbor monitor. We also perform simulations to validate our approach. The results show that our defense scheme can significantly reduce the SSDH attack success ratio. |
abstractGer |
Cognitive radio ad hoc networks are commonly perceived as ideal ad hoc environments where cognitive radio technology enables secondary users (SUs) to utilize scarce spectrum resources in a dynamic manner. Cooperative spectrum sensing (CSS) is the key function of cognitive radio technology to identify the available spectrum. However, the nature of aggregating data makes CSS offer opportunities for malicious SUs. Recently, a lot of efforts have been paid to combating spectrum sensing data falsification (SSDF) threat, but little attention to the multi-hop architecture of cognitive radio ad hoc networks. In this paper, we report the discovery of a novel attack called spectrum sensing data hijack (SSDH), in which attackers disguise as routers to hijack and tamper with spectrum sensing data during the transmission. Our simulations show that this new attack needs much less cost to manipulate CSS and has a much higher success rate compared with SSDF attack. We conduct an in-depth investigation on SSDH and propose a two-level defense scheme from the design ideas of IBC signature-verification and neighbor monitor. We also perform simulations to validate our approach. The results show that our defense scheme can significantly reduce the SSDH attack success ratio. |
abstract_unstemmed |
Cognitive radio ad hoc networks are commonly perceived as ideal ad hoc environments where cognitive radio technology enables secondary users (SUs) to utilize scarce spectrum resources in a dynamic manner. Cooperative spectrum sensing (CSS) is the key function of cognitive radio technology to identify the available spectrum. However, the nature of aggregating data makes CSS offer opportunities for malicious SUs. Recently, a lot of efforts have been paid to combating spectrum sensing data falsification (SSDF) threat, but little attention to the multi-hop architecture of cognitive radio ad hoc networks. In this paper, we report the discovery of a novel attack called spectrum sensing data hijack (SSDH), in which attackers disguise as routers to hijack and tamper with spectrum sensing data during the transmission. Our simulations show that this new attack needs much less cost to manipulate CSS and has a much higher success rate compared with SSDF attack. We conduct an in-depth investigation on SSDH and propose a two-level defense scheme from the design ideas of IBC signature-verification and neighbor monitor. We also perform simulations to validate our approach. The results show that our defense scheme can significantly reduce the SSDH attack success ratio. |
collection_details |
GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV SSG-OLC-PHA GBV_ILN_40 |
title_short |
Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks |
url |
https://doi.org/10.1016/j.jnca.2016.06.007 |
remote_bool |
true |
author2 |
Lu, Guangyue Wang, Honggang Wang, Xuanhong |
author2Str |
Lu, Guangyue Wang, Honggang Wang, Xuanhong |
ppnlink |
ELV013451553 |
mediatype_str_mv |
z |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth oth oth |
doi_str |
10.1016/j.jnca.2016.06.007 |
up_date |
2024-07-06T17:42:42.160Z |
_version_ |
1803852460496781312 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV035496479</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230625204452.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">180603s2016 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.jnca.2016.06.007</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">GBVA2016019000003.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV035496479</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S1084-8045(16)30126-6</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">610</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">570</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">BIODIV</subfield><subfield code="q">DE-30</subfield><subfield code="2">fid</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">35.70</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">42.12</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">42.15</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Feng, Jingyu</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2016transfer abstract</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">10</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cognitive radio ad hoc networks are commonly perceived as ideal ad hoc environments where cognitive radio technology enables secondary users (SUs) to utilize scarce spectrum resources in a dynamic manner. Cooperative spectrum sensing (CSS) is the key function of cognitive radio technology to identify the available spectrum. However, the nature of aggregating data makes CSS offer opportunities for malicious SUs. Recently, a lot of efforts have been paid to combating spectrum sensing data falsification (SSDF) threat, but little attention to the multi-hop architecture of cognitive radio ad hoc networks. In this paper, we report the discovery of a novel attack called spectrum sensing data hijack (SSDH), in which attackers disguise as routers to hijack and tamper with spectrum sensing data during the transmission. Our simulations show that this new attack needs much less cost to manipulate CSS and has a much higher success rate compared with SSDF attack. We conduct an in-depth investigation on SSDH and propose a two-level defense scheme from the design ideas of IBC signature-verification and neighbor monitor. We also perform simulations to validate our approach. The results show that our defense scheme can significantly reduce the SSDH attack success ratio.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cognitive radio ad hoc networks are commonly perceived as ideal ad hoc environments where cognitive radio technology enables secondary users (SUs) to utilize scarce spectrum resources in a dynamic manner. Cooperative spectrum sensing (CSS) is the key function of cognitive radio technology to identify the available spectrum. However, the nature of aggregating data makes CSS offer opportunities for malicious SUs. Recently, a lot of efforts have been paid to combating spectrum sensing data falsification (SSDF) threat, but little attention to the multi-hop architecture of cognitive radio ad hoc networks. In this paper, we report the discovery of a novel attack called spectrum sensing data hijack (SSDH), in which attackers disguise as routers to hijack and tamper with spectrum sensing data during the transmission. Our simulations show that this new attack needs much less cost to manipulate CSS and has a much higher success rate compared with SSDF attack. We conduct an in-depth investigation on SSDH and propose a two-level defense scheme from the design ideas of IBC signature-verification and neighbor monitor. We also perform simulations to validate our approach. The results show that our defense scheme can significantly reduce the SSDH attack success ratio.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Ad hoc</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cooperative spectrum sensing</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hijack</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cognitive radio</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Trust</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lu, Guangyue</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Honggang</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Xuanhong</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Academic Press</subfield><subfield code="a">Alvarez, Fernando ELSEVIER</subfield><subfield code="t">Claude C. Roy, MD, October 21, 1928–July 2, 2015</subfield><subfield code="d">2015</subfield><subfield code="g">London</subfield><subfield code="w">(DE-627)ELV013451553</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:72</subfield><subfield code="g">year:2016</subfield><subfield code="g">pages:140-149</subfield><subfield code="g">extent:10</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.jnca.2016.06.007</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">FID-BIODIV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-PHA</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">35.70</subfield><subfield code="j">Biochemie: Allgemeines</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">42.12</subfield><subfield code="j">Biophysik</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">42.15</subfield><subfield code="j">Zellbiologie</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">72</subfield><subfield code="j">2016</subfield><subfield code="h">140-149</subfield><subfield code="g">10</subfield></datafield><datafield tag="953" ind1=" " ind2=" "><subfield code="2">045F</subfield><subfield code="a">004</subfield></datafield></record></collection>
|
score |
7.3998785 |