Vulnerabilities of cognitive radio MAC protocols and countermeasures | IEEE Journals & Magazine | IEEE Xplore