Figure 1From: A survey on security attacks and countermeasures with primary user detection in cognitive radio networks Usage scenarios in cognitive radio environments. Back to article page