Figure 3From: A survey on security attacks and countermeasures with primary user detection in cognitive radio networks Cooperative sensing approaches in one-hop distributed and centralized CR scenarios. Back to article page