[1] Mitola, J.: Cognitive radio for flexible mobile multimedia communications. IEEE International Workshop on Mobile Multimedia Communications, (MoMuC’99), pp. 3-10 (1999) [2] Niyato, D., & Hossain, E.: Spectrum trading in cognitive radio networks: A market-equilibrium-based approach. IEEE Wireless Communications, vol. 15(6), pp. 71-80 (2008) [3] Crocioni, P.: Is allowing trading enough? Making secondary markets in spectrum work. Telecommunications Policy, vol. 33(8), pp. 451-468 (2009) [4] Khasawneh, M., & Agarwal, A.: A survey on security in Cognitive Radio networks. International Conference on Computer Science and Information Technology (CSIT), pp. 64-70 (2014) [5] Akyildiz, Y.: OFDM-Based Cognitive Radio Networks. In Cognitive wireless communications networks, pp. 189-211 (2006) [6] El-Hajj, W., Safa, H. & Guizani, M.: Survey of Security Issues in Cognitive Radio Network. Journal of Internet Technology. vol. 12(2), pp. 1-18 (2011) [7] Sodagari, S. & Clancy, T. C.: An Anti-Jamming Strategy for Channel Access in Cognitive Radio Networks, Decision and Game Theory for Security, LNCS. vol. 7037, pp. 34-43 (2011) [8] Zhao, J. & Cao, G.: Robust Topology Control In Multi-Hop Cognitive Radio Networks. INFOCOM. pp. 2032-2040 (2012) [9] Khasawneh, M., Kajman, I., Alkhudaidy, R. & Althubyani A.: A Survey on Wi-Fi Protocols: WPA and WPA2. International Conference on Security in Computer Networks and Distributed Systems, SNDS, pp. 496-511 (2014) [10] Wong, K., Zheng, Y., Cao, J. &Wang, S.: A Dynamic user authentication scheme for WSN. IEEE International Conference on Sensor Networks, Ubiquitous Computing, and Trustworthy Computing SUTC, pp. 244-251 (2006) [11] Tseng, H., Jan, R. Yang, W.: An Improved Dynamic User Authentication Scheme for WSN. GLOBECOM, pp. 986-990 (2007) [12] Han, K., ShiakShon, T. & Kim, K.: Efficient Mobile Sensor Authentication in Smart Home, IEEE Transaction on Consumer Electronics. vol. 56(2),pp. 591-596 (2010) [13] Zhu, S. Setia, S. & Jajodia, S.: LEAP: efficient security mechanisms in large scale distributed networks. 10th ACM Conference on Computers and Communication Security (CCS), pp. 62-72 (2003) [14] Ning, P., Liu, A. & Du, W.: Mitigating DOS attacks against broadcast authentication in WSN. ACM Transactions on Sensor Networks. vol. 4(1), pp. 1-35 (2008). [15] Tan, X., Borle K., Du,W. & Chen, B.: Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio. 4th ACM conference on Wireless Network Security, WiSec, pp. 1-12 (2011) [16] Kim, HS.: Location-based authentication protocol for first cognitive radio networking standard. Journal of Network and Computer Applications. vol. 34(4), pp. 1160-1167 (2011) [17] Parvin, S. H. & Khadeer, F.: Digital signature-based secure communication in cognitive radio networks. Broadband and Wireless Computing, Communication and Applications, BWCCA, pp. 230-235 (2011) [18] Parvin, S., Han, S., Tian, B., & Kadeer, H.F.: Trust based authentication for secure communication in cognitive radio networks. IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, EUC, pp. 589-596 (2010) [19] Parvin, S., Khadeer, F.H., & Khadeer, O.H.: Digital signature-based authentication framework in cognitive radio networks, 10th International Conference on Advances in Mobile Computing & Multimedia, pp. 136-142 (2012) [20] Chatterjee, K., De, A., & Gupta, D.: A secure and efficient authentication protocol in wireless sensor network. Wireless Personal Communication, vol. 81(1), pp. 17-37 (2015) [21] Liu, Y., Ning, P., & Dai, H.: Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures. IEEE Symposium on Security and Privacy (SP), pp. 286-301 (2010) [22] Burrows, M., Abadi, M., & Needham, R.: A Logic of authentication. ACM Transactions on Computer Systems. vol. 8(1), pp. 18-36 (1990) [23] Cremers. C.: Scyther User Manual, Available at: http://profs.info.uaic.ro/ cbirjoveanu/web/Ps/Scyther/scyther-manual.pdf, (2017). Accessed May, 16th, 2017 [24] Crypto++ 5.6.0 Benchmarks, Available at: http://www.cryptopp.com/benchmarks.html, (2017). Accessed May, 16th, 2017.