Research Article

Primary User Emulation in Cognitive Radio-Enabled WSNs for Structural Health Monitoring: Modeling and Attack Detection

Figure 7

Histograms for average reporting times under stealthy attack ().