Fig. 1From: A survey on cognitive radio network attack mitigation using machine learning and blockchainSU leaves the channel, when the PU arrives. Figure portrays the opportunistic nature of cognitive radio networkBack to article page