In order to combat an objective function attack, a simple suggestion has been made in [5]. It is to define threshold values
whenever the radio parameters need to be updated. If the detected parameters do not meet the predefined thresholds,
the secondary user will not collect that information. Moreover,a good intrusion detection system can be used to strengthen
the countermeasure. However, using an intrusion detection system is a general countermeasure that may not perform well
in defending against objective function attacks