Affiliation:
1. School of Technology Woxsen University Hyderabad India
2. NanoBioTech Laboratory, Department of Environmental Engineering Florida Polytechnic University Lakeland Florida USA
3. Department of Computer Science University of Houston‐Victoria Texas USA
Abstract
AbstractThe growing cognizance of spectrum scarcity has become a more significant concern in wireless radio communications. Due to the exponential growth of data transmission in intelligent wireless sensor networks, energy spectrum detection has become a promising solution for resolving spectrum shortages. Primary user emulation attack (PUEA) has been identified as a significant attack vector in the cognitive radio (CR) domain's physical layer. In comparison, the CR is a promising method to increase spectrum efficiency by allowing unlicensed secondary users (SUs) to access licensed frequency bands without interfering with approved primary users (PUs). The study's primary findings are the methodology for preventing PUEA using authentication tags, which are unique sequences. This research blends SC‐FDMA with CR to protect CR networks from PUEA attacks, a Latin square (LS) matrix tag generation system is proposed to mitigate the PUEA effect. The technology is meant to provide effective authentication and protection against malicious users. In a secured environment, the LS tag technique is utilized to track and estimate the PU. For example, the BER of both techniques is virtually identical between 0 and 4 dB, while the BER performance of the suggested LS tag generation improves with increasing signal‐to‐noise ratio (SNR). As a result, the suggested LS tag generation is less susceptible to PUEA. To diminish the influence of PUEA in CR networks, an efficient enlightening approach for making the future Green Cognitive Radio Wireless networks structure is proposed. The simulation results also demonstrate the resilience of the proposed CR spectrum sensing techniques for energy‐efficient knowledge at varying degrees to reduce the adverse effects of environmental technologies.
Subject
General Engineering,General Computer Science
Reference108 articles.
1. Defence against selfish PUEA in cognitive radio networks based on hash message authentication code;Ghanem WR;Int J Electron Informat Eng,2016
2. A mitigation strategy against malicious Primary User Emulation Attack in Cognitive Radio networks
3. A survey of various defence techniques to detect primary user emulation attacks;Singh A;Int J Current Eng Technol,2014
4. Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard
5. Investigation of puea in cognitive radio networks using energy detection in different channel models;Ghanem WR;Circuits Syst Int J,2015
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献