To mitigate primary user emulation attack trajectory using cognitive single carrier frequency division multiple access approaches: Towards next generation green IoT

Hirak Mazumdar,Ajeet Kaushik,Hardik A. Gohel
DOI: https://doi.org/10.1002/eng2.12672
2023-05-10
Engineering Reports
Abstract:This article has been presented with imperative and up‐to‐date information about authenticating end‐to‐end data transmission among secondary users' needs a large amount of power, leading to harmful interference to primary users. To overcome such massive energy consumption, significant bandwidth efficiency is always a key concern; thus, in this research, the prosperous state of the art of Green IoTs is focused on. Taking concentration on the facile and cost‐effective strategy of the Green wireless network and their advanced use in Green IoT framework of various next‐generation green communication with an efficient computational algorithm with active concern and awareness are proposed. Moreover, because of their tuneability, stability, and tailored features, methods, and applications, along with their hybrids/composites in the field of CRN for their broad‐spectrum practical applications, leads towards new research direction to enterprise an experimental testbed to provision green networks. The growing cognizance of spectrum scarcity has become a more significant concern in wireless radio communications. Due to the exponential growth of data transmission in intelligent wireless sensor networks, energy spectrum detection has become a promising solution for resolving spectrum shortages. Primary user emulation attack (PUEA) has been identified as a significant attack vector in the cognitive radio (CR) domain's physical layer. In comparison, the CR is a promising method to increase spectrum efficiency by allowing unlicensed secondary users (SUs) to access licensed frequency bands without interfering with approved primary users (PUs). The study's primary findings are the methodology for preventing PUEA using authentication tags, which are unique sequences. This research blends SC‐FDMA with CR to protect CR networks from PUEA attacks, a Latin square (LS) matrix tag generation system is proposed to mitigate the PUEA effect. The technology is meant to provide effective authentication and protection against malicious users. In a secured environment, the LS tag technique is utilized to track and estimate the PU. For example, the BER of both techniques is virtually identical between 0 and 4 dB, while the BER performance of the suggested LS tag generation improves with increasing signal‐to‐noise ratio (SNR). As a result, the suggested LS tag generation is less susceptible to PUEA. To diminish the influence of PUEA in CR networks, an efficient enlightening approach for making the future Green Cognitive Radio Wireless networks structure is proposed. The simulation results also demonstrate the resilience of the proposed CR spectrum sensing techniques for energy‐efficient knowledge at varying degrees to reduce the adverse effects of environmental technologies.
What problem does this paper attempt to address?