To mitigate primary user emulation attack trajectory using cognitive single carrier frequency division multiple access approaches: Towards next generation green IoT

Abstract The growing cognizance of spectrum scarcity has become a more significant concern in wireless radio communications. Due to the exponential growth of data transmission in intelligent wireless sensor networks, energy spectrum detection has become a promising solution for resolving spectrum sh...

Full description

Bibliographic Details
Main Authors: Hirak Mazumdar, Ajeet Kaushik, Hardik A. Gohel
Format: Article
Language:English
Published: Wiley 2023-12-01
Series:Engineering Reports
Subjects:
Online Access:https://doi.org/10.1002/eng2.12672
_version_ 1797405607845691392
author Hirak Mazumdar
Ajeet Kaushik
Hardik A. Gohel
author_facet Hirak Mazumdar
Ajeet Kaushik
Hardik A. Gohel
author_sort Hirak Mazumdar
collection DOAJ
description Abstract The growing cognizance of spectrum scarcity has become a more significant concern in wireless radio communications. Due to the exponential growth of data transmission in intelligent wireless sensor networks, energy spectrum detection has become a promising solution for resolving spectrum shortages. Primary user emulation attack (PUEA) has been identified as a significant attack vector in the cognitive radio (CR) domain's physical layer. In comparison, the CR is a promising method to increase spectrum efficiency by allowing unlicensed secondary users (SUs) to access licensed frequency bands without interfering with approved primary users (PUs). The study's primary findings are the methodology for preventing PUEA using authentication tags, which are unique sequences. This research blends SC‐FDMA with CR to protect CR networks from PUEA attacks, a Latin square (LS) matrix tag generation system is proposed to mitigate the PUEA effect. The technology is meant to provide effective authentication and protection against malicious users. In a secured environment, the LS tag technique is utilized to track and estimate the PU. For example, the BER of both techniques is virtually identical between 0 and 4 dB, while the BER performance of the suggested LS tag generation improves with increasing signal‐to‐noise ratio (SNR). As a result, the suggested LS tag generation is less susceptible to PUEA. To diminish the influence of PUEA in CR networks, an efficient enlightening approach for making the future Green Cognitive Radio Wireless networks structure is proposed. The simulation results also demonstrate the resilience of the proposed CR spectrum sensing techniques for energy‐efficient knowledge at varying degrees to reduce the adverse effects of environmental technologies.
first_indexed 2024-03-09T03:12:28Z
format Article
id doaj.art-f8c28461286148baa3f3163370f4a75c
institution Directory Open Access Journal
issn 2577-8196
language English
last_indexed 2024-03-09T03:12:28Z
publishDate 2023-12-01
publisher Wiley
record_format Article
series Engineering Reports
spelling doaj.art-f8c28461286148baa3f3163370f4a75c2023-12-04T01:19:21ZengWileyEngineering Reports2577-81962023-12-01512n/an/a10.1002/eng2.12672To mitigate primary user emulation attack trajectory using cognitive single carrier frequency division multiple access approaches: Towards next generation green IoTHirak Mazumdar0Ajeet Kaushik1Hardik A. Gohel2School of Technology Woxsen University Hyderabad IndiaNanoBioTech Laboratory, Department of Environmental Engineering Florida Polytechnic University Lakeland Florida USADepartment of Computer Science University of Houston‐Victoria Texas USAAbstract The growing cognizance of spectrum scarcity has become a more significant concern in wireless radio communications. Due to the exponential growth of data transmission in intelligent wireless sensor networks, energy spectrum detection has become a promising solution for resolving spectrum shortages. Primary user emulation attack (PUEA) has been identified as a significant attack vector in the cognitive radio (CR) domain's physical layer. In comparison, the CR is a promising method to increase spectrum efficiency by allowing unlicensed secondary users (SUs) to access licensed frequency bands without interfering with approved primary users (PUs). The study's primary findings are the methodology for preventing PUEA using authentication tags, which are unique sequences. This research blends SC‐FDMA with CR to protect CR networks from PUEA attacks, a Latin square (LS) matrix tag generation system is proposed to mitigate the PUEA effect. The technology is meant to provide effective authentication and protection against malicious users. In a secured environment, the LS tag technique is utilized to track and estimate the PU. For example, the BER of both techniques is virtually identical between 0 and 4 dB, while the BER performance of the suggested LS tag generation improves with increasing signal‐to‐noise ratio (SNR). As a result, the suggested LS tag generation is less susceptible to PUEA. To diminish the influence of PUEA in CR networks, an efficient enlightening approach for making the future Green Cognitive Radio Wireless networks structure is proposed. The simulation results also demonstrate the resilience of the proposed CR spectrum sensing techniques for energy‐efficient knowledge at varying degrees to reduce the adverse effects of environmental technologies.https://doi.org/10.1002/eng2.12672CRenergy detection methodgreen IoTLatin Square tag generationnext generation systemsPU
spellingShingle Hirak Mazumdar
Ajeet Kaushik
Hardik A. Gohel
To mitigate primary user emulation attack trajectory using cognitive single carrier frequency division multiple access approaches: Towards next generation green IoT
Engineering Reports
CR
energy detection method
green IoT
Latin Square tag generation
next generation systems
PU
title To mitigate primary user emulation attack trajectory using cognitive single carrier frequency division multiple access approaches: Towards next generation green IoT
title_full To mitigate primary user emulation attack trajectory using cognitive single carrier frequency division multiple access approaches: Towards next generation green IoT
title_fullStr To mitigate primary user emulation attack trajectory using cognitive single carrier frequency division multiple access approaches: Towards next generation green IoT
title_full_unstemmed To mitigate primary user emulation attack trajectory using cognitive single carrier frequency division multiple access approaches: Towards next generation green IoT
title_short To mitigate primary user emulation attack trajectory using cognitive single carrier frequency division multiple access approaches: Towards next generation green IoT
title_sort to mitigate primary user emulation attack trajectory using cognitive single carrier frequency division multiple access approaches towards next generation green iot
topic CR
energy detection method
green IoT
Latin Square tag generation
next generation systems
PU
url https://doi.org/10.1002/eng2.12672
work_keys_str_mv AT hirakmazumdar tomitigateprimaryuseremulationattacktrajectoryusingcognitivesinglecarrierfrequencydivisionmultipleaccessapproachestowardsnextgenerationgreeniot
AT ajeetkaushik tomitigateprimaryuseremulationattacktrajectoryusingcognitivesinglecarrierfrequencydivisionmultipleaccessapproachestowardsnextgenerationgreeniot
AT hardikagohel tomitigateprimaryuseremulationattacktrajectoryusingcognitivesinglecarrierfrequencydivisionmultipleaccessapproachestowardsnextgenerationgreeniot