Efficient Resource Distribution in Cognitive Radio Network by Fuzzy-Based Cluster Against Attacks

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In 5G cognitive wireless network, the bandwidth is shared among the primary user (PU) and secondary user (SU) and face security risks from suspicious attacks. Secondary user (SU) networks are enhanced with a security mechanism to support primary users by proposing a mutual protocol for secondary wireless-driven users to collaborate with primary users. During a wireless transmission phase obtained by the secondary user, the cognitive hybrid access point communicates the power signal. Collected energy from primary user is used to communicate with malicious attacks and to acquire transmission capabilities during the wireless information transfer process. In addition, to obtaining optimum performance, a fuzzy-based clustered greedy algorithm is implemented to reduce the potential for interference in PU confidentiality. In the suggested strategy, the effect of injection and the reactive jamming attacks on the wireless transmission phase are analyzed. They can be detected via a convolution neural network to identify and distinguish various attacks. Finally, the simulation results for the proposed protocol and the corresponding resource sharing algorithm not only allow SU to gain transmission opportunities but also boost PU security efficiency in unknown attacks. The results are compared to the existing methods.

Cite

CITATION STYLE

APA

Sasipriya, S., Bhuvaneswari, M., Kumar, P. M. V., & Karthikeyan, C. (2022). Efficient Resource Distribution in Cognitive Radio Network by Fuzzy-Based Cluster Against Attacks. In Smart Innovation, Systems and Technologies (Vol. 251, pp. 9–18). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-16-3945-6_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free