Revelation and Defense against Overlapping Secondary User Attack using H Infinity Filter in the Cognitive Radio Network

  • G. V. Pradeep Kumar, D. Krishna Reddy

Abstract

In the current past, the development of new wireless techniques has incited the change of innovative systems in wireless correspondences, which has made the scope of dearth. This impediment is vulnerable as wireless correspondence, which mostly relies upon scope of usage. Cognitive Radio (CR) is proposed as a capable counter for feasible and profitable use of the unutilized spectrum in an appropriate approach by refining the spectrum usage range through opportunisticspectrum range sharing.

In the CR approach,the secondary user attack is discardedand,the spectral properties in energy distributioncan be accessed. Amalicioussecondary user creates a jamming signal andgoes as aprimary user. The secondaryuser attack in the perspective of the wavelet thresholding plan is analyzed. The jamming signal produced by the secondary user is removed by using a filter.

The proposed approach begins withenergy recognition to locate the present users on the frequency band. The approach uses a jammer signal as asecondaryuser attacked signal, which is then energized into Kalmanfilter and Hinfinity filters for de-noising approach. As conflicting to current techniques for perceiving primary useremulating attacks in CR, our proposed method does not require a special hardware or time synchronization calculations in the wireless system. It works in the perspective of the wavelet thresholding approach. Wavelet thresholding approach uses effective utilization of beneficiary beyond any doubt thresholding plan, less computational multifaceted design for pernicious disclosure. The proposed approach relies upon the H-infinityfilter to removethe jammer attack. Results show that the H-infinity filter yields better results thanthe Kalmanfilter. Results also show that thisapproach is less complicated whencompared with othertechniques.

Published
2021-08-12
How to Cite
G. V. Pradeep Kumar, D. Krishna Reddy. (2021). Revelation and Defense against Overlapping Secondary User Attack using H Infinity Filter in the Cognitive Radio Network. Design Engineering, 8099 - 8114. Retrieved from http://www.thedesignengineering.com/index.php/DE/article/view/3342
Section
Articles