Abstract

Construct a cognitive wireless powered communication network (CWPCN) in order to connect with the primary network that is susceptible to eavesdropper (EAVs) protection assaults. A novel cooperative protocol that facilitates collaboration between main users (PU) and secondary users (SU) is proposed here. The SU first extracts energy from the cognitive hybrid access point power signal during the wireless control (WCP) phase, and then uses the captured energy to interfere with EAVs while simultaneously acquiring transmission possibilities during the wireless knowledge transfer phase (within wireless transfers). In accordance with the PU secrecy restriction, the maximization of the SU ergodic rates, resource allotments based on the dual technique of optimisation, and the Block Synchronization technique of Downward Perfect Channel State Information (BSDPCSI). More PU beneficial greedy algorithms to reduce the chance of PU confidentiality are also suggested. Injecting pilot signals and Denial of Service (DoS), Eavesdropping, and Phishing Attacks as jamming to an aggressive intruder will behave in a man-in-the-middle manner. First of all, the channel state information can be identified, and the type of attack can be classified by using the intruder detecting neural net classifier.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.