Efficient Data Sensing Algorithm with Generalized Cascaded Chaotic Maps for Secure Cognitive Radio in 5G Networks

Sparse code multiple access (SCMA) has emerged as a significant technology to satisfy the essential criteria for 5G wireless networks, including high data rates, widespread connection, reliability, and greater spectrum efficiency. Under the restriction of scarce and limited spectrum utilization in 5...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:SN computer science Ročník 5; číslo 4; s. 384
Hlavní autoři: Shekhawat, Guman Kanwar, Yadav, R. P.
Médium: Journal Article
Jazyk:angličtina
Vydáno: Singapore Springer Nature Singapore 01.04.2024
Springer Nature B.V
Témata:
ISSN:2661-8907, 2662-995X, 2661-8907
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:Sparse code multiple access (SCMA) has emerged as a significant technology to satisfy the essential criteria for 5G wireless networks, including high data rates, widespread connection, reliability, and greater spectrum efficiency. Under the restriction of scarce and limited spectrum utilization in 5G networks, the integrated cognitive radio (CR) with SCMA is a promising solution to handle these crucial needs. A reliable and secure connection network should be built in addition to this integrated network to deal with densely deployed networks. A secure transmission sensing approach for CR-SCMA systems employing chaos theory has been presented in the paper. Different chaotic maps, including the logistic map, tent map, Chebyshev map, sine map, and the generalized cascaded chaotic map (CCS), have been employed for sensing with secure communication. Bit error rate (BER) and probability of detection with effective simulation are two of the metrics used for performance evaluation. Instead of using random sequences, the chaos-based signal transmission provides a viable solution for 5G generation networks with a secure wireless communication link. Using chaotic map signals, which are extremely sensitive to their initial conditions and have non-periodic properties, the eavesdropper or the unauthorized user cannot simply grab the encrypted and secured vital data.
Bibliografie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2661-8907
2662-995X
2661-8907
DOI:10.1007/s42979-024-02699-3