Efficient Data Sensing Algorithm with Generalized Cascaded Chaotic Maps for Secure Cognitive Radio in 5G Networks

Sparse code multiple access (SCMA) has emerged as a significant technology to satisfy the essential criteria for 5G wireless networks, including high data rates, widespread connection, reliability, and greater spectrum efficiency. Under the restriction of scarce and limited spectrum utilization in 5...

Full description

Saved in:
Bibliographic Details
Published inSN computer science Vol. 5; no. 4; p. 384
Main Authors Shekhawat, Guman Kanwar, Yadav, R. P.
Format Journal Article
LanguageEnglish
Published Singapore Springer Nature Singapore 01.04.2024
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN2661-8907
2662-995X
2661-8907
DOI10.1007/s42979-024-02699-3

Cover

More Information
Summary:Sparse code multiple access (SCMA) has emerged as a significant technology to satisfy the essential criteria for 5G wireless networks, including high data rates, widespread connection, reliability, and greater spectrum efficiency. Under the restriction of scarce and limited spectrum utilization in 5G networks, the integrated cognitive radio (CR) with SCMA is a promising solution to handle these crucial needs. A reliable and secure connection network should be built in addition to this integrated network to deal with densely deployed networks. A secure transmission sensing approach for CR-SCMA systems employing chaos theory has been presented in the paper. Different chaotic maps, including the logistic map, tent map, Chebyshev map, sine map, and the generalized cascaded chaotic map (CCS), have been employed for sensing with secure communication. Bit error rate (BER) and probability of detection with effective simulation are two of the metrics used for performance evaluation. Instead of using random sequences, the chaos-based signal transmission provides a viable solution for 5G generation networks with a secure wireless communication link. Using chaotic map signals, which are extremely sensitive to their initial conditions and have non-periodic properties, the eavesdropper or the unauthorized user cannot simply grab the encrypted and secured vital data.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2661-8907
2662-995X
2661-8907
DOI:10.1007/s42979-024-02699-3