Research Article

Secured Wireless Network Based on a Novel Dual Integrated Neural Network Architecture

Table 1

Detection approach.

Step 1The base_station here chooses an appropriate subset of Z radio signals through one or more radio frames that are active at the same time. The base_station, respectively, consists of the number of Z training symbols selected from a set. The maximum pairs for training symbols are

Step 2Here, each pair necessary for the training signals, the training signal for the radio frame in frame and training symbol in radio frame , i.e., and , the base_station here is responsible for performing the following steps:
(1) Evaluation of the scalar metric
(2) Evaluate by considering each , the is the distance from the scalar-valued to receive signal to the Zth scale N-phase shift keying
(3) The minimum distance that is defined is given by
(4) If , the base_station here trains the symbols that are not being contaminated, else it states that the signals are contaminated, and there an attacker exists

Step 3The major consideration for the detection of results for pairings, the base_station evaluates the presence of jamming signals

Step 4The base_station decides whether the attacker is present on the entire range of the frames which are widely focused on the attacker detection system parallel with the formed pairs