Secured Wireless Network Based on a Novel Dual Integrated Neural Network Architecture
Table 1
Detection approach.
Step 1
The base_station here chooses an appropriate subset of Z radio signals through one or more radio frames that are active at the same time. The base_station, respectively, consists of the number of Z training symbols selected from a set. The maximum pairs for training symbols are
Step 2
Here, each pair necessary for the training signals, the training signal for the radio frame in frame and training symbol in radio frame , i.e., and , the base_station here is responsible for performing the following steps:
(1) Evaluation of the scalar metric
(2) Evaluate by considering each , the is the distance from the scalar-valued to receive signal to the Zth scale N-phase shift keying
(3) The minimum distance that is defined is given by
(4) If , the base_station here trains the symbols that are not being contaminated, else it states that the signals are contaminated, and there an attacker exists
Step 3
The major consideration for the detection of results for pairings, the base_station evaluates the presence of jamming signals
Step 4
The base_station decides whether the attacker is present on the entire range of the frames which are widely focused on the attacker detection system parallel with the formed pairs