{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T19:41:29Z","timestamp":1772221289153,"version":"3.50.1"},"reference-count":54,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T00:00:00Z","timestamp":1669075200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>The Internet of Vehicles (IoV) is witnessed to play the leading role in the future of Intelligent Transportation Systems (ITS). Though many works have focused on IoV improvement, there is still a lack of performance due to insufficient spectrum availability, lower data rates, and the involvement of attackers. This paper considers all three issues by developing a novel mmWave-assisted Cognitive Radio based IoV (CR-IoV) model. The integration of CR in IoV resolves the issue of spectrum management, while mmWave technology ensures symmetry in acquiring higher data rates for Secondary Users (SUs). With the proposed mmWave-assisted CR-IoV model, symmetric improvements in network performance were achieved in three main areas: security, beamforming, and routing. Optimum detection mechanisms isolate malicious Secondary Users (SUs) in the overall network. First, Spectrum Sensing Data Falsification (SSDF) attack is detected by a Hybrid Kernel-based Support Vector Machine (HK-SVM), which is the lightweight Machine Learning (ML) technique. Then, the Primary User Emulation (PUE) attack is detected by a hybrid approach, namely the Fang Algorithm-based Time Difference of Arrival (FA-TDoA) method. Further, security is assured by validating the legitimacy of each SU through a Lightweight ID-based Certificate Validation mechanism. To accomplish this, we employed the Four Q-curve asymmetric cryptographic algorithm. Overall, the proposed dual-step security provisioning approach assures that the network is free from attackers. Next, beamforming is performed for legitimate SUs by a 3D-Beamforming algorithm that relies on Array Factor (AF) and Beampattern Function. Finally, routing is enabled by formulating Forwarding Zone (FZ) based on the forwarding angle. In the forwarding zone, optimal forwarders are selected by the Multi-Objective Whale Optimization (MOWO) algorithm. Here, a new potential score is formulated for fitness evaluation. Finally, the proposed mmWave-assisted CR-IoV model is validated through extensive simulations in the ns-3.26 simulation tool. The evaluation shows better performance in terms of throughput, packet delivery ratio, delay, bit error rate, and detection accuracy.<\/jats:p>","DOI":"10.3390\/sym14122472","type":"journal-article","created":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T08:27:29Z","timestamp":1669105649000},"page":"2472","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Defense against SSDF Attack and PUE Attack in CR-Internet of Vehicles (IoVs) for Millimeter Wave Massive MIMO Beamforming Systems"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5212-605X","authenticated-orcid":false,"given":"Deepanramkumar","family":"Pari","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Vellore Institute of Technology, Vellore 632014, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8845-1302","authenticated-orcid":false,"given":"Jaisankar","family":"Natarajan","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Vellore Institute of Technology, Vellore 632014, India"}]}],"member":"1968","published-online":{"date-parts":[[2022,11,22]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/JIOT.2018.2872437","article-title":"5-GHz obstructed vehicle-to-vehicle channel characterization for internet of intelligent vehicles","volume":"6","author":"Guan","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"148163","DOI":"10.1109\/ACCESS.2019.2946468","article-title":"DeepCrash: A deep learning-based Internet of vehicles system for head-on and single-vehicle accident detection with emergency notification","volume":"7","author":"Chang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1109\/JIOT.2018.2841969","article-title":"Ethical implications of social internet of vehicles systems","volume":"6","author":"Silva","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"109026","DOI":"10.1109\/ACCESS.2019.2933873","article-title":"Ips: Incentive and punishment scheme for omitting selfishness in the internet of vehicles (iov)","volume":"7","author":"Rehman","year":"2019","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1106","DOI":"10.1109\/TVT.2019.2951606","article-title":"Cognitive radio network assisted by OFDM with index modulation","volume":"69","author":"Li","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"57488","DOI":"10.1109\/ACCESS.2019.2914185","article-title":"Resource allocation in heterogeneous cognitive radio network with non-orthogonal multiple access","volume":"7","author":"Xu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"160889","DOI":"10.1109\/ACCESS.2019.2945610","article-title":"A secured and efficient communication scheme for decentralized cognitive radio-based Internet of vehicles","volume":"7","author":"Yao","year":"2019","journal-title":"IEEE Access"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Eze, J., Zhang, S., Liu, E., and Eze, E. (2020). Design optimization of resource allocation in ofdma-based cognitive radio-enabled internet of vehicles (iovs). Sensors, 20.","DOI":"10.3390\/s20216402"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MWC.2018.1800216","article-title":"Multiple access mmwave design for UAV-aided 5G communications","volume":"26","author":"Wang","year":"2019","journal-title":"IEEE Wirel. Commun."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1109\/LAWP.2019.2906775","article-title":"Quasi-Yagi antenna array with modified folded dipole driver for mmWave 5G cellular devices","volume":"18","author":"Hwang","year":"2019","journal-title":"IEEE Antennas Wirel. Propag. Lett."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1109\/LWC.2019.2910530","article-title":"Secure mmWave communications in cognitive radio networks","volume":"8","author":"Zhao","year":"2019","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Gope, J., Dutta, P., Bhadra, S., Das, S., Jana, S., Dalmia, N., and Choudhury, S. (2017, January 19\u201321). Analytical study of primary user emulation attack detection techniques in cognitive radio Adhoc network. Proceedings of the 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), New York, NY, USA.","DOI":"10.1109\/UEMCON.2017.8249092"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1016\/j.comcom.2019.03.007","article-title":"A low complexity cluster based data fusion to defense against SSDF attack in cognitive radio networks","volume":"138","author":"Ghaznavi","year":"2019","journal-title":"Comput. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1823","DOI":"10.1007\/s11277-020-07294-2","article-title":"Secure Distance Based Improved Leach Routing to Prevent Puea in Cognitive Radio Network","volume":"113","author":"Vivekanand","year":"2020","journal-title":"Wirel. Pers. Commun."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"9047809","DOI":"10.1155\/2020\/9047809","article-title":"An SETM Algorithm for Combating SSDF Attack in Cognitive Radio Networks","volume":"2020","author":"Tephillah","year":"2020","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2261","DOI":"10.1007\/s11277-019-06521-9","article-title":"Countermeasure with primary user emulation attack in cognitive radio networks","volume":"108","author":"Yazdi","year":"2019","journal-title":"Wirel. Pers. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Marvasti, Z.S.S., and Abedi, O. (2019). Detection of Malicious Node in Centralized Cognitive Radio Networks Based on MLP Neural Network. Fundamental Research in Electrical Engineering, Springer.","DOI":"10.1007\/978-981-10-8672-4_67"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Park, J.H. (2020). Symmetry-adapted machine learning for information security. Symmetry, 12.","DOI":"10.3390\/sym12061044"},{"key":"ref_19","first-page":"1183","article-title":"Opportunistic transmission using hybrid sensing for Cognitive Radio Sensor Network in the presence of smart Primary User Emulation Attack","volume":"108","author":"Bhagyaveni","year":"2020","journal-title":"Int. J. Electron."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"106849","DOI":"10.1016\/j.compeleceng.2020.106849","article-title":"Primary user emulation attack mitigation using neural network","volume":"88","author":"Ponnusamy","year":"2020","journal-title":"Comput. Electr. Eng."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1109\/MNET.001.1900271","article-title":"VANET-Assisted Interference Mitigation for Millimeter-Wave Automotive Radar Sensors","volume":"34","author":"Zhang","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Mohamed, E.M., Hashima, S., Aldosary, A., Hatano, K., and Abdelghany, M.A. (2020). Gateway Selection in Millimeter Wave UAV Wireless Networks Using Multi-Player Multi-Armed Bandit. Sensors, 20.","DOI":"10.3390\/s20143947"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Zhu, Z., Deng, H., Xu, F., Zhang, W., Liu, G., and Zhang, Y. (2022). Hybrid Precoding-Based Millimeter Wave Massive MIMO-NOMA Systems. Symmetry, 14.","DOI":"10.3390\/sym14020412"},{"key":"ref_24","first-page":"100303","article-title":"Intelligent super-fast Vehicle-to-Everything 5G communications with predictive switching between mmWave and THz links","volume":"27","author":"Rasheed","year":"2021","journal-title":"Veh. Commun."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"77535","DOI":"10.1109\/ACCESS.2020.2989790","article-title":"Routing protocols for unmanned aerial Vehicle-Aided vehicular Ad Hoc networks: A survey","volume":"8","author":"Nazib","year":"2020","journal-title":"IEEE Access"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.1007\/s10462-020-09868-9","article-title":"Bio-inspired VANET routing optimization: An overview","volume":"54","author":"Azzoug","year":"2021","journal-title":"Artif. Intell. Rev."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"3967","DOI":"10.1109\/TVT.2019.2899627","article-title":"Delay-minimization routing for heterogeneous VANETs with machine learning based mobility prediction","volume":"68","author":"Tang","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1109\/TCCN.2018.2845382","article-title":"Detecting byzantine attack in cognitive radio networks by exploiting frequency and ordering properties","volume":"4","author":"Marchang","year":"2018","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"3261058","DOI":"10.1155\/2017\/3261058","article-title":"A collaborative approach for monitoring nodes behavior during spectrum sensing to mitigate multiple attacks in cognitive radio networks","volume":"2017","author":"Khasawneh","year":"2017","journal-title":"Secur. Commun. Netw."},{"key":"ref_30","first-page":"385","article-title":"AADS: Developing agent-assisted defence system against harmful attacks in cognitive radio network","volume":"22","author":"Saini","year":"2019","journal-title":"Int. J. Commun. Netw. Distrib. Syst."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Sultana, R., and Hussain, M. (2018). Mitigating primary user emulation attack in cognitive radio network using localization and variance detection. Proceedings of the First International Conference on Smart System, Innovations and Computing, Springer.","DOI":"10.1007\/978-981-10-5828-8_41"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s11276-016-1321-0","article-title":"Cooperative spectrum sensing in the presence of primary user emulation attack in cognitive radio network: Multi-level hypotheses test approach","volume":"24","author":"Sharifi","year":"2018","journal-title":"Wirel. Netw."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"3767","DOI":"10.1109\/JSYST.2017.2747594","article-title":"Efficient transmission strategy for cognitive radio systems under primary user emulation attack","volume":"12","author":"Karimi","year":"2017","journal-title":"IEEE Syst. J."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/s40998-018-0073-5","article-title":"Trust establishment in chaotic cognitive environment to improve attack detection accuracy under primary user emulation","volume":"42","author":"Madbushi","year":"2018","journal-title":"Iran. J. Sci. Technol. Trans. Electr. Eng."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1822","DOI":"10.1109\/TWC.2017.2785788","article-title":"Position and orientation estimation through millimeter-wave MIMO in 5G systems","volume":"17","author":"Shahmansoori","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1007\/s11265-017-1272-4","article-title":"A 16\u00d7 8 Hybrid Beamforming and Precoding Processor for 2D Planar Antenna Array in mmWave MIMO Systems","volume":"90","author":"Hsu","year":"2018","journal-title":"J. Signal Process. Syst."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"6956313","DOI":"10.1155\/2018\/6956313","article-title":"AN-aided transmit beamforming design for secured cognitive radio networks with SWIPT","volume":"2018","author":"Ge","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Djigan, V. (2021, January 13\u201315). Real-Valued Arithmetic Linearly-Constrained Beamforming in Symmetric Adaptive Arrays. Proceedings of the 2021 International Siberian Conference on Control and Communications (SIBCON), Kazan, Russia.","DOI":"10.1109\/SIBCON50419.2021.9438854"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/s10776-017-0364-1","article-title":"Performance evaluation of NL-BMD precoding over analog-digital hybrid beamforming for high SHF wide-band massive MIMO in 5G","volume":"24","author":"Nishimoto","year":"2017","journal-title":"Int. J. Wirel. Inf. Netw."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Shehata, M., H\u00e9lard, M., Crussi\u00e8re, M., Roz\u00e8, A., and Langlais, C. (2018, January 3\u20136). Angular based beamforming and power allocation framework in a multi-user millimeter-wave massive MIMO system. Proceedings of the 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal.","DOI":"10.1109\/VTCSpring.2018.8417520"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13638-018-1219-x","article-title":"Multiuser 3D massive MIMO transmission in full-duplex cellular system","volume":"2018","author":"Zhang","year":"2018","journal-title":"Eurasip J. Wirel. Commun. Netw."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1711","DOI":"10.1007\/s11276-017-1624-9","article-title":"Infrastructure-aided hybrid routing in CR-VANETs using a Bayesian Model","volume":"25","author":"Ghafoor","year":"2019","journal-title":"Wirel. Netw."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1109\/JSYST.2018.2806996","article-title":"Traffic-aware VANET routing for city environments\u2014A protocol based on ant colony optimization","volume":"13","author":"Goudarzi","year":"2018","journal-title":"IEEE Syst. J."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Shen, J., Wang, C., Castiglione, A., Liu, D., and Esposito, C. (2017). Trustworthiness evaluation-based routing protocol for incompletely predictable vehicular ad hoc networks. IEEE Trans. Big Data.","DOI":"10.1007\/978-3-319-49145-5_21"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1906","DOI":"10.1109\/LCOMM.2018.2855195","article-title":"A realistic spatial-distribution-based connectivity-aware routing protocol in multilevel scenarios of urban VANETs","volume":"22","author":"Zhang","year":"2018","journal-title":"IEEE Commun. Lett."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"8846948","DOI":"10.1155\/2020\/8846948","article-title":"Support vector machine-based classification of malicious users in cognitive radio networks","volume":"2020","author":"Khan","year":"2020","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"5939","DOI":"10.1007\/s11276-020-02398-w","article-title":"Detecting Byzantine attack in cognitive radio networks using machine learning","volume":"26","author":"Sarmah","year":"2020","journal-title":"Wirel. Netw."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"19530","DOI":"10.1109\/ACCESS.2020.2968456","article-title":"GMD-based hybrid beamforming for large reconfigurable intelligent surface assisted millimeter-wave massive MIMO","volume":"8","author":"Ying","year":"2020","journal-title":"IEEE Access"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1007\/s11277-019-06189-1","article-title":"An enhanced MPR OLSR protocol for efficient node selection process in cognitive radio based VANET","volume":"106","author":"Usha","year":"2019","journal-title":"Wirel. Pers. Commun."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"102150","DOI":"10.1016\/j.adhoc.2020.102150","article-title":"Novel path similarity aware clustering and safety message dissemination via mobile gateway selection in cellular 5G-based V2X and D2D communication for urban environment","volume":"103","author":"Alghamdi","year":"2020","journal-title":"Ad Hoc Netw."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"1999","DOI":"10.1007\/s11277-019-06969-9","article-title":"A novel SVM based IDS for distributed denial of sleep strike in wireless sensor networks","volume":"111","author":"Mohd","year":"2020","journal-title":"Wirel. Pers. Commun."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Wu, P., Su, S., Zuo, Z., Guo, X., Sun, B., and Wen, X. (2019). Time difference of arrival (TDoA) localization combining weighted least squares and firefly algorithm. Sensors, 19.","DOI":"10.3390\/s19112554"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Liu, Z., Longa, P., Pereira, G.C., Reparaz, O., and Seo, H. (2017, January 25\u201328). FourQ on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks. Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems, Taipei, Taiwan.","DOI":"10.1007\/978-3-319-66787-4_32"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"16245","DOI":"10.1007\/s00521-020-04849-z","article-title":"Whale optimization algorithm: A systematic review of contemporary applications, modifications and developments","volume":"32","author":"Rana","year":"2020","journal-title":"Neural Comput. Appl."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/12\/2472\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:23:20Z","timestamp":1760145800000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/12\/2472"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,22]]},"references-count":54,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["sym14122472"],"URL":"https:\/\/doi.org\/10.3390\/sym14122472","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,22]]}}}