In a wireless communication industry Cognitive Radio Network is the most important concern to deal with long range communications in efficient manner with futuristic remote sensing and channel allocation policies. This kind of communication principles need to tackle the attacks in wide manner. Generally, the attacks come from the intruder end with several variations but the most common attacks are network sniffing, route trapping and so on, but in the case of Cognitive Radio Network the major threat is called Primary User Impersonation (PUI). This kind of PUI attacks acts like a regular Primary User (PU) and raise a signals accordingly to make confuse the Secondary Users to come out from the communication line as well as the entire communication spectrum utilized by the Secondary User gets affected. Due to these kinds of affections the legitimate Secondary Users suffer and left from the respective channels utilized for communication. This type of attacks highly creates an impact over the Cognitive Radio Network and causes the failure over spectrum accessing. The flexible accessibility by some voluntary users maintains a constant selection of actions to determine their appropriate target, so they can differentiate between accomplishing their objectives and being compliant with their goals. The critical role is protected against obstruction and moreover mandated by vitality criteria. At the aim to develop energy saving and power gathering cooperative spectrum, factors that are central to the success of the project must be suggested in the literature as two major protocols, such as: Time Sharing (TS) and Energy Sharing (ES). An energy utilization constraint restriction is imposed on the power cells (battery) to make sure they do not charge and discharge at around the parallel period Primary User Impersonation detection in an efficient manner, in which it uses recent advancements in cooperative spectrum sensing to devise an algorithm called Energetic Cognitive Radio Network Game Planner (ECRNGP). A Game Theory logic provides an intelligent attack identification abilities to the proposed approach to identify the threat signals immediately and notify that to the respective transmitter unit to make appropriate preventive measures for that as well as this proposed approach efficiently identifies the Primary User Impersonation and provides a sufficient protection to the CRN environment as well as Secondary Users to make a perfect communication between entities without any attack oriented constraints.