The Community for Technology Leaders
RSS Icon
Issue No.03 - March (2012 vol.23)
pp: 547-555
Hongbo Liu , Stevens Institute of Technology, Hoboken
Wenyuan Xu , Unversity of South Carolina, Columbia
Zhenhua Liu , Unversity of South Carolina, Columbia
Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wide range of defense strategies. In this paper, we focus on developing mechanisms to localize a jammer by exploiting neighbor changes. We first conduct jamming effect analysis to examine how the communication range alters with the jammer's location and transmission power using free-space model. Then, we show that a node's affected communication range can be estimated purely by examining its neighbor changes caused by jamming attacks and thus, we can perform the jammer location estimation by solving a least-squares (LSQ) problem that exploits the changes of communication range. Compared with our previous iterative-search-based virtual force algorithm, our LSQ-based algorithm exhibits lower computational cost (i.e., one step instead of iterative searches) and higher localization accuracy. Furthermore, we analyze the localization challenges in real systems by building the log-normal shadowing model empirically and devising an adaptive LSQ-based algorithm to address those challenges. The extensive evaluation shows that the adaptive LSQ-based algorithm can effectively estimate the location of the jammer even in a highly complex propagation environment.
Jamming, radio interference, least squares, localization.
Hongbo Liu, Wenyuan Xu, Zhenhua Liu, "Exploiting Jamming-Caused Neighbor Changes for Jammer Localization", IEEE Transactions on Parallel & Distributed Systems, vol.23, no. 3, pp. 547-555, March 2012, doi:10.1109/TPDS.2011.154
[1] J.G. Proakis, Digital Communications, fourth ed. McGraw-Hill, 2000.
[2] G. Noubir and G. Lin, "Low-Power DoS Attacks in Data Wireless Lans and Countermeasures," ACM SIGMOBILE Mobile Computing and Comm. Rev., vol. 7, no. 3, pp. 29-30, 2003.
[3] W. Xu, W. Trappe, and Y. Zhang, "Channel Surfing: Defending Wireless Sensor Networks from Interference," IPSN '07: Proc. Sixth Int'l Conf. Information Processing in Sensor Networks, pp. 499-508, 2007.
[4] K. Ma, Y. Zhang, and W. Trappe, "Mobile Network Management and Robust Spatial Retreats via Network Dynamics," Proc. First Int'l Workshop Resource Provisioning and Management in Sensor Networks (RPMSN '05), 2005.
[5] M. Cagalj, S. Capkun, and J. Hubaux, "Wormhole-Based Anti-Jamming Techniques in Sensor Networks," IEEE Trans. Mobile Computing, vol. 6, no. 1, pp. 100-114, Jan. 2007.
[6] R. Want, A. Hopper, V. Falcao, and J. Gibbons, "The Active Badge Location System," ACM Trans. Information Systems, vol. 10, no. 1, pp. 91-102, Jan. 1992.
[7] P. Bahl and V.N. Padmanabhan, "RADAR: An In-Building RF-Based User Location and Tracking System," Proc. IEEE INFOCOM, pp. 775-784, Mar. 2000.
[8] Y. Chen, J. Francisco, W. Trappe, and R.P. Martin, "A Practical Approach to Landmark Deployment for Indoor Localization," Proc. Third Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON), Sept. 2006.
[9] N. Priyantha, A. Chakraborty, and H. Balakrishnan, "The Cricket Location-Support System," Proc. ACM MobiCom, pp. 32-43, Aug. 2000.
[10] H. Liu, W. Xu, Y. Chen, and Z. Liu, "Localizing Jammers in Wireless Networks," Proc. IEEE PerCom Int'l Workshop Pervasive Wireless Networking (IEEE PWN), 2009.
[11] K. Pelechrinis, I. Koutsopoulos, I. Broustis, and S.V. Krishnamurthy, "Lightweight Jammer Localization in Wireless Networks: System Design and Implementation," Proc. IEEE Conf. Global Telecomm. (GLOBECOM), Dec. 2009.
[12] J. Polastre, J. Hill, and D. Culler, "Versatile Low Power Media Access for Wireless Sensor Networks," SenSys '04: Proc. Second Int'l Conf. Embedded Networked Sensor Systems, pp. 95-107, 2004.
[13] A. Wood, J. Stankovic, and S. Son, "JAM: A Jammed-Area Mapping Service for Sensor Networks," Proc. 24th IEEE Real-Time Systems Symp., pp. 286-297, 2003.
[14] W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," MobiHoc '05: Proc. Sixth ACM Int'l Symp. Mobile Ad Hoc Networking and Computing, pp. 46-57, 2005.
[15] Crossbow Technology, http:/, 2011.
[16] A. Goldsmith, Wireless Communications., Cambridge Univ. Press, 2005.
21 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool