This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Exploiting Jamming-Caused Neighbor Changes for Jammer Localization
March 2012 (vol. 23 no. 3)
pp. 547-555
Zhenhua Liu, Unversity of South Carolina, Columbia
Hongbo Liu, Stevens Institute of Technology, Hoboken
Wenyuan Xu, Unversity of South Carolina, Columbia
Yingying Chen, Stevens Institute of Technology, Hoboken
Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wide range of defense strategies. In this paper, we focus on developing mechanisms to localize a jammer by exploiting neighbor changes. We first conduct jamming effect analysis to examine how the communication range alters with the jammer's location and transmission power using free-space model. Then, we show that a node's affected communication range can be estimated purely by examining its neighbor changes caused by jamming attacks and thus, we can perform the jammer location estimation by solving a least-squares (LSQ) problem that exploits the changes of communication range. Compared with our previous iterative-search-based virtual force algorithm, our LSQ-based algorithm exhibits lower computational cost (i.e., one step instead of iterative searches) and higher localization accuracy. Furthermore, we analyze the localization challenges in real systems by building the log-normal shadowing model empirically and devising an adaptive LSQ-based algorithm to address those challenges. The extensive evaluation shows that the adaptive LSQ-based algorithm can effectively estimate the location of the jammer even in a highly complex propagation environment.

[1] J.G. Proakis, Digital Communications, fourth ed. McGraw-Hill, 2000.
[2] G. Noubir and G. Lin, "Low-Power DoS Attacks in Data Wireless Lans and Countermeasures," ACM SIGMOBILE Mobile Computing and Comm. Rev., vol. 7, no. 3, pp. 29-30, 2003.
[3] W. Xu, W. Trappe, and Y. Zhang, "Channel Surfing: Defending Wireless Sensor Networks from Interference," IPSN '07: Proc. Sixth Int'l Conf. Information Processing in Sensor Networks, pp. 499-508, 2007.
[4] K. Ma, Y. Zhang, and W. Trappe, "Mobile Network Management and Robust Spatial Retreats via Network Dynamics," Proc. First Int'l Workshop Resource Provisioning and Management in Sensor Networks (RPMSN '05), 2005.
[5] M. Cagalj, S. Capkun, and J. Hubaux, "Wormhole-Based Anti-Jamming Techniques in Sensor Networks," IEEE Trans. Mobile Computing, vol. 6, no. 1, pp. 100-114, Jan. 2007.
[6] R. Want, A. Hopper, V. Falcao, and J. Gibbons, "The Active Badge Location System," ACM Trans. Information Systems, vol. 10, no. 1, pp. 91-102, Jan. 1992.
[7] P. Bahl and V.N. Padmanabhan, "RADAR: An In-Building RF-Based User Location and Tracking System," Proc. IEEE INFOCOM, pp. 775-784, Mar. 2000.
[8] Y. Chen, J. Francisco, W. Trappe, and R.P. Martin, "A Practical Approach to Landmark Deployment for Indoor Localization," Proc. Third Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON), Sept. 2006.
[9] N. Priyantha, A. Chakraborty, and H. Balakrishnan, "The Cricket Location-Support System," Proc. ACM MobiCom, pp. 32-43, Aug. 2000.
[10] H. Liu, W. Xu, Y. Chen, and Z. Liu, "Localizing Jammers in Wireless Networks," Proc. IEEE PerCom Int'l Workshop Pervasive Wireless Networking (IEEE PWN), 2009.
[11] K. Pelechrinis, I. Koutsopoulos, I. Broustis, and S.V. Krishnamurthy, "Lightweight Jammer Localization in Wireless Networks: System Design and Implementation," Proc. IEEE Conf. Global Telecomm. (GLOBECOM), Dec. 2009.
[12] J. Polastre, J. Hill, and D. Culler, "Versatile Low Power Media Access for Wireless Sensor Networks," SenSys '04: Proc. Second Int'l Conf. Embedded Networked Sensor Systems, pp. 95-107, 2004.
[13] A. Wood, J. Stankovic, and S. Son, "JAM: A Jammed-Area Mapping Service for Sensor Networks," Proc. 24th IEEE Real-Time Systems Symp., pp. 286-297, 2003.
[14] W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," MobiHoc '05: Proc. Sixth ACM Int'l Symp. Mobile Ad Hoc Networking and Computing, pp. 46-57, 2005.
[15] Crossbow Technology, http:/www.xbow.com/, 2011.
[16] A. Goldsmith, Wireless Communications., Cambridge Univ. Press, 2005.

Index Terms:
Jamming, radio interference, least squares, localization.
Citation:
Zhenhua Liu, Hongbo Liu, Wenyuan Xu, Yingying Chen, "Exploiting Jamming-Caused Neighbor Changes for Jammer Localization," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 3, pp. 547-555, March 2012, doi:10.1109/TPDS.2011.154
Usage of this product signifies your acceptance of the Terms of Use.