Skip to main content

Wireless Jamming Localization by Exploiting Nodes’ Hearing Ranges

  • Conference paper
Distributed Computing in Sensor Systems (DCOSS 2010)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 6131))

Included in the following conference series:

Abstract

Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wide range of defense strategies. Thus, in this paper, we focus on developing mechanisms to localize a jammer. We first conduct jamming effect analysis to examine how a hearing range, e.g., the area from which a node can successfully receive and decode the packet, alters with the jammer’s location and transmission power. Then, we show that the affected hearing range can be estimated purely by examining the network topology changes caused by jamming attacks. As such, we solve the jammer location estimation by constructing a least-squares problem, which exploits the changes of the hearing ranges. Compared with our previous iterative-search-based virtual force algorithm, our proposed hearing-range-based algorithm exhibits lower computational cost (i.e., one-step instead of iterative searches) and higher localization accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bahl, P., Padmanabhan, V.N.: RADAR: An in-building RF-based user location and tracking system. In: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), pp. 775–784 (March 2000)

    Google Scholar 

  2. Cagalj, M., Capkun, S., Hubaux, J.: Wormhole-Based Anti-Jamming Techniques in Sensor Networks. IEEE Transactions on Mobile Computing, 100–114 (January 2007)

    Google Scholar 

  3. Chen, Y., Francisco, J., Trappe, W., Martin, R.P.: A practical approach to landmark deployment for indoor localization. In: Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON (2006)

    Google Scholar 

  4. Liu, H., Xu, W., Chen, Y., Liu, Z.: Localizing jammers in wireless networks. In: Proceedings of IEEE PerCom International Workshop on Pervasive Wireless Networking, IEEE PWN (2009)

    Google Scholar 

  5. Ma, K., Zhang, Y., Trappe, W.: Mobile network management and robust spatial retreats via network dynamics. In: Proceedings of the The 1st International Workshop on Resource Provisioning and Management in Sensor Networks, RPMSN 2005 (2005)

    Google Scholar 

  6. Noubir, G., Lin, G.: Low-power DoS attacks in data wireless lans and countermeasures. SIGMOBILE Mob. Comput. Commun. Rev. 7(3), 29–30 (2003)

    Article  Google Scholar 

  7. Pelechrinis, K., Koutsopoulos, I., Broustis, I., Krishnamurthy, S.V.: Lightweight jammer localization in wireless networks: System design and implementation. In: Proceedings of the IEEE GLOBECOM (December 2009)

    Google Scholar 

  8. Polastre, J., Hill, J., Culler, D.: Versatile low power media access for wireless sensor networks. In: SenSys 2004: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp. 95–107 (2004)

    Google Scholar 

  9. Priyantha, N., Chakraborty, A., Balakrishnan, H.: The cricket location-support system. In: Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom), pp. 32–43 (August 2000)

    Google Scholar 

  10. Proakis, J.G.: Digital Communications, 4th edn. McGraw-Hill, New York (2000)

    Google Scholar 

  11. Wang, G., Cao, G., Porta, T.L.: Movement-assisted sensor deployment. IEEE Transactions on Mobile Computing 5(6), 640–652 (2006)

    Article  Google Scholar 

  12. Want, R., Hopper, A., Falcao, V., Gibbons, J.: The active badge location system. ACM Transactions on Information Systems 10(1), 91–102 (1992)

    Article  Google Scholar 

  13. Wood, A., Stankovic, J., Son, S.: JAM: A jammed-area mapping service for sensor networks. In: 24th IEEE Real-Time Systems Symposium, pp. 286–297 (2003)

    Google Scholar 

  14. Xu, W., Trappe, W., Zhang, Y.: Channel surfing: defending wireless sensor networks from interference. In: IPSN 2007: Proceedings of the 6th International Conference on Information Processing in Sensor Networks, pp. 499–508 (2007)

    Google Scholar 

  15. Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: MobiHoc 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Noc Networking and Computing, pp. 46–57 (2005)

    Google Scholar 

  16. Xu, W.: On adjusting power to defend wireless networks from jamming. In: Proceedings of the Fourth Annual International Conference on Mobile and Ubiquitous Systems, MobiQuitous (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, Z., Liu, H., Xu, W., Chen, Y. (2010). Wireless Jamming Localization by Exploiting Nodes’ Hearing Ranges. In: Rajaraman, R., Moscibroda, T., Dunkels, A., Scaglione, A. (eds) Distributed Computing in Sensor Systems. DCOSS 2010. Lecture Notes in Computer Science, vol 6131. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13651-1_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13651-1_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13650-4

  • Online ISBN: 978-3-642-13651-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics