Skip to main content
Erschienen in: Wireless Networks 2/2011

01.02.2011

Determining the position of a jammer using a virtual-force iterative approach

verfasst von: Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu

Erschienen in: Wireless Networks | Ausgabe 2/2011

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications. Most existing anti-jamming work does not consider the location information of radio interferers and jammers. However, this information can provide important insights for networks to manage its resource in different layers and to defend against radio interference. In this paper, we investigate issues associated with localizing jammers in wireless networks. In particular, we formulate the jamming effects using two jamming models: region-based and signal-to-noise-ratio(SNR)-based; and we categorize network nodes into three states based on the level of disturbance caused by the jammer. By exploiting the states of nodes, we propose to localize jammers in wireless networks using a virtual-force iterative approach. The virtual-force iterative localization scheme is a range-free position estimation method that estimates the position of a jammer iteratively by utilizing the network topology. We have conducted experiments to validate our SNR-based jamming model and performed extensive simulation to evaluate our approach. Our simulation results have showed that the virtual-force iterative approach is highly effective in localizing a jammer in various network conditions when comparing to existing centroid-based localization approaches.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Want, R., Hopper, A., Falcao, V., & Gibbons, J. (1992). The active badge location system. ACM Transactions on Information Systems, 10(1), 91–102.CrossRef Want, R., Hopper, A., Falcao, V., & Gibbons, J. (1992). The active badge location system. ACM Transactions on Information Systems, 10(1), 91–102.CrossRef
2.
Zurück zum Zitat Bahl, P., & Padmanabhan, V. N. (2000). RADAR: An in-building RF-based user location and tracking system. In Proceedings of the IEEE international conference on computer communications (INFOCOM). March 2000, pp. 775–784. Bahl, P., & Padmanabhan, V. N. (2000). RADAR: An in-building RF-based user location and tracking system. In Proceedings of the IEEE international conference on computer communications (INFOCOM). March 2000, pp. 775–784.
3.
Zurück zum Zitat He, T., Huang, C., Blum, B. M., Stankovic, J. A., & Abdelzaher, T. (2005). Range-free localization and its impact on large scale sensor networks. ACM Transactions on Embedded Computing Systems, 4, 877–906.CrossRef He, T., Huang, C., Blum, B. M., Stankovic, J. A., & Abdelzaher, T. (2005). Range-free localization and its impact on large scale sensor networks. ACM Transactions on Embedded Computing Systems, 4, 877–906.CrossRef
4.
Zurück zum Zitat Chen, Y., Francisco, J., Trappe, W., & Martin, R. P. (2006). A practical approach to landmark deployment for indoor localization. In Proceedings of the third annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON). Chen, Y., Francisco, J., Trappe, W., & Martin, R. P. (2006). A practical approach to landmark deployment for indoor localization. In Proceedings of the third annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON).
5.
Zurück zum Zitat Kleisouris, K., Chen, Y., Yang, J., & Martin, R. P. (2008). The impact of using multiple antennas on wireless localization. In Proceedings of the fifth annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON). June 2008. Kleisouris, K., Chen, Y., Yang, J., & Martin, R. P. (2008). The impact of using multiple antennas on wireless localization. In Proceedings of the fifth annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON). June 2008.
6.
Zurück zum Zitat Proakis, J. G. (2000). Digital communications (4th ed.). Singapore: McGraw-Hill. Proakis, J. G. (2000). Digital communications (4th ed.). Singapore: McGraw-Hill.
7.
Zurück zum Zitat Schleher, C. (1999). Electronic warfare in the information age. Norwood: MArtech House. Schleher, C. (1999). Electronic warfare in the information age. Norwood: MArtech House.
8.
Zurück zum Zitat Wood, A., Stankovic, J., & Son, S. (2003). JAM: A jammed-area mapping service for sensor networks. In 24th IEEE real-time systems Symposium. pp. 286–297. Wood, A., Stankovic, J., & Son, S. (2003). JAM: A jammed-area mapping service for sensor networks. In 24th IEEE real-time systems Symposium. pp. 286–297.
9.
Zurück zum Zitat Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In MobiHoc ’05: Proceedings of the 6th ACM international Symposium on mobile ad hoc networking and computing. pp. 46–57. Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In MobiHoc ’05: Proceedings of the 6th ACM international Symposium on mobile ad hoc networking and computing. pp. 46–57.
10.
Zurück zum Zitat Çakiroǧlu, M., & Özcerit, A. T. (2008). Jamming detection mechanisms for wireless sensor networks. In InfoScale ’08: Proceedings of the 3rd international conference on scalable information systems. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 1–8. Çakiroǧlu, M., & Özcerit, A. T. (2008). Jamming detection mechanisms for wireless sensor networks. In InfoScale ’08: Proceedings of the 3rd international conference on scalable information systems. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 1–8.
11.
Zurück zum Zitat Mraleedharan, R., & Osadciw, L. A. (2006). Jamming attack detection and countermeasures in wireless sensor network using ant system,” in Proceedings of the SPIE in wireless sensing and processing, (Vol. 6248). p. 62480G. Mraleedharan, R., & Osadciw, L. A. (2006). Jamming attack detection and countermeasures in wireless sensor network using ant system,” in Proceedings of the SPIE in wireless sensing and processing, (Vol. 6248). p. 62480G.
12.
Zurück zum Zitat Chiang, J. T., & Hu, Y.-C. (2007). Cross-layer jamming detection and mitigation in wireless broadcast networks. In MobiCom ’07: Proceedings of the 13th annual ACM international conference on mobile computing and networking. New York, NY, USA: ACM, pp. 346–349. Chiang, J. T., & Hu, Y.-C. (2007). Cross-layer jamming detection and mitigation in wireless broadcast networks. In MobiCom ’07: Proceedings of the 13th annual ACM international conference on mobile computing and networking. New York, NY, USA: ACM, pp. 346–349.
13.
Zurück zum Zitat Noubir, G. & Lin, G. (2003). Low-power DoS attacks in data wireless lans and countermeasures. SIGMOBILE Mobile Computing and Communications Review, 7(3), 29–30.CrossRef Noubir, G. & Lin, G. (2003). Low-power DoS attacks in data wireless lans and countermeasures. SIGMOBILE Mobile Computing and Communications Review, 7(3), 29–30.CrossRef
14.
Zurück zum Zitat Xu, W., Trappe, W., & Zhang, Y. (2007). Channel surfing: Defending wireless sensor networks from interference. In IPSN ’07: Proceedings of the 6th international conference on information processing in sensor networks. pp. 499–508. Xu, W., Trappe, W., & Zhang, Y. (2007). Channel surfing: Defending wireless sensor networks from interference. In IPSN ’07: Proceedings of the 6th international conference on information processing in sensor networks. pp. 499–508.
15.
Zurück zum Zitat Navda, V., Bohra, A., Ganguly, S., Izmailov, R., & Rubenstein, D. (2007). Using channel hopping to increase 802.11 resilience to jamming attacks. In IEEE infocom minisymposium. May 2007, pp. 2526–2530. Navda, V., Bohra, A., Ganguly, S., Izmailov, R., & Rubenstein, D. (2007). Using channel hopping to increase 802.11 resilience to jamming attacks. In IEEE infocom minisymposium. May 2007, pp. 2526–2530.
16.
Zurück zum Zitat Khattab, S., Mosse, D., & Melhem, R. (2008). Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks,” In Mobiquitous ’08: Proceedings of the 5th annual international conference on mobile and ubiquitous systems. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 1–10. Khattab, S., Mosse, D., & Melhem, R. (2008). Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks,” In Mobiquitous ’08: Proceedings of the 5th annual international conference on mobile and ubiquitous systems. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 1–10.
17.
Zurück zum Zitat Ma, K., Zhang, Y., & Trappe, W. (2005). Mobile network management and robust spatial retreats via network dynamics. In Proceedings of the the 1st international workshop on resource provisioning and management in sensor networks (RPMSN05). Ma, K., Zhang, Y., & Trappe, W. (2005). Mobile network management and robust spatial retreats via network dynamics. In Proceedings of the the 1st international workshop on resource provisioning and management in sensor networks (RPMSN05).
18.
Zurück zum Zitat Xu, W., Trappe, W., & Zhang, Y. (2008). Anti-jamming timing channels for wireless networks. In WiSec ’08: Proceedings of the first ACM conference on wireless network security. New York, NY, USA: ACM, pp. 203–213. Xu, W., Trappe, W., & Zhang, Y. (2008). Anti-jamming timing channels for wireless networks. In WiSec ’08: Proceedings of the first ACM conference on wireless network security. New York, NY, USA: ACM, pp. 203–213.
19.
Zurück zum Zitat Cagalj, M., Capkun, S., & Hubaux, J. (2007). Wormhole-based anti-jamming techniques in sensor networks. In IEEE transactions on mobile computing. January 2007, pp. 100–114. Cagalj, M., Capkun, S., & Hubaux, J. (2007). Wormhole-based anti-jamming techniques in sensor networks. In IEEE transactions on mobile computing. January 2007, pp. 100–114.
20.
Zurück zum Zitat Wood, A. D., Stankovic, J. A., & Zhou, G. (2007). Deejam: Defeating energyefficient jamming in ieee 802.15.4-based wireless networks,” In Communications society conference on sensor, mesh and ad hoc communications and networks (SECON). Wood, A. D., Stankovic, J. A., & Zhou, G. (2007). Deejam: Defeating energyefficient jamming in ieee 802.15.4-based wireless networks,” In Communications society conference on sensor, mesh and ad hoc communications and networks (SECON).
21.
Zurück zum Zitat Priyantha, N., Chakraborty, A., & Balakrishnan, H. (2000). The cricket location-support system. In Proceedings of the ACM international conference on mobile computing and networking (MobiCom). Aug 2000, pp. 32–43. Priyantha, N., Chakraborty, A., & Balakrishnan, H. (2000). The cricket location-support system. In Proceedings of the ACM international conference on mobile computing and networking (MobiCom). Aug 2000, pp. 32–43.
22.
Zurück zum Zitat Ward, A., Jones, A., & Hopper, A. (1997). A new location technique for the active office. IEEE Personal Communications, 4(5), 42–47.CrossRef Ward, A., Jones, A., & Hopper, A. (1997). A new location technique for the active office. IEEE Personal Communications, 4(5), 42–47.CrossRef
23.
Zurück zum Zitat Chen, Y., Kleisouris, K., Li, X., Trappe, W., & Martin, R. P. (2006). The robustness of localization algorithms to signal strength attacks: A comparative study. In Proceedings of the international conference on distributed computing in sensor systems (DCOSS). June 2006, pp. 546–563. Chen, Y., Kleisouris, K., Li, X., Trappe, W., & Martin, R. P. (2006). The robustness of localization algorithms to signal strength attacks: A comparative study. In Proceedings of the international conference on distributed computing in sensor systems (DCOSS). June 2006, pp. 546–563.
24.
Zurück zum Zitat Chandrasekaran, G., Ergin, M. A., Yang, J., Liu, S., Chen, Y., Gruteser, M., & Martin, R. (2009). Empirical evaluation of the limits on localization using signal strength. In Proceedings of the third annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON). June 2009. Chandrasekaran, G., Ergin, M. A., Yang, J., Liu, S., Chen, Y., Gruteser, M., & Martin, R. (2009). Empirical evaluation of the limits on localization using signal strength. In Proceedings of the third annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON). June 2009.
25.
Zurück zum Zitat Hightower, J., Borriello, G., & Want, R. (2000). Spoton: An indoor 3d location sensing technology based on RF signal strength. University of Washington, Dept. of Computer Science and Engineering, Technical Report 00-02-02, February 2000. Hightower, J., Borriello, G., & Want, R. (2000). Spoton: An indoor 3d location sensing technology based on RF signal strength. University of Washington, Dept. of Computer Science and Engineering, Technical Report 00-02-02, February 2000.
26.
Zurück zum Zitat Enge, P., & Misra, P. (2001). Global positioning system: Signals, measurements and performance. Ganga-Jamuna Pr. Enge, P., & Misra, P. (2001). Global positioning system: Signals, measurements and performance. Ganga-Jamuna Pr.
27.
Zurück zum Zitat He, T., Huang, C., Blum, B., Stankovic, J. A., & Abdelzaher, T. (2003). Range-free localization schemes in large scale sensor networks. In Proceedings of the ninth annual ACM international conference on mobile computing and networking (MobiCom’03). He, T., Huang, C., Blum, B., Stankovic, J. A., & Abdelzaher, T. (2003). Range-free localization schemes in large scale sensor networks. In Proceedings of the ninth annual ACM international conference on mobile computing and networking (MobiCom’03).
28.
Zurück zum Zitat Bulusu, N., Heidemann, J., & Estrin, D. (2000). Gps-less low-cost outdoor localization for very small devices. IEEE Personal Communications Magazine, 7, 28–34.CrossRef Bulusu, N., Heidemann, J., & Estrin, D. (2000). Gps-less low-cost outdoor localization for very small devices. IEEE Personal Communications Magazine, 7, 28–34.CrossRef
29.
Zurück zum Zitat Niculescu, D., & Nath, B. (2001). Ad hoc positioning system (APS). In Proceedings of the IEEE global telecommunications conference (GLOBECOM). pp. 2926–2931. Niculescu, D., & Nath, B. (2001). Ad hoc positioning system (APS). In Proceedings of the IEEE global telecommunications conference (GLOBECOM). pp. 2926–2931.
30.
Zurück zum Zitat Shang, Y., Ruml, W., Zhang, Y., & Fromherz, M. P. J. (2003). Localization from mere connectivity. In Proceedings of the fourth ACM international Symposium on mobile ad-hoc networking and computing (MobiHoc). Jun 2003, pp. 201–212. Shang, Y., Ruml, W., Zhang, Y., & Fromherz, M. P. J. (2003). Localization from mere connectivity. In Proceedings of the fourth ACM international Symposium on mobile ad-hoc networking and computing (MobiHoc). Jun 2003, pp. 201–212.
31.
Zurück zum Zitat Pelechrinis, K., Koutsopoulos, I., Broustis, I., & Krishnamurthy, S. (2009). Lightweight jammer localization in wireless networks: System design and implementaion. In Proceedings of IEEE global telecommunication cofference (GLOBECOM). December 2009. Pelechrinis, K., Koutsopoulos, I., Broustis, I., & Krishnamurthy, S. (2009). Lightweight jammer localization in wireless networks: System design and implementaion. In Proceedings of IEEE global telecommunication cofference (GLOBECOM). December 2009.
32.
Zurück zum Zitat Deng, J., Han, R., & Mishra, S. (2004). Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In DSN ’04: Proceedings of the 2004 international conference on dependable systems and networks. Washington, DC, USA: IEEE Computer Society, p. 637. Deng, J., Han, R., & Mishra, S. (2004). Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In DSN ’04: Proceedings of the 2004 international conference on dependable systems and networks. Washington, DC, USA: IEEE Computer Society, p. 637.
33.
Zurück zum Zitat Kleppner, D., & Kolenkow, R. J. (1973). An introduction to mechanics. New York: McGraw-Hill. Kleppner, D., & Kolenkow, R. J. (1973). An introduction to mechanics. New York: McGraw-Hill.
35.
Zurück zum Zitat Xu, W. (2007). On adjusting power to defend wireless networks from jamming. In Proceedings of the first workshop on the security and privacy of emerging ubiquitous communication systems (SPEUCS). Xu, W. (2007). On adjusting power to defend wireless networks from jamming. In Proceedings of the first workshop on the security and privacy of emerging ubiquitous communication systems (SPEUCS).
36.
Zurück zum Zitat Liu, H., Xu, W., Chen, Y., & Liu, Z. (2009). Localizing jammers in wireless networks. In Proceedings of IEEE PerCom international workshop on pervasive wireless networking (IEEE PWN). Liu, H., Xu, W., Chen, Y., & Liu, Z. (2009). Localizing jammers in wireless networks. In Proceedings of IEEE PerCom international workshop on pervasive wireless networking (IEEE PWN).
Metadaten
Titel
Determining the position of a jammer using a virtual-force iterative approach
verfasst von
Hongbo Liu
Zhenhua Liu
Yingying Chen
Wenyuan Xu
Publikationsdatum
01.02.2011
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 2/2011
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-010-0295-6

Weitere Artikel der Ausgabe 2/2011

Wireless Networks 2/2011 Zur Ausgabe

Neuer Inhalt