Skip to main content
Top

Localizing Wireless Jamming Attacks with Minimal Network Resources

  • 2017
  • OriginalPaper
  • Chapter
Published in:

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless networks such as the wireless sensor networks (WSNs) are increasingly becoming ubiquitous in today’s Internet of Things (IoT) environment. However, wireless networks are very vulnerable to jamming attacks which can be easily carried out by small concealable wireless transmitters. Thus, there is a need to quickly localize and remove the jammer node to prevent further disruptions to the network. In addition, an efficient jammer node localization algorithm should use minimal network resources, e.g., number of reporting nodes. Based on this idea, we propose a maximum likelihood estimator (MLE)-based localization method for the jammer node which allows each node that detected a jammed link to probabilistically transmit a jamming report. The node transmission probabilities are optimized using the cross-entropy (CE) method to ensure that the localization algorithm satisfies a pre-defined reliability threshold. Our simulation results show that the proposed scheme performs significantly better than the simple centroid-based localization methods while using lesser number of reporting nodes and traffic.

Not a customer yet? Then find out more about our access models now:

Individual Access

Start your personal individual access now. Get instant access to more than 164,000 books and 540 journals – including PDF downloads and new releases.

Starting from 54,00 € per month!    

Get access

Access for Businesses

Utilise Springer Professional in your company and provide your employees with sound specialist knowledge. Request information about corporate access now.

Find out how Springer Professional can uplift your work!

Contact us now
Title
Localizing Wireless Jamming Attacks with Minimal Network Resources
Authors
Jing Yang Koh
Pengfei Zhang
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-72395-2_30
This content is only visible if you are logged in and have the appropriate permissions.
This content is only visible if you are logged in and have the appropriate permissions.

Premium Partner

    Image Credits
    Neuer Inhalt/© ITandMEDIA, Nagarro GmbH/© Nagarro GmbH, AvePoint Deutschland GmbH/© AvePoint Deutschland GmbH, AFB Gemeinnützige GmbH/© AFB Gemeinnützige GmbH, USU GmbH/© USU GmbH, Ferrari electronic AG/© Ferrari electronic AG