Determining the position of a jammer using a virtual-force iterative approach

Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu

Research output: Contribution to journalArticlepeer-review

26 Scopus citations

Abstract

Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications. Most existing anti-jamming work does not consider the location information of radio interferers and jammers. However, this information can provide important insights for networks to manage its resource in different layers and to defend against radio interference. In this paper, we investigate issues associated with localizing jammers in wireless networks. In particular, we formulate the jamming effects using two jamming models: region-based and signal-to-noise- ratio(SNR)-based; and we categorize network nodes into three states based on the level of disturbance caused by the jammer. By exploiting the states of nodes, we propose to localize jammers in wireless networks using a virtual-force iterative approach. The virtual-force iterative localization scheme is a range-free position estimation method that estimates the position of a jammer iteratively by utilizing the network topology. We have conducted experiments to validate our SNR-based jamming model and performed extensive simulation to evaluate our approach. Our simulation results have showed that the virtual-force iterative approach is highly effective in localizing a jammer in various network conditions when comparing to existing centroid-based localization approaches.

Original languageEnglish (US)
Pages (from-to)531-547
Number of pages17
JournalWireless Networks
Volume17
Issue number2
DOIs
StatePublished - Feb 2011
Externally publishedYes

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Keywords

  • Jamming
  • Localization
  • Radio interference
  • Virtual force

Fingerprint

Dive into the research topics of 'Determining the position of a jammer using a virtual-force iterative approach'. Together they form a unique fingerprint.

Cite this