Wireless jamming localization by exploiting nodes' hearing ranges

Zhenhua Liu, Hongbo Liu, Wenyuan Xu, Yingying Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Scopus citations


Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wide range of defense strategies. Thus, in this paper, we focus on developing mechanisms to localize a jammer. We first conduct jamming effect analysis to examine how a hearing range, e.g., the area from which a node can successfully receive and decode the packet, alters with the jammer's location and transmission power. Then, we show that the affected hearing range can be estimated purely by examining the network topology changes caused by jamming attacks. As such, we solve the jammer location estimation by constructing a least-squares problem, which exploits the changes of the hearing ranges. Compared with our previous iterative-search-based virtual force algorithm, our proposed hearing-range-based algorithm exhibits lower computational cost (i.e., one-step instead of iterative searches) and higher localization accuracy.

Original languageEnglish (US)
Title of host publicationDistributed Computing in Sensor Systems - 6th IEEE International Conference, DCOSS 2010, Proceedings
Number of pages14
StatePublished - 2010
Externally publishedYes
Event6th IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2010 - Santa Barbara, CA, United States
Duration: Jun 21 2010Jun 23 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6131 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other6th IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2010
Country/TerritoryUnited States
CitySanta Barbara, CA

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)


Dive into the research topics of 'Wireless jamming localization by exploiting nodes' hearing ranges'. Together they form a unique fingerprint.

Cite this