Wireless jamming localization by exploiting nodes' hearing ranges

Zhenhua Liu, Hongbo Liu, Wenyuan Xu, Yingying Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

23 Citations (Scopus)

Abstract

Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wide range of defense strategies. Thus, in this paper, we focus on developing mechanisms to localize a jammer. We first conduct jamming effect analysis to examine how a hearing range, e.g., the area from which a node can successfully receive and decode the packet, alters with the jammer's location and transmission power. Then, we show that the affected hearing range can be estimated purely by examining the network topology changes caused by jamming attacks. As such, we solve the jammer location estimation by constructing a least-squares problem, which exploits the changes of the hearing ranges. Compared with our previous iterative-search-based virtual force algorithm, our proposed hearing-range-based algorithm exhibits lower computational cost (i.e., one-step instead of iterative searches) and higher localization accuracy.

Original languageEnglish (US)
Title of host publicationDistributed Computing in Sensor Systems - 6th IEEE International Conference, DCOSS 2010, Proceedings
Pages348-361
Number of pages14
DOIs
StatePublished - Aug 13 2010
Event6th IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2010 - Santa Barbara, CA, United States
Duration: Jun 21 2010Jun 23 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6131 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other6th IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2010
CountryUnited States
CitySanta Barbara, CA
Period6/21/106/23/10

Fingerprint

Jamming
Audition
Vertex of a graph
Range of data
Attack
Location Estimation
Power transmission
Decode
Dependability
Least Squares Problem
Wireless Communication
Network Topology
Topology
Computational Cost
Communication
Costs

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Liu, Z., Liu, H., Xu, W., & Chen, Y. (2010). Wireless jamming localization by exploiting nodes' hearing ranges. In Distributed Computing in Sensor Systems - 6th IEEE International Conference, DCOSS 2010, Proceedings (pp. 348-361). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6131 LNCS). https://doi.org/10.1007/978-3-642-13651-1_25
Liu, Zhenhua ; Liu, Hongbo ; Xu, Wenyuan ; Chen, Yingying. / Wireless jamming localization by exploiting nodes' hearing ranges. Distributed Computing in Sensor Systems - 6th IEEE International Conference, DCOSS 2010, Proceedings. 2010. pp. 348-361 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{76560308c94f4ea4a4390c562243d3e3,
title = "Wireless jamming localization by exploiting nodes' hearing ranges",
abstract = "Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wide range of defense strategies. Thus, in this paper, we focus on developing mechanisms to localize a jammer. We first conduct jamming effect analysis to examine how a hearing range, e.g., the area from which a node can successfully receive and decode the packet, alters with the jammer's location and transmission power. Then, we show that the affected hearing range can be estimated purely by examining the network topology changes caused by jamming attacks. As such, we solve the jammer location estimation by constructing a least-squares problem, which exploits the changes of the hearing ranges. Compared with our previous iterative-search-based virtual force algorithm, our proposed hearing-range-based algorithm exhibits lower computational cost (i.e., one-step instead of iterative searches) and higher localization accuracy.",
author = "Zhenhua Liu and Hongbo Liu and Wenyuan Xu and Yingying Chen",
year = "2010",
month = "8",
day = "13",
doi = "10.1007/978-3-642-13651-1_25",
language = "English (US)",
isbn = "3642136508",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "348--361",
booktitle = "Distributed Computing in Sensor Systems - 6th IEEE International Conference, DCOSS 2010, Proceedings",

}

Liu, Z, Liu, H, Xu, W & Chen, Y 2010, Wireless jamming localization by exploiting nodes' hearing ranges. in Distributed Computing in Sensor Systems - 6th IEEE International Conference, DCOSS 2010, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6131 LNCS, pp. 348-361, 6th IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2010, Santa Barbara, CA, United States, 6/21/10. https://doi.org/10.1007/978-3-642-13651-1_25

Wireless jamming localization by exploiting nodes' hearing ranges. / Liu, Zhenhua; Liu, Hongbo; Xu, Wenyuan; Chen, Yingying.

Distributed Computing in Sensor Systems - 6th IEEE International Conference, DCOSS 2010, Proceedings. 2010. p. 348-361 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6131 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Wireless jamming localization by exploiting nodes' hearing ranges

AU - Liu, Zhenhua

AU - Liu, Hongbo

AU - Xu, Wenyuan

AU - Chen, Yingying

PY - 2010/8/13

Y1 - 2010/8/13

N2 - Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wide range of defense strategies. Thus, in this paper, we focus on developing mechanisms to localize a jammer. We first conduct jamming effect analysis to examine how a hearing range, e.g., the area from which a node can successfully receive and decode the packet, alters with the jammer's location and transmission power. Then, we show that the affected hearing range can be estimated purely by examining the network topology changes caused by jamming attacks. As such, we solve the jammer location estimation by constructing a least-squares problem, which exploits the changes of the hearing ranges. Compared with our previous iterative-search-based virtual force algorithm, our proposed hearing-range-based algorithm exhibits lower computational cost (i.e., one-step instead of iterative searches) and higher localization accuracy.

AB - Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wide range of defense strategies. Thus, in this paper, we focus on developing mechanisms to localize a jammer. We first conduct jamming effect analysis to examine how a hearing range, e.g., the area from which a node can successfully receive and decode the packet, alters with the jammer's location and transmission power. Then, we show that the affected hearing range can be estimated purely by examining the network topology changes caused by jamming attacks. As such, we solve the jammer location estimation by constructing a least-squares problem, which exploits the changes of the hearing ranges. Compared with our previous iterative-search-based virtual force algorithm, our proposed hearing-range-based algorithm exhibits lower computational cost (i.e., one-step instead of iterative searches) and higher localization accuracy.

UR - http://www.scopus.com/inward/record.url?scp=77955405219&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77955405219&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-13651-1_25

DO - 10.1007/978-3-642-13651-1_25

M3 - Conference contribution

AN - SCOPUS:77955405219

SN - 3642136508

SN - 9783642136504

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 348

EP - 361

BT - Distributed Computing in Sensor Systems - 6th IEEE International Conference, DCOSS 2010, Proceedings

ER -

Liu Z, Liu H, Xu W, Chen Y. Wireless jamming localization by exploiting nodes' hearing ranges. In Distributed Computing in Sensor Systems - 6th IEEE International Conference, DCOSS 2010, Proceedings. 2010. p. 348-361. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-13651-1_25