Jammer Localization in Wireless Sensor Networks

Jamming style Denial-of-Service attack is the transmission of radio signals that disrupt communications by decreasing the signal to noise ratio. This kind of attack can be easily launched by jammer through either bypassing MAC-layer protocols or emitting a radio signal targeted at blocking a particular channel. In this paper, we consider the item of localizing a jammer in which little work has been done. First we explored the existing localization algorithms that have been used in wireless sensor networks. We then proposed a Geometry-Covering based Localization (GCL) algorithm, which utilizes the knowledge of computing geometry, especially the convex hull. Simulation results showed that GCL is able to achieve higher accuracy than Centroid Localization, and has the time complexity of O(nlogn), which is proper to sensor networks.

[1]  F. Golatowski,et al.  Weighted Centroid Localization in Zigbee-based Sensor Networks , 2007, 2007 IEEE International Symposium on Intelligent Signal Processing.

[2]  Wenyuan Xu,et al.  Localizing jammers in wireless networks , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[3]  Wenyuan Xu,et al.  Anti-jamming timing channels for wireless networks , 2008, WiSec '08.

[4]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[5]  Tarek F. Abdelzaher,et al.  Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.

[6]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[7]  Srdjan Capkun,et al.  Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .

[8]  H. Aghajan,et al.  Utilizing RFID Signaling Scheme for Localization of Stationary Objects and Speed Estimation of Mobile Objects , 2007, 2007 IEEE International Conference on RFID.

[9]  Srdjan Capkun,et al.  Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.

[10]  Richard P. Martin,et al.  The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study , 2006, DCOSS.

[11]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[12]  Wenyuan Xu,et al.  Channel Surfing: Defending Wireless Sensor Networks from Interference , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.