Exploiting jamming-caused neighbor changes for jammer localization

Zhenhua Liu, Hongbo Liu, Wenyuan Xu, Yingying Chen

Research output: Contribution to journalArticle

38 Citations (Scopus)

Abstract

Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wide range of defense strategies. In this paper, we focus on developing mechanisms to localize a jammer by exploiting neighbor changes. We first conduct jamming effect analysis to examine how the communication range alters with the jammer's location and transmission power using free-space model. Then, we show that a node's affected communication range can be estimated purely by examining its neighbor changes caused by jamming attacks and thus, we can perform the jammer location estimation by solving a least-squares (LSQ) problem that exploits the changes of communication range. Compared with our previous iterative-search-based virtual force algorithm, our LSQ-based algorithm exhibits lower computational cost (i.e., one step instead of iterative searches) and higher localization accuracy. Furthermore, we analyze the localization challenges in real systems by building the log-normal shadowing model empirically and devising an adaptive LSQ-based algorithm to address those challenges. The extensive evaluation shows that the adaptive LSQ-based algorithm can effectively estimate the location of the jammer even in a highly complex propagation environment.

Original languageEnglish (US)
Article number5871592
Pages (from-to)547-555
Number of pages9
JournalIEEE Transactions on Parallel and Distributed Systems
Volume23
Issue number3
DOIs
StatePublished - Mar 1 2012

Fingerprint

Jamming
Communication
Power transmission
Costs

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Hardware and Architecture
  • Computational Theory and Mathematics

Keywords

  • Jamming
  • Least squares
  • Localization
  • Radio interference

Cite this

@article{ea3b47c0cb1c45a3bc5951d604f1732d,
title = "Exploiting jamming-caused neighbor changes for jammer localization",
abstract = "Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wide range of defense strategies. In this paper, we focus on developing mechanisms to localize a jammer by exploiting neighbor changes. We first conduct jamming effect analysis to examine how the communication range alters with the jammer's location and transmission power using free-space model. Then, we show that a node's affected communication range can be estimated purely by examining its neighbor changes caused by jamming attacks and thus, we can perform the jammer location estimation by solving a least-squares (LSQ) problem that exploits the changes of communication range. Compared with our previous iterative-search-based virtual force algorithm, our LSQ-based algorithm exhibits lower computational cost (i.e., one step instead of iterative searches) and higher localization accuracy. Furthermore, we analyze the localization challenges in real systems by building the log-normal shadowing model empirically and devising an adaptive LSQ-based algorithm to address those challenges. The extensive evaluation shows that the adaptive LSQ-based algorithm can effectively estimate the location of the jammer even in a highly complex propagation environment.",
keywords = "Jamming, Least squares, Localization, Radio interference",
author = "Zhenhua Liu and Hongbo Liu and Wenyuan Xu and Yingying Chen",
year = "2012",
month = "3",
day = "1",
doi = "https://doi.org/10.1109/TPDS.2011.154",
language = "English (US)",
volume = "23",
pages = "547--555",
journal = "IEEE Transactions on Parallel and Distributed Systems",
issn = "1045-9219",
publisher = "IEEE Computer Society",
number = "3",

}

Exploiting jamming-caused neighbor changes for jammer localization. / Liu, Zhenhua; Liu, Hongbo; Xu, Wenyuan; Chen, Yingying.

In: IEEE Transactions on Parallel and Distributed Systems, Vol. 23, No. 3, 5871592, 01.03.2012, p. 547-555.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Exploiting jamming-caused neighbor changes for jammer localization

AU - Liu, Zhenhua

AU - Liu, Hongbo

AU - Xu, Wenyuan

AU - Chen, Yingying

PY - 2012/3/1

Y1 - 2012/3/1

N2 - Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wide range of defense strategies. In this paper, we focus on developing mechanisms to localize a jammer by exploiting neighbor changes. We first conduct jamming effect analysis to examine how the communication range alters with the jammer's location and transmission power using free-space model. Then, we show that a node's affected communication range can be estimated purely by examining its neighbor changes caused by jamming attacks and thus, we can perform the jammer location estimation by solving a least-squares (LSQ) problem that exploits the changes of communication range. Compared with our previous iterative-search-based virtual force algorithm, our LSQ-based algorithm exhibits lower computational cost (i.e., one step instead of iterative searches) and higher localization accuracy. Furthermore, we analyze the localization challenges in real systems by building the log-normal shadowing model empirically and devising an adaptive LSQ-based algorithm to address those challenges. The extensive evaluation shows that the adaptive LSQ-based algorithm can effectively estimate the location of the jammer even in a highly complex propagation environment.

AB - Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wide range of defense strategies. In this paper, we focus on developing mechanisms to localize a jammer by exploiting neighbor changes. We first conduct jamming effect analysis to examine how the communication range alters with the jammer's location and transmission power using free-space model. Then, we show that a node's affected communication range can be estimated purely by examining its neighbor changes caused by jamming attacks and thus, we can perform the jammer location estimation by solving a least-squares (LSQ) problem that exploits the changes of communication range. Compared with our previous iterative-search-based virtual force algorithm, our LSQ-based algorithm exhibits lower computational cost (i.e., one step instead of iterative searches) and higher localization accuracy. Furthermore, we analyze the localization challenges in real systems by building the log-normal shadowing model empirically and devising an adaptive LSQ-based algorithm to address those challenges. The extensive evaluation shows that the adaptive LSQ-based algorithm can effectively estimate the location of the jammer even in a highly complex propagation environment.

KW - Jamming

KW - Least squares

KW - Localization

KW - Radio interference

UR - http://www.scopus.com/inward/record.url?scp=80054075293&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=80054075293&partnerID=8YFLogxK

U2 - https://doi.org/10.1109/TPDS.2011.154

DO - https://doi.org/10.1109/TPDS.2011.154

M3 - Article

VL - 23

SP - 547

EP - 555

JO - IEEE Transactions on Parallel and Distributed Systems

JF - IEEE Transactions on Parallel and Distributed Systems

SN - 1045-9219

IS - 3

M1 - 5871592

ER -