Wireless Networks

, Volume 17, Issue 2, pp 531–547

Determining the position of a jammer using a virtual-force iterative approach

  • Hongbo Liu
  • Zhenhua Liu
  • Yingying Chen
  • Wenyuan Xu
Article

Abstract

Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications. Most existing anti-jamming work does not consider the location information of radio interferers and jammers. However, this information can provide important insights for networks to manage its resource in different layers and to defend against radio interference. In this paper, we investigate issues associated with localizing jammers in wireless networks. In particular, we formulate the jamming effects using two jamming models: region-based and signal-to-noise-ratio(SNR)-based; and we categorize network nodes into three states based on the level of disturbance caused by the jammer. By exploiting the states of nodes, we propose to localize jammers in wireless networks using a virtual-force iterative approach. The virtual-force iterative localization scheme is a range-free position estimation method that estimates the position of a jammer iteratively by utilizing the network topology. We have conducted experiments to validate our SNR-based jamming model and performed extensive simulation to evaluate our approach. Our simulation results have showed that the virtual-force iterative approach is highly effective in localizing a jammer in various network conditions when comparing to existing centroid-based localization approaches.

Keywords

Jamming Radio interference Localization Virtual force 

References

  1. 1.
    Want, R., Hopper, A., Falcao, V., & Gibbons, J. (1992). The active badge location system. ACM Transactions on Information Systems, 10(1), 91–102.CrossRefGoogle Scholar
  2. 2.
    Bahl, P., & Padmanabhan, V. N. (2000). RADAR: An in-building RF-based user location and tracking system. In Proceedings of the IEEE international conference on computer communications (INFOCOM). March 2000, pp. 775–784.Google Scholar
  3. 3.
    He, T., Huang, C., Blum, B. M., Stankovic, J. A., & Abdelzaher, T. (2005). Range-free localization and its impact on large scale sensor networks. ACM Transactions on Embedded Computing Systems, 4, 877–906.CrossRefGoogle Scholar
  4. 4.
    Chen, Y., Francisco, J., Trappe, W., & Martin, R. P. (2006). A practical approach to landmark deployment for indoor localization. In Proceedings of the third annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON).Google Scholar
  5. 5.
    Kleisouris, K., Chen, Y., Yang, J., & Martin, R. P. (2008). The impact of using multiple antennas on wireless localization. In Proceedings of the fifth annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON). June 2008.Google Scholar
  6. 6.
    Proakis, J. G. (2000). Digital communications (4th ed.). Singapore: McGraw-Hill.Google Scholar
  7. 7.
    Schleher, C. (1999). Electronic warfare in the information age. Norwood: MArtech House.Google Scholar
  8. 8.
    Wood, A., Stankovic, J., & Son, S. (2003). JAM: A jammed-area mapping service for sensor networks. In 24th IEEE real-time systems Symposium. pp. 286–297.Google Scholar
  9. 9.
    Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In MobiHoc ’05: Proceedings of the 6th ACM international Symposium on mobile ad hoc networking and computing. pp. 46–57.Google Scholar
  10. 10.
    Çakiroǧlu, M., & Özcerit, A. T. (2008). Jamming detection mechanisms for wireless sensor networks. In InfoScale ’08: Proceedings of the 3rd international conference on scalable information systems. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 1–8.Google Scholar
  11. 11.
    Mraleedharan, R., & Osadciw, L. A. (2006). Jamming attack detection and countermeasures in wireless sensor network using ant system,” in Proceedings of the SPIE in wireless sensing and processing, (Vol. 6248). p. 62480G.Google Scholar
  12. 12.
    Chiang, J. T., & Hu, Y.-C. (2007). Cross-layer jamming detection and mitigation in wireless broadcast networks. In MobiCom ’07: Proceedings of the 13th annual ACM international conference on mobile computing and networking. New York, NY, USA: ACM, pp. 346–349.Google Scholar
  13. 13.
    Noubir, G. & Lin, G. (2003). Low-power DoS attacks in data wireless lans and countermeasures. SIGMOBILE Mobile Computing and Communications Review, 7(3), 29–30.CrossRefGoogle Scholar
  14. 14.
    Xu, W., Trappe, W., & Zhang, Y. (2007). Channel surfing: Defending wireless sensor networks from interference. In IPSN ’07: Proceedings of the 6th international conference on information processing in sensor networks. pp. 499–508.Google Scholar
  15. 15.
    Navda, V., Bohra, A., Ganguly, S., Izmailov, R., & Rubenstein, D. (2007). Using channel hopping to increase 802.11 resilience to jamming attacks. In IEEE infocom minisymposium. May 2007, pp. 2526–2530.Google Scholar
  16. 16.
    Khattab, S., Mosse, D., & Melhem, R. (2008). Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks,” In Mobiquitous ’08: Proceedings of the 5th annual international conference on mobile and ubiquitous systems. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 1–10.Google Scholar
  17. 17.
    Ma, K., Zhang, Y., & Trappe, W. (2005). Mobile network management and robust spatial retreats via network dynamics. In Proceedings of the the 1st international workshop on resource provisioning and management in sensor networks (RPMSN05).Google Scholar
  18. 18.
    Xu, W., Trappe, W., & Zhang, Y. (2008). Anti-jamming timing channels for wireless networks. In WiSec ’08: Proceedings of the first ACM conference on wireless network security. New York, NY, USA: ACM, pp. 203–213.Google Scholar
  19. 19.
    Cagalj, M., Capkun, S., & Hubaux, J. (2007). Wormhole-based anti-jamming techniques in sensor networks. In IEEE transactions on mobile computing. January 2007, pp. 100–114.Google Scholar
  20. 20.
    Wood, A. D., Stankovic, J. A., & Zhou, G. (2007). Deejam: Defeating energyefficient jamming in ieee 802.15.4-based wireless networks,” In Communications society conference on sensor, mesh and ad hoc communications and networks (SECON).Google Scholar
  21. 21.
    Priyantha, N., Chakraborty, A., & Balakrishnan, H. (2000). The cricket location-support system. In Proceedings of the ACM international conference on mobile computing and networking (MobiCom). Aug 2000, pp. 32–43.Google Scholar
  22. 22.
    Ward, A., Jones, A., & Hopper, A. (1997). A new location technique for the active office. IEEE Personal Communications, 4(5), 42–47.CrossRefGoogle Scholar
  23. 23.
    Chen, Y., Kleisouris, K., Li, X., Trappe, W., & Martin, R. P. (2006). The robustness of localization algorithms to signal strength attacks: A comparative study. In Proceedings of the international conference on distributed computing in sensor systems (DCOSS). June 2006, pp. 546–563.Google Scholar
  24. 24.
    Chandrasekaran, G., Ergin, M. A., Yang, J., Liu, S., Chen, Y., Gruteser, M., & Martin, R. (2009). Empirical evaluation of the limits on localization using signal strength. In Proceedings of the third annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON). June 2009.Google Scholar
  25. 25.
    Hightower, J., Borriello, G., & Want, R. (2000). Spoton: An indoor 3d location sensing technology based on RF signal strength. University of Washington, Dept. of Computer Science and Engineering, Technical Report 00-02-02, February 2000.Google Scholar
  26. 26.
    Enge, P., & Misra, P. (2001). Global positioning system: Signals, measurements and performance. Ganga-Jamuna Pr.Google Scholar
  27. 27.
    He, T., Huang, C., Blum, B., Stankovic, J. A., & Abdelzaher, T. (2003). Range-free localization schemes in large scale sensor networks. In Proceedings of the ninth annual ACM international conference on mobile computing and networking (MobiCom’03).Google Scholar
  28. 28.
    Bulusu, N., Heidemann, J., & Estrin, D. (2000). Gps-less low-cost outdoor localization for very small devices. IEEE Personal Communications Magazine, 7, 28–34.CrossRefGoogle Scholar
  29. 29.
    Niculescu, D., & Nath, B. (2001). Ad hoc positioning system (APS). In Proceedings of the IEEE global telecommunications conference (GLOBECOM). pp. 2926–2931.Google Scholar
  30. 30.
    Shang, Y., Ruml, W., Zhang, Y., & Fromherz, M. P. J. (2003). Localization from mere connectivity. In Proceedings of the fourth ACM international Symposium on mobile ad-hoc networking and computing (MobiHoc). Jun 2003, pp. 201–212.Google Scholar
  31. 31.
    Pelechrinis, K., Koutsopoulos, I., Broustis, I., & Krishnamurthy, S. (2009). Lightweight jammer localization in wireless networks: System design and implementaion. In Proceedings of IEEE global telecommunication cofference (GLOBECOM). December 2009.Google Scholar
  32. 32.
    Deng, J., Han, R., & Mishra, S. (2004). Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In DSN ’04: Proceedings of the 2004 international conference on dependable systems and networks. Washington, DC, USA: IEEE Computer Society, p. 637.Google Scholar
  33. 33.
    Kleppner, D., & Kolenkow, R. J. (1973). An introduction to mechanics. New York: McGraw-Hill.Google Scholar
  34. 34.
    "Crossbow Technology Inc." white paper available at http://www.xbow.com.
  35. 35.
    Xu, W. (2007). On adjusting power to defend wireless networks from jamming. In Proceedings of the first workshop on the security and privacy of emerging ubiquitous communication systems (SPEUCS).Google Scholar
  36. 36.
    Liu, H., Xu, W., Chen, Y., & Liu, Z. (2009). Localizing jammers in wireless networks. In Proceedings of IEEE PerCom international workshop on pervasive wireless networking (IEEE PWN).Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  • Hongbo Liu
    • 1
  • Zhenhua Liu
    • 2
  • Yingying Chen
    • 1
  • Wenyuan Xu
    • 2
  1. 1.Department of ECEStevens Institute of TechnologyHobokenUSA
  2. 2.Department of CSEUniversity of South CarolinaColumbiaUSA

Personalised recommendations