Skip to main content

Localizing Wireless Jamming Attacks with Minimal Network Resources

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10658))

Abstract

Wireless networks such as the wireless sensor networks (WSNs) are increasingly becoming ubiquitous in today’s Internet of Things (IoT) environment. However, wireless networks are very vulnerable to jamming attacks which can be easily carried out by small concealable wireless transmitters. Thus, there is a need to quickly localize and remove the jammer node to prevent further disruptions to the network. In addition, an efficient jammer node localization algorithm should use minimal network resources, e.g., number of reporting nodes. Based on this idea, we propose a maximum likelihood estimator (MLE)-based localization method for the jammer node which allows each node that detected a jammed link to probabilistically transmit a jamming report. The node transmission probabilities are optimized using the cross-entropy (CE) method to ensure that the localization algorithm satisfies a pre-defined reliability threshold. Our simulation results show that the proposed scheme performs significantly better than the simple centroid-based localization methods while using lesser number of reporting nodes and traffic.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Since the fusion center receives all the reports from the nodes, the localization algorithm should produce the lowest possible MSE values.

References

  1. Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., Pantziou, G.: A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tutor. 11(4), 42–56 (2009)

    Article  Google Scholar 

  2. Pelechrinis, K., Iliofotou, M., Krishnamurthy, S.V.: Denial of service attacks in wireless networks: the case of jammers. IEEE Commun. Surv. Tutor. 13(2), 245–257 (2011)

    Article  Google Scholar 

  3. Grover, K., Lim, A., Yang, Q.: Jamming and anti-jamming techniques in wireless networks: a survey. Int. J. Ad Hoc Ubiquitous Comput. 17(4), 197–215 (2014)

    Article  Google Scholar 

  4. Lu, Z., Wang, W., Wang, C.: From jammer to gambler: modeling and detection of jamming attacks against time-critical traffic. In: Proceedings of the IEEE International Conference Computer Communications (INFOCOM), pp. 1871–1879, April 2011

    Google Scholar 

  5. Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 46–57 (2005)

    Google Scholar 

  6. Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming sensor networks: attack and defense strategies. IEEE Netw. 20(3), 41–47 (2006)

    Article  Google Scholar 

  7. Wood, A.D., Stankovic, J.A., Son, S.H.: Jam: a jammed-area mapping service for sensor networks. In: IEEE Real-Time Systems Symposium (RTSS), pp. 286–297, December 2003

    Google Scholar 

  8. Sun, Y., Wang, X., Zhou, X.: Jammer localization for wireless sensor networks. Chin. J. Electron. 20(4), 735–738 (2011)

    Google Scholar 

  9. Pelechrinis, K., Koutsopoulos, I., Broustis, I., Krishnamurthy, S.V.: Lightweight jammer localization in wireless networks: system design and implementation. In: IEEE Global Telecommunications Conference (GLOBECOM), pp. 1–6, November 2009

    Google Scholar 

  10. Koh, J.Y., Nevat, I., Leong, D., Wong, W.C.: Geo-spatial location spoofing detection for internet of things. IEEE Internet Things J. PP(99), 1–8 (2016)

    Google Scholar 

  11. Nevat, I., Peters, G.W., Avnit, K., Septier, F., Clavier, L.: Location of things: geospatial tagging for iot using time-of-arrival. IEEE Trans. Signal Inf. Process. Over Netw. 2(2), 174–185 (2016)

    Article  MathSciNet  Google Scholar 

  12. Lu, Z., Wang, W., Wang, C.: Modeling, evaluation and detection of jamming attacks in time-critical wireless applications. IEEE Trans. Mobile Comput. 13(8), 1746–1759 (2014)

    Article  Google Scholar 

  13. Liu, H., Liu, Z., Chen, Y., Xu, W.: Determining the position of a jammer using a virtual-force iterative approach. Wirel. Netw. 17(2), 531–547 (2011)

    Article  Google Scholar 

  14. Patwari, N., Hero III, A., Perkins, M., Correal, N., O’Dea, R.: Relative location estimation in wireless sensor networks. IEEE Trans. Signal Process. 51(8), 2137–2148 (2003)

    Article  Google Scholar 

  15. Rubinstein, R.Y., Kroese, D.P.: The Cross-Entropy Method. A Unified Approach to Combinatorial Optimization, Monte-carlo Simulation and Machine Learning. Information Science and Statistics. Springer, New York (2004). https://doi.org/10.1007/978-1-4757-4321-0

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pengfei Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Koh, J.Y., Zhang, P. (2017). Localizing Wireless Jamming Attacks with Minimal Network Resources. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72395-2_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72394-5

  • Online ISBN: 978-3-319-72395-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics