Abstract
Wireless networks such as the wireless sensor networks (WSNs) are increasingly becoming ubiquitous in today’s Internet of Things (IoT) environment. However, wireless networks are very vulnerable to jamming attacks which can be easily carried out by small concealable wireless transmitters. Thus, there is a need to quickly localize and remove the jammer node to prevent further disruptions to the network. In addition, an efficient jammer node localization algorithm should use minimal network resources, e.g., number of reporting nodes. Based on this idea, we propose a maximum likelihood estimator (MLE)-based localization method for the jammer node which allows each node that detected a jammed link to probabilistically transmit a jamming report. The node transmission probabilities are optimized using the cross-entropy (CE) method to ensure that the localization algorithm satisfies a pre-defined reliability threshold. Our simulation results show that the proposed scheme performs significantly better than the simple centroid-based localization methods while using lesser number of reporting nodes and traffic.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Since the fusion center receives all the reports from the nodes, the localization algorithm should produce the lowest possible MSE values.
References
Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., Pantziou, G.: A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tutor. 11(4), 42–56 (2009)
Pelechrinis, K., Iliofotou, M., Krishnamurthy, S.V.: Denial of service attacks in wireless networks: the case of jammers. IEEE Commun. Surv. Tutor. 13(2), 245–257 (2011)
Grover, K., Lim, A., Yang, Q.: Jamming and anti-jamming techniques in wireless networks: a survey. Int. J. Ad Hoc Ubiquitous Comput. 17(4), 197–215 (2014)
Lu, Z., Wang, W., Wang, C.: From jammer to gambler: modeling and detection of jamming attacks against time-critical traffic. In: Proceedings of the IEEE International Conference Computer Communications (INFOCOM), pp. 1871–1879, April 2011
Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 46–57 (2005)
Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming sensor networks: attack and defense strategies. IEEE Netw. 20(3), 41–47 (2006)
Wood, A.D., Stankovic, J.A., Son, S.H.: Jam: a jammed-area mapping service for sensor networks. In: IEEE Real-Time Systems Symposium (RTSS), pp. 286–297, December 2003
Sun, Y., Wang, X., Zhou, X.: Jammer localization for wireless sensor networks. Chin. J. Electron. 20(4), 735–738 (2011)
Pelechrinis, K., Koutsopoulos, I., Broustis, I., Krishnamurthy, S.V.: Lightweight jammer localization in wireless networks: system design and implementation. In: IEEE Global Telecommunications Conference (GLOBECOM), pp. 1–6, November 2009
Koh, J.Y., Nevat, I., Leong, D., Wong, W.C.: Geo-spatial location spoofing detection for internet of things. IEEE Internet Things J. PP(99), 1–8 (2016)
Nevat, I., Peters, G.W., Avnit, K., Septier, F., Clavier, L.: Location of things: geospatial tagging for iot using time-of-arrival. IEEE Trans. Signal Inf. Process. Over Netw. 2(2), 174–185 (2016)
Lu, Z., Wang, W., Wang, C.: Modeling, evaluation and detection of jamming attacks in time-critical wireless applications. IEEE Trans. Mobile Comput. 13(8), 1746–1759 (2014)
Liu, H., Liu, Z., Chen, Y., Xu, W.: Determining the position of a jammer using a virtual-force iterative approach. Wirel. Netw. 17(2), 531–547 (2011)
Patwari, N., Hero III, A., Perkins, M., Correal, N., O’Dea, R.: Relative location estimation in wireless sensor networks. IEEE Trans. Signal Process. 51(8), 2137–2148 (2003)
Rubinstein, R.Y., Kroese, D.P.: The Cross-Entropy Method. A Unified Approach to Combinatorial Optimization, Monte-carlo Simulation and Machine Learning. Information Science and Statistics. Springer, New York (2004). https://doi.org/10.1007/978-1-4757-4321-0
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Koh, J.Y., Zhang, P. (2017). Localizing Wireless Jamming Attacks with Minimal Network Resources. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_30
Download citation
DOI: https://doi.org/10.1007/978-3-319-72395-2_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72394-5
Online ISBN: 978-3-319-72395-2
eBook Packages: Computer ScienceComputer Science (R0)