Eavesdropper and Jammer Selection in Wireless Source Localization Networks

نویسندگان

چکیده

We consider a wireless source localization network in which target node emits signals that are used by anchor nodes to estimate the position. In addition and nodes, there can also exist eavesdropper jammer aim position of degrade accuracy localization, respectively. first propose problem selection with goal optimally placing given number subset possible positions as accurately possible. As performance metric, Cramer-Rao lower bound (CRLB) related estimation is derived, its convexity monotonicity properties investigated. By relaxing integer constraints, approximated convex optimization algorithms proposed for selection. Moreover, presence parameter uncertainty, robust version developed. Then, where place degrading much A CRLB expression from literature concavity derived. Also, derived after relaxation. joint certain numbers positions. Simulation results presented illustrate algorithms.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Technique for Jammer Localization in Wireless Networks

Jammеrs could drastically interrupt your salеs and marketing communications throughout wifi sitеs, along with jammers’ situation information еnables your dеfensе to positively еliminate thе jamming assaults. Hеncе, with this cardstock, most of us aim to dеsign a new structure that may localize onе particular or many jammers using a high accuracy. Most of recent jammеr-localization plans employ ...

متن کامل

Relay Secrecy in Wireless Networks with Eavesdropper

Anonymous monitoring of transmissions in a wireless network by eavesdroppers can provide critical information about the data flows in the network. It is, therefore, necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, we present a mathematical formulation of route secrecy when eavesdroppers observe transmission epochs of nodes. We propose a sch...

متن کامل

Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer

Physical layer security is an emerging security area that explores possibilities of achieving perfect secrecy data transmission between the intended network nodes, while possible malicious nodes that eavesdrop the communication obtain zero information. The so-called secrecy capacity can be improved using friendly jammers that introduce extra interference to the eavesdroppers. Here, we investiga...

متن کامل

A Survey and Open Issues of Jammer Localization Techniques in Wireless Sensor Networks

Jamming sensor attacks localization is a significant area that acquires considerable research interest. This interest is expected to grow further with the prolifiration of wireless sensor network applications due to the physical share environment. Jamming attacks emitting a radio frequency signals by the adversaries and impact the wireless sensor network localization tactic. Also the jamming at...

متن کامل

Preserving Source-Location Privacy in Wireless Sensor Networks against a Global Eavesdropper

While many works to date in wireless sensor networks (WSNs) security have focused on providing confidentiality for message contents, contextual information usually remains exposed. Thus the adversary especially the global eavesdropper can easily obtain the sensitive information such as the location of a target object in a monitoring application, which is critical to the mission of the sensor ne...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Signal Processing

سال: 2021

ISSN: ['1053-587X', '1941-0476']

DOI: https://doi.org/10.1109/tsp.2021.3098465