Jammer Localization Using Wireless Devices with Mitigation by Self-Configuration
نویسندگان
چکیده
Communication abilities of a wireless network decrease significantly in the presence of a jammer. This paper presents a reactive technique, to detect and locate the position of a jammer using a distributed collection of wireless sensor devices. We employ the theory of autonomic computing as a framework to design the same. Upon detection of a jammer, the affected nodes self-configure their power consumption which stops unnecessary waste of battery resources. The scheme then proceeds to determine the approximate location of the jammer by analysing the location of active nodes as well as the affected nodes. This is done by employing a circular curve fitting algorithm. Results indicate a high degree of accuracy in localizing a jammer has been achieved.
منابع مشابه
M-cluster and X-ray: Two methods for multi-jammer localization in wireless sensor networks
Jamming is one of the most severe attacks in wireless sensor networks (WSNs). While existing countermeasures mainly focus on designing new communication mechanisms to survive under jamming, a proactive solution is to first localize the jammer(s) and then take necessary actions. Unlike the existing work that focuses on localizing a single jammer in WSNs, this work solves a multi-jammer localizat...
متن کاملGeometry-covering Jammer Localization based on Distance Comprehension in Wireless Sensor Networks
Jamming attacks could cause severe damage to Wireless Sensor Networks (WSNs). Once jamming attack occurs, the most urgent work is to get the position information of the jammer. Then safety measures to eliminate the jamming effects can be devised. In this paper, the jammer localization is conducted by geometric covering method to achieve a low energy consumption. And utilizing the power of the j...
متن کاملSecurity Threats and Jamming Attacks of Multi Channel Wireless Sensor Networks
Built upon a shared wireless medium, wireless sensor network is particularly vulnerable to jamming attacks. These attacks can easily be accomplished by an adversary by either bypassing MAC-layer protocols or emitting a radio signal targeted at jamming a particular channel. This paper considers a scenario where a sophisticated jammer jams an area in a multichannel wireless sensor network. The ja...
متن کاملA Survey and Open Issues of Jammer Localization Techniques in Wireless Sensor Networks
Jamming sensor attacks localization is a significant area that acquires considerable research interest. This interest is expected to grow further with the prolifiration of wireless sensor network applications due to the physical share environment. Jamming attacks emitting a radio frequency signals by the adversaries and impact the wireless sensor network localization tactic. Also the jamming at...
متن کاملDetermining the position of a jammer using a virtual-force iterative approach
Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications. Most existing anti-jamming work does not consider the location information of radio interferers and jammers. However, this information can provide important insights for networks to manage its resource in different layers and to defend against radio interference. In th...
متن کامل