Skip to main content

An Inducing Localization Scheme for Reactive Jammer in ZigBee Networks

  • Conference paper
  • First Online:
Book cover Science of Cyber Security (SciSec 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11287))

Included in the following conference series:

  • 704 Accesses

Abstract

Reactive Jamming attack could severely disrupt the communications in ZigBee networks, which will have an evident jamming effect on the transmissions in a hard-to-detect manner. Therefore, after analyzing the general process of reactive jamming, we develop a lightweight reactive jammer localization scheme, called IndLoc, which is applicable to ZigBee networks. In this scheme, we first design the time-varying mask code (TVMC) to protect the transmission of the packets to ensure that the jammer cannot monitor the channel effectively. Then, the strength of jamming signal (JSS) could be collected by sending inducing messages into the channel. And the location of the jammer can be estimated through the locations of JSS peak nodes, which are selected according to the gradient ascent algorithm. Experiments are performed based on an open-source stack, msstatePAN. And the results reveal that IndLoc could effectively protect the transmissions of the packets and achieve relatively higher localization accuracy under different network scenarios with fewer calculation and storage overheads.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Tseng, H.W., Lee, Y.H., Yen, L.Y.: ZigBee (2.4 G) wireless sensor network application on indoor intrusion detection. In: Consumer Electronics-Taiwan (ICCE-TW), Taiwan, pp. 434–435. IEEE (2015)

    Google Scholar 

  2. Borges, L.M., Velez, F.J., Lebres, A.S.: Survey on the characterization and classification of wireless sensor network applications. IEEE Commun. Surv. Tutor. 16(4), 1860–1890 (2014)

    Article  Google Scholar 

  3. Strasser, M., Danev, B., Čapkun, S.: Detection of reactive jamming in sensor networks. ACM Trans. Sens. Netw. (TOSN) 7(2), 16 (2010)

    Google Scholar 

  4. Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. Computer 35(10), 54–62 (2002)

    Article  Google Scholar 

  5. Xu, W., Trappe, W., Zhang, Y.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing 2005, pp. 46–57. ACM (2005)

    Google Scholar 

  6. Wilhelm, M., Martinovic, I., Schmitt, J.B.: Short paper: reactive jamming in wireless networks: how realistic is the threat? In: Proceedings of the Fourth ACM Conference on Wireless Network Security 2011, pp. 47–52. ACM (2011)

    Google Scholar 

  7. Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C.: A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tutor. 11(4), 42–56 (2009)

    Article  Google Scholar 

  8. Liu, Y., Ning, P.: BitTrickle: defending against broadband and high-power reactive jamming attacks. In: 2012 Proceedings of IEEE INFOCOM, pp. 909–917. IEEE (2012)

    Google Scholar 

  9. Li, M., Koutsopoulos, I., Poovendran, R.: Optimal jamming attack strategies and network defense policies in wireless sensor networks. IEEE Trans. Mob. Comput. 9(8), 1119–1133 (2010)

    Article  Google Scholar 

  10. Pelechrinis, K., Koutsopoulos, I., Broustis, I.: Lightweight jammer localization in wireless networks: system design and implementation. In: Global Telecommunications Conference 2009, GLOBECOM, pp. 1–6. IEEE (2009)

    Google Scholar 

  11. Cheng, T., Li, P., Zhu, S.: An algorithm for jammer localization in wireless sensor networks. In: 2012 IEEE 26th International Conference on Advanced Information Networking and Applications (AINA), pp. 724–731. IEEE (2012)

    Google Scholar 

  12. Liu, H., Liu, Z., Chen, Y.: Localizing multiple jamming attackers in wireless networks. In: 2011 31st International Conference on Distributed Computing Systems (ICDCS), pp. 517–528. IEEE (2011)

    Google Scholar 

  13. Liu, H., Liu, Z., Xu, W., Chen, Y.: Localizing jammers in wireless networks. In: IEEE International Conference on Pervasive Computing & Communications 2009, vol. 25, pp. 1–6. IEEE (2009)

    Google Scholar 

  14. Liu, Z., Liu, H., Xu, W., Chen, Y.: Wireless jamming localization by exploiting nodes’ hearing ranges. In: Rajaraman, R., Moscibroda, T., Dunkels, A., Scaglione, A. (eds.) DCOSS 2010. LNCS, vol. 6131, pp. 348–361. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13651-1_25

    Chapter  Google Scholar 

  15. Wang, T., Wei, X., Sun, Q.: GSA-based jammer localization in multi-hop wireless network. In: 2017 Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC), vol. 1, pp. 410–415. IEEE (2017)

    Google Scholar 

  16. Cai, Y., Pelechrinis, K., Wang, X.: Joint reactive jammer detection and localization in an enterprise WiFi network. Comput. Netw. 57(18), 3799–3811 (2013)

    Article  Google Scholar 

  17. Xuan, Y., Shen, Y., Nguyen, N.P.: A trigger identification service for defending reactive jammers in WSN. IEEE Trans. Mob. Comput. 11(5), 793–806 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kuan He .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

He, K., Yu, B. (2018). An Inducing Localization Scheme for Reactive Jammer in ZigBee Networks. In: Liu, F., Xu, S., Yung, M. (eds) Science of Cyber Security. SciSec 2018. Lecture Notes in Computer Science(), vol 11287. Springer, Cham. https://doi.org/10.1007/978-3-030-03026-1_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-03026-1_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-03025-4

  • Online ISBN: 978-3-030-03026-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics