Skip to main content
Log in

Determining the position of a jammer using a virtual-force iterative approach

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications. Most existing anti-jamming work does not consider the location information of radio interferers and jammers. However, this information can provide important insights for networks to manage its resource in different layers and to defend against radio interference. In this paper, we investigate issues associated with localizing jammers in wireless networks. In particular, we formulate the jamming effects using two jamming models: region-based and signal-to-noise-ratio(SNR)-based; and we categorize network nodes into three states based on the level of disturbance caused by the jammer. By exploiting the states of nodes, we propose to localize jammers in wireless networks using a virtual-force iterative approach. The virtual-force iterative localization scheme is a range-free position estimation method that estimates the position of a jammer iteratively by utilizing the network topology. We have conducted experiments to validate our SNR-based jamming model and performed extensive simulation to evaluate our approach. Our simulation results have showed that the virtual-force iterative approach is highly effective in localizing a jammer in various network conditions when comparing to existing centroid-based localization approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Want, R., Hopper, A., Falcao, V., & Gibbons, J. (1992). The active badge location system. ACM Transactions on Information Systems, 10(1), 91–102.

    Article  Google Scholar 

  2. Bahl, P., & Padmanabhan, V. N. (2000). RADAR: An in-building RF-based user location and tracking system. In Proceedings of the IEEE international conference on computer communications (INFOCOM). March 2000, pp. 775–784.

  3. He, T., Huang, C., Blum, B. M., Stankovic, J. A., & Abdelzaher, T. (2005). Range-free localization and its impact on large scale sensor networks. ACM Transactions on Embedded Computing Systems, 4, 877–906.

    Article  Google Scholar 

  4. Chen, Y., Francisco, J., Trappe, W., & Martin, R. P. (2006). A practical approach to landmark deployment for indoor localization. In Proceedings of the third annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON).

  5. Kleisouris, K., Chen, Y., Yang, J., & Martin, R. P. (2008). The impact of using multiple antennas on wireless localization. In Proceedings of the fifth annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON). June 2008.

  6. Proakis, J. G. (2000). Digital communications (4th ed.). Singapore: McGraw-Hill.

  7. Schleher, C. (1999). Electronic warfare in the information age. Norwood: MArtech House.

    Google Scholar 

  8. Wood, A., Stankovic, J., & Son, S. (2003). JAM: A jammed-area mapping service for sensor networks. In 24th IEEE real-time systems Symposium. pp. 286–297.

  9. Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In MobiHoc ’05: Proceedings of the 6th ACM international Symposium on mobile ad hoc networking and computing. pp. 46–57.

  10. Çakiroǧlu, M., & Özcerit, A. T. (2008). Jamming detection mechanisms for wireless sensor networks. In InfoScale ’08: Proceedings of the 3rd international conference on scalable information systems. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 1–8.

  11. Mraleedharan, R., & Osadciw, L. A. (2006). Jamming attack detection and countermeasures in wireless sensor network using ant system,” in Proceedings of the SPIE in wireless sensing and processing, (Vol. 6248). p. 62480G.

  12. Chiang, J. T., & Hu, Y.-C. (2007). Cross-layer jamming detection and mitigation in wireless broadcast networks. In MobiCom ’07: Proceedings of the 13th annual ACM international conference on mobile computing and networking. New York, NY, USA: ACM, pp. 346–349.

  13. Noubir, G. & Lin, G. (2003). Low-power DoS attacks in data wireless lans and countermeasures. SIGMOBILE Mobile Computing and Communications Review, 7(3), 29–30.

    Article  Google Scholar 

  14. Xu, W., Trappe, W., & Zhang, Y. (2007). Channel surfing: Defending wireless sensor networks from interference. In IPSN ’07: Proceedings of the 6th international conference on information processing in sensor networks. pp. 499–508.

  15. Navda, V., Bohra, A., Ganguly, S., Izmailov, R., & Rubenstein, D. (2007). Using channel hopping to increase 802.11 resilience to jamming attacks. In IEEE infocom minisymposium. May 2007, pp. 2526–2530.

  16. Khattab, S., Mosse, D., & Melhem, R. (2008). Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks,” In Mobiquitous ’08: Proceedings of the 5th annual international conference on mobile and ubiquitous systems. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 1–10.

  17. Ma, K., Zhang, Y., & Trappe, W. (2005). Mobile network management and robust spatial retreats via network dynamics. In Proceedings of the the 1st international workshop on resource provisioning and management in sensor networks (RPMSN05).

  18. Xu, W., Trappe, W., & Zhang, Y. (2008). Anti-jamming timing channels for wireless networks. In WiSec ’08: Proceedings of the first ACM conference on wireless network security. New York, NY, USA: ACM, pp. 203–213.

  19. Cagalj, M., Capkun, S., & Hubaux, J. (2007). Wormhole-based anti-jamming techniques in sensor networks. In IEEE transactions on mobile computing. January 2007, pp. 100–114.

  20. Wood, A. D., Stankovic, J. A., & Zhou, G. (2007). Deejam: Defeating energyefficient jamming in ieee 802.15.4-based wireless networks,” In Communications society conference on sensor, mesh and ad hoc communications and networks (SECON).

  21. Priyantha, N., Chakraborty, A., & Balakrishnan, H. (2000). The cricket location-support system. In Proceedings of the ACM international conference on mobile computing and networking (MobiCom). Aug 2000, pp. 32–43.

  22. Ward, A., Jones, A., & Hopper, A. (1997). A new location technique for the active office. IEEE Personal Communications, 4(5), 42–47.

    Article  Google Scholar 

  23. Chen, Y., Kleisouris, K., Li, X., Trappe, W., & Martin, R. P. (2006). The robustness of localization algorithms to signal strength attacks: A comparative study. In Proceedings of the international conference on distributed computing in sensor systems (DCOSS). June 2006, pp. 546–563.

  24. Chandrasekaran, G., Ergin, M. A., Yang, J., Liu, S., Chen, Y., Gruteser, M., & Martin, R. (2009). Empirical evaluation of the limits on localization using signal strength. In Proceedings of the third annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON). June 2009.

  25. Hightower, J., Borriello, G., & Want, R. (2000). Spoton: An indoor 3d location sensing technology based on RF signal strength. University of Washington, Dept. of Computer Science and Engineering, Technical Report 00-02-02, February 2000.

  26. Enge, P., & Misra, P. (2001). Global positioning system: Signals, measurements and performance. Ganga-Jamuna Pr.

  27. He, T., Huang, C., Blum, B., Stankovic, J. A., & Abdelzaher, T. (2003). Range-free localization schemes in large scale sensor networks. In Proceedings of the ninth annual ACM international conference on mobile computing and networking (MobiCom’03).

  28. Bulusu, N., Heidemann, J., & Estrin, D. (2000). Gps-less low-cost outdoor localization for very small devices. IEEE Personal Communications Magazine, 7, 28–34.

    Article  Google Scholar 

  29. Niculescu, D., & Nath, B. (2001). Ad hoc positioning system (APS). In Proceedings of the IEEE global telecommunications conference (GLOBECOM). pp. 2926–2931.

  30. Shang, Y., Ruml, W., Zhang, Y., & Fromherz, M. P. J. (2003). Localization from mere connectivity. In Proceedings of the fourth ACM international Symposium on mobile ad-hoc networking and computing (MobiHoc). Jun 2003, pp. 201–212.

  31. Pelechrinis, K., Koutsopoulos, I., Broustis, I., & Krishnamurthy, S. (2009). Lightweight jammer localization in wireless networks: System design and implementaion. In Proceedings of IEEE global telecommunication cofference (GLOBECOM). December 2009.

  32. Deng, J., Han, R., & Mishra, S. (2004). Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In DSN ’04: Proceedings of the 2004 international conference on dependable systems and networks. Washington, DC, USA: IEEE Computer Society, p. 637.

  33. Kleppner, D., & Kolenkow, R. J. (1973). An introduction to mechanics. New York: McGraw-Hill.

    Google Scholar 

  34. "Crossbow Technology Inc." white paper available at http://www.xbow.com.

  35. Xu, W. (2007). On adjusting power to defend wireless networks from jamming. In Proceedings of the first workshop on the security and privacy of emerging ubiquitous communication systems (SPEUCS).

  36. Liu, H., Xu, W., Chen, Y., & Liu, Z. (2009). Localizing jammers in wireless networks. In Proceedings of IEEE PerCom international workshop on pervasive wireless networking (IEEE PWN).

Download references

Acknowledgments

Preliminary results of this paper have been presented in part in IEEE SPEUCS 2007 [35] and IEEE PWN 2009 [36]. The work was supported in part by National Science Foundation Grants CNS-0845671 and CNS-0954020.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongbo Liu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Liu, H., Liu, Z., Chen, Y. et al. Determining the position of a jammer using a virtual-force iterative approach. Wireless Netw 17, 531–547 (2011). https://doi.org/10.1007/s11276-010-0295-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-010-0295-6

Keywords

Navigation