TY - GEN
T1 - Multi-jammer localization in wireless sensor networks
AU - Cheng, Tianzhen
AU - Li, Ping
AU - Zhu, Sencun
PY - 2011/12/1
Y1 - 2011/12/1
N2 - Jamming attack is one of the most severe attacks in wireless sensor networks (WSNs). While existing counter-measures mainly focus on designing new communication mechanisms to survive under jamming, an alternative solution is to first localize the jammer(s) and then take necessary actions. In this work, we solve a multi-jammer localization problem, where multiple jammers launch collaborative jamming attacks. We develop an x-rayed jammed-area localization (X-ray) algorithm which skeletonizes jammed areas and estimates the jammer locations based on bifurcation points on skeletons of jammed areas. Our extensive simulation results demonstrate that with one run of the algorithms, X-ray is efficient in localizing multiple jammers in WSN with small errors.
AB - Jamming attack is one of the most severe attacks in wireless sensor networks (WSNs). While existing counter-measures mainly focus on designing new communication mechanisms to survive under jamming, an alternative solution is to first localize the jammer(s) and then take necessary actions. In this work, we solve a multi-jammer localization problem, where multiple jammers launch collaborative jamming attacks. We develop an x-rayed jammed-area localization (X-ray) algorithm which skeletonizes jammed areas and estimates the jammer locations based on bifurcation points on skeletons of jammed areas. Our extensive simulation results demonstrate that with one run of the algorithms, X-ray is efficient in localizing multiple jammers in WSN with small errors.
UR - http://www.scopus.com/inward/record.url?scp=84856533161&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84856533161&partnerID=8YFLogxK
U2 - 10.1109/CIS.2011.167
DO - 10.1109/CIS.2011.167
M3 - Conference contribution
AN - SCOPUS:84856533161
SN - 9780769545844
T3 - Proceedings - 2011 7th International Conference on Computational Intelligence and Security, CIS 2011
SP - 736
EP - 740
BT - Proceedings - 2011 7th International Conference on Computational Intelligence and Security, CIS 2011
T2 - 2011 7th International Conference on Computational Intelligence and Security, CIS 2011
Y2 - 3 December 2011 through 4 December 2011
ER -