Multi-jammer localization in wireless sensor networks

Tianzhen Cheng, Ping Li, Sencun Zhu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Abstract

Jamming attack is one of the most severe attacks in wireless sensor networks (WSNs). While existing counter-measures mainly focus on designing new communication mechanisms to survive under jamming, an alternative solution is to first localize the jammer(s) and then take necessary actions. In this work, we solve a multi-jammer localization problem, where multiple jammers launch collaborative jamming attacks. We develop an x-rayed jammed-area localization (X-ray) algorithm which skeletonizes jammed areas and estimates the jammer locations based on bifurcation points on skeletons of jammed areas. Our extensive simulation results demonstrate that with one run of the algorithms, X-ray is efficient in localizing multiple jammers in WSN with small errors.

Original languageEnglish (US)
Title of host publicationProceedings - 2011 7th International Conference on Computational Intelligence and Security, CIS 2011
Pages736-740
Number of pages5
DOIs
StatePublished - Dec 1 2011
Event2011 7th International Conference on Computational Intelligence and Security, CIS 2011 - Sanya, Hainan, China
Duration: Dec 3 2011Dec 4 2011

Publication series

NameProceedings - 2011 7th International Conference on Computational Intelligence and Security, CIS 2011

Other

Other2011 7th International Conference on Computational Intelligence and Security, CIS 2011
CountryChina
CitySanya, Hainan
Period12/3/1112/4/11

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computational Theory and Mathematics

Fingerprint Dive into the research topics of 'Multi-jammer localization in wireless sensor networks'. Together they form a unique fingerprint.

  • Cite this

    Cheng, T., Li, P., & Zhu, S. (2011). Multi-jammer localization in wireless sensor networks. In Proceedings - 2011 7th International Conference on Computational Intelligence and Security, CIS 2011 (pp. 736-740). [6128223] (Proceedings - 2011 7th International Conference on Computational Intelligence and Security, CIS 2011). https://doi.org/10.1109/CIS.2011.167