Abstract
The shared nature and open access to the wireless medium make the wireless network vulnerable to different kinds of security threats. Jamming attack may pose a significant threat to the wireless network by occupying the communication channel used by legal nodes. To tackle this security threat, a few anti-jamming schemes have been put forward, such as channel hopping, spatial retreat, etc. Among these strategies, jammer localization has attracted much attention in recent years since it is very helpful for jamming-avoidance routing or even jammer elimination. However, existing algorithms mainly focus on the localization of the stationary jammer, which fail to cope with the scenario where mobile one exists. Besides, the cooperative assumption in sensor localization and object tracking problems in cooperative network configurations will not hold for the jammer localization scenario since jamming attacks can seriously affect normal network transmission. In order to bridge this gap, a Mobile Jammer Localization and Tracking Scheme (MJLTS) is put forward, which contains four steps, i.e., Initial monitoring nodes selection, Cooperative nodes determination, Trilateration localization and Monitoring group handover. In order to evaluate the effectiveness of the proposed scheme, a series of simulation experiments have been conducted. Experimental results show that MJLTS can locate and track mobile jammer effectively and accurately.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Adamy D (2004) Ew 102: a second course in electronic warfare. Artech House Inc, Norwood
Armaghani FR, Gondal I, Kamruzzaman J, Green DG (2014) Sensor selection for tracking multiple groups of targets. J Netw Comput Appl 46(C):36–47. https://doi.org/10.1016/j.jnca.2014.07.023
Bahl P, Padmanabhan VN (2000) RADAR: an in-building RF-based user location and tracking system. INFOCOM 2000. Nineteenth Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE (Vol.2, pp. 775–784 vol. 2). IEEE Xplore. https://doi.org/10.1109/infcom.2000.832252
Bhuiyan MZA, Wang G, Vasilakos AV (2015) Local area prediction-based mobile target tracking in wireless sensor networks. Comput IEEE Trans 64(7):1968–1982. https://doi.org/10.1109/tc.2014.2346209
Blumenthal J, Grossmann R, Golatowski F, Timmermann D (2007) Weighted centroid localization in Zigbee-based sensor networks. In: IEEE International Symposium on Intelligent Signal Processing (pp 1–6). IEEE. https://doi.org/10.1109/wisp.2007.4447528
Cheng T, Li P, Zhu S (2012) An algorithm for jammer localization in wireless sensor networks. In: IEEE, International Conference on Advanced Information Networking and Applications (Vol 11, pp 724–731). IEEE. https://doi.org/10.1109/aina.2012.11
Cheng T, Li P, Zhu S, Torrieri D (2014) M-cluster and X-ray: two methods for multi-jammer localization in wireless sensor networks. Integr Comput Aided Eng 21(1):19–34. https://doi.org/10.3233/ICA-130445
D’Orazio C, Choo KKR (2016) An adversary model to evaluate DRM protection of video contents on iOS devices. Comput Secur. https://doi.org/10.1016/j.cose.2015.06.009 (Elsevier Advanced Technology Publications)
Fan J, Wang Q, Wei X, Wang T (2014) Jammer location-oriented noise node elimination method for MHWN. Int J Mobile Comput Multimed Commun (IJMCMC) 6(4):1–19. https://doi.org/10.4018/IJMCMC.2014100101
Ge M, Choo KKR, Wu H, Yu Y (2016) Survey on key revocation mechanisms in wireless sensor networks. J Netw Comput Appl 63:24–38. https://doi.org/10.1016/j.jnca.2016.01.012
Gezici S, Gholami MR, Bayram S, Jansson M (2016) Jamming of wireless localization systems. IEEE Trans Commun 64(6):2660–2676. https://doi.org/10.1109/TCOMM.2016.2558560
Gharghan SK, Nordin R, Ismail M, Ali JA (2015) Accurate wireless sensor localization technique based on hybrid pso-ann algorithm for indoor and outdoor track cycling. IEEE Sens J 16(2):529–541. https://doi.org/10.1109/jsen.2015.2483745
Kumar S, Tiwari SN, Hegde RM (2015) Sensor node tracking using semi-supervised hidden markov models. Ad Hoc Netw 33:55–70. https://doi.org/10.1016/j.adhoc.2015.04.004
Li W, Jia Y, Du J (2015). RSS-based joint detection and tracking in mixed LOS and NLOS environments. Academic Press Inc, Cambridge. https://doi.org/10.1016/j.dsp.2015.05.001
Liu H, Wenyuan X, Chen Y, Liu Z (2009). Localizing jammers in wireless networks. In: IEEE International Conference on Pervasive Computing and Communications (Vol.25, pp. 1–6). IEEE Computer Society. https://doi.org/10.1109/percom.2009.4912878
Liu Z, Liu H, Xu W, Chen Y (2010) Wireless jamming localization by exploiting nodes’ hearing ranges. In: Distributed Computing in Sensor Systems. DBLP. https://doi.org/10.1007/978-3-642-13651-1_25
Liu Z, Liu H, Xu W, Chen Y (2012) Exploiting jamming-caused neighbor changes for jammer localization. IEEE Trans Parallel Distrib Syst 23(3):547–555. https://doi.org/10.1109/tpds.2011.154
Liu Z, Liu H, Xu W, Chen Y (2014) An error-minimizing framework for localizing jammers in wireless networks. IEEE Trans Parallel Distrib Syst 25(2):508–517. https://doi.org/10.9756/bijsesc.8231
Michaelides MP, Laoudias C, Panayiotou CG (2014) Fault tolerant localization and tracking of multiple sources in wsns using binary data. Mobile Comput IEEE Trans 13(6):1213–1227. https://doi.org/10.1109/tmc.2013.2297319
Misra S, Singh A, Chatterjee S, Mandal AK (2015) Qos-aware sensor allocation for target tracking in sensor-cloud. Ad Hoc Netw 33:140–153. https://doi.org/10.1016/j.adhoc.2015.04.009
Pang L, Chen X, Xue Z, Khatoun R (2017) A novel range-free jammer localization solution in wireless network by using PSO algorithm. In: Zou B, Han Q, Sun G, Jing W, Peng X, Lu Z (eds) International conference of pioneering computer scientists, engineers and educators. Springer, Singapore, pp 198–211
Pelechrinis K, Koutsopoulos I, Broustis I, Krishnamurthy SV (2010) Lightweight jammer localization in wireless networks: system design and implementation. Global Telecommunications Conference. 2009. GLOBECOM (pp 1–6). IEEE. https://doi.org/10.1109/glocom.2009.5425405
Pelechrinis K, Koutsopoulos I, Broustis I, Krishnamurthy SV (2016) Jammer localization in wireless networks: an experimentation-driven approach. Comput Commun 86:75–85. https://doi.org/10.1016/j.comcom.2016.04.009
Rashid H, Turuk AK (2015) Dead reckoning localisation technique for mobile wireless sensor networks. Wireless Sensor Systems IET 5(2):87–96. https://doi.org/10.1049/iet-wss.2014.0043
Read J, Achutegui K (2014) A distributed particle filter for nonlinear tracking in wireless sensor networks. Sig Process 98(5):121–134. https://doi.org/10.1016/j.sigpro.2013.11.020
Savic V, Wymeersch H, Zazo S (2014) Belief consensus algorithms for fast distributed target tracking in wireless sensor networks. Sig Process 95(2):149–160. https://doi.org/10.1016/j.sigpro.2013.09.005
Shi K, Chen H, Lin Y (2015) Probabilistic coverage based sensor scheduling for target tracking sensor networks. Inf Sci 292(C):95–110. https://doi.org/10.1016/j.ins.2014.08.067
Sun Y, Wang X, Molva R (2011) CrowdLoc: wireless jammer localization with crowdsourcing measurements. In: Proceedings of the 2nd international workshop on Ubiquitous crowdsouring (pp 33–36). ACM. https://doi.org/10.1145/2030100.2030111
Vasuhi S, Vaidehi V (2016) Target tracking using interactive multiple model for wireless sensor network. Inf Fusion. https://doi.org/10.1016/j.inffus.2015.05.004 (Elsevier Science Publishers B V)
Wang Q, Wei X, Fan J, Wang T, Sun Q (2016) A step further of PDR-based jammer localization through dynamic power adaptation. In: International Conference on Wireless Communications, NETWORKING and Mobile Computing (pp 6. -6.). IET. https://doi.org/10.1049/cp.2015.0731
Wang T, Wei X, Sun Q, Hu F (2017) GSA-Based Jammer Localization in Multi-Hop Wireless Network. In: IEEE International Conference on Computational Science and Engineering (pp 410–415). IEEE. https://doi.org/10.1109/cse-euc.2017.80
Wei X, Wang Q, Wang T, Fan J (2017) Jammer localization in multi-hop wireless network: a comprehensive survey. IEEE Commun Surveys Tutor 19(2):765–799. https://doi.org/10.1109/COMST.2016.2631146
Wood AD, Stankovic J (2002) Denial of service in sensor networks. Computer 35(10):54–62. https://doi.org/10.1109/MC.2002.1039518
Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: ACM International Symposium on Mobile Ad Hoc Networking and Computing (pp. 46–57). ACM. https://doi.org/10.1145/1062689.1062697
Xu W, Ma K, Trappe W, Zhang Y (2006) Jamming sensor networks: attack and defense strategies. Network IEEE 20(3):41–47. https://doi.org/10.1109/mnet.2006.1637931
Zeng P, Choo KKR, Sun DZ (2010) On the security of an enhanced novel access control protocol for wireless sensor networks. IEEE Trans Consum Electron 56(2):566–569. https://doi.org/10.1109/tce.2010.5505971
Zhang J, Xu L, Shen Q, Ji X (2015) Localization for jamming attack in wireless sensor networks. In: Intelligent data analysis and applications. Springer, Cham, pp 361–369. https://doi.org/10.1007/978-3-319-21206-7_30
Zhao H, Feng J (2015) Efficient cluster head selection for target tracking in wireless sensor network. In: Wireless and Mobile. IEEE. (pp 46–51). https://doi.org/10.1109/apwimob.2015.7374948
Zheng J, Bhuiyan MZA, Liang S, Xing X, Wang G (2014) Auction-based adaptive sensor activation algorithm for target tracking in wireless sensor networks. Futur Gener Comput Syst 39(1):88–99. https://doi.org/10.1016/j.future.2013.12.014
Acknowledgements
This research was supported in part by the Major State Basic Research Development Program of China (973 Program) No. 2012CB315806, National Natural Science Foundation of China under Grant No. 61402521, Jiangsu Province Natural Science Foundation of China under Grant Nos. BK20140068 and BK20150201.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, T., Wei, X., Hu, F. et al. Mobile jammer localization and tracking in multi-hop wireless network. J Ambient Intell Human Comput 15, 1239–1250 (2024). https://doi.org/10.1007/s12652-018-0708-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-018-0708-4