Short paper: Jamming-resilient multipath routing leveraging availability-based correlation
Proceedings of the fourth ACM conference on Wireless network security
CrowdLoc: wireless jammer localization with crowdsourcing measurements
Proceedings of the 2nd international workshop on Ubiquitous crowdsouring
Extracting jamming signals to locate radio interferers and jammers
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
Joint reactive jammer detection and localization in an enterprise WiFi network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wide range of defense strategies. In this paper, we focus on developing mechanisms to localize a jammer by exploiting neighbor changes. We first conduct jamming effect analysis to examine how the communication range alters with the jammer's location and transmission power using free-space model. Then, we show that a node's affected communication range can be estimated purely by examining its neighbor changes caused by jamming attacks and thus, we can perform the jammer location estimation by solving a least-squares (LSQ) problem that exploits the changes of communication range. Compared with our previous iterative-search-based virtual force algorithm, our LSQ-based algorithm exhibits lower computational cost (i.e., one step instead of iterative searches) and higher localization accuracy. Furthermore, we analyze the localization challenges in real systems by building the log-normal shadowing model empirically and devising an adaptive LSQ-based algorithm to address those challenges. The extensive evaluation shows that the adaptive LSQ-based algorithm can effectively estimate the location of the jammer even in a highly complex propagation environment.