2017
DOI: 10.1109/comst.2016.2631146
|View full text |Cite
|
Sign up to set email alerts
|

Jammer Localization in Multi-Hop Wireless Network: A Comprehensive Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
1

Relationship

3
5

Authors

Journals

citations
Cited by 56 publications
(27 citation statements)
references
References 114 publications
0
23
0
1
Order By: Relevance
“…After receiving the ACK, device A records the current time information and records it as T 2 . At this time, the time difference is calculated according to (1), and the distance is calculated according to (2), where c is the speed of light. It should also be emphasized that T prop is the processing delay, that is, the time between unpacking and packaging after receiving the package.…”
Section: Toa-based Distance Estimationmentioning
confidence: 99%
See 1 more Smart Citation
“…After receiving the ACK, device A records the current time information and records it as T 2 . At this time, the time difference is calculated according to (1), and the distance is calculated according to (2), where c is the speed of light. It should also be emphasized that T prop is the processing delay, that is, the time between unpacking and packaging after receiving the package.…”
Section: Toa-based Distance Estimationmentioning
confidence: 99%
“…IEEE 802.11ad, which is released as a promising technology, aims to support multi-gigabit-per-second throughput through utilizing 60GHz unlicensed frequency, and thus to support the aforementioned applications. Compared with other IEEE 802.11 standards [1], the introducing of mmWave communication in IEEE 802.11ad has many desirable characteristics, including wide available spectrum range and large information capacity; achieving narrow beam and high gain antenna easily; high resolution and strong directivity; strong ability to penetrate plasma; high transmission rate and completely free spectrum resources [2]- [7]. However, IEEE 802.11ad still faces diverse security threats,as revealed recently in [8], especially the man-in-themiddle (MITM attack), in which an attacker could hijack the information exchanged between two victims through establishing a relay path between them.…”
Section: Introductionmentioning
confidence: 99%
“…Over the past few years, Xu et al conducted a series of researches on the jamming attack and four basic approaches of jamming attack were proposed [8], which were defined as constant jamming, random jamming, proactive jamming, and reactive jamming. Wei et al provided a comprehensive survey of the major works done in the field of jammer localization for MHWN [9].…”
Section: Related Workmentioning
confidence: 99%
“…Assume that there is a locating node, which is in charge of jammer localization, in the wireless network chosen from the unaffected nodes through some kind of voting algorithm. To realize the localization (1) if a node does not detect jamming attack then (2) This node is an unaffected node; (3) else (4) if this node does not lose any neighbor and its received SNRs from most of its neighbors' do not decrease more than a percent then (5) This node is an unaffected node; (6) else (7) if this node loses more than percent of its neighbors then (8) This node is a jammed node; (9) else (10) if more than percent of its neighbors' SNRs decrease more than percent then (11) This node is a jammed node; (12) else (13) This node is a boundary node; (14) end if (15) end if (16) end if (17) end if Algorithm 1: Node state determination algorithm. process, it has to firstly collect information from wireless nodes and then execute the localization algorithm.…”
Section: Information Collectionmentioning
confidence: 99%
“…Actually, if the position of the jammer could be located accurately, the jammer may be eliminated through physical measures. Therefore, the research on jammer localisation has been attracting increasing attention in recent years [4].…”
Section: Introductionmentioning
confidence: 99%