GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference 2009
DOI: 10.1109/glocom.2009.5425405
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Jammer Localization in Wireless Networks: System Design and Implementation

Abstract: Jamming attacks have become prevalent during the last few years, due to the shared nature and the open access to the wireless medium. Finding the location of a jamming device is of great importance for restoring normal network operations. After detecting the malicious node we want to find its position, in order for further security actions to be taken. Our goal in this paper is the design and implementation of a simple, lightweight and generic localization algorithm. Our scheme is based on the principles of th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
43
0
2

Year Published

2010
2010
2018
2018

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 65 publications
(45 citation statements)
references
References 15 publications
0
43
0
2
Order By: Relevance
“…Particularly, the shared secret between transmitter and receiver is established via the Uncoordinated Seed Disclosure in Frequency Hopping under the presence of jamming. Besides FHSS and DSSS, other defense strategies include the use of error correcting codes [19] to increase the likelihood of decoding corrupted packets, spatial retreats [20] to move out of jammed regions geographically, anti-jamming timing channels [21], wormhole-based anti-jamming techniques [22], Multi-Channel Ratio (MCR) Decoding [23], and localizing jammers for physically neutralizing the jamming attacks [24]- [26].…”
Section: Related Workmentioning
confidence: 99%
“…Particularly, the shared secret between transmitter and receiver is established via the Uncoordinated Seed Disclosure in Frequency Hopping under the presence of jamming. Besides FHSS and DSSS, other defense strategies include the use of error correcting codes [19] to increase the likelihood of decoding corrupted packets, spatial retreats [20] to move out of jammed regions geographically, anti-jamming timing channels [21], wormhole-based anti-jamming techniques [22], Multi-Channel Ratio (MCR) Decoding [23], and localizing jammers for physically neutralizing the jamming attacks [24]- [26].…”
Section: Related Workmentioning
confidence: 99%
“…Current jammer-localization approaches mostly rely on parameters derived from the affected network topology, such as packet delivery ratios [11], neighbor lists [6], and nodes' hearing ranges [7]. The use of these indirect measurements derived from jamming effects makes it difficult to accurately localize jammer's position.…”
Section: Introductionmentioning
confidence: 99%
“…Pelechrinis et al (2009b) computes the PDR value as a product of the probability of the sender sensing the medium idle, probability that the receiver will receive the packets sent to it and the probability that the sender will receive the acknowledgment. These probabilities are computed using the signal propagation model.…”
Section: Light-weight Jammer Localizationmentioning
confidence: 99%