2018
DOI: 10.1049/iet-ifs.2017.0346
|View full text |Cite
|
Sign up to set email alerts
|

Sequential opening multi‐jammers localisation in multi‐hop wireless network

Abstract: Multi-hop wireless network (MHWN) can be easily attacked by jammers for its shared nature and open access to the wireless medium. Jamming attack may pose a significant threat to MHWN by occupying wireless channel used by legitimate users. A number of anti-jamming countermeasures have been put forward to eliminate the impact of communication disruption caused by jamming attacks. As an important building block of anti-jamming strategies, jammer localisation attracts much attention in recent years and several alg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…For the characteristics of the highly nonlinear nodes in the model that are not easy to solve, the sensor network communication characteristic algorithm is designed using the theoretical method of optimization calculation to solve it, and the convergence of the algorithm is proved by a random process to further obtain the optimal solution. However, the complexity of the algorithm is greatly affected by the prediction operation before positioning [22].…”
Section: Related Workmentioning
confidence: 99%
“…For the characteristics of the highly nonlinear nodes in the model that are not easy to solve, the sensor network communication characteristic algorithm is designed using the theoretical method of optimization calculation to solve it, and the convergence of the algorithm is proved by a random process to further obtain the optimal solution. However, the complexity of the algorithm is greatly affected by the prediction operation before positioning [22].…”
Section: Related Workmentioning
confidence: 99%
“…For multi-jammers scenario, Cheng et al put forward the M-clusters and X-ray to estimate jammers' positions, respectively [15]. Wang et al proposed the k-mean cluster algorithm based on the neighbor nodes' information to estimate the positions of the jammers [16].…”
Section: Related Workmentioning
confidence: 99%
“…Assume that there is a locating node, which is in charge of jammer localization, in the wireless network chosen from the unaffected nodes through some kind of voting algorithm. To realize the localization (1) if a node does not detect jamming attack then (2) This node is an unaffected node; (3) else (4) if this node does not lose any neighbor and its received SNRs from most of its neighbors' do not decrease more than a percent then (5) This node is an unaffected node; (6) else (7) if this node loses more than percent of its neighbors then (8) This node is a jammed node; (9) else (10) if more than percent of its neighbors' SNRs decrease more than percent then (11) This node is a jammed node; (12) else (13) This node is a boundary node; (14) end if (15) end if (16) end if (17) end if Algorithm 1: Node state determination algorithm. process, it has to firstly collect information from wireless nodes and then execute the localization algorithm.…”
Section: Information Collectionmentioning
confidence: 99%
“…In addition, for multijammer scenarios, Cheng et al designed two methods to calculate the localization of jammers based on M-clusters and X-rays [31]. Wang et al utilized the k-means clustering algorithm to estimate the location of the jammer according to the location information of neighboring nodes [32].…”
Section: Introductionmentioning
confidence: 99%