An algorithm for jammer localization in wireless sensor networks

Tianzhen Cheng*, Ping Li, Sencun Zhu

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

47 Citations (Scopus)

Abstract

In wireless sensor networks (WSNs), jamming attacks have become a great concern recently. Finding the location of a jamming device is important so as to take security actions against the jammer and restore the network communication. In this paper, we take a comprehensive study on the jammer localization problem, and propose a simple while effective algorithm called Double Circle Localization (DCL). DCL is based on minimum bounding circle (MBC) and maximum inscribed circle (MIC). We implement and evaluate DCL under different conditions, including different node densities, jammer's transmission powers and antenna orientations, and compare it with three existing jammer localization algorithms through both simulation and experiments. Our evaluation results have demonstrated that, compared with all other approaches, DCL achieves the best accuracy in jammer localization.

Original languageEnglish
Title of host publicationProceedings - 26th IEEE International Conference on Advanced Information Networking and Applications, AINA 2012
Pages724-731
Number of pages8
DOIs
Publication statusPublished - 2012
Event26th IEEE International Conference on Advanced Information Networking and Applications, AINA 2012 - Fukuoka, Japan
Duration: 26 Mar 201229 Mar 2012

Publication series

NameProceedings - International Conference on Advanced Information Networking and Applications, AINA
ISSN (Print)1550-445X

Conference

Conference26th IEEE International Conference on Advanced Information Networking and Applications, AINA 2012
Country/TerritoryJapan
CityFukuoka
Period26/03/1229/03/12

Keywords

  • Bounding Circle
  • Inscribed Circle
  • Jammer Localization
  • Jamming Attacks
  • Wireless Sensor Networks

Fingerprint

Dive into the research topics of 'An algorithm for jammer localization in wireless sensor networks'. Together they form a unique fingerprint.

Cite this