By Topic

Jammer Localization in Wireless Sensor Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Yanqiang Sun ; Nat. Lab. for Parallel & Distrib. Process., Nat. Univ. of Defense Technol., Changsha, China ; Xiaodong Wang

Jamming style denial-of-service attack is the transmission of radio signals that disrupt communications by decreasing the signal to noise ratio.This kind of attack can be easily launched by jammer through either bypassing MAC-layer protocols or emitting a radio signal targeted at blocking a particular channel. In this paper, we consider the item of localizing a jammer in which little work has been done. First we explored the existing localization algorithms that have been used in wireless sensor networks. We then proposed a geometry-covering based localization (GCL) algorithm, which utilizes the knowledge of computing geometry, especially the convex hull. Simulation results showed that GCL is able to achieve higher accuracy than centroid localization, and has the time complexity of O(n logn), which is proper to sensor networks.

Published in:

Wireless Communications, Networking and Mobile Computing, 2009. WiCom '09. 5th International Conference on

Date of Conference:

24-26 Sept. 2009