M-cluster and X-ray: Two methods for multi-jammer localization in wireless sensor networks

被引:30
作者
Cheng, Tianzhen [1 ]
Li, Ping [1 ]
Zhu, Sencun [2 ]
Torrieri, Don [3 ]
机构
[1] Beijing Inst Technol, Sch Mechatron Engn, Beijing 100081, Peoples R China
[2] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
[3] US Army Res Lab, Adelphi, MD USA
基金
美国国家科学基金会;
关键词
Multi-jammer localization; wireless sensor networks; clustering; skeletonization; JAMMING ATTACKS;
D O I
10.3233/ICA-130445
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Jamming is one of the most severe attacks in wireless sensor networks (WSNs). While existing countermeasures mainly focus on designing new communication mechanisms to survive under jamming, a proactive solution is to first localize the jammer(s) and then take necessary actions. Unlike the existing work that focuses on localizing a single jammer in WSNs, this work solves a multi-jammer localization problem, where multiple jammers launch collaborative attacks. We develop two multi-jammer localization algorithms: a multi-cluster localization (M-cluster) algorithm and an X-rayed jammed-area localization (Xray) algorithm. Our extensive simulation results demonstrate that with one run of the algorithms, both M-cluster and X-ray are efficient in localizing multiple jammers in a wireless sensor network with small errors.
引用
收藏
页码:19 / 34
页数:16
相关论文
共 35 条
[1]   Skeleton pruning by contour partitioning with discrete curve evolution [J].
Bai, Xiang ;
Latecki, Longin Jan ;
Liu, Wen-Yu .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2007, 29 (03) :449-462
[2]   Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps [J].
Bankovic, Zorana ;
Moya, Jose M. ;
Araujo, Alvaro ;
Fraga, David ;
Carlos Vallejo, Juan ;
de Goyeneche, Juan-Mariano .
INTEGRATED COMPUTER-AIDED ENGINEERING, 2010, 17 (02) :87-102
[3]  
Cakiroglu M., 2008, INFOSCALE 08
[4]   A linear-time component-labeling algorithm using contour tracing technique [J].
Chang, F ;
Chen, CJ ;
Lu, CJ .
COMPUTER VISION AND IMAGE UNDERSTANDING, 2004, 93 (02) :206-220
[5]  
Cheng T., 2011, P INT C COMP INT SEC
[6]  
Cheng T., 2012, P 26 IEEE INT C ADV
[7]  
Chiang JT, 2008, IEEE INFOCOM SER, P1885
[8]  
Cormen T., 2001, Introduction to Algorithms
[9]   Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing [J].
Dong, Qi ;
Liu, Donggang .
2010 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2010, 2010,
[10]  
Goldsmith A., 2005, WIRELESS COMMULICATI