Downloads: 102 | Views: 264
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015 | Popularity: 6.6 / 10
Effective Approach for Localizing Jammers in Wireless Sensor Network
Ashwini S. Chimankar, V. S. Nandedkar
Abstract: Jammers can harshly interrupt the communication in wireless network. Defender can eliminate the jamming attacks by getting the information of Jammers position. Our aim is to design a framework that localizes one or multiple jammers with a high accuracy. Almost all of existing jammer-localization methods utilize indirect measurements (like hearing ranges) that are affected by jamming attacks which does not localize jammers accurately. We use a direct measurement technique-the strength of jamming signals (JSS). The jamming signals can be embedded in other signals thus it may be difficult to estimate the JSS. We used estimation scheme based on ambient noise floor. We define an evaluation feedback metric to reduce the estimation errors and from this jammer localization problem is formulated as non linear optimization problem, whose global optimal solution is close to jammers true positions. Our error-minimizing-based framework will achieve better performance than the existing schemes. In our work we took the average jammer location obtained by centroids based method and JSS based direct measurement technique.
Keywords: localization, Jamming, radio interference
Edition: Volume 4 Issue 7, July 2015
Pages: 2294 - 2298
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2001
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 718
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 698
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 698
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 687
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera