Robust multiple frequency multiple power localization schemes in the presence of multiple jamming attacks

PLoS One. 2017 May 11;12(5):e0177326. doi: 10.1371/journal.pone.0177326. eCollection 2017.

Abstract

Localization of the wireless sensor network is a vital area acquiring an impressive research concern and called upon to expand more with the rising of its applications. As localization is gaining prominence in wireless sensor network, it is vulnerable to jamming attacks. Jamming attacks disrupt communication opportunity among the sender and receiver and deeply impact the localization process, leading to a huge error of the estimated sensor node position. Therefore, detection and elimination of jamming influence are absolutely indispensable. Range-based techniques especially Received Signal Strength (RSS) is facing severe impact of these attacks. This paper proposes algorithms based on Combination Multiple Frequency Multiple Power Localization (C-MFMPL) and Step Function Multiple Frequency Multiple Power Localization (SF-MFMPL). The algorithms have been tested in the presence of multiple types of jamming attacks including capture and replay, random and constant jammers over a log normal shadow fading propagation model. In order to overcome the impact of random and constant jammers, the proposed method uses two sets of frequencies shared by the implemented anchor nodes to obtain the averaged RSS readings all over the transmitted frequencies successfully. In addition, three stages of filters have been used to cope with the replayed beacons caused by the capture and replay jammers. In this paper the localization performance of the proposed algorithms for the ideal case which is defined by without the existence of the jamming attack are compared with the case of jamming attacks. The main contribution of this paper is to achieve robust localization performance in the presence of multiple jamming attacks under log normal shadow fading environment with a different simulation conditions and scenarios.

MeSH terms

  • Algorithms*
  • Computer Communication Networks*
  • Computer Security*
  • Computer Simulation
  • Models, Theoretical
  • Signal Processing, Computer-Assisted
  • Wireless Technology*

Grants and funding

The work of C.Y. Leow is jointly supported by the Ministry of Higher Education Malaysia and Universiti Teknologi Malaysia under vote number 4F818, 4J210 and 12H35. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.