IDEAS home Printed from https://ideas.repec.org/a/plo/pone00/0177326.html
   My bibliography  Save this article

Robust multiple frequency multiple power localization schemes in the presence of multiple jamming attacks

Author

Listed:
  • Ahmed Abdulqader Hussein
  • Chee Yen Leow
  • Tharek A Rahman

Abstract

Localization of the wireless sensor network is a vital area acquiring an impressive research concern and called upon to expand more with the rising of its applications. As localization is gaining prominence in wireless sensor network, it is vulnerable to jamming attacks. Jamming attacks disrupt communication opportunity among the sender and receiver and deeply impact the localization process, leading to a huge error of the estimated sensor node position. Therefore, detection and elimination of jamming influence are absolutely indispensable. Range-based techniques especially Received Signal Strength (RSS) is facing severe impact of these attacks. This paper proposes algorithms based on Combination Multiple Frequency Multiple Power Localization (C-MFMPL) and Step Function Multiple Frequency Multiple Power Localization (SF-MFMPL). The algorithms have been tested in the presence of multiple types of jamming attacks including capture and replay, random and constant jammers over a log normal shadow fading propagation model. In order to overcome the impact of random and constant jammers, the proposed method uses two sets of frequencies shared by the implemented anchor nodes to obtain the averaged RSS readings all over the transmitted frequencies successfully. In addition, three stages of filters have been used to cope with the replayed beacons caused by the capture and replay jammers. In this paper the localization performance of the proposed algorithms for the ideal case which is defined by without the existence of the jamming attack are compared with the case of jamming attacks. The main contribution of this paper is to achieve robust localization performance in the presence of multiple jamming attacks under log normal shadow fading environment with a different simulation conditions and scenarios.

Suggested Citation

  • Ahmed Abdulqader Hussein & Chee Yen Leow & Tharek A Rahman, 2017. "Robust multiple frequency multiple power localization schemes in the presence of multiple jamming attacks," PLOS ONE, Public Library of Science, vol. 12(5), pages 1-43, May.
  • Handle: RePEc:plo:pone00:0177326
    DOI: 10.1371/journal.pone.0177326
    as

    Download full text from publisher

    File URL: https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0177326
    Download Restriction: no

    File URL: https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0177326&type=printable
    Download Restriction: no

    File URL: https://libkey.io/10.1371/journal.pone.0177326?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Mohammed Y Aalsalem & Wazir Zada Khan & N M Saad & Md Shohrab Hossain & Mohammed Atiquzzaman & Muhammad Khurram Khan, 2016. "A New Random Walk for Replica Detection in WSNs," PLOS ONE, Public Library of Science, vol. 11(7), pages 1-20, July.
    2. Huixian Li & Xubao Chen & Liaojun Pang & Weisong Shi, 2013. "Quantum Attack-Resistent Certificateless Multi-Receiver Signcryption Scheme," PLOS ONE, Public Library of Science, vol. 8(6), pages 1-8, June.
    3. Qazi Mamoon Ashraf & Mohamed Hadi Habaebi & Md Rafiqul Islam, 2016. "Jammer Localization Using Wireless Devices with Mitigation by Self-Configuration," PLOS ONE, Public Library of Science, vol. 11(9), pages 1-21, September.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Ritika Raj Krishna & Aanchal Priyadarshini & Amitkumar V. Jha & Bhargav Appasani & Avireni Srinivasulu & Nicu Bizon, 2021. "State-of-the-Art Review on IoT Threats and Attacks: Taxonomy, Challenges and Solutions," Sustainability, MDPI, vol. 13(16), pages 1-46, August.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.

      More about this item

      Statistics

      Access and download statistics

      Corrections

      All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:plo:pone00:0177326. See general information about how to correct material in RePEc.

      If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

      If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

      If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

      For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: plosone (email available below). General contact details of provider: https://journals.plos.org/plosone/ .

      Please note that corrections may take a couple of weeks to filter through the various RePEc services.

      IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.