Jammer localization using wireless devices with mitigation by self-configuration
Communication abilities of a wireless network decrease significantly in the presence of a jammer. This paper presents a reactive technique, to detect and locate the position of a jammer using a distributed collection of wireless sensor devices. We employ the theory of autonomic computing as a fra...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English English English |
Published: |
PLOS Publications
2016
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/51894/1/journal.pone.0160311.pdf http://irep.iium.edu.my/51894/7/51894-Jammer%20Localization%20Using%20Wireless%20Devices_SCOPUS.pdf http://irep.iium.edu.my/51894/8/51894-Jammer%20Localization%20Using%20Wireless%20Devices_WOS.pdf http://irep.iium.edu.my/51894/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.iium.irep.51894 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.518942017-10-16T06:14:04Z http://irep.iium.edu.my/51894/ Jammer localization using wireless devices with mitigation by self-configuration Ashraf, Qazi Mamoon Habaebi, Mohamed Hadi Islam, Md. Rafiqul TK5101 Telecommunication. Including telegraphy, radio, radar, television TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices Communication abilities of a wireless network decrease significantly in the presence of a jammer. This paper presents a reactive technique, to detect and locate the position of a jammer using a distributed collection of wireless sensor devices. We employ the theory of autonomic computing as a framework to design the same. Upon detection of a jammer, the affected nodes self-configure their power consumption which stops unnecessary waste of battery resources. The scheme then proceeds to determine the approximate location of the jammer by analysing the location of active nodes as well as the affected nodes. This is done by employing a circular curve fitting algorithm. Results indicate a high degree of accuracy in localizing a jammer has been achieved. PLOS Publications 2016-09-01 Article REM application/pdf en http://irep.iium.edu.my/51894/1/journal.pone.0160311.pdf application/pdf en http://irep.iium.edu.my/51894/7/51894-Jammer%20Localization%20Using%20Wireless%20Devices_SCOPUS.pdf application/pdf en http://irep.iium.edu.my/51894/8/51894-Jammer%20Localization%20Using%20Wireless%20Devices_WOS.pdf Ashraf, Qazi Mamoon and Habaebi, Mohamed Hadi and Islam, Md. Rafiqul (2016) Jammer localization using wireless devices with mitigation by self-configuration. PLOS ONE, 11 (9). pp. 1-21. ttp://journals.plos.org/plosone/article?id=10.1371/journal.pone.0160311 10.1371/journal.pone.0160311 |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English English English |
topic |
TK5101 Telecommunication. Including telegraphy, radio, radar, television TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices |
spellingShingle |
TK5101 Telecommunication. Including telegraphy, radio, radar, television TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices Ashraf, Qazi Mamoon Habaebi, Mohamed Hadi Islam, Md. Rafiqul Jammer localization using wireless devices with mitigation by self-configuration |
description |
Communication abilities of a wireless network decrease significantly in the presence of a
jammer. This paper presents a reactive technique, to detect and locate the position of a jammer
using a distributed collection of wireless sensor devices. We employ the theory of autonomic
computing as a framework to design the same. Upon detection of a jammer, the
affected nodes self-configure their power consumption which stops unnecessary waste of
battery resources. The scheme then proceeds to determine the approximate location of the
jammer by analysing the location of active nodes as well as the affected nodes. This is done
by employing a circular curve fitting algorithm. Results indicate a high degree of accuracy in
localizing a jammer has been achieved. |
format |
Article |
author |
Ashraf, Qazi Mamoon Habaebi, Mohamed Hadi Islam, Md. Rafiqul |
author_facet |
Ashraf, Qazi Mamoon Habaebi, Mohamed Hadi Islam, Md. Rafiqul |
author_sort |
Ashraf, Qazi Mamoon |
title |
Jammer localization using wireless devices with mitigation by self-configuration |
title_short |
Jammer localization using wireless devices with mitigation by self-configuration |
title_full |
Jammer localization using wireless devices with mitigation by self-configuration |
title_fullStr |
Jammer localization using wireless devices with mitigation by self-configuration |
title_full_unstemmed |
Jammer localization using wireless devices with mitigation by self-configuration |
title_sort |
jammer localization using wireless devices with mitigation by self-configuration |
publisher |
PLOS Publications |
publishDate |
2016 |
url |
http://irep.iium.edu.my/51894/1/journal.pone.0160311.pdf http://irep.iium.edu.my/51894/7/51894-Jammer%20Localization%20Using%20Wireless%20Devices_SCOPUS.pdf http://irep.iium.edu.my/51894/8/51894-Jammer%20Localization%20Using%20Wireless%20Devices_WOS.pdf http://irep.iium.edu.my/51894/ |
_version_ |
1643614062077018112 |
score |
13.211869 |