{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:36:03Z","timestamp":1765438563125,"version":"3.37.3"},"reference-count":26,"publisher":"Oxford University Press (OUP)","issue":"10","license":[{"start":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T00:00:00Z","timestamp":1562112000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402521","61471392"],"award-info":[{"award-number":["61402521","61471392"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Jiangsu Province Natural Science Foundation","doi-asserted-by":"publisher","award":["BK20150201","BK20140070"],"award-info":[{"award-number":["BK20150201","BK20140070"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012336","name":"Major State Basic Research Development Program of China","doi-asserted-by":"publisher","award":["2012CB315806"],"award-info":[{"award-number":["2012CB315806"]}],"id":[{"id":"10.13039\/501100012336","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Wireless sensor network can be easily attacked by jammers for its shared character and open access to the wireless channel. Jamming attack could produce a significant threat to the network by interrupting the normal transmission of nodes. To this end, several anti-jamming countermeasures have been proposed to improve the quality of service of the wireless sensor network. As an important building block for anti-jamming countermeasures, the estimation of jammer\u2019s location could provide us a possible way to eliminate jammers artificially. However, existing localization algorithms mainly pay attention to locate the jammers that are equipped with omnidirectional antennas, which usually fail to cope with directional jammers. In order to bridge this gap, an algorithm of antenna identification and localization of the jammer (AILJ) based on the topology information of jamming scenarios is put forward in this paper. At first, a collection protocol is designed to collect the information of boundary nodes and jammed nodes. Then, an identification method based on the classification of the boundary nodes is proposed to derive the type of jammer\u2019s antenna. At last, a range-free method is put forward to locate the jammer without relying on the propagation parameters. The proposed AILJ only depends on the localization of jammed nodes and boundary nodes and employs their geometry knowledge. For the omnidirectional jammer, the mean center of two circumcircles is considered as the jammer\u2019s position. For the directional jammer, the mean value of the intersections between the straight line that represents jammer\u2019s direction and the circumcircles is considered as the directional jammer\u2019s position. Finally, a series of experiments have been conducted to evaluate the identification and localization performance of AILJ.<\/jats:p>","DOI":"10.1093\/comjnl\/bxz055","type":"journal-article","created":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T19:07:17Z","timestamp":1557688037000},"page":"1515-1527","source":"Crossref","is-referenced-by-count":15,"title":["Identification and Localization of the Jammer in Wireless Sensor Networks"],"prefix":"10.1093","volume":"62","author":[{"given":"Jianhua","family":"Fan","sequence":"first","affiliation":[{"name":"The 63rd Research Institute, National University of Defense Technology, Nanjing 210007, China"}]},{"given":"Tao","family":"Liang","sequence":"additional","affiliation":[{"name":"The 63rd Research Institute, National University of Defense Technology, Nanjing 210007, China"}]},{"given":"Tongxiang","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Systems Engineering, AMS, PLA, Beijing 100039, China"}]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[{"name":"Graduate School, The Army Engineering University of PLA, Nanjing 210007, China"}]}],"member":"286","published-online":{"date-parts":[[2019,7,3]]},"reference":[{"key":"2019102108591220500_ref1","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1109\/SURV.2011.041110.00022","article-title":"Denial of service attacks in wireless networks: the case of jammers","volume":"13","author":"Pelechrinis","year":"2011","journal-title":"IEEE Comm. Surv. Tutor.,"},{"key":"2019102108591220500_ref2","first-page":"1","article-title":"Jammer localization in multi-hop wireless network: a comprehensive survey","author":"Wei","year":"2016","journal-title":"IEEE Comm. Surv. Tutor., PP"},{"key":"2019102108591220500_ref3","first-page":"1","article-title":"A survey on wireless security: technical challenges, recent advances, and future trends","volume-title":"Proc. IEEE","author":"Zou","year":"2016"},{"key":"2019102108591220500_ref4","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1109\/CNS.2014.6997489","article-title":"Self-healing wireless networks under insider jamming attacks","author":"Li","year":"2014","journal-title":"2014 IEEE Conf. on Communications and Network Security (CNS),"},{"key":"2019102108591220500_ref5","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1109\/REAL.2003.1253275","article-title":"Jam: A jammed-area mapping service for sensor networks","volume-title":"24th IEEE Real-Time Systems Symposium, 2003. RTSS 2003","author":"Wood","year":"2003"},{"key":"2019102108591220500_ref6","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1145\/1062689.1062697","article-title":"The feasibility of launching and detecting jamming attacks in wireless networks","author":"Xu","year":"2005","journal-title":"Int. Symposium on Mobile Ad Hoc NETWORKING and Computing"},{"key":"2019102108591220500_ref7","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MNET.2006.1637931","article-title":"Jamming sensor networks: attack and defense strategies","volume":"20","author":"Xu","year":"2006","journal-title":"IEEE Netw."},{"key":"2019102108591220500_ref8","doi-asserted-by":"crossref","first-page":"1746","DOI":"10.1109\/TMC.2013.146","article-title":"Modeling, evaluation and detection of jamming attacks in time-critical wireless applications","volume":"13","author":"Lu","year":"2014","journal-title":"IEEE Trans. Mobile Comput."},{"key":"2019102108591220500_ref9","first-page":"501","article-title":"Statistics-based jamming detection algorithm for jamming attacks against tactical manets","volume-title":"2014 IEEE Military Communications Conf.","author":"Lu","year":"2014"},{"key":"2019102108591220500_ref10","first-page":"1","article-title":"Lightweight jammer localization in wireless networks: system design and implementation","author":"Pelechrinis","year":"2010","journal-title":"Global Telecommunications Conf., 2009 (GLOBECOM)"},{"key":"2019102108591220500_ref11","first-page":"1","article-title":"A step further of PDR-based jammer localization through dynamic power adaptation. In 11th Int. Conf. on Wireless Communications, Networking and Mobile Computing (WiCOM 2015),","author":"Wang","year":"2015","journal-title":"IET"},{"key":"2019102108591220500_ref12","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1109\/TPDS.2011.154","article-title":"Exploiting jamming-caused neighbor changes for jammer localization","volume":"23","author":"Liu","year":"2014","journal-title":"IEEE Trans. Parall. Distr. Syst."},{"key":"2019102108591220500_ref13","doi-asserted-by":"crossref","first-page":"1027","DOI":"10.1016\/j.future.2016.11.032","article-title":"Collaborative mobile jammer tracking in multi-hop wireless network","volume":"78","author":"Wei","year":"2016","journal-title":"Future Gener. Comput. Syst."},{"key":"2019102108591220500_ref14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJMCMC.2014100101","article-title":"Jammer location-oriented noise node elimination method for MHWN","volume":"6","author":"Fan","year":"2014","journal-title":"Int. J. Mobile Comput. Multimedia Comm."},{"key":"2019102108591220500_ref15","first-page":"508","article-title":"An error-minimizing framework for localizing jammers in wireless networks","volume":"25","author":"Liu","year":"2013","journal-title":"IEEE Trans. Parall. Distrib. Syst."},{"key":"2019102108591220500_ref16","first-page":"1","article-title":"Localizing jammers in wireless networks","author":"Liu","year":"2009","journal-title":"IEEE Int. Conf. on Pervasive Computing and Communications"},{"key":"2019102108591220500_ref17","first-page":"10","article-title":"Geometry-covering based localization for jamming attack in wireless sensor networks","volume":"31","author":"Sun","year":"2010","journal-title":"J. Comm."},{"key":"2019102108591220500_ref18","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-21206-7_30","volume-title":"Localization for Jamming Attack in Wireless Sensor Networks","author":"Zhang","year":"2015"},{"key":"2019102108591220500_ref19","first-page":"1027","article-title":"Jammer localization in multihop wireless networks based on gravitational search","volume":"78","author":"Wang","year":"2018","journal-title":"Secur. Comm. Netw."},{"key":"2019102108591220500_ref20","doi-asserted-by":"crossref","DOI":"10.1109\/ICRIS.2018.00059","article-title":"Localization of directional jammer in wireless sensor networks","volume-title":"Int. Conf. on Robots & Intelligent System","author":"Wang","year":"2018"},{"key":"2019102108591220500_ref21","doi-asserted-by":"crossref","first-page":"19","DOI":"10.3233\/ICA-130445","article-title":"M-cluster and x-ray: two methods for multi-jammer localization in wireless sensor networks","volume":"21","author":"Cheng","year":"2014","journal-title":"Integr. Comput. Aid. Eng."},{"key":"2019102108591220500_ref22","first-page":"517","article-title":"Localizing multiple jamming attackers in wireless networks","author":"Liu","year":"2011","journal-title":"31st Int. Conf. on Distributed Computing Systems (ICDCS), vol. 6574. IEEE Computer Society"},{"key":"2019102108591220500_ref23","first-page":"176","article-title":"Multi-jammers localization for multi-hop wireless network","volume":"37","author":"Wang","year":"2016","journal-title":"J. Comm."},{"key":"2019102108591220500_ref24","first-page":"1","article-title":"Distributed medium access control protocol for successive interference cancellation based wireless ad hoc networks","author":"Kontik","year":"2016","journal-title":"IEEE Comm. Lett. vol. PP"},{"key":"2019102108591220500_ref25","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/MASS.2012.6502530","article-title":"Error minimizing jammer localization through smart estimation of ambient noise","volume-title":"2012 IEEE 9th Int. Conf. on Mobile Ad-Hoc and Sensor Systems (MASS 2012)","author":"Liu","year":"2012"},{"key":"2019102108591220500_ref26","first-page":"724","article-title":"An algorithm for jammer localization in wireless sensor networks","volume":"2012","author":"Cheng","journal-title":"IEEE Int. Conf. on Advanced Information NETWORKING and Applications"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/62\/10\/1515\/30251233\/bxz055.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/62\/10\/1515\/30251233\/bxz055.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,17]],"date-time":"2022-09-17T22:06:03Z","timestamp":1663452363000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/62\/10\/1515\/5525445"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,3]]},"references-count":26,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2019,7,3]]},"published-print":{"date-parts":[[2019,9,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxz055","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2019,10]]},"published":{"date-parts":[[2019,7,3]]}}}