{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:54:51Z","timestamp":1771613691372,"version":"3.50.1"},"reference-count":21,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2022,1,14]],"date-time":"2022-01-14T00:00:00Z","timestamp":1642118400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100008982","name":"Qatar National Research Fund","doi-asserted-by":"publisher","award":["X-063-1-014"],"award-info":[{"award-number":["X-063-1-014"]}],"id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Jamming is a malicious radio activity that represents a dreadful threat when employed in critical scenarios. Several techniques have been proposed to detect, locate, and mitigate jamming. Similarly, counter-counter-jamming techniques have been devised. This paper belongs to the latter thread. In particular, we propose a new jammer model: a power-modulated jammer that defies standard localization techniques. We provide several contributions: we first define a new mathematical model for the power-modulated jammer and then propose a throughout analysis of the localization error associated with the proposed power-modulated jammer, and we compare it with a standard power-constant jammer. Our results show that a power-modulated jammer can make the localization process completely ineffective\u2014even under conservative assumptions of the shadowing process associated with the radio channel. Indeed, we prove that a constant-power jammer can be localized with high precision, even when coupled with a strong shadowing effect (\u03c3\u00a0\u2248\u00a06 dBm). On the contrary, our power-modulated jammer, even in the presence of a very weak shadowing effect (\u03c3\u00a0&lt;\u00a02 dBm), presents a much wider localization error with respect to the constant-power jammer. In addition to being interesting on its own, we believe that our contribution also paves the way for further research in this area.<\/jats:p>","DOI":"10.3390\/s22020646","type":"journal-article","created":{"date-parts":[[2022,1,16]],"date-time":"2022-01-16T20:45:21Z","timestamp":1642365921000},"page":"646","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Localization of a Power-Modulated Jammer"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3324-3706","authenticated-orcid":false,"given":"Pietro","family":"Tedeschi","sequence":"first","affiliation":[{"name":"Division of Information and Computing Technology (ICT), College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha P.O. Box 5825, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9637-0430","authenticated-orcid":false,"given":"Gabriele","family":"Oligeri","sequence":"additional","affiliation":[{"name":"Division of Information and Computing Technology (ICT), College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha P.O. Box 5825, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1909-0336","authenticated-orcid":false,"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[{"name":"Division of Information and Computing Technology (ICT), College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha P.O. Box 5825, Qatar"}]}],"member":"1968","published-online":{"date-parts":[[2022,1,14]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"3902","DOI":"10.1109\/TSP.2012.2193574","article-title":"Time-Varying Jamming Modeling and Classification","volume":"60","author":"Zhang","year":"2012","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"156175","DOI":"10.1109\/ACCESS.2019.2949716","article-title":"Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios","volume":"7","author":"Sciancalepore","year":"2019","journal-title":"IEEE Access"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.jnca.2018.08.001","article-title":"GopJam: Key-less jamming mitigation via gossiping","volume":"123","author":"Oligeri","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.comnet.2017.02.010","article-title":"Enabling broadcast communications in presence of jamming via probabilistic pairing","volume":"116","author":"Oligeri","year":"2017","journal-title":"Comput. Netw."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Di Pietro, R., and Oligeri, G. (2015, January 22\u201326). Freedom of speech: Thwarting jammers via a probabilistic approach. Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, New York, NY, USA.","DOI":"10.1145\/2766498.2766515"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2699906","article-title":"Silence is golden: Exploiting jamming and radio silence to communicate","volume":"17","author":"Oligeri","year":"2015","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2734","DOI":"10.1109\/COMST.2018.2865607","article-title":"A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security","volume":"21","author":"Jameel","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"765","DOI":"10.1109\/COMST.2016.2631146","article-title":"Jammer Localization in Multi-Hop Wireless Network: A Comprehensive Survey","volume":"19","author":"Wei","year":"2017","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Pelechrinis, K., Koutsopoulos, I., Broustis, I., and Krishnamurthy, S.V. (December, January 30). Lightweight Jammer Localization in Wireless Networks: System Design and Implementation. Proceedings of the GLOBECOM 2009\u20142009 IEEE Global Telecommunications Conference, Honolulu, HI, USA.","DOI":"10.1109\/GLOCOM.2009.5425405"},{"key":"ref_10","unstructured":"Wang, Q., Wei, X., Fan, J., Wang, T., and Sun, Q. (2015, January 21\u201323). A step further of PDR-based jammer localization through dynamic power adaptation. Proceedings of the 11th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2015), Shanghai, China."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Kim, Y.S., Mokaya, F., Chen, E., and Tague, P. (2012, January 10\u201315). All your jammers belong to us\u2014Localization of wireless sensors under jamming attack. Proceedings of the 2012 IEEE International Conference on Communications (ICC), Ottawa, ON, Canada.","DOI":"10.1109\/ICC.2012.6364441"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1109\/TPDS.2011.154","article-title":"Exploiting Jamming-Caused Neighbor Changes for Jammer Localization","volume":"23","author":"Liu","year":"2012","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_13","unstructured":"Liu, H., Wenyuan, X., Chen, Y., and Liu, Z. (2009, January 9\u201313). Localizing jammers in wireless networks. Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications, Galveston, TX, USA."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Liu, H., Liu, Z., Chen, Y., and Xu, W. (2011, January 20\u201324). Localizing Multiple Jamming Attackers in Wireless Networks. Proceedings of the 2011 31st International Conference on Distributed Computing Systems, Minneapolis, MN, USA.","DOI":"10.1109\/ICDCS.2011.38"},{"key":"ref_15","unstructured":"Sun, Y., Molva, R., \u00d6nen, M., Wang, X., and Zhou, X. (2011, January 11\u201314). Catch the Jammer in Wireless Sensor Network. Proceedings of the 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications, Toronto, ON, Canada."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"5049","DOI":"10.1109\/ACCESS.2019.2963105","article-title":"Leveraging jamming to help drones complete their mission","volume":"8","author":"Tedeschi","year":"2019","journal-title":"IEEE Access"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Cheng, T., Li, P., and Zhu, S. (2012, January 26\u201329). An Algorithm for Jammer Localization in Wireless Sensor Networks. Proceedings of the 2012 IEEE 26th International Conference on Advanced Information Networking and Applications, Fukuoka, Japan.","DOI":"10.1109\/AINA.2012.11"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"19","DOI":"10.3233\/ICA-130445","article-title":"M-cluster and X-ray: Two methods for multi-jammer localization in wireless sensor networks","volume":"21","author":"Cheng","year":"2014","journal-title":"Integr. Comput.-Aided Eng."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1816","DOI":"10.1109\/JIOT.2019.2896262","article-title":"Locating Multiple GPS Jammers Using Networked UAVs","volume":"6","author":"Bhamidipati","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Rajaraman, R., Moscibroda, T., Dunkels, A., and Scaglione, A. (2010). Wireless Jamming Localization by Exploiting Nodes\u2019 Hearing Ranges. Distributed Computing in Sensor Systems, Springer.","DOI":"10.1007\/978-3-642-13651-1"},{"key":"ref_21","unstructured":"CRI-LAB (2022, January 02). Open-source code of the implementation of Power Modulated Jammer. Available online: https:\/\/github.com\/pietrotedeschi\/power-modulated-jammer\/."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/2\/646\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T14:15:02Z","timestamp":1760364902000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/2\/646"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,14]]},"references-count":21,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2022,1]]}},"alternative-id":["s22020646"],"URL":"https:\/\/doi.org\/10.3390\/s22020646","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,14]]}}}