Vous êtes sur la page 1sur 4

IJSTE - International Journal of Science Technology & Engineering | Volume 2 | Issue 11 | May 2016

ISSN (online): 2349-784X

Finding Jammer Location in WSN


Shivankar Sushil
Department of Computer Engineering
Zeal College of Engineering Narhe, Pune

Siddha Abhijeet
Department of Computer Engineering
Zeal College of Engineering Narhe, Pune

Chaware Ajit
Department of Computer Engineering
Zeal College of Engineering Narhe, Pune

Lokhande Suraj
Department of Computer Engineering
Zeal College of Engineering Narhe, Pune

Prof. Nawghare P.S.


Department of Computer Engineering
Zeal College of Engineering Narhe, Pune

Abstract
Presence of Jammers can disturb the whole communications in wireless networks and it is very difficult to find the exact position
of jammer. When the position of jammer is known then it became easy to prevent the attack Thus, in this paper, we aim to design
a framework that can localize single jammer with a high accuracy. Most of existing jammer-localization schemes exploit a direct
measurement the strength of jamming signals (JSS). But it also based on the boundary nodes of the jammed network. Estimating
the exact location of jammer by centroid based method is very difficult task it considers the all jammed nodes and take its centre
from that it finds the exact location of the jammer. To check the accuracy we compare it with the existing system and our simulation
results show that our centroid based method gets better performance than the existing schemes. In advance, our simulation shows
the positions of the jammed nods and alternate path for the data transmission so we can continue our data communication.
Keywords: Jammer, Jamming signal strength, jammed nodes, boundary nodes
________________________________________________________________________________________________________
I.

INTRODUCTION

Finding the exact location of the jammer is very difficult task in wireless sensor network. The locations of jammers anywhere in
wireless network and that disturbs the whole communication system.
To overcome these challenges and increase the localization accuracy, we implement simulation that solves the jammer localization
problem and get the high accuracy in our work. We display the result by bar graph it displays the comparison of existing system
result with proposed systems result and actual result. Locations estimated are the true location of the jammer in the wireless sensor
network, to improve our performance we adopt several algorithms that involve stochastic processes to approach the global
optimum.
Threat Model:
There are many attacking strategies, but we mainly focus on one common type of jammer constant jammers. Constant jammers
continually emit radio signals, regardless of whether the channel is idle or not. Such jammers can be unintentional radio interferers
that are always active or malicious jammers that keep disturbing network communication. In proposed work the network nodes
based on the level of disturbance caused by jammers, and identify the nodes that can participate in jammer localization, e.g., the
ones that can measure and report the JSS. Essentially, the communication range changes caused by jamming are reflected by the
changes of neighbors at the network topology level. Thus, the network nodes could be classified based on the changes of neighbors
caused by jamming. We define that node B is a neighbor of node A if A can communicate with B prior to jamming. The network
nodes can be classified into three categories according to the impact of jamming: unaffected node, jammed node, and boundary
node.
1) Unaffected node: A node is unaffected if it can communicate with all of its neighbors. This type of node is barely affected
by jamming and may not yield accurate JSS measurements.
2) Jammed node: A node is jammed if it cannot communicate with any of the unaffected nodes. We note that this type of
node can measure JSS, but cannot always report their measurements.
3) Boundary node: A boundary node can communicate with part of its neighbors but not from all of its neighbors. Boundary
nodes can not only measure the JSS, but also report their measurements to a designated node for jamming localization.
Input and Output:
Input: JSS[],Initial positions(IP[]), jammed nodes(JN[])
Output: (Xj,Yj)

All rights reserved by www.ijste.org

91

Finding Jammer Location in WSN


(IJSTE/ Volume 2 / Issue 11 / 013)

1)
2)
3)
4)
5)
6)
7)

JSS MeasureJSS();
IP[]InitialPositions();
ez EvaluateMetric(JSS[],IP[]);
zSearchBetter();
MinZMin(ez);
(xj,yj)=GetEstJammer(z);
(xjammer, yjammer) = Get_Jammer();

Problem Statement:
Implementation of single jammer localization using centroid based method based on jammed nodes. We implement the existing
JSS based method for single jammer localization and compare the centroid based method which based on finding by jammed
nodes.
II. LITERATURE REVIEW
Author hongbu liu in the year 2012 submitted a paper entitled Wireless jamming localization by exploiting nodes Hearing ranges
also explained Problem Described with proper solution that Implementation of hearing range based algorithm to and out jammer
location. Author Srikanth V. Krishna murthy in the year 2014 wrote something innovative than the previous one about Lightweight
jammer localization in WSN and also stating proper solution for it that Implementation of Distributed lightweight jammer
localization system to and out jammer location.in 2014 author Zhenhua Liu, Hongbo Liu, Wenyuan Xu, and Yingying Chen submit
a paper on an error minimizing framework for localizing Jammers in wireless networks which is based on jamming signal strength
(JSS).
III. PROJECT OBJECTIVE AND FUTURE SCOPE
Project Objectives:
1) Implementation of method for single jammer localization.
2) Implementation of centroid based method for single jammer localization.
3) Comparison of existing system with proposed system.
Future Scope:
1) Our proposed system will be implemented for single jammer localization.
2) Our project work aims to finding the jammer location using proposed method.
3) We can use this system for finding the exact location and area covered by the jammer by finding the location close to the
actual location.
IV. SOFTWARE DEVELOPMENT

Fig. 4: shows Simulation Result

Basically initially we take required number of nodes where nodes are nothing but mobile phone, computer or any wireless
device. After this we take source node and destination node to transfer data from one point of node to another.by sending the packet
path will be displayed by which data is pass, Later the system will put the jammer anywhere in network to and can this jammer
will jam the area. After that we perform the localization operation that will find the exact location of the jammer. Finally we apply
for graph we easily get a result of graph which shows higher accuracy than other systems using built application that we are using.

All rights reserved by www.ijste.org

92

Finding Jammer Location in WSN


(IJSTE/ Volume 2 / Issue 11 / 013)

V. RESULT

Fig. 5: Above snapshot shows jammer chart of advanced jammer system.

In our system here we display the result in form of bar graph this is a simple comparison of existing system and the proposed
system. This bars are nothing but the x and Y coordinates of the jammer Location. Bar which is shown in blue color represent the
value of x coordinate from on graph and bar which is shown in blue color represent the value of Y coordinate from on graph.
VI. DEVELOPED SYSTEM

Fig. 6: shows developed system

Proposed method is derived from the idea of centroid based, which is the geometric center in geometry. Method uses location
information of all neighboring nodes, which are nodes located within the transmission range of the target node.
In case of jammer localization, the target node is the jammed, and the neighboring nodes of the jammer are jammed nodes. Our
approach collects all coordinates of jammed nodes, and averages over their coordinates as the estimated position of the jammer.
Assuming that there are N jammed nodes (X1; Y1); (X2; Y2); :::; (XN; YN), the position of the jammer can be estimated by

Here Xjammer, Yjammer ate the two coordinates of the jammer and N is the nearest neighbour node.
VII. APPLICATION AND ADVANTAGES
Applications:
1) Can be used for military application in case where information that is to transfer from one station to another can be
protected from jammer.
2) Can used in government buildings were higher security is required.
3) Also can be used for commercial application.
Advantages:
1) Easy usability.
2) High accuracy.
3) More reliable than current systems.
VIII. CONCLUSION
In this work, we addressed the problem of localizing jammers in wireless networks, aiming to extensively reduce estimation errors.
The jammers could be several wireless devices causing unintentional radio interference or malicious colluding jamming devices
All rights reserved by www.ijste.org

93

Finding Jammer Location in WSN


(IJSTE/ Volume 2 / Issue 11 / 013)

who co-exist and disturb the network together. Most of the existing schemes for localizing jammers rely on the indirect
measurements of network parameters affected by jammers.
There are number of advantages like:
1) high accuracy.
2) security.
ACKNOWLEDGMENT
It gives us great pleasure in presenting the preliminary project report on Finding Jammer Location In WSN.
I would like to take this opportunity to thank my guide Prof. Nawghare P.S. for giving me all the help and guidance I needed. I
am really grateful to them for their kind support. Their valuable suggestions were very helpful.
I am also grateful to Prof. S. M. Sangve, Head of Computer Engineering Department, Zeal college of engineering Pune for his
indispensable support, suggestions.
We would like to thank the institute for providing the required facilities, Internet connection, for Our Project.
REFERENCE
[1]
[2]
[3]
[4]
[5]

Zhenhua Liu, Hongbo Liu, Wenyuan Xu, and Yingying Chen, An Error Minimizing Framework for Localizing Jammers in Wireless Networks, IEEE
TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS SPECIAL ISSUE ON TRUST, SECURITY AND PRIVACY.
Krishnamurthy, Lightweight jammer localization in wireless networks: System design and implementation, in Proceedings of IEEE GLOBECOM, 2009.
H. Liu, Z. Liu, Y. Chen, and W. Xu, Determining the position of a jammer using a virtual-force iterative approach, Wireless Networks (WiNet), vol. 17,
pp. 531547, 2010.
Z. Liu, H. Liu, W. Xu, and Y. Chen, Exploiting jamming caused neighbor changes for jammer localization, IEEE TPDS, vol. 23, no. 3, 2011.
H. Liu, Z. Liu, Y. Chen, and W. Xu, Localizing multiple jamming attackers in wireless networks, in Proceedings of ICDCS, 2011.

All rights reserved by www.ijste.org

94

Vous aimerez peut-être aussi