Professional Documents
Culture Documents
Localization Algorithm
Ruiqiong Tong∗ , Yicong Du∗ , Hongbo Liu∗ , Yingying Chen†
∗ University
of Electronic Science and Technology of China,China
Email: ruiqiongtong@gmail.com,202112081362@std.uestc.edu.cn, hongbo.liu@uestc.edu.cn
† Rutgers University,USA
Email: yingche@scarletmail.rutgers.edu
259
Authorized licensed use limited to: University of Electronic Science and Tech of China. Downloaded on November 06,2023 at 06:58:34 UTC from IEEE Xplore. Restrictions apply.
where γ0 is the received SN R threshold for all the nodes. The
communication links among nodes are bidirectional. Specifi-
cally, the link between node A and node B is considered to
be connected iff both the conditions lA→B = 1 and lB→A = 1
are satisfied.
To define the nodes’ communication ability, we discuss the
concepts of hearing range and sending range.
• Hearing range. Consider A as a receiver has an area in
Node Jammer which any transmitter T must satisfy SN RT →A > γ0 .
------ Hearing Range • Sending range. Similarly, A as a transmitter has a region
Jammer’s NLB in which any receiver R must satisfy SN RA→R > γ0 .
Sending Range
In the nonjamming situation, the hearing range of node A
q with A as the center and a radius of rc , where
is a circle
Pt G
rc = (4π)2 γ0 PN
. In an interference scenario, the hearing
Fig. 2. Hearing range and sending range changes with three spots: outside range of node A is shrink. Suppose that the hearing range
the jammer’s NLB, at the edge the jammer’s NLB, inside the jammer’s NLB.
under jamming is still a circle centerted at A (we set A’s
coordinate is (0, 0)) with radius rh
260
Authorized licensed use limited to: University of Electronic Science and Tech of China. Downloaded on November 06,2023 at 06:58:34 UTC from IEEE Xplore. Restrictions apply.
Jammed Node Jammer
Unaffected Node n10
Jammer
n1 n1
Boundary Node n7
n2 n2 n7
n3 n3
n5 n4
n4 n5
n6 n9
n6
n8
261
Authorized licensed use limited to: University of Electronic Science and Tech of China. Downloaded on November 06,2023 at 06:58:34 UTC from IEEE Xplore. Restrictions apply.
within an arbitrary set. P (N (S), S) in Φ is the probability
that N nodes inside an area S (|S|).
(λS)N eλS
P (N (S), S) = (12)
N!
where λ is approximately calculated as N|S|
(S)
.
According to the Slivnyak’s theorem [20], all nodes are
independent and the statistical properties of nodes at any
location are consistent with those of typical users at fixed
locations.
According to HPPP [3], the communication distance d
between two nodes follows a distribution, and its probability
density function f (d) is presented as:
Fig. 5. Simulation of the distribution of neighbors of the center (0, 0).
∂F (d) 2
f (d) = = 2πλde−λπd . (13)
∂d
262
Authorized licensed use limited to: University of Electronic Science and Tech of China. Downloaded on November 06,2023 at 06:58:34 UTC from IEEE Xplore. Restrictions apply.
Fig. 7. Curves of the probability density function for the variables d and |rl − ru | are shown in (a) and (b), respectively.
263
Authorized licensed use limited to: University of Electronic Science and Tech of China. Downloaded on November 06,2023 at 06:58:34 UTC from IEEE Xplore. Restrictions apply.
(a) (b) (c)
Fig. 9. Performance impacted by different parameters:(a) The jammer’s NLB. (b) The Jammer’s positon in the corner (marked as margin) and at the center.
(c) The SN R’s threshold γ0 .
B. Experimental Results
The impact of SN R’s threshold. The previous analysis
and derivation were done by comparing the SNR and the
threshold, and we wanted to investigate the impact of changes
in the threshold of SN R on the localization accuracy. As the
threshold increases from 0.5 to 1, our mean error rates of the
improved LSQ algorithm vary from 14.6% to 38.4%, in Fig.
9. This is because as the threshold increases, the number of
(a) Noise Power jammed points increases, and the distribution of the hearing
range of nodes becomes more concentrated.
The impact of node density. We measured the cumulative
position estimation error by changing the network density λ
to 0.5, 1, 2. It can be seen that when the error distance is
less than 1m, the smaller the node strength λ, the greater the
cumulative error. This is because the communication nodes are
more denser when λ is 0.5 than λ is 0.2, in Fig. 8 (b) and Fig.
9. The more neighbor nodes that can be used for localization,
(b) Number of Nodes the smaller the estimation error of jammer’ location is.
The impact of noise power. We set the average error when
Fig. 10. Performance impacted by noise power and number of nodes.
the noise power varies from 0.5 to 2, and the average accuracy
By solving the matrix X though this improved least squares of both LSQ algorithm and improved LSQ algorithm is above
algorithm, we obtain the estimated jammer coordinate. 1.6 m,in Fig. 10. Again, it is clear that the estimation error
increases in proportion to the noise power. This is due to the
V. P ERFORMANCE E VALUATION fact that the signal-to-noise ratio of the node surrounding the
jammer decreases as noise power increases.
A. Experimental Setup The impact of jammer’s NLB range. We measured the
We evaluate the performance of improved LSQ localization average positioning error of a 300-node network changing
algorithm by numerical simulation. In particular, we set the the jammer’s NLB radius to [1, 2, 3], and plotted the results
parameters η = 2 and θ = 0 for simulating the real scenario in Fig.9. Again, we observe that the performance of the
in the log-normal model. Therefore, we can capture the main improved LSQ algorithm decreases with increasing NLB.
features of the implementation and avoid the unreproducible When N LB = 1, the estimation error is reduced by about
experimental results due to differential placement of experi- 50%. However, when range of the jammer’s NLB increases,
mental equipments. (N LB = 2, N LB = 3) the estimated position of the jammer
Each of our individual results was conducted through 3000- does not change much. This is because the influence of the
topology of network. Taking LSQ algorithm as a comparison, jammer’s NLB on the positioning result is indirect, and it will
in the area of [10 × 10] we first measure the cumulative be affected by the noise power.
distribution function (CDF) of the mean error of the improved The impact of jammer position. Respectively, given corner
LSQ positioning, as shown in Fig. 8 (a) and Fig. 10. Within (5, 0), (5, 5) and center (0, 0), when we set λ intensity as 0.5,
range between [0, 1], the cumulative error of our algorithm is we observe that the mean localization error at center is reduced
50% on average, which means that the algorithm converges by 0.2 m. When the jammer is located at the corner, the
faster than the original LSQ algorithm. average estimation error is around 1.5 m. This is because when
264
Authorized licensed use limited to: University of Electronic Science and Tech of China. Downloaded on November 06,2023 at 06:58:34 UTC from IEEE Xplore. Restrictions apply.
the jammer is in the corner, the neighbor nodes around it that [11] Hongbo Liu, Zhenhua Liu, Yingying Chen, and Wenyuan Xu. Deter-
mining the position of a jammer using a virtual-force iterative approach.
can be used to locate are concentrated on one side, resulting Wireless Networks, 17(2):531–547, 2011.
in a decrease in the accuracy of the localization algorithm. [12] Shuiyin Liu, Yi Hong, and Emanuele Viterbo. Practical secrecy using
artificial noise. IEEE Communications Letters, 17(7):1483–1486, 2013.
C ONCLUSION [13] Wanchun Liu, Xiangyun Zhou, Salman Durrani, and Petar Popovski.
Secure communication with a wireless-powered friendly jammer. IEEE
In this work, we address the problem of locating jammers in Transactions on Wireless Communications, 15(1):401–415, 2016.
wireless networks and propose an improved LSQ localization [14] Zhenhua Liu, Hongbo Liu, Wenyuan Xu, and Yingying Chen. Exploiting
algorithm to estimate the jammer’s location. We have shown jamming-caused neighbor changes for jammer localization. IEEE
Transactions on Parallel and Distributed Systems, 23(3):547–555, 2011.
that the changes in a node’s hearing range can be estimated [15] Yucheng Lyu, Yuanbin Mo, Songqing Yue, and Wenwu Liu. Improved
by exploiting changes in its neighbors. Thus, we locate the beetle antennae algorithm based on localization for jamming attack in
jammer by examining the neighbor list changes of nodes and wireless sensor networks. IEEE Access, 10:13071–13088, 2022.
[16] Munienge Mbodila, Ekabua Obeten, and Isong Bassey. Implementation
utilizing a least squares problem. of novel vehicles’ traffic monitoring using wireless sensor network in
To assess positioning accuracy, we propose a mathematical south africa. In 2015 IEEE International Conference on Communication
tool to model the jamming network. Moreover, by utilizing Software and Networks (ICCSN), pages 282–286, 2015.
[17] Rajesh Kannan Megalingam, Divya M. Kaimal, and Maneesha V.
the deduced distribution of the hearing range , we enhanced Ramesh. Efficient patient monitoring for multiple patients using wsn.
the least squares algorithm based on jammer localization. To In 2012 International Conference on Advances in Mobile Network,
demonstrate the effectiveness of our improved least squares Communication and Its Applications, pages 87–90, 2012.
[18] Zhao Niu, Haozhu Li, Xin Zhou, and Jun Huang. Overview of
algorithm to localize jammer, we provide an extensible model jammer localization in wireless sensor networks. In 2020 IEEE 9th
that can be used to study complex networks, such as the non- Joint International Information Technology and Artificial Intelligence
homogeneous poisson point with variable node densities. We Conference (ITAIC), volume 9, pages 9–13, 2020.
[19] Tianzhu Qiao, Yu Zhang, and Huaping Liu. Nonlinear expectation maxi-
can also locate jammer in the cellular network, which is more mization estimator for tdoa localization. IEEE Wireless Communications
realistic and guide our future efforts. Letters, 3(6):637–640, 2014.
To evaluate the improved LSQ algorithm, we build a shadow [20] B. D. Ripley. Journal of the Royal Statistical Society. Series A (Statistics
in Society), 151(1):239–240, 1988.
model-based simulation environment and utilize some im- [21] Arian Shoari, Gonzalo Mateos, and Alireza Seyedi. Analysis of
portant parameters obtained from experiments. Our extensive target localization with ideal binary detectors via likelihood function
simulation results confirm that the improved LSQ-based algo- smoothing. IEEE Signal Processing Letters, 23(5):737–741, 2016.
[22] Arian Shoari and Alireza Seyedi. Localization of an uncooperative target
rithm can effectively locate jammers in complex experimental with binary observations. In 2010 IEEE 11th International Workshop
configurations. on Signal Processing Advances in Wireless Communications (SPAWC),
pages 1–5. IEEE, 2010.
R EFERENCES [23] Yanqiang Sun, Refik Molva, Melek Önen, Xiaodong Wang, and Xing-
ming Zhou. Catch the jammer in wireless sensor network. In 2011 IEEE
[1] Amr Abdelaziz, C. Emre Koksal, and Hesham El Gamal. On the
22nd International Symposium on Personal, Indoor and Mobile Radio
security of angle of arrival estimation. In 2016 IEEE Conference on
Communications, pages 1156–1160. IEEE, 2011.
Communications and Network Security (CNS), pages 109–117, 2016.
[24] Chao Wang, Hui-Ming Wang, Xiang-Gen Xia, and Chaowen Liu.
[2] Ahmad Alaiad and Lina Zhou. Patients’ adoption of wsn-based smart
Uncoordinated jammer selection for securing simome wiretap channels:
home healthcare systems: An integrated model of facilitators and bar-
A stochastic geometry approach. IEEE Transactions on Wireless
riers. IEEE Transactions on Professional Communication, 60(1):4–23,
Communications, 14(5):2596–2612, 2015.
2017.
[25] Huiyong Wang, Minglu Zhang, and Jingyang Wang. Design and
[3] Jeffrey G. Andrews, Francois Baccelli, and Radha Krishna Ganti. A
implementation of an emergency search and rescue system based on
tractable approach to coverage and rate in cellular networks. IEEE
mobile robot and wsn. In 2010 2nd International Asia Conference on
Transactions on Communications, 59(11):3122–3134, 2011.
Informatics in Control, Automation and Robotics (CAR 2010), volume 1,
[4] Suvankar Barai, Debajyoti Biswas, and Buddhadeb Sau. Estimate
pages 206–209, 2010.
distance measurement using nodemcu esp8266 based on rssi technique.
[26] Tongxiang Wang, Tao Liang, Xianglin Wei, and Jianhua Fan. Local-
In 2017 IEEE Conference on Antenna Measurements and Applications
ization of directional jammer in wireless sensor networks. In 2018
(CAMA), pages 170–173, 2017.
International Conference on Robots and Intelligent System (ICRIS),
[5] Nirupama Bulusu, Vladimir Bychkovskiy, Deborah Estrin, and John
pages 198–202, 2018.
Heidemann. Scalable, ad hoc deployable rf-based localization. In
[27] Charles Wiame, Luc Vandendorpe, and Claude Oestges. Stochastic
Proceedings of the grace hopper conference on celebration of women
geometry based coverage estimation using realistic urban shadowing
in computing, volume 31, 2002.
models. In 2018 IEEE 87th Vehicular Technology Conference (VTC
[6] Nirupama Bulusu, John Heidemann, and Deborah Estrin. Gps-less
Spring), pages 1–5, 2018.
low-cost outdoor localization for very small devices. IEEE personal
[28] Xi Zhang, Xiangyun Zhou, and Matthew R. McKay. Enhancing secrecy
communications, 7(5):28–34, 2000.
with multi-antenna transmission in wireless ad hoc networks. IEEE
[7] Abdolreza Hatamlou, Salwani Abdullah, and Zalinda Othman. Gravita-
Transactions on Information Forensics and Security, 8(11):1802–1814,
tional search algorithm with heuristic search for clustering problems. In
2013.
2011 3rd Conference on Data Mining and Optimization (DMO), pages
[29] Jun Zheng and Yik-Chung Wu. Joint time synchronization and localiza-
190–193, 2011.
tion of an unknown node in wireless sensor networks. IEEE Transactions
[8] Ashish Khisti and Gregory W. Wornell. Secure transmission with multi-
on Signal Processing, 58(3):1309–1320, 2010.
ple antennas—part ii: The mimome wiretap channel. IEEE Transactions
on Information Theory, 56(11):5515–5532, 2010.
[9] Joon-Ho Lee and Sangho Jo. Improvement of exhaustive search based
maximum-likelihood doa estimation. In Proceedings of the IEEE 2010
National Aerospace and Electronics Conference, pages 246–249, 2010.
[10] Sang Hyuk Lee, Soobin Lee, Heecheol Song, and Hwang Soo Lee.
Wireless sensor network design for tactical military applications :
Remote large-scale environments. In MILCOM 2009 - 2009 IEEE
Military Communications Conference, pages 1–7, 2009.
265
Authorized licensed use limited to: University of Electronic Science and Tech of China. Downloaded on November 06,2023 at 06:58:34 UTC from IEEE Xplore. Restrictions apply.