scholarly journals Distributed Extended Kalman Filtering Based Techniques for 3-D UAV Jamming Localization

Sensors ◽  
2020 ◽  
Vol 20 (22) ◽  
pp. 6405
Author(s):  
Waleed Aldosari ◽  
Muhammad Moinuddin ◽  
Abdulah Jeza Aljohani ◽  
Ubaid M. Al-Saggaf

Wireless networks are vulnerable to jamming attacks. Jamming in wireless communication becomes a major research problem due to ease in Unmanned Aerial Vehicle (UAV) launching and blocking of communication channels. Jamming is a subset of Denial of Service Attack (DoS) and an intentional interference where the malicious node disrupts the wireless communication by increasing the noise at the receiver node through transmission interference signal towards the target channel. In this work, the considered jammer is a UAV hovering around the target area to block the communication channel between two transceivers. We proposed a three-dimensional (3-D) UAV jamming localization scheme to track and detect the jammer position at each time step by employing a single boundary node observer. For this purpose, we developed two distributed Extended Kalman Filter (EKF) based schemes: (1) the Distributed EKF (DEKF) scheme using the information of the received power from the jammer at a single nearby boundary node only and (2) Distance Ratio aided Distributed EKF (DEKF-DR) based scheme utilizing an edge node in addition to a single boundary node. Extensive simulations are conducted in order to evaluate the performance of the proposed distributed algorithms for a 3-D trajectory and compared with that of the conventional Centralized EKF (EKF-Centr) based method (which is also modified for the 3-D scenario). The results show the clear supremacy of the proposed distributed algorithms with much lesser complexity in contrast to the conventional EKF-Centr technique.

2019 ◽  
Vol 2019 ◽  
pp. 1-18 ◽  
Author(s):  
Dimitrios Kosmanos ◽  
Antonios Argyriou ◽  
Leandros Maglaras

Vehicular Ad Hoc Networks (VANETs) aim at enhancing road safety and providing a comfortable driving environment by delivering early warning and infotainment messages to the drivers. Jamming attacks, however, pose a significant threat to their performance. In this paper, we propose a novel Relative Speed Estimation Algorithm (RSEA) of a moving vehicle that approaches a transmitter (Tx)-receiver (Rx) pair that interferes with their radio frequency (RF) communication by conducting a denial of service (DoS) attack. Our scheme is completely passive and uses a pilot-based received signal without hardware or computational cost to, firstly, estimate the combined channel between the transmitter-receiver and jammer-receiver and, secondly, to estimate the jamming signal and the relative speed between the jammer-receiver using the RF Doppler shift. Moreover, the relative speed metric exploits the angle of projection (AOP) of the speed vector of the jammer in the axis of its motion in order to form a two-dimensional representation of the geographical area. Our approach can effectively be applied for any form of the jamming signal and is proven to have quite accurate performance, with a mean absolute error (MAE) value of approximately 10% compared to the optimal zero MAE value under different jamming attack scenarios.


Secure and reliable routing expands the performance of wireless communication infrastructure of the Advanced Metering Infrastructure (AMI).This paper tries to deliver reliable routing using combination of AODV(Reactive type protocol) and DSDV(proactive type protocol) protocol considering WSN. Different kinds of Attack annoys the enactment of communication infrastructure of AMI. This paper defends communication infrastructure from DoS (Denial of service) attack. The main aim of this paper try to provide reliable routing with security. Communication infrastructure is a key element of AMI. Providing reliability and security for communication infrastructure we can improve the performance of AMI. Due to this electricity sector can save millions of dollars and we provide social awareness about importance of electricity security or Smart Grid. This paper calculates the security in terms of delay, energy consumption, throughput, PDR (Packet Delivery Ratio) and overhead. By considering these parameters we will calculate Confidentiality, Integrity, Availability and Accountability (non- repudiation). Wireless Sensor Network (WSN) considered for wireless communication infrastructure for the AMI. Sensor nodes are battered for attack. Intended for AODSD2V2 (Ad Hoc on Demand Destination Sequenced Distance Vector Routing Protocol) protects the data packets from malicious nodes and DoS attack. For the WSN network infrastructure two kinds of topologies are considered 1. Random deployment strategy 2. Grid deployment. Network Simulator2 (NS2) delivers comparatively simulation results intended for the calculation of reliability and security.


2021 ◽  
Author(s):  
Mingyue Xiong ◽  
Xin Wang ◽  
Jun Cheng

Abstract This work focuses on the consensus problem of multi-agent systems (MASs) under event-triggered control (ETC) subject to denial-of-service (DoS) jamming attacks. To reduce the cost of communication networks, a novel event-triggering mechanism (ETM) is applied to the sleeping interval to determine whether the sampled signal should be transmitted or not. Unlike periodic DoS attacks model, the DoS attacks occurrence are irregular, where attack attributes such as attack frequency and attack duration are taken into account. Moreover, compared with the fixed topological graph, the communication topologies may change due to DoS jamming attacks in this work. In view of this, based on the piecewise Lyapunov functional, sufficient conditions are derived to guarantee that consensus problem of the MASs can be solved. Finally, the effectiveness and correctness of the theoretical results are verified by a numerical example.


2016 ◽  
Author(s):  
Fergus R. Cooper ◽  
Ruth E. Baker ◽  
Alexander G. Fletcher

AbstractMathematical modelling provides a useful framework within which to investigate the organization of biological tissues. With advances in experimental biology leading to increasingly detailed descriptions of cellular behaviour, models that consider cells as individual objects are becoming a common tool to study how processes at the single-cell level affect collective dynamics and determine tissue size, shape and function. However, there often remains no comprehensive account of these models, their method of solution, computational implementation or analysis of parameter scaling, hindering our ability to utilise and accurately compare different models. Here we present an effcient, open-source implementation of the immersed boundary method (IBM), tailored to simulate the dynamics of cell populations. This approach considers the dynamics of elastic membranes, representing cell boundaries, immersed in a viscous Newtonian fluid. The IBM enables complex and emergent cell shape dynamics, spatially heterogeneous cell properties and precise control of growth mechanisms. We solve the model numerically using an established algorithm, based on the fast Fourier transform, providing full details of all technical aspects of our implementation. The implementation is undertaken within Chaste, an open-source C++ library that allows one to easily change constitutive assumptions. Our implementation scales linearly with time step, and subquadratically with mesh spacing and immersed boundary node spacing. We identify the relationship between the immersed boundary node spacing and fluid mesh spacing required to ensure fluid volume conservation within immersed boundaries, and the scaling of cell membrane stiffness and cell-cell interaction strength required when refining the immersed boundary discretization. This study provides a recipe allowing consistent parametrisation of IBM models.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 176691-176703
Author(s):  
Amany Alshawi ◽  
Pratik Satam ◽  
Firas Almoualem ◽  
Salim Hariri

2018 ◽  
Vol 7 (4) ◽  
pp. 48 ◽  
Author(s):  
Waleed Aldosari ◽  
Mohamed Zohdy

This work investigates boundary node selection when tracking a jammer. A technique to choose nodes to track jammers by estimating signal-to-noise Ratio (SNR), jammer-to-noise ratio (JNR), and jammer received signal strength (JRSS) are introduced in this paper. We proposed a boundary node selection threshold (BNST) algorithm. Every node can become a boundary node by comparing the SNR threshold, the average SNR estimated at the boundary node, and the received BNST value. The maximum sensing range, transmission range, and JRSS are the main parts of this algorithm. The algorithm is divided into three steps. In the first step, the maximum distance between two jammed nodes is found. Next, the maximum distance between the jammed node and its unjammed neighbors is computed. Finally, maximum BNST value is estimated. The extended Kalman filter (EKF) is utilized in this work to track the jammer and estimate its position in a different time step using selected boundary nodes. The experiment validates the benefits of selecting a boundary when tracking a jammer.


Sign in / Sign up

Export Citation Format

Share Document