SlideShare a Scribd company logo
1 of 4
An Error-Minimizing Framework for Localizing Jammers in Wireless Networks 
An Error-Minimizing Framework for Localizing Jammers in Wireless 
Networks 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in 
ABSTRACT 
Jammers can severely disrupt the communications in wireless networks, and jammersโ€™ position 
information allows the defender to actively eliminate the jamming attacks. Thus, in this paper, 
we aim to design a framework that can localize one or multiple jammers with a high accuracy. 
Most of existing jammer-localization schemes utilize indirect measurements (e.g., hearing 
ranges)affected by jamming attacks, which makes it difficult to localize jammers accurately. 
Instead, we exploit a direct measurementโ€”the strength of jamming signals (JSS). Estimating JSS 
is challenging as jamming signals may be embedded in other signals. As such, we devise an 
estimation scheme based on ambient noise floor and validate it with real-world experiments. To 
further reduce estimation errors, we define an evaluation feedback metric to quantify the 
estimation errors and formulate jammer localization as a nonlinear optimization problem, whose 
global optimal solution is close to jammersโ€™ true positions. We explore several heuristic search 
algorithms for approaching the global optimal solution, and our simulation results show that our 
error-minimizing-based framework achieves better performance than the existing schemes. In 
addition, our error-minimizing framework can utilize indirect measurements to obtain a better 
location estimation compared with prior work. 
EXISTING SYSTEM: 
Jammer-localization schemes utilize indirect measurements (e.g., hearing ranges) affected by 
jamming attacks, which makes it difficult to localize jammers accurately. The emergence of 
software-defined radios has enabled adversaries to build intentional jammers to disrupt network 
communication with little effort. Unintentional interference or malicious jamming, one or 
multiple 
jammers/interferers may coexist and have a detrimental impact on network performanceโ€”both 
can be referred as jamming. To ensure the successful deployment of pervasive wireless 
networks, it is crucial to localize jammers, since the locations of jammers allow a better physical 
arrangement of
An Error-Minimizing Framework for Localizing Jammers in Wireless Networks 
wireless devices that cause unintentional radio interference, or enable a wide range of defense 
strategies for combatting malicious jamming attackers. 
DISADVANTAGES OF EXISTING SYSTEM: 
๏‚ท Indirect measurements (e.g., hearing ranges) affected by jamming attacks. 
๏‚ท Difficult to localize jammers. 
๏‚ท Disruption of network communication. 
In proposed system, we focus on localizing one or multiple stationary jammers. Our goal is to 
extensively improve the accuracy of jammer localization. Current jammer-localization 
approaches mostly rely on parameters derived from the affected network topology, such as 
packet 
delivery ratios, neighbor lists, and nodesโ€™ hearing ranges. The use of these indirect measurements 
derived from jamming effects makes it difficult to accurately localize jammersโ€™ positions. 
Furthermore, they mainly localize one jammer and cannot cope with the cases that multiple 
jammers are located close to each other and their jamming effects overlap. 
ADVANTAGES OF PROPOSED SYSTEM: 
๏‚ท JSS utilizing the measurement of the ambient noise floor (ANF), which is readily 
availablefrom many commodity devices (e.g., MicaZ motes). 
๏‚ท Avoid disturbance of network communication 
๏‚ท Accuracy of the estimated locations. 
Contact: 9703109334, 9533694296 
PROPOSED SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
An Error-Minimizing Framework for Localizing Jammers in Wireless Networks 
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
๏ƒ˜ System : Pentium IV 2.4 GHz. 
๏ƒ˜ Hard Disk : 40 GB. 
๏ƒ˜ Floppy Drive : 1.44 Mb. 
๏ƒ˜ Monitor : 15 VGA Colour. 
๏ƒ˜ Mouse : Logitech. 
๏ƒ˜ Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
๏ƒ˜ Operating system : Windows XP/7. 
๏ƒ˜ Coding Language : ASP.net, C#.net 
๏ƒ˜ Tool : Visual Studio 2010 
๏ƒ˜ Database : SQL SERVER 2008 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
An Error-Minimizing Framework for Localizing Jammers in Wireless Networks 
Zhenhua Liu, Hongbo Liu, Wenyuan Xu, and Yingying Chen โ€œAn Error-Minimizing 
Framework for Localizing Jammers in Wireless Networksโ€ IEEE TRANSACTIONS ON 
PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014. 
Contact: 9703109334, 9533694296 
REFERENCE: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

More Related Content

Similar to an error-minimizing framework for localizing jammers in wireless networks

Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...
Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...
Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...
villagopi
ย 
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...
ijwmn
ย 
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...
ijwmn
ย 

Similar to an error-minimizing framework for localizing jammers in wireless networks (20)

Sub159
Sub159Sub159
Sub159
ย 
Parallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projectsParallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projects
ย 
Parallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 ProjectsParallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 Projects
ย 
A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...
ย 
Article GSM
Article GSMArticle GSM
Article GSM
ย 
Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...
Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...
Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...
ย 
WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMS
WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMSWORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMS
WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMS
ย 
C0511318
C0511318C0511318
C0511318
ย 
Eaackโ€”a secure intrusion detection system for manets ns2
Eaackโ€”a secure intrusion detection system for manets ns2Eaackโ€”a secure intrusion detection system for manets ns2
Eaackโ€”a secure intrusion detection system for manets ns2
ย 
Eaackโ€”a secure intrusion detection system for manets
Eaackโ€”a secure intrusion detection system for manetsEaackโ€”a secure intrusion detection system for manets
Eaackโ€”a secure intrusion detection system for manets
ย 
A survey on jamming attacks, detection and defending strategies in wireless s...
A survey on jamming attacks, detection and defending strategies in wireless s...A survey on jamming attacks, detection and defending strategies in wireless s...
A survey on jamming attacks, detection and defending strategies in wireless s...
ย 
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaackโ€”a secure intrusion detection sys...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaackโ€”a secure intrusion detection sys...JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaackโ€”a secure intrusion detection sys...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaackโ€”a secure intrusion detection sys...
ย 
Eaackโ€”a secure intrusion detection system for mane ts
Eaackโ€”a secure intrusion detection system for mane tsEaackโ€”a secure intrusion detection system for mane ts
Eaackโ€”a secure intrusion detection system for mane ts
ย 
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...
ย 
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...
PARTICLE FILTER APPROACH TO UTILIZATION OF WIRELESS SIGNAL STRENGTH FOR MOBIL...
ย 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
ย 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
ย 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
ย 
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
ย 
55
5555
55
ย 

More from swathi78

More from swathi78 (20)

secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
ย 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
ย 
web service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationweb service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s information
ย 
privacy-enhanced web service composition
privacy-enhanced web service compositionprivacy-enhanced web service composition
privacy-enhanced web service composition
ย 
optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...
ย 
friend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networksfriend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networks
ย 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computing
ย 
cooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networks
ย 
an incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloadingan incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloading
ย 
secure outsourced attribute-based signatures
secure outsourced attribute-based signaturessecure outsourced attribute-based signatures
secure outsourced attribute-based signatures
ย 
traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...
ย 
the design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networksthe design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networks
ย 
the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...
ย 
sos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networkssos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networks
ย 
securing broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryption
ย 
rre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery enginerre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery engine
ย 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...
ย 
loca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding systemloca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding system
ย 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
ย 
enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...
ย 

Recently uploaded

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
SUHANI PANDEY
ย 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
ย 

Recently uploaded (20)

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
ย 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
ย 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
ย 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
ย 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
ย 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
ย 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
ย 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
ย 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
ย 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ย 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
ย 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
ย 

an error-minimizing framework for localizing jammers in wireless networks

  • 1. An Error-Minimizing Framework for Localizing Jammers in Wireless Networks An Error-Minimizing Framework for Localizing Jammers in Wireless Networks Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in ABSTRACT Jammers can severely disrupt the communications in wireless networks, and jammersโ€™ position information allows the defender to actively eliminate the jamming attacks. Thus, in this paper, we aim to design a framework that can localize one or multiple jammers with a high accuracy. Most of existing jammer-localization schemes utilize indirect measurements (e.g., hearing ranges)affected by jamming attacks, which makes it difficult to localize jammers accurately. Instead, we exploit a direct measurementโ€”the strength of jamming signals (JSS). Estimating JSS is challenging as jamming signals may be embedded in other signals. As such, we devise an estimation scheme based on ambient noise floor and validate it with real-world experiments. To further reduce estimation errors, we define an evaluation feedback metric to quantify the estimation errors and formulate jammer localization as a nonlinear optimization problem, whose global optimal solution is close to jammersโ€™ true positions. We explore several heuristic search algorithms for approaching the global optimal solution, and our simulation results show that our error-minimizing-based framework achieves better performance than the existing schemes. In addition, our error-minimizing framework can utilize indirect measurements to obtain a better location estimation compared with prior work. EXISTING SYSTEM: Jammer-localization schemes utilize indirect measurements (e.g., hearing ranges) affected by jamming attacks, which makes it difficult to localize jammers accurately. The emergence of software-defined radios has enabled adversaries to build intentional jammers to disrupt network communication with little effort. Unintentional interference or malicious jamming, one or multiple jammers/interferers may coexist and have a detrimental impact on network performanceโ€”both can be referred as jamming. To ensure the successful deployment of pervasive wireless networks, it is crucial to localize jammers, since the locations of jammers allow a better physical arrangement of
  • 2. An Error-Minimizing Framework for Localizing Jammers in Wireless Networks wireless devices that cause unintentional radio interference, or enable a wide range of defense strategies for combatting malicious jamming attackers. DISADVANTAGES OF EXISTING SYSTEM: ๏‚ท Indirect measurements (e.g., hearing ranges) affected by jamming attacks. ๏‚ท Difficult to localize jammers. ๏‚ท Disruption of network communication. In proposed system, we focus on localizing one or multiple stationary jammers. Our goal is to extensively improve the accuracy of jammer localization. Current jammer-localization approaches mostly rely on parameters derived from the affected network topology, such as packet delivery ratios, neighbor lists, and nodesโ€™ hearing ranges. The use of these indirect measurements derived from jamming effects makes it difficult to accurately localize jammersโ€™ positions. Furthermore, they mainly localize one jammer and cannot cope with the cases that multiple jammers are located close to each other and their jamming effects overlap. ADVANTAGES OF PROPOSED SYSTEM: ๏‚ท JSS utilizing the measurement of the ambient noise floor (ANF), which is readily availablefrom many commodity devices (e.g., MicaZ motes). ๏‚ท Avoid disturbance of network communication ๏‚ท Accuracy of the estimated locations. Contact: 9703109334, 9533694296 PROPOSED SYSTEM: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 3. An Error-Minimizing Framework for Localizing Jammers in Wireless Networks SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: ๏ƒ˜ System : Pentium IV 2.4 GHz. ๏ƒ˜ Hard Disk : 40 GB. ๏ƒ˜ Floppy Drive : 1.44 Mb. ๏ƒ˜ Monitor : 15 VGA Colour. ๏ƒ˜ Mouse : Logitech. ๏ƒ˜ Ram : 512 Mb. SOFTWARE REQUIREMENTS: ๏ƒ˜ Operating system : Windows XP/7. ๏ƒ˜ Coding Language : ASP.net, C#.net ๏ƒ˜ Tool : Visual Studio 2010 ๏ƒ˜ Database : SQL SERVER 2008 Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 4. An Error-Minimizing Framework for Localizing Jammers in Wireless Networks Zhenhua Liu, Hongbo Liu, Wenyuan Xu, and Yingying Chen โ€œAn Error-Minimizing Framework for Localizing Jammers in Wireless Networksโ€ IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014. Contact: 9703109334, 9533694296 REFERENCE: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in