Jamming strategies in wireless source localization systems
buir.contributor.author | Keskin, Musa Furkan | |
buir.contributor.author | Öztürk, Cüneyd | |
buir.contributor.author | Bayram, Suat | |
buir.contributor.author | Gezici, Sinan | |
dc.citation.epage | 1145 | en_US |
dc.citation.issueNumber | 4 | en_US |
dc.citation.spage | 1141 | en_US |
dc.citation.volumeNumber | 8 | en_US |
dc.contributor.author | Keskin, Musa Furkan | en_US |
dc.contributor.author | Öztürk, Cüneyd | en_US |
dc.contributor.author | Bayram, Suat | en_US |
dc.contributor.author | Gezici, Sinan | en_US |
dc.date.accessioned | 2020-01-30T06:43:15Z | |
dc.date.available | 2020-01-30T06:43:15Z | |
dc.date.issued | 2019-08 | |
dc.department | Department of Electrical and Electronics Engineering | en_US |
dc.description.abstract | We consider optimal jamming strategies in wireless source localization systems, where anchor nodes estimate positions of target nodes in the presence of jammers that emit zero-mean Gaussian noise. The Cramér-Rao lower bound (CRLB) for target location estimation is derived and the problem of optimal power allocation for jammer nodes is formulated to maximize the average CRLB for target nodes under total and peak power constraints. Exploiting the special problem structure and successive convex approximation techniques, we develop an iterative algorithm that transforms the original non-convex problem into a sequence of convex geometric programs. In addition, we present a closed-form solution that is asymptotically optimal. Numerical results demonstrate the improved jamming performance of the proposed solutions over the uniform power allocation strategy. | en_US |
dc.description.provenance | Submitted by Evrim Ergin (eergin@bilkent.edu.tr) on 2020-01-30T06:43:15Z No. of bitstreams: 1 Jamming_Strategies_in_Wireless_Source_Localization_Systems.pdf: 428208 bytes, checksum: 9858b2c96de013925f905deecb8fd205 (MD5) | en |
dc.description.provenance | Made available in DSpace on 2020-01-30T06:43:15Z (GMT). No. of bitstreams: 1 Jamming_Strategies_in_Wireless_Source_Localization_Systems.pdf: 428208 bytes, checksum: 9858b2c96de013925f905deecb8fd205 (MD5) Previous issue date: 2019-08 | en |
dc.identifier.doi | 10.1109/LWC.2019.2909029 | en_US |
dc.identifier.issn | 2162-2345 | |
dc.identifier.uri | http://hdl.handle.net/11693/52916 | |
dc.language.iso | English | en_US |
dc.publisher | IEEE | en_US |
dc.relation.isversionof | https://doi.org/10.1109/LWC.2019.2909029 | en_US |
dc.source.title | IEEE Wireless Communications Letters | en_US |
dc.subject | Jamming | en_US |
dc.subject | Wireless localization | en_US |
dc.subject | Power allocation | en_US |
dc.subject | Geometric programming | en_US |
dc.subject | Successive convex approximation | en_US |
dc.title | Jamming strategies in wireless source localization systems | en_US |
dc.type | Article | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Jamming_Strategies_in_Wireless_Source_Localization_Systems.pdf
- Size:
- 422.53 KB
- Format:
- Adobe Portable Document Format
- Description: