Eavesdropper and jammer selection in wireless source localization networks

buir.contributor.authorÖztürk, Cüneyd
buir.contributor.authorGezici, Sinan
buir.contributor.orcidÖztürk, Cüneyd|0000-0003-3792-9844
buir.contributor.orcidGezici, Sinan|0000-0002-6369-3081
dc.citation.epage4356en_US
dc.citation.spage4341en_US
dc.citation.volumeNumber69en_US
dc.contributor.authorÖztürk, Cüneyd
dc.contributor.authorGezici, Sinan
dc.date.accessioned2022-02-01T06:55:45Z
dc.date.available2022-02-01T06:55:45Z
dc.date.issued2021-07-26
dc.departmentDepartment of Electrical and Electronics Engineeringen_US
dc.description.abstractWe consider a wireless source localization network in which a target node emits localization signals that are used by anchor nodes to estimate the target node position. In addition to target and anchor nodes, there can also exist eavesdropper nodes and jammer nodes which aim to estimate the position of the target node and to degrade the accuracy of localization, respectively. We first propose the problem of eavesdropper selection with the goal of optimally placing a given number of eavesdropper nodes to a subset of possible positions to estimate the target node position as accurately as possible. As the performance metric, the Cramér-Rao lower bound (CRLB) related to the estimation of the target node position by eavesdropper nodes is derived, and its convexity and monotonicity properties are investigated. By relaxing the integer constraints, the eavesdropper selection problem is approximated by a convex optimization problem and algorithms are proposed for eavesdropper selection. Then, the problem of jammer selection is proposed where the aim is to optimally place a given number of jammer nodes to a subset of possible positions for degrading the localization accuracy of the network as much as possible. A CRLB expression from the literature is used as the performance metric, and its concavity and monotonicity properties are derived. Also, a convex optimization problem is derived after relaxation. Finally, the joint eavesdropper and jammer selection problem is proposed with the goal of placing certain numbers of eavesdropper and jammer nodes to a subset of possible positions.en_US
dc.description.provenanceSubmitted by Evrim Ergin (eergin@bilkent.edu.tr) on 2022-02-01T06:55:45Z No. of bitstreams: 1 Eavesdropper_and_jammer_selection_in_wireless_source_localization_networks.pdf: 854394 bytes, checksum: 1533449987d5ac1db804fd287c3bbb9b (MD5)en
dc.description.provenanceMade available in DSpace on 2022-02-01T06:55:45Z (GMT). No. of bitstreams: 1 Eavesdropper_and_jammer_selection_in_wireless_source_localization_networks.pdf: 854394 bytes, checksum: 1533449987d5ac1db804fd287c3bbb9b (MD5) Previous issue date: 2021-07-26en
dc.identifier.doi10.1109/TSP.2021.3098465en_US
dc.identifier.eissn1941-0476
dc.identifier.issn1053-587X
dc.identifier.urihttp://hdl.handle.net/11693/76932
dc.language.isoEnglishen_US
dc.publisherIEEEen_US
dc.relation.isversionofhttps://doi.org/10.1109/TSP.2021.3098465en_US
dc.source.titleIEEE Transactions on Signal Processingen_US
dc.subjectLocalizationen_US
dc.subjectEavesdroppingen_US
dc.subjectJammingen_US
dc.subjectEstimationen_US
dc.subjectSecrecyen_US
dc.titleEavesdropper and jammer selection in wireless source localization networksen_US
dc.typeArticleen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Eavesdropper_and_jammer_selection_in_wireless_source_localization_networks.pdf
Size:
834.37 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.69 KB
Format:
Item-specific license agreed upon to submission
Description: