Next Article in Journal
Distributed High Temperature Monitoring of SMF under Electrical Arc Discharges Based on OFDR
Previous Article in Journal
Semantic Distributed Data for Vehicular Networks Using the Inter-Planetary File System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Distributed Extended Kalman Filtering Based Techniques for 3-D UAV Jamming Localization

by
Waleed Aldosari
1,
Muhammad Moinuddin
1,2,
Abdulah Jeza Aljohani
1,2,* and
Ubaid M. Al-Saggaf
1,2
1
Center of Excellence in Intelligent Engineering Systems, King Abdulaziz University, Jeddah 21589, Saudi Arabia
2
Department of Electrical and Computer Engineering, King Abdulaziz University, Jeddah 21589, Saudi Arabia
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(22), 6405; https://doi.org/10.3390/s20226405
Submission received: 25 September 2020 / Revised: 29 October 2020 / Accepted: 6 November 2020 / Published: 10 November 2020
(This article belongs to the Section Communications)

Abstract

:
Wireless networks are vulnerable to jamming attacks. Jamming in wireless communication becomes a major research problem due to ease in Unmanned Aerial Vehicle (UAV) launching and blocking of communication channels. Jamming is a subset of Denial of Service Attack (DoS) and an intentional interference where the malicious node disrupts the wireless communication by increasing the noise at the receiver node through transmission interference signal towards the target channel. In this work, the considered jammer is a UAV hovering around the target area to block the communication channel between two transceivers. We proposed a three-dimensional (3-D) UAV jamming localization scheme to track and detect the jammer position at each time step by employing a single boundary node observer. For this purpose, we developed two distributed Extended Kalman Filter (EKF) based schemes: (1) the Distributed EKF (DEKF) scheme using the information of the received power from the jammer at a single nearby boundary node only and (2) Distance Ratio aided Distributed EKF (DEKF-DR) based scheme utilizing an edge node in addition to a single boundary node. Extensive simulations are conducted in order to evaluate the performance of the proposed distributed algorithms for a 3-D trajectory and compared with that of the conventional Centralized EKF (EKF-Centr) based method (which is also modified for the 3-D scenario). The results show the clear supremacy of the proposed distributed algorithms with much lesser complexity in contrast to the conventional EKF-Centr technique.

1. Introduction

Unmanned Aerial Vehicles (UAVs) are an emerging technology designed to flight with no human pilot. The UAV use was initially motivated by military applications, including reconnaissance, surveillance, and tracking [1,2]. This is due to the fact that the UAVs can be readily equipped with sensors, cameras, radars, and more technologies for military purposes [3,4]. Recently, the use of UAV has unprecedentedly increased including wide range of applications, such as, public safety, police, transportation, package delivery, and environmental monitoring. UAVs offer crucial help in rescue and recovery for disaster relief operations, when public communication networks get crippled [5], since they can form a salable and dynamic networks [6]. The UAV ability of hovering over a targeted area is desirable in many applications, for example, a UAV can help in localization when the Global position System (GPS) unavailable or inaccurate [7,8].
Jamming attacks in wireless communication can be classified into two main levels [9,10]. First, the elementary level that includes constant, deceptive, and random jammers. The constant jammer simply transmits a random bit continually to make the available channel busy [10]. Hence, any node within the jammer transmission range will be unable to access the channel and keep sensing until its battery depleted [9]. While the deceptive jammer, as the name suggested, tries to mimic the original transmission by sending regular packets towards the target node. In this case, all of the nodes located around the jammer will switch to receive mode and process the received corrupted data. The random jammer switches to active mode and transmitting jamming signals towards the target for a certain time and then return to sleep mode [11,12]. Second, the advanced level that might include the barge and the spot jammers. Here, the jammers sense all available channels; once it detects the channel used by legitimate one, it immediately transmits its signal to jam it. The jammers change their frequencies from carrier to another aiming to block all sub-channels [13]. Detecting the UAV jamming location is the first step towards preventing such an attack. By finding the UAV location, any appropriate action can be taken against the enemy UAV; e.g., physically destroying it or jam the Jammer by another jamming source [14,15].
Tracking and localization jammers in wireless communication networks are still challenging topics. The used algorithms can be categorized into two main groups: range-free and range-based schemes [16]. The accuracy of the range-free techniques is based on nodes locations and the change of network topology. In this context, the Centroid Localization (CL) algorithm [17] and Weighted Centroid (WCL) algorithm [18] are examples of range-free techniques. They are both sensitive to node locations and the number of nodes deployed. The location accuracy increases when the number of nodes affected by the jamming signal increases [18,19]. Therefore, the range free method is inaccurate when the affected nodes are fewer and are located closer to each other. However, the range-based method utilizes the so-called Jammer Received Signal Strength (JRSS) in order to detect and predict jammers’ physical locations. This method tries to estimate the JRSS of the original signal, hence more reliable results can be achieved when compared to its range-free counterpart. Centralized Extended Kalman Filtering (EKF-Centr) was proposed in [20], where the algorithm is based on the received jammer’s power from the boundary nodes at each time step. It was found [20,21] that the tracking efficiency increases when the number of boundary nodes increases.
A method for detecting jammer’s location utilizing the Packet Delivery Ratio (PDR) rate at each node was reported in [22]. In [23], the adaptive RSSI filtering technique is employed to improve the measured RSSI signal degraded due to multipath effects with the aim to enhance the localization accuracy and to reduce the computational complexity of the tracking system. The RSSI based approaches that Kalman filtering to estimate the target position are presented in [24,25]. They considered that, during jamming attacks, both the Signal to Noise Ratio (SNR) and PDR decrease as the amount of noise increases. Therefore, any node that has a lower PDR than expected is considered as a near jammer node and the gradient descent technique is employed in order to track the jamming source [22]. Wide-band jammer localization method introduced in [26], where a combination of Difference of Arrivals (DOA), Time Difference of Arrivals (TDOA), and EKF used. More explicitly, the DOA was utilized in order to provide the EKF with an accurate initial position, while the TDOA helped the EKF for fast converge. The efficiency of this method depends on the number nodes used for localization and tracking processes [26].
In summary, the aforementioned existing solutions have one of several drawbacks, such as (i) higher computationally complex due to heavy computational requirements for DOA/TDOA estimation [26], (ii) sensitive to node locations and the number of nodes deployed [18,19], (iii) require a large computations for centralized processing and dependency on large number of boundary nodes [20], and (iv) highly sensitive to noise power (or SNR) [22]. Against these techniques, we proposed two novels distributed Extended Kalman Filter (EKF) based schemes:
  • Distributed EKF (DEKF) scheme while using information of the received power from the jammer at a single boundary node only.
  • Distance Ratio aided Distributed EKF (DEKF-DR) based scheme utilizing an edge node in addition to a single boundary node.
In general, these two methods require less computation due to distributed processing. Among these methods, DEKF-DR is the most promising, as it only uses a single node and its one neighbor to estimate received powers while offering the best accuracy when compared to the DEKF and the EKF-Centr (which is also modified for the 3-D scenario) techniques.
The paper is organized, as follows: following the introduction, the system model is presented in Section 2. Section 3 introduces the concept of Distance Ratio. In Section 4, an overview of the standard Extended Kalman Filter is provided and the proposed distributed Extended Kalman Filter for 3-D Jammer’s Localization are developed. Section 5 provides extension of the existing centralized EKF-aided jammers Localization scheme to 3-D scenario. The results and discussion are provided in Section 6. Finally, concluding remarks are given in Section 7.

2. System Model

We consider a jammer UAV (J) flying above the target area and emitting its jamming signal towards base stations on the ground. There are two base stations located outside the jamming region that may transmit and receive data from each other, as shown in Figure 1. Without loss of generality, we consider that the jammer UAV is moving in a three-dimensional Cartesian coordinates system with variable speed and constant acceleration. Constant acceleration is used in many works such as in [4] and non-acceleration model [27]. Non-acceleration models are commonly used in monocular SLAM systems [27]. The base stations are at fixed positions in the XY-plane, as shown in Figure 2. During a jamming attack, the network topology may change and nodes will be affected based on their locations and jammer’s transmission power. Note that, the key parameters are defined in Table 1.
Based on jamming signal and noise powers at the received signal by sensors, the nodes are classified into three different types [28], as shown in Figure 3. When jamming signal attacks nodes, the SNR decreases which result in increased Bit Error Rate (BER) and decreased Packet Delivery Ratio (PDR). Thus, the system fails to decode the signal properly and it requests the re-transmission of signals. Packets received with SNR below the system threshold value S N R < γ are considered invalid data and require re-transmission of data. The sensors located inside the jamming region are called Jammed Nodes, N J , and have SNR less the than system threshold value ( γ ). Hence, they are completely isolated from the network and cannot send or receive data from their neighbors. On the other hand, the nodes located near the jamming region and have SNR larger than the system threshold are known as the Boundary Nodes, B. These nodes lost their links with some of their neighbors. However, they might still have active links with unaffected sensors and can communicate with them. Lastly, the nodes outside the attacked area with SNR larger than the system threshold value are called Unaffected Nodes N.

3. Concept of Distance Ratio ( β )

In this section, we described the concept of distance ratio which was introduced in [29]. Moreover, we extended the distance ratio concept to three-dimensional space x , y , z . This concept will be later utilized in order to develop the EKF algorithm in Section 4. Note that, Table 1 defines the main parameters. The distance ratio concept is based on signal to noise ratio at the edge node N E , jamming power received by boundary node B and Received Signal Strength (RSS) from B, as shown in Figure 4. Here, d J B and d J E are the distances from the jammer to the boundary node and from the jammer to the edge node, respectively. Thus, we can express d J B and d J E , respectively, as:
d J B = ( x B x J ) 2 + ( y B y J ) 2 + ( z B z J ) 2
and
d J E = ( x E x J ) 2 + ( y E y J ) 2 + ( z E z J ) 2
The SNR decreases when the jammer moves towards the target node until it drops to below an acceptable threshold value. This results in a jammed node and communication channel being completely blocked. Therefore, the node has SNR approximately equal to the system threshold value S N R γ located on the jamming edge. We use this observation in order to estimate the unknown distances between the jammer and edge node. The jamming power received by the boundary node is following the Log-distance shadowing model where it an extension of the Friis equation and it is proportional inverse to the distance, as follows:
P J B = P t + k 10 n log 10 d J B + X σ
where P J B is the jamming power received at distance d, and P t is the jammer’s transmission power, the path loss exponent n, depending on the environment and it is variant from physical environment to other. In this paper we assumed it equal to 2 for free space environment, or Line of Sight (LoS). The Gaussian noise with zero mean denoted by X σ . k is constant and depend on the antenna characteristics. d J B is the distance between jammer and the boundary node.
Similarly, the jamming power received by the edge node (represented by P J E ) can be expressed as:
P J E = P t + k 10 n log 10 d J E + X σ
Next, we define the distance ratio ( β ) as the ratio of d J E to d J B , that is:
β = d J E d J B
Now, using the geometry that is shown in Figure 4, we conclude that the distances d J E , d J B , and  d E B are related as:
d J B = d J E + d E B
Thus, we can also relate d E B and d J B while using the following:
( 1 β ) = d E B d J B
As a result, we can relate the power terms P J B and P J B with the aid of distance ratio to obtain:
P J E = P J B 10 n log 10 ( β )
Similarly, it can be shown that P E B and P J B can be related as:
P E B = P J B 10 n log 10 ( 1 β )
Later, in Section 3, we will explain how the above equations can help us in the development of a distributed Extended Kalman Filter (EKF) algorithm for the jammer’s 3D location estimation.

4. Proposed Distributed Extended Kalman Filter Based 3D Jammer’s Localization Schemes

The Extended Kalman Filtering is an extension of Linear Kalman Filter (LKF), which is capable to take into account the nonlinearity of the system model. More specifically, the EKF employs the first-order linearization of the nonlinear system in a recursive fashion to find the estimates current mean and the covariance of the state vector [30].
Consider the following non-linear state transition model:
x k = f ( x k 1 , u k ) + w k
where x k represents the state vector, u k is the input vector, f represents the non-linear state transition function, and w k is a zero mean Gaussian process noise with a covariance matrix Q , i.e.,  w k N ( 0 , Q ) . Now, the measurement vector z k can be expressed as:
z k = h ( x k , u k ) + v k
where v k is a zero mean Gaussian measurement noise with a covariance matrix R , i.e., v k N ( 0 , R ) . Here, h represents non-linear function for the measurement process. The EKF estimates the current position in two main steps, prediction and update state [31]. Next, we can define the following Jacobian matrices as:
A k = f ( x k 1 , u k ) x k 1 | x ^ k 1 | k 1 a n d H k = h ( x k , u k ) x k | x ^ k | k 1
the conventional EKF algorithm can be summarized, as follows:
x ^ k | k 1 = f ( x ^ k 1 | k 1 , u k )
P k | k 1 = A k P k 1 | k 1 A k T + Q k
K k = P k | k 1 H k T ( H k P k | k 1 H k T + R k ) 1
x ^ k = x ^ k | k 1 + K k ( z k h ( x ^ k | k 1 ) )
P k | k = P k | k 1 K k H k P k | k 1
where K k is the Kalman gain and P k | k is the state error covariance matrix estimate at time instant k .
Next, we propose our distributed EKF-based two different methods for the 3-D Jammer’s Localization. These are presented in the ensuing sub-sections.

4.1. Distributed Extended Kalman Filter (DEKF) for 3D Localization

In this method, a distributed scenario is considered, where each node employs the standard EKF by using the information of the received power from the jammer at the nearby boundary node of the jamming region, as shown in Figure 3. This scheme is termed as Distributed Extended Kalman Filter (DEKF). In the DEKF approach, every node process the jamming power and estimate the jammer’s location locally without the need to collaborate with another node. Thus, for the jammer’s 3D localization task with the DEKF, the state vector will take the following form:
x k = [ x J , y J , z J , v x , v y , v z , a x , a y , a z ] T
The Jammer’s motion can be described using the well-known Kinetic equation model given by:
x k + 1 = x k + v Δ t + 1 2 a Δ t 2
Thus, the Jacobian matrix A k can be expressed as:
A k = Δ f x k | ( x ^ J , k 1 , y ^ J , k 1 , z ^ J , k 1 ) = 1 0 0 d t 0 0 d t 2 2 0 0 0 1 0 0 d t 0 0 d t 2 2 0 0 0 1 0 0 d t 0 0 d t 2 2 0 0 0 1 0 0 d t 0 0 0 0 0 0 1 0 0 d t 0 0 0 0 0 0 1 0 0 d t 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 ( x ^ J , k 1 , y ^ J , k 1 , z ^ J , k 1 )
Additionally, the covariance matrix of process noise Q k and the covariance matrix of measurement noise R k can be written, respectively, as:
Q k = d t 4 4 0 0 d t 3 3 0 0 d t 2 2 0 0 0 d t 4 4 0 0 d t 3 3 0 0 d t 2 2 0 0 0 d t 4 4 0 0 d t 3 3 0 0 d t 2 2 d t 3 3 0 0 d t 2 2 0 0 d t 0 0 0 d t 3 3 0 0 d t 2 2 0 0 d t 0 0 0 d t 3 3 0 0 d t 2 2 0 0 d t d t 2 2 0 0 d t 0 0 1 0 0 0 d t 2 2 0 0 d t 0 0 1 0 0 0 d t 2 2 0 0 d t 0 0 1
R k = d i a g σ v x 2 , σ v y 2 , σ v z 2 , σ a x 2 , σ a y 2 , σ a z 2 , σ P J B 2
Now, assume that every sensor node provides the measurements of jammer’s velocity components ( v x , v y , v z ) , acceleration ( a x , a y , a z ) components, and the power received, which are captured by boundary node denoted as P J B . Hence, the measurement vector can be set up as:
z k = [ v x , v y , v z , a x , a y , a z , P J B ] T
Thus, in this scenario, both the observation function h and the Jacobian matrix H k can be described, respectively, as:
h = [ v x , v y , v z , a x , a y , a z , P J B ] T
and
H k = Δ h x k | ( x ^ J , k 1 , y ^ J , k 1 , z ^ J , k 1 ) = 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 P J B x J P J B y J P J B z J 0 0 0 0 0 0 ( x ^ J , k 1 , y ^ J , k 1 , z ^ J , k 1 )
In order to evaluate the partial derivatives appearing in the above Jacobian matrix, we have to utilize the relation between the received power ( P J B ) and distance of jammer from the boundary node ( d J B ) given in Equation (1). The distance of jammer from the boundary node can be evaluated while using the following expression:
d J B = ( x B x J ) 2 + ( y B y J ) 2 + ( z B z J ) 2
where ( x B , y B , z B ) is the boundary node. Thus, the first derivative of jamming power with respect to jammer’s position at time k becomes as follows:
P J B x J | x ^ J , k 1 = C x B x ^ J , k 1 ( x B + x ^ J , k 1 ) 2 + ( y B + y ^ J , k 1 ) 2 + ( z B + z ^ J , k 1 ) 2
P J B y J | y ^ J , k 1 = C y B y ^ J , k 1 ( x B + x ^ J , k 1 ) 2 + ( y B + y ^ J , k 1 ) 2 + ( z B + z ^ J , k 1 ) 2
P J B z J | z ^ J , k 1 = C z B z ^ J k 1 ( x B + x ^ J k 1 ) 2 + ( y B + y ^ J k 1 ) 2 + ( z B + z ^ J k 1 ) 2
where C is a constant given by:
C = 10 n l n 10
Hence, the proposed DEKF for the three-dimensional (3D) localization can be implemented while using the Equations (13)–(17) with the aid of Equations (20), (25)–(30).

4.2. Distance Ratio Based Distributed Extended Kalman Filter (DEKF-DR) for the 3D Localization

In this section, we proposed a distributed EKF by utilizing an additional edge node E in addition to a single boundary node B, as shown in Figure 4. For this purpose, we utilize the concept of Distance Ratio ( β ) described in Section 3. Because both the distances d J B and d J E are unknown and the SNR at the edge node equal to the system threshold value S N R E γ , we can estimate the distance ratio by SNR and power relations as follows:
β = 10 ( γ P N B + P J B 10 n )
where P N B is the power received at the unaffected node N from the boundary node B. Thus, once the β is evaluated while using above relation, we can utilize it in Equations (8) and (9). Moreover, the distances can be expressed in terms of β as
d J B = ( x B x ^ J ) 2 + ( y B y ^ J ) 2 + ( z B z ^ J ) 2
d J E = d J B β = ( x B x ^ J ) 2 + ( y B y ^ J ) 2 + ( z B z ^ J ) 2 ( β )
d E B = d J B ( 1 β ) = ( x B x ^ J ) 2 + ( y B y ^ J ) 2 + ( z B z ^ J ) 2 ( 1 β )
Again, the state vector x k , A k the Jacobian matrix, and the process noise Q k can be defined by Equations (18), (20) and (21), respectively. However, the measurement vector incorporates the power measurements from a single boundary node (i.e., P J B ) and from Edge node (i.e., P J E and P E B ), that is,
h = [ v x , v y , v z , a x , a y , a z , P J B , P J E , P E B ] T
therefore, the covariance matrix of measurement noise R k become
R k = d i a g σ v x 2 , σ v y 2 , σ v z 2 , σ a x 2 , σ a y 2 , σ a z 2 , σ P J B 2 , σ P J E 2 , σ P E B 2
Thus, the Jacobian matrix H can be obtained, as follows:
H k = Δ h x k | ( x ^ J , k 1 , y ^ J , k 1 , z ^ J , k 1 ) = 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 P J B x P J B y P J B z 0 0 0 0 0 0 P J E x P J E y P J E z 0 0 0 0 0 0 P E B x P E B y P E B z 0 0 0 0 0 0 ( x ^ J , k 1 , y ^ J , k 1 , z ^ J , k 1 )
Therefore, the first derivative of jamming power with respect to jammer’s position at time k will be resulted in the following expressions:
P J B x J = C J B x B x ^ J k 1 ( x B + x ^ J k 1 ) 2 + ( y B + y ^ J k 1 ) 2 + ( z B + z ^ J k 1 ) 2
P J E x J = P J B x J β k 1
P E B x J = P J B x J ( 1 β k 1 )
P J B y J = C J B y B y ^ J k 1 ( x B + x ^ J k 1 ) 2 + ( y B + y ^ J k 1 ) 2 + ( z B + z ^ J k 1 ) 2
P J E y J = P J B y J β k 1
P E B y J = P J B y J ( 1 β k 1 )
P J B z = C J B z B z ^ J k 1 ( x B + x ^ J k 1 ) 2 + ( y B + y ^ J k 1 ) 2 + ( z B + z ^ J k 1 ) 2
P J E z J = P J B z J β k 1
P E B z J = P J B z J ( 1 β k 1 )
where,
C J B = 10 n l n 10
Thus, the proposed DEKF-DR algorithm for the 3D localization as explained in Algorithm 1 can be implemented while using the Equations (13)–(17) with the aid of Equations (37)–(47).
Algorithm 1:Pseudo-code of DEKF-DR
1:
Set the system threshold value = γ .
2:
Initialize time index ( k ) the boundary node index ( i ) and the neighbor node index ( n ) .
3:
Input: x k 1 , P k | k 1 z k .
4:
Output: x k .
5:
repeat
6:
      k = k + 1 .
7:
     Capture the P J B k .
8:
     Estimate P N B .
9:
     Compute the β k using Equation (5).
10:
    Compute the P J E k and P E B k using Equations (8) and (9).
11:
     x ^ k | k 1 f ( x ^ k 1 | k 1 ) .
12:
     P k | k 1 A k P k 1 | k 1 A k T + Q k .
13:
     z k h ( x k ) + v k .
14:
    Estimate d J B k using Equation (1).
15:
     d J E k β k d J B k .
16:
     d E B k ( 1 β k ) d J B k .
17:
     K k P k | k 1 H k T ( H k P k | k 1 H k T + R k ) 1 .
18:
     x ^ k x ^ k | k 1 + K k ( z k h ( x ^ k | k 1 ) ) .
19:
     P k P k | k 1 K k H k P k | k 1
20:
until {Final time = k f }

5. Extension of the Centralized Extended Kalman Filter (EKF-Centr) for the 3-D Localization

In the centralized EKF, every node near the jamming region may receive the jamming signal and transfer the collected data to a centralized base station, where the EKF is employed. Therefore, the EKF-Centr is designed to receive the jamming information at each time step k from all of the boundary nodes (say total B i boundary nodes). Thus, the state vector x k and A k the Jacobian matrix remains the same as appeared in Equations (18) and (20), respectively. However, the measurement vector incorporates the power measurements from all B i boundary nodes, which is,
h = [ v x , v y , v z , a x , a y , a z , P J B i 1 , P J B i 2 , , P J B i B i ] T
Additionally, the covariance matrix of measurement noise R k
R k = d i a g σ v x 2 , σ v y 2 , σ v z 2 , σ a x 2 , σ a y 2 , σ a z 2 , σ P J B i 1 2 , , σ P J B i B i 2
Consequently, the Jacobian matrix for the measurement will become:
H k = Δ h x k | ( x ^ J , k 1 , y ^ J , k 1 , z ^ J , k 1 ) = 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 P J B i 1 x J P J B i 1 y J P J B i 1 z J 0 0 0 0 0 0 P J B i 2 x J P J B i 2 y J P J B i 2 z J 0 0 0 0 0 0 P J B i B i x J P J B i B i y J P J B i B i z J 0 0 0 0 0 0 ( x ^ J , k 1 , y ^ J , k 1 , z ^ J , k 1 )
Similar to the previous case, in order to evaluate the partial derivatives in the above, we utilize the distance of jammer from each boundary node. Thus, for the i-th boundary node, the jammer’s distance is given by:
d J B i = ( x B i x J ) 2 + ( y B i y J ) 2 + ( z B i z J ) 2
Therefore, the first derivative of jamming power with respect to jammer’s position will become:
P J B i x J | x ^ J , k 1 = C J B i x B i x ^ J , k 1 ( x B i + x ^ J , k 1 ) 2 + ( y B i + y ^ J , k 1 ) 2 + ( z B i + z ^ J , k 1 ) 2
P J B i y J | y ^ J , k 1 = C J B i y B i y ^ J , k 1 ( x B i + x ^ J , k 1 ) 2 + ( y B i + y ^ J , k 1 ) 2 + ( z B i + z ^ J , k 1 ) 2
P J B i z J | z ^ J , k 1 = C J B i z B i z ^ J , k 1 ( x B i + x ^ J , k 1 ) 2 + ( y B i + y ^ J , k 1 ) 2 + ( z B i + z ^ J , k 1 ) 2
where C J B i is the constant for the i-th node and is given by:
C J B i = 10 n l n 10
In summary, the proposed EKF-Centr algorithm for the 3D localization can be implemented using the Equations (13)–(17) with the aid of Equations (50), (52)–(55).
Remark 1.
At this stage, it is important to contrast the major differences among the two proposed algorithms (the DEKF and the DEKF-DR) and the conventional EKF-Centre. By observing the Jacobian matrix H , it can be deduced that the size of H is adjusted, depending on the number of nodes utilized in the localization process. In the DEKF, there is only one boundary node to detect the jammer’s location with the aid of received power only in distributed mechanism. In the EKF-Centr, there are B i nodes utilized to locate the jammer’s location by sending all of the information to a centralized node. Finally, in the DEKF-DR, a single boundary node along with an edge node is used in distributed fashion.

6. Results and Discussion

We considered the first scenario in which the jammer UAV hovers in three-dimensional space ( x , y , z ) with constant acceleration equal to zero and variable velocity at each time step in order to evaluate the performance of the proposed algorithm. The boundary node or the tracker is located at the position ( 15 , 30 , 0 ) with transmitting power 35.5 dBm. The neighbor node near the boundary is located at ( 10 , 30 , 0 ) with the same transmitting power as that of the boundary node. The jammer UAV starts at position ( 10 , 20 , 12 ) with starting time t 0 equal to zero and transmitting power equals to 20 dBm. The sensing range of the boundary node is equal to 16 meters and the jammer UAV transmitting range is around 90 m. In the first experiment, the initial position for the original trajectory and UAV are ( 10 , 20 , 12 ) .
It can be depicted with the results that are shown in Figure 5a that the proposed the DEKF-DR has better localization performance in comparison with the DEKF and the EKF-Centr. To measure the performance and the robustness of the proposed algorithm, we have set the starting positions different for both the original trajectory and the UAV, such that the original trajectory started at position ( 0 , 0 , 5 ) , while the initial positions for the UAV are ( 5 , 4 , 8 ) in Figure 5c and (13,9,14) Figure 5e. It can be easily seen that the proposed DEKF-DR has outperformed its counterparts in both experiments and able to estimate the jammer more accurately. In contrast, the DEKF and EKF-Centr had a shift in tracking the jammer’s location, as shown in Figure 5c,e. Here, the blue triangle and the green triangle represent the boundary nodes and the neighbor nodes, respectively. The second scenario is to evaluate the centralized EKF, where the four boundary nodes located at positions ( 10 , 15 , 0 ) , ( 5 , 25 , 0 ) , ( 15 , 5 , 0 ) and ( 20 , 30 , 0 ) , as shown in Figure 5. The system threshold value γ and the path loss factor n for free space set to 2, as in Table 2.
Figure 6a shows the position errors in three-dimension space (x, y, z) at each time step. Here, the jammer UAV is moving in 1000 steps to measure the performance of the EKF-DR. The proposed algorithm can estimate the jammer position more accurately when compared to the EKF-Centr and the DEKF. The maximum position error is less than 0.6 meters compared to 2.9 m and 2.4 m for the DEKF and the EKF-Centr, respectively. The DEKF-DR performed better as the average localization error is about 0.3 m on the x-axis, 0.1 m on the y-axis, and 0.18 on the z-axis, as shown in Figure 6b–d, respectively. In the same figure, the box plot represents the median of the localization error. Here, the median error for x position is less than 0.2 m compared to 1.3 m and 0.92 m for DEKF and EKF-Centr, respectively. Similarly, the median error for the z position is less than 0.29 m for the DEKF-DR compared to its counterparts. These results further verifies the superiority of the DEKF-DR to detect the jammer location in three-dimensional space. It can be seen from these results that the conventional EKF has reached sometime a very low error close to zero. However, its error is highly fluctuating and sometimes reaches to very high value. This is also illustrated in the statistical information provided by the box plot. These results show highly inconsistent behavior of estimation by the EKF, which is not desirable in real practice. On the other hand, the proposed EKF-DR has consistent estimation performance with lesser median localization error. Moreover, the DEKF-DR has lesser computational complexity than its counterparts. Furthermore, Figure 7a shows that the Euclidean distance error to the jammer. Here, it can be observed that the DEKF has poor performance, among others. This is due to the fact that it only uses one node information, which is insufficient for the Kalman filter to estimate the unknown position. On the other hand, the EKF-Centr is designed to receive the localization information from all four different nodes and, hence, it performed better than the DEKF. Finally, the DEKF-DR showed lowest distance error. as illustrated in Figure 7b. Its median error is about 0.3 m when compared to 0.7 m and 0.4 m for the DEKF and the EKF-Centr, respectively. In order to measure the performance of the proposed method, we run the simulation 500 times and 1000 times, as reported in Figure 8a,b, respectively. The average error of the DEKF-DR is around 0.56 m. We estimated the jamming power at different points using the distance ratio as shown in Figure 9. The jamming signal received by boundary node presented in Figure 9a and jamming signal at the edge node and from the edge to the boundary node presented in Figure 9b,c, respectively.

7. Conclusions

In this paper, we proposed two distributed EKF techniques for the 3-D UAV Jammer localization: the DEKF and the DEKF-DR. Moreover, the existing centralized EKF (EKF-Center) based method is also extended for the 3-D localization scenario. The DEKF and EKF-Center are only based on received power from the boundary nodes. However, the DEKF-DR utilized an additional edge node received power to formulate the problem in terms of Distance Ratio. Specifically, the DEKF-DR is based on the distance ratio estimated at the boundary node to estimate the distance between the jammer and the boundary node. The performance of the proposed distributed techniques was compared with the conventional centralized EKF based solution. Unlike the performance of the EKF-Centr, which depends on the number of cooperative nodes, the performance of the proposed DEKF and DEKF-DR are insensitive to the number of nodes, as they only rely on a single node. Moreover, the localization accuracy of the DEKF-DR is found to be the highest and it is not affected by the jammer location or its transmission power. Last but not the least, the DEKF-DR has a lesser computational load in contrast to the EKF-Center due to its distributed design.

Author Contributions

Conceptualization; methodology; implementation, W.A., M.M. and A.J.A.; writing–original draft preparation, W.A.; review and editing, U.M.A.-S.; visualization, A.J.A.; supervision, M.M.; project administration, U.M.A.-S.; funding acquisition, U.M.A.-S. All authors have read and agreed to the published version of the manuscript.

Funding

This Project was funded by the Deanship of Scientific Research (DSR), King Abdulaziz University, Jeddah, under grant no. (KEP-6-135-41). The authors, therefore, acknowledge with thanks the DSR for technical and financial support.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Orfanus, D.; de Freitas, E.P.; Eliassen, F. Self-Organization as a Supporting Paradigm for Military UAV Relay Networks. IEEE Commun. Lett. 2016, 20, 804–807. [Google Scholar] [CrossRef]
  2. Samad, T.; Bay, J.S.; Godbole, D. Network-Centric Systems for Military Operations in Urban Terrain: The Role of UAVs. Proc. IEEE 2007, 95, 92–107. [Google Scholar] [CrossRef]
  3. Lykou, G.; Moustakas, D.; Gritzalis, D. Defending Airports from UAS: A Survey on Cyber-Attacks and Counter-Drone Sensing Technologies. Sensors 2020, 20, 3537. [Google Scholar] [CrossRef] [PubMed]
  4. Trujillo, J.C.; Munguia, R.; Urzua, S.; Guerra, E.; Grau, A. Monocular Visual SLAM Based on a Cooperative UAV–Target System. Sensors 2020, 20, 3531. [Google Scholar] [CrossRef] [PubMed]
  5. Gupta, L.; Jain, R.; Vaszkun, G. Survey of Important Issues in UAV Communication Networks. IEEE Commun. Surv. Tutor. 2016, 18, 1123–1152. [Google Scholar] [CrossRef] [Green Version]
  6. Hinas, A.; Ragel, R.; Roberts, J.; Gonzalez, F. A Framework for Multiple Ground Target Finding and Inspection Using a Multirotor UAS. Sensors 2020, 20, 272. [Google Scholar] [CrossRef] [Green Version]
  7. Haque, A.; Elsaharti, A.; Elderini, T.; Elsaharty, M.A.; Neubert, J. UAV Autonomous Localization Using Macro-Features Matching with a CAD Model. Sensors 2020, 20, 743. [Google Scholar] [CrossRef] [Green Version]
  8. Acevedo, J.J.; Maza, I.; Ollero, A.; Arrue, B.C. An Efficient Distributed Area Division Method for Cooperative Monitoring Applications with Multiple UAVs. Sensors 2020, 20, 3448. [Google Scholar] [CrossRef]
  9. Grover, K.; Lim, A.; Yang, Q. Jamming and anti–jamming techniques in wireless networks: A survey. Int. J. Ad Hoc Ubiquitous Comput. 2014, 17, 197–215. [Google Scholar] [CrossRef] [Green Version]
  10. Sun, Y.; Molva, R.; Önen, M.; Wang, X.; Zhou, X. Catch the jammer in wireless sensor network. In Proceedings of the 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications, Toronto, ON, Canada, 11–14 September 2011; pp. 1156–1160. [Google Scholar]
  11. Zhang, T.; Ji, X.; Zhuang, Z.; Xu, W. JamCatcher: A mobile jammer localization scheme for advanced metering infrastructure in smart grid. Sensors 2019, 19, 909. [Google Scholar] [CrossRef] [Green Version]
  12. Adil, M.; Almaiah, M.A.; Omar Alsayed, A.; Almomani, O. An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks. Sensors 2020, 20, 2311. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  13. Morales Ferre, R.; de la Fuente, A.; Lohan, E.S. Jammer classification in GNSS bands via machine learning algorithms. Sensors 2019, 19, 4841. [Google Scholar] [CrossRef] [Green Version]
  14. Jin, W.C.; Kim, K.; Choi, J.W. Robust jamming algorithm for location-based UAV jamming system. In Proceedings of the 2019 IEEE Asia-Pacific Microwave Conference (APMC), Singapore, 10–13 December 2019; pp. 1581–1583. [Google Scholar]
  15. Abughalwa, M.; Samara, L.; Hasna, M.O.; Hamila, R. Full-Duplex Jamming and Interception Analysis of UAV-Based Intrusion Links. IEEE Commun. Lett. 2020, 24, 1105–1109. [Google Scholar] [CrossRef]
  16. Zhang, Y.D.; Amin, M.G. Anti-jamming GPS receiver with reduced phase distortions. IEEE Signal Process. Lett. 2012, 19, 635–638. [Google Scholar] [CrossRef]
  17. Blumenthal, J.; Grossmann, R.; Golatowski, F.; Timmermann, D. Weighted centroid localization in zigbee-based sensor networks. In Proceedings of the 2007 IEEE International Symposium on Intelligent Signal Processing, Henares, Spain, 3–5 October 2007; pp. 1–6. [Google Scholar]
  18. Wang, Z.M.; Zheng, Y. The study of the weighted centroid localization algorithm based on RSSI. In Proceedings of the 2014 International Conference on Wireless Communication and Sensor Network, Wuhan, China, 13–14 December 2014; pp. 276–279. [Google Scholar]
  19. Duan, B.; Yin, D.; Cong, Y.; Zhou, H.; Xiang, X.; Shen, L. Anti-jamming path planning for unmanned aerial vehicles with imperfect jammer information. In Proceedings of the 2018 IEEE International Conference on Robotics and Biomimetics (ROBIO), Kuala Lumpur, Malaysia, 12–15 December 2018; pp. 729–735. [Google Scholar]
  20. Aldosari, W.; Zohdy, M.; Olawoyin, R. Tracking the mobile jammer in wireless sensor networks using extended kalman filter. In Proceedings of the 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 10–12 October 2019; pp. 207–212. [Google Scholar]
  21. Aldosari, W.; Zohdy, M. Tracking a Jammer in Wireless Sensor Networks and Selecting Boundary Nodes by Estimating Signal-to-Noise Ratios and Using an Extended Kalman Filter. J. Sens. Actuator Netw. 2018, 7, 48. [Google Scholar] [CrossRef] [Green Version]
  22. Pelechrinis, K.; Koutsopoulos, I.; Broustis, I.; Krishnamurthy, S.V. Lightweight jammer localization in wireless networks: System design and implementation. In Proceedings of the 2009 IEEE Global Telecommunications Conference (GLOBECOM), Honolulu, HI, USA, 30 November–4 December 2009; pp. 1–6. [Google Scholar]
  23. Booranawong, A.; Jindapetch, N.; Saito, H. Adaptive filtering methods for rssi signals in a device-free human detection and tracking system. IEEE Syst. J. 2019, 13, 2998–3009. [Google Scholar] [CrossRef]
  24. Subedi, S.; Pauls, E.; Zhang, Y.D. Accurate localization and tracking of a passive RFID reader based on RSSI measurements. IEEE J. Radio Freq. Identif. 2017, 1, 144–154. [Google Scholar] [CrossRef]
  25. Ghosh, P.; Tran, J.A.; Krishnamachari, B. ARREST: A RSSI Based Approach for Mobile Sensing and Tracking of a Moving Object. IEEE Trans. Mob. Comput. 2020, 19, 1260–1273. [Google Scholar] [CrossRef] [Green Version]
  26. Wang, Z.; Chen, G.; Blasch, E.; Pham, K.; Lynch, R. Jamming emitter localization with multiple UAVs equipped with smart antennas. In Automatic Target Recognition XX; Acquisition, Tracking, Pointing, and Laser Systems Technologies XXIV; and Optical Pattern Recognition XXI; International Society for Optics and Photonics: Washington, DC, USA, 2010; Volume 7696, p. 769607. [Google Scholar]
  27. Xia, N.; Weitnauer, M.A. TDOA-based mobile localization using particle filter with multiple motion and channel Models. IEEE Access 2019, 7, 21057–21066. [Google Scholar] [CrossRef]
  28. Liu, H.; Liu, Z.; Chen, Y.; Xu, W. Determining the position of a jammer using a virtual-force iterative approach. Wirel. Netw. 2011, 17, 531–547. [Google Scholar] [CrossRef]
  29. Aldosari, W.; Zohdy, M.; Olawoyin, R. Jammer localization through smart estimation of jammer’s transmission power. In Proceedings of the 2019 IEEE National Aerospace and Electronics Conference (NAECON), Dayton, OH, USA, 15–19 July 2019; pp. 430–436. [Google Scholar]
  30. Pappas, G.P.; Zohdy, M.A. Extended Kalman Filtering and Pathloss modeling for Shadow Power Parameter Estimation in Mobile Wireless Communications. Int. J. Smart Sens. Intell. Syst. 2014, 7, 898–924. [Google Scholar] [CrossRef] [Green Version]
  31. Jiang, T.; Sidiropoulos, N.D.; Giannakis, G.B. Kalman filtering for power estimation in mobile communications. IEEE Trans. Wirel. Commun. 2003, 2, 151–161. [Google Scholar] [CrossRef]
Figure 1. Jammer Unmanned Aerial Vehicles (UAV) targeted two base stations on the ground where the blue base station represents unaffected nodes and the red base stations are the jammed nodes. The dot green line depicts the sensing range and the solid red line the jamming region.
Figure 1. Jammer Unmanned Aerial Vehicles (UAV) targeted two base stations on the ground where the blue base station represents unaffected nodes and the red base stations are the jammed nodes. The dot green line depicts the sensing range and the solid red line the jamming region.
Sensors 20 06405 g001
Figure 2. Representation of the link quality and JRSS while jammer is moving. The solid arrow describes the jamming signal and the dotted red line is the JRSS received by the base station. The link between the nodes depicted by the dot green line and the power received by the boundary node from its neighbor represented as a solid green line.
Figure 2. Representation of the link quality and JRSS while jammer is moving. The solid arrow describes the jamming signal and the dotted red line is the JRSS received by the base station. The link between the nodes depicted by the dot green line and the power received by the boundary node from its neighbor represented as a solid green line.
Sensors 20 06405 g002
Figure 3. Nodes classification during jamming attack.
Figure 3. Nodes classification during jamming attack.
Sensors 20 06405 g003
Figure 4. Illustration of distance ratio. The two base stations positioned outside the jamming range wherever the green circle depicts the edge node and placed at the jamming region.
Figure 4. Illustration of distance ratio. The two base stations positioned outside the jamming range wherever the green circle depicts the edge node and placed at the jamming region.
Sensors 20 06405 g004
Figure 5. The UAV localization based on distance ratio ( β ) and Distributed Extended Kalman Filter (DEKF-DR) when compared to Centralized Extended Kalman Filter (EKF-Centr) and DEKF where the jammer UAV hovers over the target area to jam the base stations on the ground. (a) trajectory and UAV initial position ( 10 , 20 , 12 ) , (b) Zoom in of (a). (c) trajectory starting position ( 0 , 0 , 5 ) and UAV initial position ( 5 , 4 , 8 ) , (d) zoom in (b). (e) trajectory starting position ( 0 , 0 , 5 ) and UAV initial position ( 13 , 9 , 14 ) , and (f) zoom in of (e).
Figure 5. The UAV localization based on distance ratio ( β ) and Distributed Extended Kalman Filter (DEKF-DR) when compared to Centralized Extended Kalman Filter (EKF-Centr) and DEKF where the jammer UAV hovers over the target area to jam the base stations on the ground. (a) trajectory and UAV initial position ( 10 , 20 , 12 ) , (b) Zoom in of (a). (c) trajectory starting position ( 0 , 0 , 5 ) and UAV initial position ( 5 , 4 , 8 ) , (d) zoom in (b). (e) trajectory starting position ( 0 , 0 , 5 ) and UAV initial position ( 13 , 9 , 14 ) , and (f) zoom in of (e).
Sensors 20 06405 g005
Figure 6. Representation of position error. (a) express the location errors at each time step on x, y, and z coordinates. the median error for three coordinates represented by the box plot in (bd).
Figure 6. Representation of position error. (a) express the location errors at each time step on x, y, and z coordinates. the median error for three coordinates represented by the box plot in (bd).
Sensors 20 06405 g006
Figure 7. Distance Error. (a) Euclidean distance error; (b) lowest distance error.
Figure 7. Distance Error. (a) Euclidean distance error; (b) lowest distance error.
Sensors 20 06405 g007
Figure 8. Average Error (a) 500 iterations and (b) 1000 iterations.
Figure 8. Average Error (a) 500 iterations and (b) 1000 iterations.
Sensors 20 06405 g008
Figure 9. (a) Jamming power received by boundary node, (b) Jamming power estimated at the edge node and (c) jamming power estimated at the boundary node from the edge.
Figure 9. (a) Jamming power received by boundary node, (b) Jamming power estimated at the edge node and (c) jamming power estimated at the boundary node from the edge.
Sensors 20 06405 g009
Table 1. List of symbols.
Table 1. List of symbols.
NotationDescription
BBoundary node
B i Total boundary nodes
NUnaffected node
N E Edge node
JJammer UAV
N J Jammed node
( x J , y J , z J ) Jammer UAV position
( x B , y B , z B ) Boundary node position
( x N , y N , z N ) Node location
p J t Jammer’s transmission power
p t Node’s transmission power
J R S S Jammer received signal strength
R S S Received signal strength
P J B i Jamming power captured by boundary node i = 1 , 2 , , n
P J E i Jamming power estimated at edge node i = 1 , 2 , , n
P E B i Jamming power estimated at edge by boundary node i = 1 , 2 , , n
L i Link quality for link i = 1 , 2 , , n
S N R Signal to noise ratio
γ System threshold value
β Distance ratio
d J E Distance from jammer to the edge node
d E B Distance from edge node to the boundary node
d J B Distance from jammer to the boundary node
nEnvironmental factor
a Acceleration
x k Current state
x k 1 Previous state
w k Process noise
z k Measurement vector
h k Nonlinear function
v k Measurement noise
Q Covariance matrix for prediction
R Covariance matrix for observation
H k Jacobian matrix
K k Kalman gain
A Transition matrix
v Velocity
X σ Gaussian noise
Table 2. The Simulation Parameters.
Table 2. The Simulation Parameters.
ParameterMeaningAssigned Values
LRange of network100
NNumber of nodes1
N j Number of jammer1
P J t Jammer’s transmission power (dBm) 20 (dBm)
P t Sensor’s transmission Power (dBm) 35.5 (dBm)
R J Jammer’s transmission range (m)90 (m)
R N Node’s transmission range (m)16 (m)
k 0 Initial time0 s
t End time1000 s
Δ t Time step 1.0 s
v x Initial velocity on x axis1 m/s
v y Initial velocity on y axis0 m/s
aacceleration0 m/s2
γ System threshold value2
n Environmental factor2
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Aldosari, W.; Moinuddin, M.; Aljohani, A.J.; Al-Saggaf, U.M. Distributed Extended Kalman Filtering Based Techniques for 3-D UAV Jamming Localization. Sensors 2020, 20, 6405. https://doi.org/10.3390/s20226405

AMA Style

Aldosari W, Moinuddin M, Aljohani AJ, Al-Saggaf UM. Distributed Extended Kalman Filtering Based Techniques for 3-D UAV Jamming Localization. Sensors. 2020; 20(22):6405. https://doi.org/10.3390/s20226405

Chicago/Turabian Style

Aldosari, Waleed, Muhammad Moinuddin, Abdulah Jeza Aljohani, and Ubaid M. Al-Saggaf. 2020. "Distributed Extended Kalman Filtering Based Techniques for 3-D UAV Jamming Localization" Sensors 20, no. 22: 6405. https://doi.org/10.3390/s20226405

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop