ABSTRACT
In this paper, we study strategies for allocating and managing friendly jammers, so as to create virtual barriers that would prevent hostile eavesdroppers from tapping sensitive wireless communication. Our scheme precludes the use of any encryption technique. Applications include domains such as (i) protecting the privacy of storage locations where RFID tags are used for item identification, (ii) secure reading of RFID tags embedded in credit cards, (iii) protecting data transmitted through wireless networks, sensor networks, etc. By carefully managing jammers to produce noise, we show how to reduce the SINR of eavesdroppers to below a threshold for successful reception, without jeopardizing network performance.
We present algorithms targeted towards optimizing power allocation and number of jammers needed in several settings. Experimental simulations back up our results.
- L. V. Ahlfors. Complex analysis: an introduction to the theory of analytic functions of one complex variable. International series in pure and applied mathematics. McGraw-Hill, 1979.Google Scholar
- F. Aurenhammer. Voronoi diagrams-a survey of a fundamental geometric data structure. ACM Comput. Surv., 23(3):345--405, 1991. Google ScholarDigital Library
- C. Commander, P. Pardalos, V. Ryabchenko, S. Uryasev, and G. Zrazhevsky. The wireless network jamming problem. J. Comb. Optim., 14(4):481--498, 2007.Google ScholarCross Ref
- M. de Berg, M. van Kreveld, M. Overmars, and O. Schwarzkopf. Computational Geometry: Algorithms and Applications. Springer-Verlag, 2000. Google ScholarDigital Library
- P. Gupta and P. R. Kumar. The capacity of wireless networks. IEEE T. Inform. Theory, 46(2):388--404, 2000. Google ScholarDigital Library
- Z. Han, N. Marina, M. Debbah, and A. Hjørungnes. Physical layer security game: Interaction between source, eavesdropper, and friendly jammer. EURASIP J. Wirel. Comm., pp. 11:1--11:10, Jun. 2009. Google ScholarDigital Library
- T. Heydt-Benjamin, D. Bailey, K. Fu, A. Juels, and T. O'Hare. Vulnerabilities in first-generation rfid-enabled credit cards. In Financial Cryptography and Data Security, vol. 4886 of LNCS, pp. 2--14. Springer, 2007. Google ScholarDigital Library
- A. Juels. Rfid security and privacy: a research survey. IEEE J. Sel. Area. Comm., 24(2):381--394, 2006. Google ScholarDigital Library
- A. Juels and J. Brainard. Soft blocking: flexible blocker tags on the cheap. In Proc. 2004 ACM Workshop on Privacy in the Electronic Society, pp. 1--7, 2004. Google ScholarDigital Library
- A. Juels, R. L. Rivest, and M. Szydlo. The blocker tag: selective blocking of rfid tags for consumer privacy. In Proc. 8th ACM Conf. on Computer and Communications Security, pp. 103--111, 2003. Google ScholarDigital Library
- D. G. Kirkpatrick. Efficient computation of continuous skeletons. In Proc. 20th Annual Sympos. on Foundations of Comp. Sci., pp. 18--27, 1979. Google ScholarDigital Library
- L. Lai and H. El Gamal. The relay-eavesdropper channel: Cooperation for secrecy. IEEE T. Inform. Theory, 54(9):4005--4019, 2008. Google ScholarDigital Library
- D. T. Lee and R. L. Drysdale. Generalization of voronoi diagrams in the plane. SIAM J. Comput., 10(1):73--87, 1981.Google ScholarDigital Library
- D. Malan, T. Fulford-Jones, M. Welsh, and S. Moulton. Codeblue: An ad hoc sensor network infrastructure for emergency medical care. In Proc. 1st Int. Workshop on Wearable and Implantable Body Sensor Networks, pp. 55--58, 2004.Google Scholar
- R. Negi and S. Goel. Secret communication using artificial noise. In Proc. IEEE 62nd Vehicular Technology Conf., pp. 1906--1910, 2005.Google ScholarCross Ref
- J. Nehmer, M. Becker, A. Karshmer, and R. Lamm. Living assistance systems: an ambient intelligence approach. In Proc. 28th Int. Conf. on Software Engineering, pp. 43--50, 2006. Google ScholarDigital Library
- K. Nohl, D. Evans, Starbug, and H. Plötz. Reverse-engineering a cryptographic rfid tag. In Proc. USENIX Security Sympos., pp. 185--193, 2008. Google ScholarDigital Library
- P. Peris-Lopez, J. Hernandez-Castro, J. Estevez-Tapiador, and A. Ribagorda. Rfid systems: A survey on security threats and proposed solutions. In Personal Wireless Communications, vol. 4217 of LNCS, pp. 159--170. Springer, 2006. Google ScholarDigital Library
- A. Perrig, J. Stankovic, and D. Wagner. Security in wireless sensor networks. Commun. ACM, 47(6):53--57, 2004. Google ScholarDigital Library
- T. Rappaport. Wireless Communications: Principles and Practice. Prentice Hall PTR, 2001. Google ScholarDigital Library
- N. X. P. Semiconductors. Mifare classic 1k. http://www.nxp.com/documents/data_sheet/MF1S50YYX.pdf.Google Scholar
- M. Simplício Jr., P. Barreto, C. Margi, and T. Carvalho. A survey on key management mechanisms for distributed wireless sensor networks. Comp. Netw., 54(15):2591--2612, 2010. Google ScholarDigital Library
- X. Tang, R. Liu, P. Spasojevic, and H. V. Poor. Interference assisted secret communication. IEEE T. Inform. Theory, 57(5):3153--3167, 2011. Google ScholarDigital Library
- A. Vigneron. Geometric optimization and sums of algebraic functions. In Proc. 21st Annual ACM-SIAM Sympos. on Discrete Algorithms, pp. 906--917, 2010. Google ScholarDigital Library
- J. P. Vilela, M. Bloch, J. Barros, and S. W. McLaughlin. Wireless secrecy regions with friendly jamming. IEEE T. Inf. Foren. Sec., 6(2):256--266, 2011. Google ScholarDigital Library
- Y. Wang, G. Attebury, and B. Ramamurthy. A survey of security issues in wireless sensor networks. IEEE Communications Surveys Tutorials, 8(2):2--23, 2006. Google ScholarDigital Library
- W. Weber, J. M. Rabaey, and E. H. L. Aarts, editors. Ambient intelligence. Springer-Verlag, 2005. Google ScholarDigital Library
- A. D. Wyner. The Wire-tap Channel. Bell Systems Technical Journal, 54(8):1355--1387, 1975.Google ScholarCross Ref
Index Terms
- Optimization schemes for protective jamming
Recommendations
On Limitations of Friendly Jamming for Confidentiality
SP '13: Proceedings of the 2013 IEEE Symposium on Security and PrivacyWireless communication provides unique security challenges, but also enables novel ways to defend against attacks. In the past few years, a number of works discussed the use of friendly jamming to protect the confidentiality of the communicated data as ...
Optimization Schemes for Protective Jamming
In this paper, we study strategies for allocating and managing friendly jammers, so as to create virtual barriers that would prevent hostile eavesdroppers from tapping sensitive wireless communication. Our scheme precludes the use of any encryption ...
Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time
SP '13: Proceedings of the 2013 IEEE Symposium on Security and PrivacyThis paper presents a novel mechanism, called Ally Friendly Jamming, which aims at providing an intelligent jamming capability that can disable unauthorized (enemy) wireless communication but at the same time still allow authorized wireless devices to ...
Comments