skip to main content
10.1145/2248371.2248383acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
research-article

Optimization schemes for protective jamming

Published:11 June 2012Publication History

ABSTRACT

In this paper, we study strategies for allocating and managing friendly jammers, so as to create virtual barriers that would prevent hostile eavesdroppers from tapping sensitive wireless communication. Our scheme precludes the use of any encryption technique. Applications include domains such as (i) protecting the privacy of storage locations where RFID tags are used for item identification, (ii) secure reading of RFID tags embedded in credit cards, (iii) protecting data transmitted through wireless networks, sensor networks, etc. By carefully managing jammers to produce noise, we show how to reduce the SINR of eavesdroppers to below a threshold for successful reception, without jeopardizing network performance.

We present algorithms targeted towards optimizing power allocation and number of jammers needed in several settings. Experimental simulations back up our results.

References

  1. L. V. Ahlfors. Complex analysis: an introduction to the theory of analytic functions of one complex variable. International series in pure and applied mathematics. McGraw-Hill, 1979.Google ScholarGoogle Scholar
  2. F. Aurenhammer. Voronoi diagrams-a survey of a fundamental geometric data structure. ACM Comput. Surv., 23(3):345--405, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C. Commander, P. Pardalos, V. Ryabchenko, S. Uryasev, and G. Zrazhevsky. The wireless network jamming problem. J. Comb. Optim., 14(4):481--498, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  4. M. de Berg, M. van Kreveld, M. Overmars, and O. Schwarzkopf. Computational Geometry: Algorithms and Applications. Springer-Verlag, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. P. Gupta and P. R. Kumar. The capacity of wireless networks. IEEE T. Inform. Theory, 46(2):388--404, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Z. Han, N. Marina, M. Debbah, and A. Hjørungnes. Physical layer security game: Interaction between source, eavesdropper, and friendly jammer. EURASIP J. Wirel. Comm., pp. 11:1--11:10, Jun. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. T. Heydt-Benjamin, D. Bailey, K. Fu, A. Juels, and T. O'Hare. Vulnerabilities in first-generation rfid-enabled credit cards. In Financial Cryptography and Data Security, vol. 4886 of LNCS, pp. 2--14. Springer, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Juels. Rfid security and privacy: a research survey. IEEE J. Sel. Area. Comm., 24(2):381--394, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Juels and J. Brainard. Soft blocking: flexible blocker tags on the cheap. In Proc. 2004 ACM Workshop on Privacy in the Electronic Society, pp. 1--7, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Juels, R. L. Rivest, and M. Szydlo. The blocker tag: selective blocking of rfid tags for consumer privacy. In Proc. 8th ACM Conf. on Computer and Communications Security, pp. 103--111, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. G. Kirkpatrick. Efficient computation of continuous skeletons. In Proc. 20th Annual Sympos. on Foundations of Comp. Sci., pp. 18--27, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. L. Lai and H. El Gamal. The relay-eavesdropper channel: Cooperation for secrecy. IEEE T. Inform. Theory, 54(9):4005--4019, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. D. T. Lee and R. L. Drysdale. Generalization of voronoi diagrams in the plane. SIAM J. Comput., 10(1):73--87, 1981.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. Malan, T. Fulford-Jones, M. Welsh, and S. Moulton. Codeblue: An ad hoc sensor network infrastructure for emergency medical care. In Proc. 1st Int. Workshop on Wearable and Implantable Body Sensor Networks, pp. 55--58, 2004.Google ScholarGoogle Scholar
  15. R. Negi and S. Goel. Secret communication using artificial noise. In Proc. IEEE 62nd Vehicular Technology Conf., pp. 1906--1910, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  16. J. Nehmer, M. Becker, A. Karshmer, and R. Lamm. Living assistance systems: an ambient intelligence approach. In Proc. 28th Int. Conf. on Software Engineering, pp. 43--50, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. K. Nohl, D. Evans, Starbug, and H. Plötz. Reverse-engineering a cryptographic rfid tag. In Proc. USENIX Security Sympos., pp. 185--193, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. P. Peris-Lopez, J. Hernandez-Castro, J. Estevez-Tapiador, and A. Ribagorda. Rfid systems: A survey on security threats and proposed solutions. In Personal Wireless Communications, vol. 4217 of LNCS, pp. 159--170. Springer, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. Perrig, J. Stankovic, and D. Wagner. Security in wireless sensor networks. Commun. ACM, 47(6):53--57, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. T. Rappaport. Wireless Communications: Principles and Practice. Prentice Hall PTR, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. N. X. P. Semiconductors. Mifare classic 1k. http://www.nxp.com/documents/data_sheet/MF1S50YYX.pdf.Google ScholarGoogle Scholar
  22. M. Simplício Jr., P. Barreto, C. Margi, and T. Carvalho. A survey on key management mechanisms for distributed wireless sensor networks. Comp. Netw., 54(15):2591--2612, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. X. Tang, R. Liu, P. Spasojevic, and H. V. Poor. Interference assisted secret communication. IEEE T. Inform. Theory, 57(5):3153--3167, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. A. Vigneron. Geometric optimization and sums of algebraic functions. In Proc. 21st Annual ACM-SIAM Sympos. on Discrete Algorithms, pp. 906--917, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. J. P. Vilela, M. Bloch, J. Barros, and S. W. McLaughlin. Wireless secrecy regions with friendly jamming. IEEE T. Inf. Foren. Sec., 6(2):256--266, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Y. Wang, G. Attebury, and B. Ramamurthy. A survey of security issues in wireless sensor networks. IEEE Communications Surveys Tutorials, 8(2):2--23, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. W. Weber, J. M. Rabaey, and E. H. L. Aarts, editors. Ambient intelligence. Springer-Verlag, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. A. D. Wyner. The Wire-tap Channel. Bell Systems Technical Journal, 54(8):1355--1387, 1975.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Optimization schemes for protective jamming

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MobiHoc '12: Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
        June 2012
        280 pages
        ISBN:9781450312813
        DOI:10.1145/2248371

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 11 June 2012

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate296of1,843submissions,16%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader