[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2248371.2248383acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
research-article

Optimization schemes for protective jamming

Published: 11 June 2012 Publication History

Abstract

In this paper, we study strategies for allocating and managing friendly jammers, so as to create virtual barriers that would prevent hostile eavesdroppers from tapping sensitive wireless communication. Our scheme precludes the use of any encryption technique. Applications include domains such as (i) protecting the privacy of storage locations where RFID tags are used for item identification, (ii) secure reading of RFID tags embedded in credit cards, (iii) protecting data transmitted through wireless networks, sensor networks, etc. By carefully managing jammers to produce noise, we show how to reduce the SINR of eavesdroppers to below a threshold for successful reception, without jeopardizing network performance.
We present algorithms targeted towards optimizing power allocation and number of jammers needed in several settings. Experimental simulations back up our results.

References

[1]
L. V. Ahlfors. Complex analysis: an introduction to the theory of analytic functions of one complex variable. International series in pure and applied mathematics. McGraw-Hill, 1979.
[2]
F. Aurenhammer. Voronoi diagrams-a survey of a fundamental geometric data structure. ACM Comput. Surv., 23(3):345--405, 1991.
[3]
C. Commander, P. Pardalos, V. Ryabchenko, S. Uryasev, and G. Zrazhevsky. The wireless network jamming problem. J. Comb. Optim., 14(4):481--498, 2007.
[4]
M. de Berg, M. van Kreveld, M. Overmars, and O. Schwarzkopf. Computational Geometry: Algorithms and Applications. Springer-Verlag, 2000.
[5]
P. Gupta and P. R. Kumar. The capacity of wireless networks. IEEE T. Inform. Theory, 46(2):388--404, 2000.
[6]
Z. Han, N. Marina, M. Debbah, and A. Hjørungnes. Physical layer security game: Interaction between source, eavesdropper, and friendly jammer. EURASIP J. Wirel. Comm., pp. 11:1--11:10, Jun. 2009.
[7]
T. Heydt-Benjamin, D. Bailey, K. Fu, A. Juels, and T. O'Hare. Vulnerabilities in first-generation rfid-enabled credit cards. In Financial Cryptography and Data Security, vol. 4886 of LNCS, pp. 2--14. Springer, 2007.
[8]
A. Juels. Rfid security and privacy: a research survey. IEEE J. Sel. Area. Comm., 24(2):381--394, 2006.
[9]
A. Juels and J. Brainard. Soft blocking: flexible blocker tags on the cheap. In Proc. 2004 ACM Workshop on Privacy in the Electronic Society, pp. 1--7, 2004.
[10]
A. Juels, R. L. Rivest, and M. Szydlo. The blocker tag: selective blocking of rfid tags for consumer privacy. In Proc. 8th ACM Conf. on Computer and Communications Security, pp. 103--111, 2003.
[11]
D. G. Kirkpatrick. Efficient computation of continuous skeletons. In Proc. 20th Annual Sympos. on Foundations of Comp. Sci., pp. 18--27, 1979.
[12]
L. Lai and H. El Gamal. The relay-eavesdropper channel: Cooperation for secrecy. IEEE T. Inform. Theory, 54(9):4005--4019, 2008.
[13]
D. T. Lee and R. L. Drysdale. Generalization of voronoi diagrams in the plane. SIAM J. Comput., 10(1):73--87, 1981.
[14]
D. Malan, T. Fulford-Jones, M. Welsh, and S. Moulton. Codeblue: An ad hoc sensor network infrastructure for emergency medical care. In Proc. 1st Int. Workshop on Wearable and Implantable Body Sensor Networks, pp. 55--58, 2004.
[15]
R. Negi and S. Goel. Secret communication using artificial noise. In Proc. IEEE 62nd Vehicular Technology Conf., pp. 1906--1910, 2005.
[16]
J. Nehmer, M. Becker, A. Karshmer, and R. Lamm. Living assistance systems: an ambient intelligence approach. In Proc. 28th Int. Conf. on Software Engineering, pp. 43--50, 2006.
[17]
K. Nohl, D. Evans, Starbug, and H. Plötz. Reverse-engineering a cryptographic rfid tag. In Proc. USENIX Security Sympos., pp. 185--193, 2008.
[18]
P. Peris-Lopez, J. Hernandez-Castro, J. Estevez-Tapiador, and A. Ribagorda. Rfid systems: A survey on security threats and proposed solutions. In Personal Wireless Communications, vol. 4217 of LNCS, pp. 159--170. Springer, 2006.
[19]
A. Perrig, J. Stankovic, and D. Wagner. Security in wireless sensor networks. Commun. ACM, 47(6):53--57, 2004.
[20]
T. Rappaport. Wireless Communications: Principles and Practice. Prentice Hall PTR, 2001.
[21]
N. X. P. Semiconductors. Mifare classic 1k. http://www.nxp.com/documents/data_sheet/MF1S50YYX.pdf.
[22]
M. Simplício Jr., P. Barreto, C. Margi, and T. Carvalho. A survey on key management mechanisms for distributed wireless sensor networks. Comp. Netw., 54(15):2591--2612, 2010.
[23]
X. Tang, R. Liu, P. Spasojevic, and H. V. Poor. Interference assisted secret communication. IEEE T. Inform. Theory, 57(5):3153--3167, 2011.
[24]
A. Vigneron. Geometric optimization and sums of algebraic functions. In Proc. 21st Annual ACM-SIAM Sympos. on Discrete Algorithms, pp. 906--917, 2010.
[25]
J. P. Vilela, M. Bloch, J. Barros, and S. W. McLaughlin. Wireless secrecy regions with friendly jamming. IEEE T. Inf. Foren. Sec., 6(2):256--266, 2011.
[26]
Y. Wang, G. Attebury, and B. Ramamurthy. A survey of security issues in wireless sensor networks. IEEE Communications Surveys Tutorials, 8(2):2--23, 2006.
[27]
W. Weber, J. M. Rabaey, and E. H. L. Aarts, editors. Ambient intelligence. Springer-Verlag, 2005.
[28]
A. D. Wyner. The Wire-tap Channel. Bell Systems Technical Journal, 54(8):1355--1387, 1975.

Cited By

View all
  • (2023)Efficient Protective Jamming in 2D SINR NetworksEuro-Par 2023: Parallel Processing10.1007/978-3-031-39698-4_36(533-546)Online publication date: 24-Aug-2023
  • (2022)Subcarrier‐pair based joint resource allocation for secure cooperative OFDM system with multiple untrusted AF relaysIET Communications10.1049/cmu2.1239116:9(929-941)Online publication date: 19-Apr-2022
  • (2021)Exact and Efficient Protective Jamming in SINR-based Wireless Networks2021 29th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)10.1109/MASCOTS53633.2021.9614261(1-8)Online publication date: 3-Nov-2021
  • Show More Cited By

Index Terms

  1. Optimization schemes for protective jamming

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MobiHoc '12: Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
      June 2012
      280 pages
      ISBN:9781450312813
      DOI:10.1145/2248371
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 11 June 2012

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. friendly jamming
      2. rfid
      3. security
      4. wireless

      Qualifiers

      • Research-article

      Conference

      MobiHoc '12
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 296 of 1,843 submissions, 16%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)7
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 01 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Efficient Protective Jamming in 2D SINR NetworksEuro-Par 2023: Parallel Processing10.1007/978-3-031-39698-4_36(533-546)Online publication date: 24-Aug-2023
      • (2022)Subcarrier‐pair based joint resource allocation for secure cooperative OFDM system with multiple untrusted AF relaysIET Communications10.1049/cmu2.1239116:9(929-941)Online publication date: 19-Apr-2022
      • (2021)Exact and Efficient Protective Jamming in SINR-based Wireless Networks2021 29th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)10.1109/MASCOTS53633.2021.9614261(1-8)Online publication date: 3-Nov-2021
      • (2021)Secure Resource Allocation for Cooperative OFDMA System With Untrusted AF RelayingIEEE Access10.1109/ACCESS.2021.31300679(156818-156830)Online publication date: 2021
      • (2020)Countering cross-technology jamming attackProceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3395351.3399367(99-110)Online publication date: 8-Jul-2020
      • (2018)A Novel Friendly Jamming Scheme in Industrial Crowdsensing Networks against Eavesdropping AttackSensors10.3390/s1806193818:6(1938)Online publication date: 14-Jun-2018
      • (2018)Covert Wireless Communication With Artificial Noise GenerationIEEE Transactions on Wireless Communications10.1109/TWC.2018.286594617:11(7252-7267)Online publication date: Nov-2018
      • (2018)SNR based secure communication via untrusted amplify-and-forward relay nodes using artificial noiseWireless Networks10.1007/s11276-016-1318-824:1(127-138)Online publication date: 1-Jan-2018
      • (2017)Friendly-Jamming: An anti-eavesdropping scheme in wireless networks2017 IEEE 18th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)10.1109/WoWMoM.2017.7974299(1-3)Online publication date: Jun-2017
      • (2017)AE-shelter: An novel anti-eavesdropping scheme in wireless networks2017 IEEE International Conference on Communications (ICC)10.1109/ICC.2017.7996847(1-6)Online publication date: May-2017
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media