Optimization schemes for protective jamming

Swaminathan Sankararaman, Karim Abu-Affash, Alon Efrat, Sylvester David Eriksson-Bique, Valentin Polishchuk, Srinivasan Ramasubramanian, Michael Segal

Research output: Contribution to journalArticle

8 Citations (Scopus)

Abstract

In this paper, we study strategies for allocating and managing friendly jammers, so as to create virtual barriers that would prevent hostile eavesdroppers from tapping sensitive wireless communication. Our scheme precludes the use of any encryption technique. Applications include domains such as (i) protecting the privacy of storage locations where RFID tags are used for item identification, (ii) secure reading of RFID tags embedded in credit cards, (iii) protecting data transmitted through wireless networks, sensor networks, etc. By carefully managing jammers to produce noise, we show how to reduce the SINR of eavesdroppers to below a threshold for successful reception, without jeopardizing network performance. In this paper, we present algorithms targeted towards optimizing power consumption and number of jammers needed in several settings. Experimental simulations back up our results.

Original languageEnglish (US)
Pages (from-to)45-60
Number of pages16
JournalMobile Networks and Applications
Volume19
Issue number1
DOIs
StatePublished - Feb 2014

Fingerprint

Jamming
Radio frequency identification (RFID)
Network performance
Sensor networks
Cryptography
Wireless networks
Identification (control systems)
Electric power utilization
Communication

Keywords

  • Jammers allocation
  • Optimization
  • Power allocation
  • Privacy protection

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems
  • Software

Cite this

Sankararaman, S., Abu-Affash, K., Efrat, A., Eriksson-Bique, S. D., Polishchuk, V., Ramasubramanian, S., & Segal, M. (2014). Optimization schemes for protective jamming. Mobile Networks and Applications, 19(1), 45-60. https://doi.org/10.1007/s11036-013-0483-6

Optimization schemes for protective jamming. / Sankararaman, Swaminathan; Abu-Affash, Karim; Efrat, Alon; Eriksson-Bique, Sylvester David; Polishchuk, Valentin; Ramasubramanian, Srinivasan; Segal, Michael.

In: Mobile Networks and Applications, Vol. 19, No. 1, 02.2014, p. 45-60.

Research output: Contribution to journalArticle

Sankararaman, S, Abu-Affash, K, Efrat, A, Eriksson-Bique, SD, Polishchuk, V, Ramasubramanian, S & Segal, M 2014, 'Optimization schemes for protective jamming', Mobile Networks and Applications, vol. 19, no. 1, pp. 45-60. https://doi.org/10.1007/s11036-013-0483-6
Sankararaman S, Abu-Affash K, Efrat A, Eriksson-Bique SD, Polishchuk V, Ramasubramanian S et al. Optimization schemes for protective jamming. Mobile Networks and Applications. 2014 Feb;19(1):45-60. https://doi.org/10.1007/s11036-013-0483-6
Sankararaman, Swaminathan ; Abu-Affash, Karim ; Efrat, Alon ; Eriksson-Bique, Sylvester David ; Polishchuk, Valentin ; Ramasubramanian, Srinivasan ; Segal, Michael. / Optimization schemes for protective jamming. In: Mobile Networks and Applications. 2014 ; Vol. 19, No. 1. pp. 45-60.
@article{8275b9e7ef164952a715088b5a327119,
title = "Optimization schemes for protective jamming",
abstract = "In this paper, we study strategies for allocating and managing friendly jammers, so as to create virtual barriers that would prevent hostile eavesdroppers from tapping sensitive wireless communication. Our scheme precludes the use of any encryption technique. Applications include domains such as (i) protecting the privacy of storage locations where RFID tags are used for item identification, (ii) secure reading of RFID tags embedded in credit cards, (iii) protecting data transmitted through wireless networks, sensor networks, etc. By carefully managing jammers to produce noise, we show how to reduce the SINR of eavesdroppers to below a threshold for successful reception, without jeopardizing network performance. In this paper, we present algorithms targeted towards optimizing power consumption and number of jammers needed in several settings. Experimental simulations back up our results.",
keywords = "Jammers allocation, Optimization, Power allocation, Privacy protection",
author = "Swaminathan Sankararaman and Karim Abu-Affash and Alon Efrat and Eriksson-Bique, {Sylvester David} and Valentin Polishchuk and Srinivasan Ramasubramanian and Michael Segal",
year = "2014",
month = "2",
doi = "10.1007/s11036-013-0483-6",
language = "English (US)",
volume = "19",
pages = "45--60",
journal = "Mobile Networks and Applications",
issn = "1383-469X",
publisher = "Springer Netherlands",
number = "1",

}

TY - JOUR

T1 - Optimization schemes for protective jamming

AU - Sankararaman, Swaminathan

AU - Abu-Affash, Karim

AU - Efrat, Alon

AU - Eriksson-Bique, Sylvester David

AU - Polishchuk, Valentin

AU - Ramasubramanian, Srinivasan

AU - Segal, Michael

PY - 2014/2

Y1 - 2014/2

N2 - In this paper, we study strategies for allocating and managing friendly jammers, so as to create virtual barriers that would prevent hostile eavesdroppers from tapping sensitive wireless communication. Our scheme precludes the use of any encryption technique. Applications include domains such as (i) protecting the privacy of storage locations where RFID tags are used for item identification, (ii) secure reading of RFID tags embedded in credit cards, (iii) protecting data transmitted through wireless networks, sensor networks, etc. By carefully managing jammers to produce noise, we show how to reduce the SINR of eavesdroppers to below a threshold for successful reception, without jeopardizing network performance. In this paper, we present algorithms targeted towards optimizing power consumption and number of jammers needed in several settings. Experimental simulations back up our results.

AB - In this paper, we study strategies for allocating and managing friendly jammers, so as to create virtual barriers that would prevent hostile eavesdroppers from tapping sensitive wireless communication. Our scheme precludes the use of any encryption technique. Applications include domains such as (i) protecting the privacy of storage locations where RFID tags are used for item identification, (ii) secure reading of RFID tags embedded in credit cards, (iii) protecting data transmitted through wireless networks, sensor networks, etc. By carefully managing jammers to produce noise, we show how to reduce the SINR of eavesdroppers to below a threshold for successful reception, without jeopardizing network performance. In this paper, we present algorithms targeted towards optimizing power consumption and number of jammers needed in several settings. Experimental simulations back up our results.

KW - Jammers allocation

KW - Optimization

KW - Power allocation

KW - Privacy protection

UR - http://www.scopus.com/inward/record.url?scp=84894810519&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84894810519&partnerID=8YFLogxK

U2 - 10.1007/s11036-013-0483-6

DO - 10.1007/s11036-013-0483-6

M3 - Article

VL - 19

SP - 45

EP - 60

JO - Mobile Networks and Applications

JF - Mobile Networks and Applications

SN - 1383-469X

IS - 1

ER -