TY - GEN
T1 - Optimization schemes for protective jamming
AU - Sankararaman, Swaminathan
AU - Abu-Affash, Karim
AU - Efrat, Alon
AU - Eriksson-Bique, Sylvester David
AU - Polishchuk, Valentin
AU - Ramasubramanian, Srinivasan
AU - Segal, Michael
PY - 2012/7/11
Y1 - 2012/7/11
N2 - In this paper, we study strategies for allocating and managing friendly jammers, so as to create virtual barriers that would prevent hostile eavesdroppers from tapping sensitive wireless communication. Our scheme precludes the use of any encryption technique. Applications include domains such as (i) protecting the privacy of storage locations where RFID tags are used for item identification, (ii) secure reading of RFID tags embedded in credit cards, (iii) protecting data transmitted through wireless networks, sensor networks, etc. By carefully managing jammers to produce noise, we show how to reduce the SINR of eavesdroppers to below a threshold for successful reception, without jeopardizing network performance. We present algorithms targeted towards optimizing power allocation and number of jammers needed in several settings. Experimental simulations back up our results.
AB - In this paper, we study strategies for allocating and managing friendly jammers, so as to create virtual barriers that would prevent hostile eavesdroppers from tapping sensitive wireless communication. Our scheme precludes the use of any encryption technique. Applications include domains such as (i) protecting the privacy of storage locations where RFID tags are used for item identification, (ii) secure reading of RFID tags embedded in credit cards, (iii) protecting data transmitted through wireless networks, sensor networks, etc. By carefully managing jammers to produce noise, we show how to reduce the SINR of eavesdroppers to below a threshold for successful reception, without jeopardizing network performance. We present algorithms targeted towards optimizing power allocation and number of jammers needed in several settings. Experimental simulations back up our results.
KW - friendly jamming
KW - rfid
KW - security
KW - wireless
UR - http://www.scopus.com/inward/record.url?scp=84863552416&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84863552416&partnerID=8YFLogxK
U2 - 10.1145/2248371.2248383
DO - 10.1145/2248371.2248383
M3 - Conference contribution
AN - SCOPUS:84863552416
SN - 9781450312813
T3 - Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
SP - 65
EP - 74
BT - MobiHoc'12 - Proceedings of the 13th ACM International Symposium on Mobile Ad Hoc Networking and Computing
T2 - 13th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'12
Y2 - 11 June 2012 through 14 June 2012
ER -