Optimization schemes for protective jamming

Swaminathan Sankararaman, Karim Abu-Affash, Alon Efrat, Sylvester David Eriksson-Bique, Valentin Polishchuk, Srinivasan Ramasubramanian, Michael Segal

Research output: Chapter in Book/Report/Conference proceedingConference contribution

22 Scopus citations

Abstract

In this paper, we study strategies for allocating and managing friendly jammers, so as to create virtual barriers that would prevent hostile eavesdroppers from tapping sensitive wireless communication. Our scheme precludes the use of any encryption technique. Applications include domains such as (i) protecting the privacy of storage locations where RFID tags are used for item identification, (ii) secure reading of RFID tags embedded in credit cards, (iii) protecting data transmitted through wireless networks, sensor networks, etc. By carefully managing jammers to produce noise, we show how to reduce the SINR of eavesdroppers to below a threshold for successful reception, without jeopardizing network performance. We present algorithms targeted towards optimizing power allocation and number of jammers needed in several settings. Experimental simulations back up our results.

Original languageEnglish (US)
Title of host publicationMobiHoc'12 - Proceedings of the 13th ACM International Symposium on Mobile Ad Hoc Networking and Computing
Pages65-74
Number of pages10
DOIs
StatePublished - Jul 11 2012
Event13th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'12 - Hilton Head, SC, United States
Duration: Jun 11 2012Jun 14 2012

Publication series

NameProceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)

Other

Other13th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'12
CountryUnited States
CityHilton Head, SC
Period6/11/126/14/12

Keywords

  • friendly jamming
  • rfid
  • security
  • wireless

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Optimization schemes for protective jamming'. Together they form a unique fingerprint.

  • Cite this

    Sankararaman, S., Abu-Affash, K., Efrat, A., Eriksson-Bique, S. D., Polishchuk, V., Ramasubramanian, S., & Segal, M. (2012). Optimization schemes for protective jamming. In MobiHoc'12 - Proceedings of the 13th ACM International Symposium on Mobile Ad Hoc Networking and Computing (pp. 65-74). (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)). https://doi.org/10.1145/2248371.2248383