TY - JOUR
T1 - Optimization schemes for protective jamming
AU - Sankararaman, Swaminathan
AU - Abu-Affash, Karim
AU - Efrat, Alon
AU - Eriksson-Bique, Sylvester David
AU - Polishchuk, Valentin
AU - Ramasubramanian, Srinivasan
AU - Segal, Michael
N1 - Funding Information:
Acknowledgments The authors would like to thank Pankaj Agarwal, Paz Carmi, Esther Ezra, Matya Katz, Anantha Raman Krishnan and Zvika Lotker for enlightening discussions. SEB was funded by U of Helsinki research funds. VP is supported by the Academy of Finland grant 135280.
PY - 2014/2
Y1 - 2014/2
N2 - In this paper, we study strategies for allocating and managing friendly jammers, so as to create virtual barriers that would prevent hostile eavesdroppers from tapping sensitive wireless communication. Our scheme precludes the use of any encryption technique. Applications include domains such as (i) protecting the privacy of storage locations where RFID tags are used for item identification, (ii) secure reading of RFID tags embedded in credit cards, (iii) protecting data transmitted through wireless networks, sensor networks, etc. By carefully managing jammers to produce noise, we show how to reduce the SINR of eavesdroppers to below a threshold for successful reception, without jeopardizing network performance. In this paper, we present algorithms targeted towards optimizing power consumption and number of jammers needed in several settings. Experimental simulations back up our results.
AB - In this paper, we study strategies for allocating and managing friendly jammers, so as to create virtual barriers that would prevent hostile eavesdroppers from tapping sensitive wireless communication. Our scheme precludes the use of any encryption technique. Applications include domains such as (i) protecting the privacy of storage locations where RFID tags are used for item identification, (ii) secure reading of RFID tags embedded in credit cards, (iii) protecting data transmitted through wireless networks, sensor networks, etc. By carefully managing jammers to produce noise, we show how to reduce the SINR of eavesdroppers to below a threshold for successful reception, without jeopardizing network performance. In this paper, we present algorithms targeted towards optimizing power consumption and number of jammers needed in several settings. Experimental simulations back up our results.
KW - Jammers allocation
KW - Optimization
KW - Power allocation
KW - Privacy protection
UR - http://www.scopus.com/inward/record.url?scp=84894810519&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84894810519&partnerID=8YFLogxK
U2 - 10.1007/s11036-013-0483-6
DO - 10.1007/s11036-013-0483-6
M3 - Article
AN - SCOPUS:84894810519
SN - 1383-469X
VL - 19
SP - 45
EP - 60
JO - Mobile Networks and Applications
JF - Mobile Networks and Applications
IS - 1
ER -