Voronoi diagrams—a survey of a fundamental geometric data structure
ACM Computing Surveys (CSUR)
Computational geometry: algorithms and applications
Computational geometry: algorithms and applications
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Soft blocking: flexible blocker tags on the cheap
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Living assistance systems: an ambient intelligence approach
Proceedings of the 28th international conference on Software engineering
Ambient Intelligence
Efficient computation of continuous skeletons
SFCS '79 Proceedings of the 20th Annual Symposium on Foundations of Computer Science
Reverse-engineering a cryptographic RFID tag
SS'08 Proceedings of the 17th conference on Security symposium
Vulnerabilities in first-generation RFID-enabled credit cards
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
A survey on key management mechanisms for distributed Wireless Sensor Networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Geometric optimization and sums of algebraic functions
SODA '10 Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms
Physical layer security game: interaction between source, eavesdropper, and friendly jammer
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
RFID systems: a survey on security threats and proposed solutions
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
A survey of security issues in wireless sensor networks
IEEE Communications Surveys & Tutorials
The capacity of wireless networks
IEEE Transactions on Information Theory
The Relay–Eavesdropper Channel: Cooperation for Secrecy
IEEE Transactions on Information Theory
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Interference Assisted Secret Communication
IEEE Transactions on Information Theory
Wireless Secrecy Regions With Friendly Jamming
IEEE Transactions on Information Forensics and Security
Optimization Schemes for Protective Jamming
Mobile Networks and Applications
Hi-index | 0.00 |
In this paper, we study strategies for allocating and managing friendly jammers, so as to create virtual barriers that would prevent hostile eavesdroppers from tapping sensitive wireless communication. Our scheme precludes the use of any encryption technique. Applications include domains such as (i) protecting the privacy of storage locations where RFID tags are used for item identification, (ii) secure reading of RFID tags embedded in credit cards, (iii) protecting data transmitted through wireless networks, sensor networks, etc. By carefully managing jammers to produce noise, we show how to reduce the SINR of eavesdroppers to below a threshold for successful reception, without jeopardizing network performance. We present algorithms targeted towards optimizing power allocation and number of jammers needed in several settings. Experimental simulations back up our results.