Optimization Schemes for Protective Jamming

  • Authors:
  • Swaminathan Sankararaman;Karim Abu-Affash;Alon Efrat;Sylvester David Eriksson-Bique;Valentin Polishchuk;Srinivasan Ramasubramanian;Michael Segal

  • Affiliations:
  • Department of Computer Science, Duke University, Durham, USA;Department of Computer Science, Ben-Gurion University of the Negev, Beer-Sheva, Israel 84105;Department of Computer Science, The University of Arizona, Tucson, USA;CS Department, University of Helsinki, Helsinki, Finland;CS Department, University of Helsinki, Helsinki, Finland;Department of Electrical and Computer Engineering, The University of Arizona, Tucson, USA;Department of Communication Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva, Israel 84105

  • Venue:
  • Mobile Networks and Applications
  • Year:
  • 2014

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we study strategies for allocating and managing friendly jammers, so as to create virtual barriers that would prevent hostile eavesdroppers from tapping sensitive wireless communication. Our scheme precludes the use of any encryption technique. Applications include domains such as (i) protecting the privacy of storage locations where RFID tags are used for item identification, (ii) secure reading of RFID tags embedded in credit cards, (iii) protecting data transmitted through wireless networks, sensor networks, etc. By carefully managing jammers to produce noise, we show how to reduce the SINR of eavesdroppers to below a threshold for successful reception, without jeopardizing network performance. In this paper, we present algorithms targeted towards optimizing power consumption and number of jammers needed in several settings. Experimental simulations back up our results.