ABSTRACT
Wireless communication systems, such as RFIDs and wireless sensor networks, are increasingly being used in security-sensitive applications, e.g. credit card transactions or monitoring patient health in hospitals. Wireless jamming by transmitting artificial noise, which is traditionally used as an offensive technique for disrupting communication, has recently been explored as a means of protecting sensitive communication from eavesdroppers.
In this paper, we consider location optimization problems related to the placement and power consumption of such friendly jammers in order to protect the privacy of wireless communications constrained within a geographic region. Under our model, we show that the problem of placing a minimum number of fixed-power jammers is NP-Hard, and we provide a PTAS ((1 + ε)-approximation scheme) for the same, where ε is a tunable parameter between 0 and 1.
- D. S. Alberts, J. J. Garstka, and F. P. Stein. Network centric warfare: Developing and leveraging information superiority. Technical report, DTIC Document, 2000.Google Scholar
- D. W. Bliss. Robust MIMO wireless communication in the presence of interference using ad hoc antenna arrays. In IEEE Military Communications Conference, MILCOM'03, volume 2, pages 1382--1385. IEEE, 2003. Google ScholarDigital Library
- M. de Berg, M. van Kreveld, M. Overmars, and O. Schwarzkopf. Computational Geometry: Algorithms and Applications. Springer-Verlag, 2000. Google ScholarDigital Library
- S. A. Fakoorian and A. L. Swindlehurst. Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer. IEEE Transactions on Signal Processing, 59(10): 5013--5022, 2011. Google ScholarDigital Library
- M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, 1979. Google ScholarDigital Library
- S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They can hear your heartbeats: Non-invasive security for implantable medical devices. ACM SIGCOMM Computer Communication Review, 41(4): 2--13, 2011. Google ScholarDigital Library
- P. Gupta and P. R. Kumar. The capacity of wireless networks. IEEE Transactions on Information Theory, 46(2): 388--404, 2000. Google ScholarDigital Library
- Z. Han, N. Marina, M. Debbah, and A. H. rungnes. Physical layer security game: Interaction between source, eavesdropper, and friendly jammer. EURASIP Journal on Wireless Communications and Networking, 2009(1): 452907, 2009. Google ScholarDigital Library
- M. Hendry. Multi-application Smart Cards: Technology and Applications. Cambridge University Press, 2007. Google ScholarDigital Library
- A. Juels and J. Brainard. Soft blocking: Flexible blocker tags on the cheap. In Proc. 2004 ACM Workshop on Privacy in the Electronic Society (WPES), pages 1--7, 2004. Google ScholarDigital Library
- A. Juels, R. L. Rivest, and M. Szydlo. The blocker tag: selective blocking of RFID tags for consumer privacy. In 10th ACM Conference on Computer and Communications Security, pages 103--111, 2003. Google ScholarDigital Library
- D. G. Kirkpatrick. Efficient computation of continuous skeletons. In 20th Annual IEEE Symposium on Foundations of Computer Science (FOCS'79), pages 18--27, 1979. Google ScholarDigital Library
- L. Lai and H. E. Gamal. The relay-eavesdropper channel: Cooperation for secrecy. IEEE Transactions on Information Theory, 54(9): 4005--4019, 2008. Google ScholarDigital Library
- D. T. Lee and R. L. Drysdale. Generalization of Voronoi diagrams in the plane. SIAM Journal on Computing, 10(1): 73--87, 1981.Google ScholarCross Ref
- D. Malan, T. Fulford-Jones, M. Welsh, and S. Moulton. Codeblue: An ad hoc sensor network infrastructure for emergency medical care. In Proc. 1st International Workshop on Wearable and Implantable Body Sensor Networks, pages 55--58, 2004.Google Scholar
- N. Megiddo and K. Supowit. On the complexity of some common geometric location problems. SIAM Journal on Computing, 13(1): 182--196, 1984.Google ScholarCross Ref
- A. Mukherjee and A. L. Swindlehurst. Jamming games in the MIMO wiretap channel with an active eavesdropper. IEEE Transactions on Signal Processing, 61(1): 82--91, 2013. Google ScholarDigital Library
- N. H. Mustafa and S. Ray. Improved results on geometric hitting set problems. Discrete and Computational Geometry, 44: 883--895, 2010. Google ScholarDigital Library
- R. Negi and S. Goel. Secret communication using artificial noise. In Proc. IEEE 62nd Vehicular Technology Conference, pages 1906--1910, 2005.Google ScholarCross Ref
- J. Nehmer, M. Becker, A. Karshmer, and R. Lamm. Living assistance systems: An ambient intelligence approach. In 28th International Conference on Software Engineering, pages 43--50, 2006. Google ScholarDigital Library
- P. Peris-Lopez, J. Hernandez-Castro, J. Estevez-Tapiador, and A. Ribagorda. RFID systems: A survey on security threats and proposed solutions. In Personal Wireless Communications, volume 4217 of LNCS, pages 159--170. Springer, 2006. Google ScholarDigital Library
- A. Perrig, J. A. Stankovic, and D. Wagner. Security in wireless sensor networks. Communications of the ACM, 47(6): 53--57, 2004. Google ScholarDigital Library
- S. Sankararaman, A. K. Abu-Affash, A. Efrat, S. D. Eriksson-Bique, V. Polishchuk, S. Ramasubramanian, and M. Segal. Optimization schemes for protective jamming. In 13th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'12, Hilton Head, SC, USA, June 11--14, 2012, pages 65--74, 2012. Google ScholarDigital Library
- S. Sankararaman, K. Abu-Affash, A. Efrat, S. D. Eriksson-Bique, V. Polishchuk, S. Ramasubramanian, and M. Segal. Optimization schemes for protective jamming. Mobile Networks and Applications, 19(1): 45--60, 2014. Google ScholarDigital Library
- W. Shen, P. Ning, X. He, and H. Dai. Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time. In IEEE Symposium on Security and Privacy, pages 174--188, 2013. Google ScholarDigital Library
- M. A. Simplício Jr., P. S. L. M. Barreto, C. B. Margi, and T. C. M. B. Carvalho. A survey on key management mechanisms for distributed wireless sensor networks. Computer Networks, 54(15): 2591--2612, 2010. Google ScholarDigital Library
- X. Tang, R. Liu, P. Spasojevic, and H. V. Poor. Interference assisted secret communication. IEEE Transactions on Information Theory, 57(5): 3153--3167, 2011. Google ScholarDigital Library
- J. P. Vilela and J. Barros. Collision-free jamming for enhanced wireless secrecy. In IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2013, Madrid, Spain, June 4--7, 2013, pages 1--6, 2013.Google ScholarCross Ref
- J. P. Vilela, M. Bloch, J. Barros, and S. W. McLaughlin. Wireless secrecy regions with friendly jamming. IEEE Transactions on Information Forensics and Security, 6(2): 256--266, 2011. Google ScholarDigital Library
- J. P. Vilela, M. R. Bloch, J. Barros, and S. W. McLaughlin. Friendly jamming for wireless secrecy. In IEEE International Conference on Communications, ICC'10, Cape Town, South Africa, 23--27 May 2010, pages 1--6, 2010.Google ScholarCross Ref
- J. P. Vilela, P. C. Pinto, and J. Barros. Jammer selection policies for secure wireless networks. In Communications Workshops (ICC), 2011 IEEE International Conference on, pages 1--6. IEEE, 2011.Google ScholarCross Ref
- A. D. Wyner. The Wire-tap Channel. Bell Systems Technical Journal, 54(8): 1355--1387, 1975.Google ScholarCross Ref
Index Terms
Optimal placement of protective jammers for securing wireless transmissions in a geographic domain
Recommendations
Identifying Jammers in Wireless Sensor Network with an Approach to Defend Reactive Jammer
CSNT '14: Proceedings of the 2014 Fourth International Conference on Communication Systems and Network TechnologiesThe jamming attack is one of the major security issues where a jammer node interferes with the signal of neighboring sensor nodes and thus disrupts the message delivery of its neighboring nodes. In wireless sensor network which is having a broadcast ...
Comments