skip to main content
10.1145/2737095.2742142acmconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
research-article

Optimal placement of protective jammers for securing wireless transmissions in a geographic domain

Published:13 April 2015Publication History

ABSTRACT

Wireless communication systems, such as RFIDs and wireless sensor networks, are increasingly being used in security-sensitive applications, e.g. credit card transactions or monitoring patient health in hospitals. Wireless jamming by transmitting artificial noise, which is traditionally used as an offensive technique for disrupting communication, has recently been explored as a means of protecting sensitive communication from eavesdroppers.

In this paper, we consider location optimization problems related to the placement and power consumption of such friendly jammers in order to protect the privacy of wireless communications constrained within a geographic region. Under our model, we show that the problem of placing a minimum number of fixed-power jammers is NP-Hard, and we provide a PTAS ((1 + ε)-approximation scheme) for the same, where ε is a tunable parameter between 0 and 1.

References

  1. D. S. Alberts, J. J. Garstka, and F. P. Stein. Network centric warfare: Developing and leveraging information superiority. Technical report, DTIC Document, 2000.Google ScholarGoogle Scholar
  2. D. W. Bliss. Robust MIMO wireless communication in the presence of interference using ad hoc antenna arrays. In IEEE Military Communications Conference, MILCOM'03, volume 2, pages 1382--1385. IEEE, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. de Berg, M. van Kreveld, M. Overmars, and O. Schwarzkopf. Computational Geometry: Algorithms and Applications. Springer-Verlag, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. A. Fakoorian and A. L. Swindlehurst. Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer. IEEE Transactions on Signal Processing, 59(10): 5013--5022, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They can hear your heartbeats: Non-invasive security for implantable medical devices. ACM SIGCOMM Computer Communication Review, 41(4): 2--13, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. P. Gupta and P. R. Kumar. The capacity of wireless networks. IEEE Transactions on Information Theory, 46(2): 388--404, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Z. Han, N. Marina, M. Debbah, and A. H. rungnes. Physical layer security game: Interaction between source, eavesdropper, and friendly jammer. EURASIP Journal on Wireless Communications and Networking, 2009(1): 452907, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Hendry. Multi-application Smart Cards: Technology and Applications. Cambridge University Press, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Juels and J. Brainard. Soft blocking: Flexible blocker tags on the cheap. In Proc. 2004 ACM Workshop on Privacy in the Electronic Society (WPES), pages 1--7, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Juels, R. L. Rivest, and M. Szydlo. The blocker tag: selective blocking of RFID tags for consumer privacy. In 10th ACM Conference on Computer and Communications Security, pages 103--111, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. G. Kirkpatrick. Efficient computation of continuous skeletons. In 20th Annual IEEE Symposium on Foundations of Computer Science (FOCS'79), pages 18--27, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. L. Lai and H. E. Gamal. The relay-eavesdropper channel: Cooperation for secrecy. IEEE Transactions on Information Theory, 54(9): 4005--4019, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. T. Lee and R. L. Drysdale. Generalization of Voronoi diagrams in the plane. SIAM Journal on Computing, 10(1): 73--87, 1981.Google ScholarGoogle ScholarCross RefCross Ref
  15. D. Malan, T. Fulford-Jones, M. Welsh, and S. Moulton. Codeblue: An ad hoc sensor network infrastructure for emergency medical care. In Proc. 1st International Workshop on Wearable and Implantable Body Sensor Networks, pages 55--58, 2004.Google ScholarGoogle Scholar
  16. N. Megiddo and K. Supowit. On the complexity of some common geometric location problems. SIAM Journal on Computing, 13(1): 182--196, 1984.Google ScholarGoogle ScholarCross RefCross Ref
  17. A. Mukherjee and A. L. Swindlehurst. Jamming games in the MIMO wiretap channel with an active eavesdropper. IEEE Transactions on Signal Processing, 61(1): 82--91, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. N. H. Mustafa and S. Ray. Improved results on geometric hitting set problems. Discrete and Computational Geometry, 44: 883--895, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. R. Negi and S. Goel. Secret communication using artificial noise. In Proc. IEEE 62nd Vehicular Technology Conference, pages 1906--1910, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  20. J. Nehmer, M. Becker, A. Karshmer, and R. Lamm. Living assistance systems: An ambient intelligence approach. In 28th International Conference on Software Engineering, pages 43--50, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. P. Peris-Lopez, J. Hernandez-Castro, J. Estevez-Tapiador, and A. Ribagorda. RFID systems: A survey on security threats and proposed solutions. In Personal Wireless Communications, volume 4217 of LNCS, pages 159--170. Springer, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Perrig, J. A. Stankovic, and D. Wagner. Security in wireless sensor networks. Communications of the ACM, 47(6): 53--57, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Sankararaman, A. K. Abu-Affash, A. Efrat, S. D. Eriksson-Bique, V. Polishchuk, S. Ramasubramanian, and M. Segal. Optimization schemes for protective jamming. In 13th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'12, Hilton Head, SC, USA, June 11--14, 2012, pages 65--74, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. S. Sankararaman, K. Abu-Affash, A. Efrat, S. D. Eriksson-Bique, V. Polishchuk, S. Ramasubramanian, and M. Segal. Optimization schemes for protective jamming. Mobile Networks and Applications, 19(1): 45--60, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. W. Shen, P. Ning, X. He, and H. Dai. Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time. In IEEE Symposium on Security and Privacy, pages 174--188, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. M. A. Simplício Jr., P. S. L. M. Barreto, C. B. Margi, and T. C. M. B. Carvalho. A survey on key management mechanisms for distributed wireless sensor networks. Computer Networks, 54(15): 2591--2612, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. X. Tang, R. Liu, P. Spasojevic, and H. V. Poor. Interference assisted secret communication. IEEE Transactions on Information Theory, 57(5): 3153--3167, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. P. Vilela and J. Barros. Collision-free jamming for enhanced wireless secrecy. In IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2013, Madrid, Spain, June 4--7, 2013, pages 1--6, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  29. J. P. Vilela, M. Bloch, J. Barros, and S. W. McLaughlin. Wireless secrecy regions with friendly jamming. IEEE Transactions on Information Forensics and Security, 6(2): 256--266, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. J. P. Vilela, M. R. Bloch, J. Barros, and S. W. McLaughlin. Friendly jamming for wireless secrecy. In IEEE International Conference on Communications, ICC'10, Cape Town, South Africa, 23--27 May 2010, pages 1--6, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  31. J. P. Vilela, P. C. Pinto, and J. Barros. Jammer selection policies for secure wireless networks. In Communications Workshops (ICC), 2011 IEEE International Conference on, pages 1--6. IEEE, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  32. A. D. Wyner. The Wire-tap Channel. Bell Systems Technical Journal, 54(8): 1355--1387, 1975.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Optimal placement of protective jammers for securing wireless transmissions in a geographic domain

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            IPSN '15: Proceedings of the 14th International Conference on Information Processing in Sensor Networks
            April 2015
            430 pages
            ISBN:9781450334754
            DOI:10.1145/2737095

            Copyright © 2015 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 13 April 2015

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate143of593submissions,24%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader