Optimization schemes for protective jamming
2014 (English)In: Mobile Networks and Applications, ISSN 1383-469X, Vol. 19, no 1, 45-60 p.Article in journal (Refereed) PublishedText
In this paper, we study strategies for allocating and managing friendly jammers, so as to create virtual barriers that would prevent hostile eavesdroppers from tapping sensitive wireless communication. Our scheme precludes the use of any encryption technique. Applications include domains such as (i) protecting the privacy of storage locations where RFID tags are used for item identication, (ii) secure reading of RFID tags embedded in credit cards, (iii) protecting data transmitted through wireless networks, sensor networks, etc. By carefully managing jammers to produce noise, we show how to reduce the SINR of eavesdroppers to below a threshold for successful reception, without jeopardizing network performance. We present algorithms targeted towards optimizing power allocation and number of jammers needed in several settings. Experimental simulations back up our results.
Place, publisher, year, edition, pages
2014. Vol. 19, no 1, 45-60 p.
Friendly jamming, RFID, wireless, security
IdentifiersURN: urn:nbn:se:liu:diva-128027DOI: 10.1007/s11036-013-0483-6OAI: oai:DiVA.org:liu-128027DiVA: diva2:928738