Loading...
Please wait, while we are loading the content...
Similar Documents
Carving secure wi-fi zones with defensive jamming.
| Content Provider | CiteSeerX |
|---|---|
| Author | Kim, Yu Seung Tague, Patrick Lee, Heejo Kim, Hyogon |
| Abstract | With rampant deployment of wireless technologies such as WLAN, information leakage is increasingly becoming a threat for its serious adopters such as enterprises. Research on antidotes has been mainly focused on logical measures such as authentication protocols and secure channels, but an inside collaborator can readily circumvent such defenses and wirelessly divert the classified information to a conniver outside. In this paper, we propose a novel approach to the problem that forges a walled wireless coverage, a secure Wi-Fi zone in particular. Inspired by the fact that jamming as an attack is inherently difficult to defeat, we turn the table and use it as a defensive weapon to fend off the covert illegal access from outside. From an existing non-isotropic jamming theory, we construct a computational model for the protected geography forged by the defensive jamming. The model is spelled out in terms of the arrangement of the jammers, the transmitter, and the receiver, and the transmitting powers. Parameters are included in order to fine-tune the model to fit with the given physical environment. To validate the proposed approach, we conduct extensive outdoor experiments with the IEEE 802.11g Wi-Fi adapters. The measurements show that the forged secure zones match well with the model prediction and that the defensive jamming approach can indeed be used to protect wireless networks against information leakage. Lastly, we propose the algorithms to configure defensive jammers in arbitrary geometry and discuss the considerations for the practical deployment of our approach. 1. |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Secure Wi-fi Zone Information Leakage Physical Environment Walled Wireless Coverage Defensive Jammer Covert Illegal Access Practical Deployment Defensive Weapon Forged Secure Zone Transmitting Power Wi-fi Adapter Arbitrary Geometry Classified Information Secure Channel Model Prediction Wireless Technology Novel Approach Computational Model Logical Measure Defensive Jamming Approach Protected Geography Non-isotropic Jamming Theory Wireless Network Extensive Outdoor Experiment Authentication Protocol Serious Adopter Rampant Deployment Defensive Jamming Inside Collaborator |
| Content Type | Text |