16
Optimization Schemes for Protective Jamming Swaminathan Sankararaman (Duke) Karim Abu-Affash (Ben Gurion University, Israel) Alon Efrat (me) (U Arizona, USA) Sylvester David Eriksson-Bique (U Helsinki, Finland) Valentin Polishchuk (U Helsinki, Finland) Srinivasan Ramasubramanian (U Arizona, USA) Michael Segal (Ben Gurion University, Israel) 1

Optimization Schemes for Protective Jamming Swaminathan Sankararaman(Duke) Karim Abu-Affash(Ben Gurion University, Israel) Alon Efrat (me)(U Arizona, USA)

Embed Size (px)

Citation preview

Page 1: Optimization Schemes for Protective Jamming Swaminathan Sankararaman(Duke) Karim Abu-Affash(Ben Gurion University, Israel) Alon Efrat (me)(U Arizona, USA)

Optimization Schemes for Protective Jamming

• Swaminathan Sankararaman (Duke)

• Karim Abu-Affash (Ben Gurion University, Israel)

• Alon Efrat (me) (U Arizona, USA)

• Sylvester David Eriksson-Bique (U Helsinki, Finland)

• Valentin Polishchuk (U Helsinki, Finland)

• Srinivasan Ramasubramanian (U Arizona, USA)

• Michael Segal (Ben Gurion University, Israel)

1

Page 2: Optimization Schemes for Protective Jamming Swaminathan Sankararaman(Duke) Karim Abu-Affash(Ben Gurion University, Israel) Alon Efrat (me)(U Arizona, USA)

2

RFID Devices

• Tags and Readers• Sensitive information– Credit cards, patient

information in hospitals, etc.– Tricky to encrypt due to

severely limited capabilities

Page 3: Optimization Schemes for Protective Jamming Swaminathan Sankararaman(Duke) Karim Abu-Affash(Ben Gurion University, Israel) Alon Efrat (me)(U Arizona, USA)

3

Eavesdroppers and Jammers• RFID tags (or other active wireless

sources), are placed in storage areas. • The storage is surrounded by a fence• Hostile eavesdroppers might be

present outside fence.• Idea for protection: Place (friendly)

jammers that create "enough" noise to prevent successful unfriendly reading.

• This jamming should not disturb legit reading within storage.

Questions: 1.How to model successful jamming ?2.Where to place jammers ? 3.Power assignments ? 4.How to orient antennas (if not omnidirectional) ?5.How to schedule jammers (eg when battery operated)

e

ee

e

j j

j

j

js

fence

storage

Page 4: Optimization Schemes for Protective Jamming Swaminathan Sankararaman(Duke) Karim Abu-Affash(Ben Gurion University, Israel) Alon Efrat (me)(U Arizona, USA)

4

Same setting, different motivation

• Inmates/Terrorists/Drug Dealers (depending on funding agency) inside a prison might (illegally) have cellphones

• Need to jam their communication with outside world, without disturbing legit users outside the (outer) fence of the prison.

So jammers create virtual Faraday cage

Page 5: Optimization Schemes for Protective Jamming Swaminathan Sankararaman(Duke) Karim Abu-Affash(Ben Gurion University, Israel) Alon Efrat (me)(U Arizona, USA)

5

Same setting, yet another motivation

• Sensors communicate inside a sensors field.

• Eavesdropper outside the fenced region try to decrepit the sensor communications.

• Friendly jammers provide another level of security, on top of encryption.

Page 6: Optimization Schemes for Protective Jamming Swaminathan Sankararaman(Duke) Karim Abu-Affash(Ben Gurion University, Israel) Alon Efrat (me)(U Arizona, USA)

Assumptions

1. Only single frequency

2. Eavesdroppers could be anywhere outside fenced region.

3. No assumption about sensitivity of readers and eavesdroppers.

=> No assumptions about range of tags and jammers.

4. No co-transmissions from tags.

5. Jammers have no sensing abilities.

6. Other source of noise are not taken into account in SINR model (only simplify the problem)

t2t1

Page 7: Optimization Schemes for Protective Jamming Swaminathan Sankararaman(Duke) Karim Abu-Affash(Ben Gurion University, Israel) Alon Efrat (me)(U Arizona, USA)

Successful Jamming

t2

t1

Power received = power transmitted / distance2

Observation: For every eavesdropper q, need to worry only about nearest storage point (in omnidirectional case)

Claim: Under “reasonable” assumption, enough to validate conditions only for points on boundaries of fence and storage (jammers could be placed anywhere, though)

p1

p2p3

Def: Given user-specified thresholds P0 , δ0 jamming is successful if:•For every point ti inside the storage, the summed power from all jammers < P0.

•For every point pi outside the fence (possible eavesdropper), and every placement of RFID tag ti, we have

Page 8: Optimization Schemes for Protective Jamming Swaminathan Sankararaman(Duke) Karim Abu-Affash(Ben Gurion University, Israel) Alon Efrat (me)(U Arizona, USA)

Discretization, Witness Points and ILPWe could discretize the fence and storage boundaries by placing a set W of “witness points”, and validate the conditions only on these points.

t1

t2

Conclusions: Can use ILP to `solve’ variants of the problem such as• Picking a subsets of jammers from candidate locations• Schedule activation/deactivation of jammers activate to last longer.

PROBLEM: •Running time depends critically on #constraints, so could not use too many witness points. So challenging to provide guarantees for non-witness points. New Result: •Can place place only O(n/ε log (perimeter) ) witness points so successful is guaranteed everywhere, with ε-approximation of constants P0 , δ0

p2

p1

j3For every fence witness point

For every storage witness point

Page 9: Optimization Schemes for Protective Jamming Swaminathan Sankararaman(Duke) Karim Abu-Affash(Ben Gurion University, Israel) Alon Efrat (me)(U Arizona, USA)

Directional eavesdropper

• Eavesdropper could try to avoid the noise from Jammers by using directional antenna

• Jamming problem now is to verify that for every placement and orientation of cone, successful jamming is obtained when considering only nodes within this cone

• The angle θ cannot be too small since RFID frequencies is usually 30Mhz

• Can show: # witness points is still bounded from above by O(n3/ε 3 log (perimeter) )

Page 10: Optimization Schemes for Protective Jamming Swaminathan Sankararaman(Duke) Karim Abu-Affash(Ben Gurion University, Israel) Alon Efrat (me)(U Arizona, USA)

10

Cooler results: Placement problem

Where should jammers be placed if all have same power?

Further assumption: Only nearest jammer counts (NN Model)

Justification:•Jammers location is sparse, •strong comparing to tags, •power fades fast.

xx

Page 11: Optimization Schemes for Protective Jamming Swaminathan Sankararaman(Duke) Karim Abu-Affash(Ben Gurion University, Israel) Alon Efrat (me)(U Arizona, USA)

11

Placement problem (cont)

First condition of successful jamming

{ Jamming Power inside Storage ≤ P0 }

=> Jammer cannot lie within distance R0 of storage

Def: Forbidden Region: Union of all such Disks (minkovsky sum)

Page 12: Optimization Schemes for Protective Jamming Swaminathan Sankararaman(Duke) Karim Abu-Affash(Ben Gurion University, Israel) Alon Efrat (me)(U Arizona, USA)

12

Placement problem (second condition) The condition

Boils down (under NN model) to

. Let p be a point on fence.

Def: the critical disk of p, D(p), is the smallest disk centered at p, and touching the storage.

This disk must contain a jammer

Continuous Hitting Set Problem: Place a minimum number of jammers so that all critical disks (of all fence points p) contain a jammer.

D(pj)pj

Page 13: Optimization Schemes for Protective Jamming Swaminathan Sankararaman(Duke) Karim Abu-Affash(Ben Gurion University, Israel) Alon Efrat (me)(U Arizona, USA)

Greedy Approach

13

1. Start at any point p1 on boundary and compute its critical disk.

2. Compute next point p2 such that critical disks are tangent

3. Place first jammer at tangent point

4. Repeat

Algorithm gives Opt+1 for convex case.

D(p1)

D(p2)

Page 14: Optimization Schemes for Protective Jamming Swaminathan Sankararaman(Duke) Karim Abu-Affash(Ben Gurion University, Israel) Alon Efrat (me)(U Arizona, USA)

14

Simulations

No variation with ϵ

50x33 units

δ0 Jammer Powerδ0

Page 15: Optimization Schemes for Protective Jamming Swaminathan Sankararaman(Duke) Karim Abu-Affash(Ben Gurion University, Israel) Alon Efrat (me)(U Arizona, USA)

15

Background• RFID Security

– Blocker tag (Juels et al., ACM CCS ‘03): Security tag on a bag containing the RFID tag interferes with readers outside.

• Sensor network security– Most techniques focus on cryptography where the main problem is key management

(Simplicio Jr. et al., Computer Networks, ’10)• General Wireless security

– Active Jamming • Commander et al., Journal of Combinatorial

Optimization, ’07• Do not consider geometry of region

– Information Theoretic Approaches • Lai and El Gamal, IEEE Trans. On Information Theory, ‘08; Negi and Goel, IEEE VTC, ’05; Tang et al., IEEE Trans. On Information Theory, ’11; Vilela et al., IEEE Trans. On Information Forensics and Security, ’11

• No bounds on number/power of jammers

• Considering the geometry of the region is new

Page 16: Optimization Schemes for Protective Jamming Swaminathan Sankararaman(Duke) Karim Abu-Affash(Ben Gurion University, Israel) Alon Efrat (me)(U Arizona, USA)

16

Thank you