Proximity-based wireless access control through considerate jamming

As diverse types of wireless devices emerge, it becomes difficult to apply the existing wireless security measures to them without efforts. Those devices lack conventional user interfaces or they are resource-constrained to process the security protocols. Meanwhile, many of them are used within a geographical boundary to access to the basestation. This motivates us to develop a complementary non-cryptographic technique to secure communication of such wireless devices. In this paper, we present considerate jamming, a novel wireless access control mechanism allowing access to only the wireless devices within a given boundary. The proposed mechanism does not require any modification in the wireless clients, but instead it is implemented with separate jamming devices and the modified basestation. We provide the theoretical model with system parameters and validate it through simulation.

[1]  Srdjan Capkun,et al.  Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[2]  Rachelin Sujae Packet Hiding Methods for Preventing Selective Jamming Attacks , 2013 .

[3]  Srdjan Capkun,et al.  Key Agreement in Peer-to-Peer Wireless Networks , 2006, Proceedings of the IEEE.

[4]  Loukas Lazos,et al.  Packet-Hiding Methods for Preventing Selective Jamming Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.

[5]  Matthieu R. Bloch,et al.  Wireless Secrecy Regions With Friendly Jamming , 2011, IEEE Transactions on Information Forensics and Security.

[6]  M. Vavrda Digital beamforming in wireless communications , 2004 .

[7]  Bart Preneel,et al.  Key Establishment Using Secure Distance Bounding Protocols , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).

[8]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[9]  Heejo Lee,et al.  Carving secure wi-fi zones with defensive jamming , 2012, ASIACCS '12.

[10]  Ivan Martinovic,et al.  Short paper: reactive jamming in wireless networks: how realistic is the threat? , 2011, WiSec '11.

[11]  David Wetherall,et al.  Predictable 802.11 packet delivery from wireless channel measurements , 2010, SIGCOMM '10.

[12]  Voon Chin Phua,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .

[13]  Alon Efrat,et al.  Optimization Schemes for Protective Jamming , 2012, MobiHoc '12.

[14]  Srinivasan Seshan,et al.  Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries , 2009, Pervasive.

[15]  O. Holland,et al.  Implementation of dynamic switching between one-to-many download methods , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..