Detection and resolving jamming in RFID wireless network using Gauss Elimination method

Wireless networking plays a most important role to improve the human living standard by providing continuous connectivity and service by using networking devices. In today's world, technology makes more and more convenient life for everyone. Radio Frequency Identification Technology (RFID), which has been growing exponentially in many different industries, inventory tracking and security service such as electronic passport and credit card. However, Radio Frequency Identification has some issues regarding security and privacy. This paper is based on Jamming issue, how to detect Jamming and how to solve this problem using Gauss Elimination method. We came up with algorithm to identify the different types of jamming attacks occur in the wireless communication system.

[1]  C. M. Roberts,et al.  Radio frequency identification (RFID) , 2006, Comput. Secur..

[2]  Sai K. Kalyanaraman,et al.  GPS Adaptive Array Phase Compensation using a Software Radio Architecture , 2010 .

[3]  Sieh Kiong Tiong,et al.  Beamforming Algorithms Technique by Using MVDR and LCMV - TI Journals , 2012 .

[4]  Pawel Rotter,et al.  A Framework for Assessing RFID System Security and Privacy Risks , 2008, IEEE Pervasive Computing.

[5]  Abdul Razaque,et al.  Nomenclature of Medium Access Control Protocol over Wireless Sensor Networks , 2016 .

[6]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[7]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[8]  Manish Bhuptani,et al.  RFID Field Guide: Deploying Radio Frequency Identification Systems , 2005 .

[9]  Khaled M. Elleithy,et al.  Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks , 2014, Sensors.

[10]  Yimin Zhang,et al.  Anti-Jamming GPS Receiver With Reduced Phase Distortions , 2012, IEEE Signal Processing Letters.

[11]  Nandita Srivastava,et al.  RFID Introduction, Present and Future applications and Security Implications , 2006 .

[12]  Alexander M. Wyglinski,et al.  A combined approach for distinguishing different types of jamming attacks against wireless networks , 2011, Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.