A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control

Yu Seung Kim, Patrick Tague, Heejo Lee, Hyogon Kim

Research output: Contribution to journalArticle

11 Citations (Scopus)

Abstract

Prevalent Wi-Fi networks have adopted various protections to prevent eavesdropping caused by the intrinsic shared nature of wireless medium. However, many of them are based on pre-shared secret incurring key management costs, and are still vulnerable from practical countermeasures. In this study, we investigate the feasibility of using defensive jamming technique to protect enterprise Wi-Fi networks from potential eavesdroppers. This non-cryptographic approach requires neither any pre-shared key or high deployment costs. Defensive jammers geographically confine the wireless coverage of Wi-Fi access point, and thus block the message reception outside an arbitrary boundary at a physical layer. We provide a theoretical model fine tuning the jamming parameters for jammer placement. We then discuss practical considerations including optimized jammer arrangement algorithms, interference countermeasures to legitimate communications, and countermeasures against advanced attackers.

Original languageEnglish
Pages (from-to)2631-2647
Number of pages17
JournalWireless Networks
Volume21
Issue number8
DOIs
Publication statusPublished - 2015 Nov 1

Fingerprint

Wi-Fi
Jamming
Access control
Industry
Costs
Tuning
Communication

Keywords

  • Defensive jamming
  • Eavesdropping
  • Wi-Fi networks

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Networks and Communications
  • Information Systems

Cite this

A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control. / Kim, Yu Seung; Tague, Patrick; Lee, Heejo; Kim, Hyogon.

In: Wireless Networks, Vol. 21, No. 8, 01.11.2015, p. 2631-2647.

Research output: Contribution to journalArticle

@article{73fbf0df81ab4c61ba27a1bf00c16fd9,
title = "A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control",
abstract = "Prevalent Wi-Fi networks have adopted various protections to prevent eavesdropping caused by the intrinsic shared nature of wireless medium. However, many of them are based on pre-shared secret incurring key management costs, and are still vulnerable from practical countermeasures. In this study, we investigate the feasibility of using defensive jamming technique to protect enterprise Wi-Fi networks from potential eavesdroppers. This non-cryptographic approach requires neither any pre-shared key or high deployment costs. Defensive jammers geographically confine the wireless coverage of Wi-Fi access point, and thus block the message reception outside an arbitrary boundary at a physical layer. We provide a theoretical model fine tuning the jamming parameters for jammer placement. We then discuss practical considerations including optimized jammer arrangement algorithms, interference countermeasures to legitimate communications, and countermeasures against advanced attackers.",
keywords = "Defensive jamming, Eavesdropping, Wi-Fi networks",
author = "Kim, {Yu Seung} and Patrick Tague and Heejo Lee and Hyogon Kim",
year = "2015",
month = "11",
day = "1",
doi = "10.1007/s11276-015-0935-y",
language = "English",
volume = "21",
pages = "2631--2647",
journal = "Wireless Networks",
issn = "1022-0038",
publisher = "Springer Netherlands",
number = "8",

}

TY - JOUR

T1 - A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control

AU - Kim, Yu Seung

AU - Tague, Patrick

AU - Lee, Heejo

AU - Kim, Hyogon

PY - 2015/11/1

Y1 - 2015/11/1

N2 - Prevalent Wi-Fi networks have adopted various protections to prevent eavesdropping caused by the intrinsic shared nature of wireless medium. However, many of them are based on pre-shared secret incurring key management costs, and are still vulnerable from practical countermeasures. In this study, we investigate the feasibility of using defensive jamming technique to protect enterprise Wi-Fi networks from potential eavesdroppers. This non-cryptographic approach requires neither any pre-shared key or high deployment costs. Defensive jammers geographically confine the wireless coverage of Wi-Fi access point, and thus block the message reception outside an arbitrary boundary at a physical layer. We provide a theoretical model fine tuning the jamming parameters for jammer placement. We then discuss practical considerations including optimized jammer arrangement algorithms, interference countermeasures to legitimate communications, and countermeasures against advanced attackers.

AB - Prevalent Wi-Fi networks have adopted various protections to prevent eavesdropping caused by the intrinsic shared nature of wireless medium. However, many of them are based on pre-shared secret incurring key management costs, and are still vulnerable from practical countermeasures. In this study, we investigate the feasibility of using defensive jamming technique to protect enterprise Wi-Fi networks from potential eavesdroppers. This non-cryptographic approach requires neither any pre-shared key or high deployment costs. Defensive jammers geographically confine the wireless coverage of Wi-Fi access point, and thus block the message reception outside an arbitrary boundary at a physical layer. We provide a theoretical model fine tuning the jamming parameters for jammer placement. We then discuss practical considerations including optimized jammer arrangement algorithms, interference countermeasures to legitimate communications, and countermeasures against advanced attackers.

KW - Defensive jamming

KW - Eavesdropping

KW - Wi-Fi networks

UR - http://www.scopus.com/inward/record.url?scp=84945447530&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84945447530&partnerID=8YFLogxK

U2 - 10.1007/s11276-015-0935-y

DO - 10.1007/s11276-015-0935-y

M3 - Article

AN - SCOPUS:84945447530

VL - 21

SP - 2631

EP - 2647

JO - Wireless Networks

JF - Wireless Networks

SN - 1022-0038

IS - 8

ER -