Carving secure Wi-Fi zones with defensive jamming

Yu Seung Kim, Patrick Tague, Heejo Lee, Hyogon Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Abstract

With rampant deployment of wireless technologies such as WLAN, information leakage is increasingly becoming a threat for its serious adopters such as enterprises. Research on antidotes has been mainly focused on logical measures such as authentication protocols and secure channels, but an inside collaborator can readily circumvent such defenses and wire-lessly divert the classified information to a conniver outside. In this paper, we propose a novel approach to the problem that forges a walled wireless coverage, a secure Wi-Fi zone in particular. Inspired by the fact that jamming as an attack is inherently difficult to defeat, we turn the table and use it as a defensive weapon to fend off the covert illegal access from outside. To validate the proposed approach, we conduct extensive outdoor experiments with the IEEE 802.11g Wi-Fi adapters. The measurements show that the forged secure zones match well with the model prediction and that the defensive jamming approach can indeed be used to protect wireless networks against information leakage. Lastly, we propose the algorithms to configure defensive jammers in arbitrary geometry.

Original languageEnglish
Title of host publicationASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security
Pages53-54
Number of pages2
DOIs
Publication statusPublished - 2012 Dec 1
Event7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012 - Seoul, Korea, Republic of
Duration: 2012 May 22012 May 4

Other

Other7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012
CountryKorea, Republic of
CitySeoul
Period12/5/212/5/4

Fingerprint

Wi-Fi
Jamming
Wireless local area networks (WLAN)
Authentication
Wireless networks
Wire
Network protocols
Geometry
Industry
Experiments

Keywords

  • Algorithms
  • Performance
  • Security

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Cite this

Kim, Y. S., Tague, P., Lee, H., & Kim, H. (2012). Carving secure Wi-Fi zones with defensive jamming. In ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security (pp. 53-54) https://doi.org/10.1145/2414456.2414487

Carving secure Wi-Fi zones with defensive jamming. / Kim, Yu Seung; Tague, Patrick; Lee, Heejo; Kim, Hyogon.

ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. 2012. p. 53-54.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, YS, Tague, P, Lee, H & Kim, H 2012, Carving secure Wi-Fi zones with defensive jamming. in ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. pp. 53-54, 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012, Seoul, Korea, Republic of, 12/5/2. https://doi.org/10.1145/2414456.2414487
Kim YS, Tague P, Lee H, Kim H. Carving secure Wi-Fi zones with defensive jamming. In ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. 2012. p. 53-54 https://doi.org/10.1145/2414456.2414487
Kim, Yu Seung ; Tague, Patrick ; Lee, Heejo ; Kim, Hyogon. / Carving secure Wi-Fi zones with defensive jamming. ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. 2012. pp. 53-54
@inproceedings{9b152060f7104d2cb4771464cb19d44c,
title = "Carving secure Wi-Fi zones with defensive jamming",
abstract = "With rampant deployment of wireless technologies such as WLAN, information leakage is increasingly becoming a threat for its serious adopters such as enterprises. Research on antidotes has been mainly focused on logical measures such as authentication protocols and secure channels, but an inside collaborator can readily circumvent such defenses and wire-lessly divert the classified information to a conniver outside. In this paper, we propose a novel approach to the problem that forges a walled wireless coverage, a secure Wi-Fi zone in particular. Inspired by the fact that jamming as an attack is inherently difficult to defeat, we turn the table and use it as a defensive weapon to fend off the covert illegal access from outside. To validate the proposed approach, we conduct extensive outdoor experiments with the IEEE 802.11g Wi-Fi adapters. The measurements show that the forged secure zones match well with the model prediction and that the defensive jamming approach can indeed be used to protect wireless networks against information leakage. Lastly, we propose the algorithms to configure defensive jammers in arbitrary geometry.",
keywords = "Algorithms, Performance, Security",
author = "Kim, {Yu Seung} and Patrick Tague and Heejo Lee and Hyogon Kim",
year = "2012",
month = "12",
day = "1",
doi = "10.1145/2414456.2414487",
language = "English",
isbn = "9781450313032",
pages = "53--54",
booktitle = "ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security",

}

TY - GEN

T1 - Carving secure Wi-Fi zones with defensive jamming

AU - Kim, Yu Seung

AU - Tague, Patrick

AU - Lee, Heejo

AU - Kim, Hyogon

PY - 2012/12/1

Y1 - 2012/12/1

N2 - With rampant deployment of wireless technologies such as WLAN, information leakage is increasingly becoming a threat for its serious adopters such as enterprises. Research on antidotes has been mainly focused on logical measures such as authentication protocols and secure channels, but an inside collaborator can readily circumvent such defenses and wire-lessly divert the classified information to a conniver outside. In this paper, we propose a novel approach to the problem that forges a walled wireless coverage, a secure Wi-Fi zone in particular. Inspired by the fact that jamming as an attack is inherently difficult to defeat, we turn the table and use it as a defensive weapon to fend off the covert illegal access from outside. To validate the proposed approach, we conduct extensive outdoor experiments with the IEEE 802.11g Wi-Fi adapters. The measurements show that the forged secure zones match well with the model prediction and that the defensive jamming approach can indeed be used to protect wireless networks against information leakage. Lastly, we propose the algorithms to configure defensive jammers in arbitrary geometry.

AB - With rampant deployment of wireless technologies such as WLAN, information leakage is increasingly becoming a threat for its serious adopters such as enterprises. Research on antidotes has been mainly focused on logical measures such as authentication protocols and secure channels, but an inside collaborator can readily circumvent such defenses and wire-lessly divert the classified information to a conniver outside. In this paper, we propose a novel approach to the problem that forges a walled wireless coverage, a secure Wi-Fi zone in particular. Inspired by the fact that jamming as an attack is inherently difficult to defeat, we turn the table and use it as a defensive weapon to fend off the covert illegal access from outside. To validate the proposed approach, we conduct extensive outdoor experiments with the IEEE 802.11g Wi-Fi adapters. The measurements show that the forged secure zones match well with the model prediction and that the defensive jamming approach can indeed be used to protect wireless networks against information leakage. Lastly, we propose the algorithms to configure defensive jammers in arbitrary geometry.

KW - Algorithms

KW - Performance

KW - Security

UR - http://www.scopus.com/inward/record.url?scp=84871995561&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84871995561&partnerID=8YFLogxK

U2 - 10.1145/2414456.2414487

DO - 10.1145/2414456.2414487

M3 - Conference contribution

AN - SCOPUS:84871995561

SN - 9781450313032

SP - 53

EP - 54

BT - ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security

ER -