Show simple item record

iJam: Jamming Oneself for Secure Wireless Communication

dc.date.accessioned2010-06-07T19:15:07Z
dc.date.accessioned2018-11-26T22:26:19Z
dc.date.available2010-06-07T19:15:07Z
dc.date.available2018-11-26T22:26:19Z
dc.date.issued2010-06-07
dc.identifier.urihttp://hdl.handle.net/1721.1/55650
dc.identifier.urihttp://repository.aust.edu.ng/xmlui/handle/1721.1/55650
dc.description.abstractWireless is inherently less secure than wired networks because of its broadcast nature. Attacks that simply snoop on the wireless medium successfully defeat the security of even 802.11 networks using the most recent security standards (WPA2-PSK). In this paper we ask the following question: Can we prevent this kind of eavesdropping from happening? If so, we can potentially defeat the entire class of attacks that rely on snooping. This paper presents iJam, a PHY-layer protocol for OFDM-based wireless systems. iJam ensures that an eavesdropper cannot successfully demodulate a wireless signal not intended for it. To achieve this iJam strategically introduces interference that prevents an eavesdropper from decoding the data, while allowing the intended receiver to decode it. iJam exploits the properties of 802.11â s OFDM signals to ensure that an eavesdropper cannot even tell which parts of the signal are jammed. We implement iJam and evaluate it in a testbed of GNURadios with an 802.11-like physical layer. We show that iJam makes the data bits at the adversary look random, i.e., the BER becomes close to 50%, whereas the receiver can perfectly decode the data.en_US
dc.format.extent13 p.en_US
dc.subjectPhysical Layer Securityen_US
dc.titleiJam: Jamming Oneself for Secure Wireless Communicationen_US


Files in this item

FilesSizeFormatView
MIT-CSAIL-TR-2010-028.pdf465.0Kbapplication/pdfView/Open

This item appears in the following Collection(s)

Show simple item record