ANTI-JAMMER FOR EMP SIGNALS AKASH R MANNARI, USHA S UG SCHOLAR, PROFESSOR & HOD DEPARTMENT DEPARTMENT OF COMPUTER SCIENCE SCIENCE AND AND ENGINEERING RAJARAJESHWARI RAJARAJESHWARI COLLEGE COLLEGE OF ENGINEERING, ENGINEERING, BENGALURU KARNATAKA, KARNATAKA, INDIA
[email protected] [email protected]
Abstract - Nowadays the imo!ta"t ase#t o$ a" i"di%id&a' is (Net (Netwo! wo!)* )*++ As we a!e a!e 'i%i 'i%i" " i" the the e!a e!a o$ i!e i!e'es 'esss Se"s Se"so! o! Netwo!)s, the ma.o! th!eats wi'' /e its se#&!ity - s&se#ted to e"o!mo&s tyes o$ atta#)s+ These #a" /e #ateo!i0ed i"to ma"y #ateo! #ateo!ies ies 1 2e"ia' 2e"ia' O$ Se! Se!%i#e %i#e atta#) 32OS atta#) atta#)4+ 4+ Si"a' Si"a' Jamme! Jamme! is o"e sh th!eat th!eat whi#h whi#h #a" /e #o"sid #o"side!e e!ed d as 2OS atta#) atta#)++ 5asi# 5asi# $&" $&"#ti #tio" o" o$ this this si"a' si"a' .amme! .amme! is .ammi" .ammi" the 'eitimate "odes at the hysi#a' 'aye! whi#h a!e &sed to !ode si"a's+ This !es&'ts i" de#!ease o$ its "etwo!) e!$o!ma"#e+ As a" a"tidote $o! this Si"a' Jammi" the #o"#et o$ A"ti-Jammi" is /ei" i"t!ode i"t!oded+ d+ 5y this te#h"i6&e te#h"i6&e it #a" /e ass&!ed ass&!ed that the !oe! !oe! si"a' 3"etwo!) si"a'4 is !eai"ed+ !eai"ed+ The A"ti-Jamm A"ti-Jammi" i" de%i#e is /ei" /&i't i" o!de! to dest!oy dest!oy the E'e#t!o-Ma" E'e#t!o-Ma"eti# eti# P&'se P&'se .amme! .amme! si"a's si"a's 3EMP 3EMP Jammi" Jammi" si"a' si"a'4+ 4+ It is &s&a'' &s&a''y y a #ha''e"i" .o/ to $i"d o&t whethe! the!e is a /!ea)dow" i" a "etwo!) o! #!oss #o""e#tio" i" the hysi#a' 'aye! desi"+ A'most a'' the si"a' e"e!ati" de%i#es &se the #ha!ea/'e /atte!y $o! thei! oe!atio"s at whi#h the atte!" #a" /e !edi#ted i"te!%a's i" the #ase o$ EMP Jamme!s+ He"#e, i" this ae!, a" i"st!&me"t is /ei" /ei" i"t!od i"t!ode ed, d, "amed "amed as (A"ti(A"ti-Jam Jamme! me!*+ *+ Fo! the se"so! se"so! "etwo!)s 3EMP .amme!s4 this me#ha"ism is time-sy"#h!o"i0ed a"d modi$ied modi$ied i" sh sh a way that with with hihe! hihe! $!e6&e" $!e6&e"#ies #ies the atte!"s ets deta#hed !es&'ti" i" !oe! wo! )i" o$ the .ammed de%i#e+ Th!o&h a"a'ysis, sim&'atio" sim&'atio" a"d e7e!ime"ta e7e!ime"tatio" tio" this ae! demo"st!ates demo"st!ates that the A"ti-Jamm A"ti-Jamme! e! de%i#e*s de%i#e*s e$$i#ie"#y o$ a"y a"y EMP EMP .amm .amme! e! whi#h whi#h has has the the 'owes 'owestt #e"s #e"so! o!sh shi i-t -too-'i 'i") ") &ti'i0atio" !atio+
II+
RELATE2 ORKS
A+
MO5ILE PHONE JAMMER
+n instru instrume ment nt used used to prev preven entt the the cellu cellular lar phon phones es from from ac0uiring signals through the base station is basically called as mobile phone jammer. *ammers can be used practically in any location for its own use but usually e1ploited in locations where the radio signals of any mobile phones has to be jam:packed. ;asic idea of the jammer is to block the radio signals either to send or receive the signals from mobile or signal towers. his device device acts as the signal obstacle obstacle between between the mobile mobile phone phone signa signall and and the signal signal receiv receiver er tower tower by produ producin cing g more more fre0uency than that of the fre0uency produced by cellular phone. o the highest degree signals utili!es assorted bands to transmit and get into communication from a tower %fre0uency division duple1ing, duple1ing, /<<&. "mall ranged signals signals ranging from =66 M7!: 9366 M7! %for 34& within a purview of >6:?6 foot depending on its fre0uency power capacity.
K!"#r$s- A"ti-Jamme!, EMP Jamme!, i!e'ess "etwo!)i", 2OS atta#), ARM8, RT9 I+
FIGUR FIGURE E :; 5ASI9 5ASI9 PRIN9 PRIN9IPL IPLE E OF JAMMERS
INTRO2U9TION
Initially jamming devices were developed for military purposes. purposes. In addition addition to this, mobile phone is being being used used individ individually ually which which uses Electro Magnetic Magnetic Pulse Pulse signals. signals. here are many many organi!ations like Indian "pace #esearch $rgani!ation %I"#$&, 'uclear Power plant and many other where the mobile phones are are proh prohib ibit ited ed(( henc hencee to avoi avoid d thes thesee they they use use )EMP EMP *+MME#", which is basically the electronic countermeasure device %EM- device&. sually the mobile network transmits a #adio /re0uency signal in the fre0uency range are reserved for particular signals. /or e1ample2 34 network uses the bandwidth range from 566M7! 8 9366M7!. his results in )no network available in the mobile phone display. display. Entire radius radius of the jamming device device 8 the devices devices using these signals will be jammed and silenced. herefore, in this this paper paper,, the +ntido +ntidote te for for the EMP EMP *+MME# *+MME# is being being e1plained. his device jams the jammer and breaks down it. his method method is called called as )+'I:*+ )+'I:*+MME# MME#.. Mentioni Mentioning ng that cell phone jammers are illegal devices in most countries, this report is solely done for educational purposes.
Earlier the EMP jammers were undermanned on working of only mobile phones which used either digital mobile signals or analog signals defined for cellular phones. Parvenu models % like double and triple band jammers & will block wide range of devices just as -
SPOOFING
EMP jammer steamrolls the cellular phones to switch off the signals signals automat automatical ically ly.. his his kind kind of techni0u techni0uee is nasty nasty to be impleme implemented nted,, as the jammers jammers first first instantia instantiate te all the mobile mobile phone signals in that surrounding surrounding rather than selecting the particular signal. "ometimes the cellular phones receive the message message to user indicating to switch the mobile into silent mode. hese are the ethical way of spoofing the jammers.
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
9+
SHIEL2ING SHIEL2IN G ATTA9K ATTA9K
hese are connected to an Ion:Bithium battery for a better performance. performance.
Electr Electrom omag agnet netic ic field field shiel shieldin ding g %EM/ %EM/ shiel shieldin ding& g& or the EMPE" are basically known as the two types of shielding attacks. "hielding attacks re0uires a stoppered stoppered circumference withi within n a farad faraday ay range range so that that the devi device ce gene generat rating ing the electronic signals in this range will not be able to communicate between the the signals. 2+
2ENI 2ENIAL AL OF SER SER
PROPOSE2 S=STEM
+ny disease disease erupte erupted d will will get get an antido antidote te,, for for any probl problem em occurre occurred d the solution solution will be found found out. out. "imilarly "imilarly this paper paper gives gives the solution solution for jammer jammer devices devices used as non ethicals ethicals.. ;asically +'I:*+MME# +'I:*+MME# acts as an antidote for the *+MME# device. Meaning by using the proposed device jams the jammer itself. itself. /irstly /irstly,, the +'I:*+MME +'I:*+MME# # device device uses the reverse reverse engineering concept of the *ammer device. his device creates more fre0uency than that of the fre0uency created by the jammer resulting in breakdown of the signals, and the actual signals are recovered. ;asic idea of this is to shut the capacitors down used in *ammer device, so that it cannot be regained. +nti:*amming techni0ues for all the four types of attacks are e1plained below(
ANTI-JAMMING TE9HNI>UES
FIGURE ; 9ROSS SE9TION OF ANTIJAMMER 9+ +nti:"po +nti:"poofin ofing g technolo technology gy can be used when a cellular cellular signal signal is jammed jammed with taking a more more time to target target the cellular cellular phones and process process it. +ny +ny major major organi! organi!atio ation n having any kinds of threats of getting their devices jammed will be having a building system control at different place. he control system recogni!es the circumference where its bee jammed and this technology technology of +nti:*amming +nti:*amming is brought brought into that circumference circumference and operated in order to recover recover the original original signals. signals. /igure /igure ? justifies justifies the block block diagram of working of the +nti:*ammer. /irstly the power source from the battery will produce re0uired amount the power to the I/:section I/:section to the 93C 93C +ir +ir Ioni!er which which is then sent to the #/:"ection to high voltage convertor.
A+ +nti:*ammer foregathers the jammed signal and crushes the jammer circuit internally internally.. he fre0uency should should range more than 3A66M7! 8 >666M7!. his device uses +ir ioni!er connected to the igniter. +s and when the ignition is more than the fre0uency increases as desired to block the signals. his just blocks the capacitor without any destruction. he transistor and capacitor are connected in series in order to produce higher higher desired desired fre0uency fre0uency..
POWER SUPPLY
12v AIR IONIZE R
HIGH VOLTAGE CONVERTE R
JAMME D SIGNAL S
FIGURE B; FLO 9HART OF ANTIJAMMER FIGURE ?; 9IR9UIT 2IAGRAM OF AIR IONI@ER
2+ In the design , the fre0uency of jamming should be same or more than that of the downlink fre0uency. his is to be done because it needs lower power than the uplink range.
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
GSM CDD
29S :DD
UPLINK 37andset ransmit& =56:59A M7!
2ONLINK 37andset #eceive& 5>A:5D6 M7!
996:9=A M7!
9=6A:9==6 M7!
TA5LE :; OPERATING SIGNAL 5AN2I2THS E+ "ometimes there will be a re0uirement of keypad connected in the device device in order order to select select the signals signals which which to be blocked. blocked. hese are programm programmed ed into the device device if desired. desired.
1
2
3
4
5
7
8
"
!
#
FIGURE ; KE=PA2
I<+ RESULT ANAL=SIS
/igure D shows the hardware design of the mobile jammer with pre: scheduled scheduled time duration. duration. It includes the *ammer, +nti:*ammer, +nti:*ammer, +#M , keypad keypad and relay relay. Fhen Fhen the time schedule schedule arrives arrives in ##- the jammer will be activated with the help of relay and disrupt the communication system. his will be shown in figD.
9ON9LUSION
<+
his paper is successfully completed using Mobile jammer, +nti: *amm *ammer er,, and +#M. +#M. ;y this this syste system, m, we can can deact deactiv ivate ate all the jammed signals at any location. his device can be applied in many places like( like( If the military
A9KNOLE2GEMENT
he author gratefully acknowledges the support of management and
REFEREN9ES G9H www.7ow"tuff www.7ow"tuffFo Fork.com rk.com G3H En.wikipedia.org En.wikipedia.orgwikiMobileJ wikiMobileJphoneJjam phoneJjammer mer IEEE International G>H Multitopic conference3 conference366=.I'MI66=.I'MI- 366=. 366=. IEEE International G?H KLone KLone of silence silence Gcell Gcell phone phone jammerH,K jammerH,K Spectrum, IEEE, vol.42, no.5, 18, May 366A GAH "ami +!!am, +!!am, +hmad +hmad 7ija!i, +li Mahmoudy. Mahmoudy. "mart *ammer for mobile phone systems systems GDH Mobile Mobile Persona Personall -ommun -ommunicat ications ions -ommittee -ommittee of the #adio +dvisory ;oard of -anada, )se of jammer and disabler
FIGURE ; HAR2ARE 2ESIGN
G5H I. /. +kyildi!, +kyildi!, F. "u, . . "ankarasubrama "ankarasubramaniam, niam, E. -ayirci, %3663& K+ survey on sensor sensor networks networksK, K, IEEE -ommun -ommunicati ication. on. Mag., Mag., pp. 963:99?. G96H-ag G96H-agalj alj M( -apkun -apkun "( 7ubau1 7ubau1 *.P( %366& %366& KFor KFormho mhole:;a le:;ase se +ntijamming echni0ues in "ensor 'etworks,K Mobile -omputing, IEEE ransactions on, vol.D, no.9, pp.966:99?. G99H G99H P.'are P.'aresh, sh, P. #aveend #aveendra ra ;abu, ;abu, Q."atyas Q."atyaswath wathi( i(