• No results found

WIRELESS JAMMING ATTACKS UNDER DYNAMIC TRAFFIC UNCERTAINTY

N/A
N/A
Protected

Academic year: 2022

Share "WIRELESS JAMMING ATTACKS UNDER DYNAMIC TRAFFIC UNCERTAINTY"

Copied!
7
0
0

Loading.... (view fulltext now)

Full text

(1)

P.Sridhar rajan

, IJRIT 367

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com ISSN 2001-5569

WIRELESS JAMMING ATTACKS UNDER DYNAMIC TRAFFIC UNCERTAINTY

P.Sridhar rajan Mr.G.Sundar.

PG scholar, Dept of VLSI Design, Assistant Professor, Dept.of ECE, Sembodai R.V.Engg. College, Sembodai R.V.Engg. College, sridhar.ece87gmail.com gsundarttp@gmail.com

ABSTRACT

A Wireless jammer is an instrument used to prevent cellular phones from receiving signals from base stations.

When used, the jammer effectively disables cellular phones. These devices can be used in practically any location, but are found primarily in places where a phone call would be particularly disruptive because silence is expected.

Mobile phones are more lately utilized by terrorists for organizing explosions in several locations at a time.

Therefore by, the cell phone jammers are utilized to stop all such situations from becoming out of hand. Envisage a situation where you are essaying to dial 911 and cannot get through because someone has a cell phone jammer with him. Otherwise, you want to call the police to avoid a robbery in your building but the robber has a cell phone jammer with him. So, what could you do in such a dangerous situation? Jamming devices utilized with some thoughts may be much more useful than just a method of enjoyment. To remove these hazards a new efficient type of mobile jammer is proposed using FPGA. In this new design we are going to disable the keypad, MIC, speaker, will be only disabled by using the FPGA & we doing it using a 400MHz frequency which has an public license so there is no need of licensing.

KEYWORDS

Downlink cellular network, cooperative jammer, beam forming, and Physical layer security.

INTRODUCTION

Communication jamming devices were first developed and used by military. This interest comes from the fundamental objective of denying the successful transport of information from the sender (tactical commanders) to the receiver (the army personnel), and vice-versa. Nowadays, mobile (or cell) phones are becoming essential tools in our daily life. Here in India, three main cell phone carriers are available; namely; Zain, Orange, and Umniah The first two use the GSM 900 system, while the third uses the GSM 1800 system. Needless to say, the wide use of mobile phones could create some problems as the sound of ringing becomes annoying or disrupting. This could happen in some places like conference rooms, law courts, libraries, lecture rooms and temples. One way to stop these disrupting ringing is to install a device in such places which will inhibit the use of mobiles, i.e., make them obsolete. Such a device is known as cell phone jammer or "GSM jammer", which is basically some kind of electronic countermeasure device. The technology behind cell phone jamming is very simple. The jamming device broadcasts an RF signal in the frequency range reserved for cell phones that interferes with the cell phone signal, which results in a "no network available" display on the cell phone screen. All phones within the effective radius of the jammer are silenced. It should be mentioned that cell phone jammers are illegal devices in most countries.

According to the Federal Communications Commission (FCC) in the USA: "The manufacture importation, sale or offer for sale, of devices designed to block or jam wireless transmissions is prohibited". However, recently, there has been an increasing demand for portable cell phone jammers. In this project we are going to design the new jammer based on FPGA. In this design we are going to disable the Keypad, Mic and speaker of the mobile phone by using FPGA and doing it using the 433.9 MHz RF signal in jammer unit.

(2)

P.Sridhar rajan

, IJRIT 368

JAMMING TECHNIQUES

There are several ways to jam an RF device. The three most common techniques can be categorized as follows:

1. Spoofing

In this kind of jamming, the device forces the mobile to turn off itself. This type is very difficult to be implemented since the jamming device first detects any mobile phone in a specific area, then the device sends the signal to disable the mobile phone. Some types of this technique can detect if a nearby mobile phone is there and sends a message to tell the user to switch the phone to the silent mode (Intelligent Beacon Disablers).

2. Shielding Attacks

This is known as TEMPEST or EMF shielding. This kind requires closing an area in a faraday cage so that any device inside this cage cannot transmit or receive RF signal from outside of the cage. This area can be as large as buildings, for example.

3. Denial of Service

This technique is referred to DOS. In this technique, the device transmits a noise signal at the same operating frequency of the mobile phone in order to decrease the signal-to-noise ratio (SNR) of the mobile under its minimum value. This kind of jamming technique is the simplest one since the device is always on. Our device is of this type.

4. Proposed Method

In our proposed method we are not going to block any signal, just control the mobile phones inside the jammer unit.

This technique is not suitable for present mobile phones it is designed for future mobile phone applications. The mobile phone should consist of some control unit itself by manufacturing. In mobile jammer unit we are going to transmit 433.9 MHz public frequency by using RF transmitter. Mobile phone inside the jamming unit receives this RF signal using RF receiver present in the mobile and control itself like disable the keypad, Mic and speaker. In this project all of these controlling actions are performed using the compact hardware called FPGA.

The block diagram of proposed unit is as shown in the figure 2.1. It consists of FPGA, mobile control unit, RF receiver all of these are interfaced with mobile phone. The jammer unit consists of RF transmitter for transmitting 433.9 MHz public frequency. In restricted area will have RF Transmitter to inform the mobile about the restriction.

In mobile section RF receiver will get the signal from restricted area. Then the FPGA will block the keypad and specked in the phone through relay. LCD will display the status of mobile phone Once the user go out of the protected area means then the mobile will work in a normal mode.

DESIGN AND IMPLEMENTATION OF MOBILE JAMMER WITH FPGA

The implementation of the proposed mobile jammer unit is as shown in the figure 3.1. It consist of RF section, FPGA and mobile phone.

FPGA

A field-programmable gate array (FPGA) is an integrated circuit designed to be configured by the customer or designer after manufacturing hence "field-programmable". The FPGA configuration is generally specified using a hardware description language (HDL), similar to that used for an application-specific integrated circuit (ASIC) (circuit diagrams were previously used to specify the configuration, as they were for ASICs, but this is increasingly rare). FPGAs can be used to implement any logical function that an ASIC could perform. The ability to update the functionality after shipping, partial re-configuration of the portion of the design and the low non-recurring engineering costs relative to an ASIC design (notwithstanding the generally higher unit cost), offer advantages for many applications. Spartan 3AN FPGA is used for this controlling action.

(3)

P.Sridhar rajan

, IJRIT 369

Fig. 2.1 Block Diagram

Keypad

Sp ea FPGA ker

Mbl cntrl unit

RF Rec eive

Jammer Unit

RF

Trans

mitte

(4)

P.Sridhar rajan

, IJRIT 370

Fig 3.1 Block Diagram

Fig 3.2 Spartan 3AN FPGA Block diagram

(5)

P.Sridhar rajan

, IJRIT 371

ON-CHIP FEATURES

50,000-gate Xilinx Spartan 3AN FPGA in a 144-TQG (XC3S50-4TQG144C)

• 1,584 logic cell equivalents

• 54K-bit block RAMs

• Three 18x18 hardware multipliers

• Two Digital Clock Managers (DCMs)

• Up to 108 user-defined I/O signals.

POWER SUPPLY UNIT

The external power can be AC or DC, with a voltage between (9V, 1A output) at 230V AC input. The SPARTAN3AN board produces +5V using an LM7805 voltage regulator, which provides supply to the peripherals.

Separate On/Off Switch (SW1) for controlling power to the board. There are multiple voltages supplied on the Spartan-3AN Evaluation Kit, 3.3V and 1.2V regulators. Similarly, the 3.3V regulator feeds all the VCCO voltage supply inputs to the FPGA’s I/O banks and powers most of the components on the board. The FPGA configuration interface on the board is powered by 3.3V. Finally, a 1.2V regulator supplies power to the FPGA’s VCCINT voltage inputs, which power the FPGA’s core logic. The board uses three discrete regulators to generate the necessary voltages.

JTAG PROGRAMMER

The FPGASP3 Kit includes a JTAG programming and debugging chain. Pantech JTAG3 low-cost parallel to JTAG cable is included as part of the kit and connects to the JTAG header. DB-25 parallel port connector to 6 pin female header connector. The JTAG cable connect directly to the parallel port of a PC and to a standard 6 pin JTAG programming header in the kit, can program a devices that have a JTAG voltage of 1.8V or greater.

Fig 3.3 JTAG Programmer RF MODULE

Fig 3.4 RF Transmitter

The STT-433 is ideal for remote control applications where low cost and longer range is required. The transmitter operates from a 1.5-12V supply, making it ideal for battery-powered applications. The transmitter employs a SAW- stabilized oscillator, ensuring accurate frequency control for best range performance. Output power and harmonic

(6)

P.Sridhar rajan

, IJRIT 372

emissions are easy to control, making FCC and ETSI compliance easy. The manufacturing-friendly SIP style package and low-cost make the STT-433 suitable for high volume applications.

FEATURES

 433.92 MHz Frequency

 Low Cost

 1.5-12V operation

Fig 3.5 RF Receiver

The STR-433 is ideal for short-range remote control applications where cost is a primary concern. The receiver module requires no external RF components except for the antenna. It generates virtually no emissions, making FCC

(7)

P.Sridhar rajan

, IJRIT 373

and ETSI approvals easy. The super-regenerative design exhibits exceptional sensitivity at a very low cost. The manufacturing-friendly SIP style package and low-cost make the STR-433 suitable for high volume applications.

4. CONCLUSION

This paper proposed the new mobile jammer technique namely co-operative jammer to maintain the silence inside a particular zone (jamming area) with intimation of incoming calls and messages which were not be proceeded to its original functions like voice conversations or data conversations , until the user must get out the jamming area. In future, we can design this control logic circuits such as FPGA blocks, may be made within the mobile phone IC by using System-on-chip technique.

5. REFERENCES

[1] A. D. Wyner, “The wire-tap channel,” The Bell Sys. Tech. J., vol. 54, no. 8, pp. 1355–1387, Oct. 1975.

[2] X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, “Interference assisted secret communication,” to appear in IEEE Trans. Inf. Theory. Preprint available on arXiv:0908.2397, Aug. 2009.

[3] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, June 2008.

[4] A. Khisti and G. Wornell, “Secure transmission with multiple antennas—I: the MISOME wiretap channel,”

IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088–3104, Jul. 2010.

[5] E. A. Jorswieck, “Secrecy capacity of single- and multi-antenna channels with simple helpers,” in Proc. 2010 Int. ITG Conf. on Source and Channel Coding, pp. 1–6.

[6] A. Khisti, A. Tchamkerten, and G. Wornell, “Secure broadcasting over fading channels,” IEEE Trans. Inf.

Theory, vol. 54, no. 6, pp. 1–7, Jun. 2008.

[7] A. Mukherjee and A. L. Swindlehurst, “Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels,” in Proc. 2009 Allerton Conf. on Comm. Control and Comp., pp. 1134–1141.

[8] M. Vzquez, A. Prez-Neira, and M. Lagunas, “Confidential communication in downlink beamforming,” in Proc.

2012 IEEE Workshop on Sign. Proc. Adv. in Wireless Comm., pp. 349–353.

[9] S. Jeong, K. Lee, J. Kang, Y. Baek, and B. Koo, “Cooperative jammer design in cellular network with internal eavesdroppers,” in Proc. 2012 IEEE Mil. Comm. Conf., pp. 1–5.

[10] H. D. Ly, T. Liu, and Y. Liang, “Multiple-input multiple-output Gaussian broadcast channels with common and confidential messages,” IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5477–5487, Nov. 2010.

References

Related documents

LO5 The effect of geographic diversity on economic profiles of a country LO6 Why marketers need to be responsive to the geography of a country LO7 The economic effects

Results: Factors of staff, service and process gained the highest score from the perspective of patients; while price, facilities and promotion scored the lowest among

The projected gains over the years 2000 to 2040 in life and active life expectancies, and expected years of dependency at age 65for males and females, for alternatives I, II, and

This suggests that the greater the difference between the perceived and desired work attributes (quantity, variety, power, responsibility and concentration required), the lower will

The purpose of this article was to review the contemporary literature investigating the definition and occurrence of body temperature abnormalities in addition to their impact

Videographer to our two sample estate testimonials page dedicated agent would need to quite responsive and energy really good morning i thought they not.. Upfront investment as well

(2004) have identified six forms of capital that communities must identify and transform for sustainable development: natural, cultural, human, social, political, and

This paper aimed at assessing the impacts of climate change on the wheat production in the United Kingdom during the two development stages (Grain filling and