SlideShare a Scribd company logo
CONCEPTS OF JAMMING



                   AJAL.A.J
           Assistant Professor –Dept of ECE,
Federal Institute of Science And Technology (FISAT)   TM

               MAIL: ec2reach@gmail.com
Bats are jammed by moths
        •Echolocation: by emitting high-pitched
        sounds and listening to the echoes, the
        microbats locate nearby objects.
        •A few moths have exploited the bat's
        senses:
            •In one group (the tiger moths), the
            moths produce ultrasonic signals to warn
            the bats that the moths are chemically-
            protected (aposematism);
            •In the other group (Noctuidae) the moths
            have a type of hearing organ called a
            tympanum which responds to an incoming
            bat signal by causing the moth's flight
            muscles to twitch erratically, sending the
            moth into random evasive maneuvers.
History of Jamming?
   During World War II a variation of radio jamming was used where ground
    operators would attempt to mislead pilots by false instructions in their own
    language.
   Jamming of foreign radio broadcast stations has often been used in wartime
    to prevent or deter citizens from listening to broadcasts from enemy
    countries.
   Jamming has also occasionally been used by the Governments of Germany
    (during WW2), Cuba, Iran, China, Korea and several Latin American
    countries
   Jamming has also occasionally been attempted by the authorities against
    pirate radio stations including Radio Nova in Ireland and Radio Northsea
    International off the coast of Britain.
   Saddam's government obtained special electronic jamming equipment
    from Russia that was set up around several sites in Iraq. The jammers
    attempted to disrupt the signals sent by U.S. GPS satellites that are
    used to guide joint direct attack munitions, the military's premier
    satellite-guided bombs.
   In 2004, China acquired radio jamming technology and technical
    support from French state-owned company, Thales Group. It is used
    for jamming foreign radio stations broadcasting to China.
“Over the Air”
Threats due to wireless communication

Attacks
  Eavesdropping, jamming, spoofing, “message attacks”
  Sleep deprivation torture


Counter measures
  First attacks are not specific to ad hoc networks, well
     researched in military context:
     frequency hopping, spread spectrum
First Mobile Radio Telephone
1924
(ECM)
Electronic Counter Measure
• Further advances in what became known as
  Electronic warfare were made during the First
  World War, primarily in the fields of Radio
  Direction Finding and signal intelligence. The
  sailing of the Royal Navy’s Home Fleet before the
  Battle of Jutland, for example, was initiated by the
  interception of German transmissions that
  indicated the German High Seas Fleet was
  preparing to leave port. By the end of the war, the
  Royal Navy had an extensive chain of RDF
  stations covering the North Sea.
Dr. Reginald V. Jones
1911 – 1997
-Commissioned in Officer
Training Corps 1928
-PhD in Physics 1934
-Assistant Director of
Scientific intelligence 1939
-Outstanding work in all
aspects of Scientific
Intelligence.
-Professor Emeritus
-“Most Secret War”
published as “The Wizard
War” in United States
HISTORICAL BACKGROUND
•   As Jones figures quite prominently in our story, an introduction is in order.
•   Reginald Victor Jones was born in London in 1911, the son of a career officer in the Grenadier
    Guards. As a boy he built many crystal radios, and in 1928 built a “thermonic valve” radio to
    receive a test transmission from Australia, receiving a QSL card in confirmation. He entered the
    Officer Training Corps and was commissioned in 1928. He received his doctorate in physics in 1934
    at the age of 22. In the 1930s he worked on Infra-Red detection of aircraft, and at the start of the war
    he was appointed Assistant Director of Scientific Intelligence at the British Air Ministry.

•   In addition to his work with the Battle of the Beams, he discovered the tactical and technical details
    of the German radar-controlled night defences, correctly analyzed intelligence on V1 and V2 rockets,
    and conceived of chaff, the most widely used method to jam and deceive radar. In 1946 he was
    appointed Director of Scientific Intelligence, and later Chair of Natural Philosophy at the University
    of Aberdeen. He was described as a superb lecturer, interesting and amusing, and a great practical
    joker. He retired as a professor emeritus in 1981, and passed away in 1997 at age 86.

•   His awards include CBE 1942, CB 1945, US Medal for Merit and the US Medal for Freedom,
    honourary member of the USAF, and he was the 1st foreigner ever to speak in the CIA auditorium. In
    1993 the CIA created an award in his name, and CIA Director James Woolsey described him as a
    “one-man, all source intelligence evaluation, collection and analysis section”. In 1994 he was
    appointed “Companion of Honour”, one of Britain’s highest awards, and it was declared “a national
    scandal” that his wartime work was not honoured with a knighthood. His book Most Secret War was
    published as The Wizard War in the United States.
Electronic Counter Measure
                 (ECM)
• An electronic countermeasure (ECM) is an
  electrical or electronic device designed to trick or
  deceive radar, sonar or other detection systems,
  like infrared (IR) or lasers. It may be used both
  offensively and defensively to deny targeting
  information to an enemy.
Aircraft ECM
Radar ECM
Shipboard ECM


                                 German Luftwaffe Tornado ECR.
"Official“ jamming should more aptly be called Concealment or Masking
Jammer         US$150.00

• A GSM Jammer is a device
  that transmit signal on the
  same frequency at which
  the GSM system operates.
• The jamming is success
  when the mobile phones in
  the area where the jammer
  is located are disabled.
Multiple False Targets


               Real Target
Jamming
                 TGT Freq
True Noise


                   Ideal
                   Jammer



                    Actual Spot
                    Jammer
Noise Jamming

Definition:

  Noise jamming is the deliberate radiation, re-
  radiation, or reflection of electromagnetic
  energy with the purpose of impairing the use
  of electronic devices, equipment, or systems
  being used by the enemy.
Mobile Phone Jamming. What is it?
• Cell phone jamming is
  the use of an
  electronic device to
  prevent the
  transferring of data
  through a wireless
  phone
Is Jamming useful?
• Jammers can be used practically
  anywhere
• Jammers are used primarily where silence
  is necessary or data transfer might be
  destructive
• Jammers are simple to build and use
If you’re a jammer, how would
    you jam the channel?
Jamming attack models
• Constant jammer
  – Always emit random bits of radio signal
• Deceptive jammer
  – Always emit preamble bits
• Random jammer
  – Alternate between sleeping and jamming
    states -> Conserve Energy
• Reactive jammer
  – Transmit signal when jammer senses channel
    activity -> Harder to detect
Signal strength spectral
     discrimination
How do they work?
• Jammers simply overflow
  the frequency used by
  wireless phones with
  radio waves
• Enough interference
  caused by these waves
  will prevent
  communication between
  a wireless phone and a
  base tower
• Some Jammers are small,
  hand-held sized devices
  while others can be very
  large
• Smaller Jammers interfere
  mostly with the wireless
  phones themselves while
  devices with larger radii may
  interfere with the towers
  directly
Some Quick Numbers…
• Wireless phone network ranges generally
  from 800-1900Mhz
• Small Jammers block all communication in
  this range for a 30 ft radius
• Commercial size Jammers can block all
  communication for 5 miles

Disgruntled
 Contractor



                Rogue Radio
                                PLC   PLC
                              Plant
• Originally much of the technology associated with jamming was
  developed for military purposes
• A huge part of security in the military is data security; Jamming
  communications signals locally can prevent the loss of data




• Some Law Enforcement agencies use Jammers to prevent criminals
  from communicating
• Law Enforcement and Military both use Jammers for preventing
  signals from certain kinds of remote explosive detonation devices
Can I have one?
• Of course not (legally)! Jammers are highly illegal to
  civilians in the US
• Worldwide they are used in Libraries, Banks, Prisons,
  Hospitals, Churches, Movie theaters, and other places
  where locals or govt. have deemed wireless phone use
  more of a problem than a plus
Jam Proof Microwave link
Jamming of the Digital Microwave link

                                                             OFDM based WiFi / WiMAX links and
                                                             Proprietary ( QAM, QPSK ) links are
                                                             extremely vulnerable
                                                             These links are not designed for anti
                                                             Jamming. Simple Transmitters in the same
                                                             frequency can break the links easily
                                                             High level of vulnerability to the signal
                                                             jamming threat


                                                             Needs a Jam Proof back up link for
                                                             withstanding a jamming threat




     A Jamming attack could be conducted from the land or from the sea by using directional
     antennas
     Jamming attack from a moving platform ( Car or a boat ) is almost impossible to locate


     A land based low power jamming source ( in 10s of Watts) with a directional antenna can bring
     down the land based Radio terminal easily.
     The commercially available modems employing QAM, OFDM or similar techniques are highly
     vulnerable to signal jamming. Even a low level of jamming is able to break the link completely.
•Jamming the Troposcater & VHF links




 Troposcater links are highly vulnerable
 VHF, HFIP , Troposcater links are not designed to withstand interference
 Low power jammers can bring down these links
Wireless jamming
● blocking of the wireless channel due to interference,
  noise or collision at the receiver side




                                XX
                                XX

                                        wireless nodes




                                                         38
Jamming Attacks
                    Wireless Networks
• Definitions and Characteristics

   – A jammer is an entity who is purposefully trying to interfere
     with the physical transmission and reception of wireless
     communications


   – A jammer continuously emits RF signals to fill a wireless
     channel so that legitimate traffic will be completely blocked


   – Common characteristics for all jamming attacks is that their
     communications are not compliant with MAC protocols
Jamming Attacks
                 Wireless Networks
• Jamming Attack Models

  –   Constant Jammer
  –   Deceptive Jammer
  –   Random Jammer
  –   Reactive Jammer
Jammer Attack Models
                                              &F*(SDJFFD(*MC*(^%&^*&(%*)(*)_*^&*FS…….




   Constant jammer:
       Continuously emits a radio signal
                   Preamble       CRC


                        Payload         Payload     Payload    Payload     Payload      …




   Deceptive jammer:
     Constantly injects regular packets to the channel without any gap
      between consecutive packet transmissions
     A normal communicator will be deceived into the receive state
Jammer Attack Models
                                           &F*(SDJF       ^F&*D(       D*KC*I^   …



    Random jammer:
          Alternates between sleeping and jamming
                Sleeping period: turn off the radio
                Jamming period: either a constant jammer or deceptive jammer
       Underling              Payload          Payload       Payload
     normal traffic
                             &F*(SDJ           ^%^*&        CD*(&FG         …




    Reactive jammer:
        Stays quiet when the channel is idle, starts transmitting a
         radio signal as soon as it senses activity on the channel.
        Targets the reception of a message

More Related Content

What's hot

Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
Alok Gupta
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
Venky Venkatesh
 
How mobile phone jammer works
How mobile phone jammer worksHow mobile phone jammer works
How mobile phone jammer works
elprocus
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
Abhishek Gupta
 
Mobile jammer
Mobile jammer Mobile jammer
Mobile jammer
Farhanullah khan
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
Ronson Calvin Fernandes
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
Aditya Kumar Tripathy
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
kishan alagiya
 
Mobile phone jammers
Mobile phone jammersMobile phone jammers
Mobile phone jammers
Taruni Kancharla
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
Deepak Bhojwani
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
akash roy
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Komal Srivastava
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
Professional Packers & Movers Pvt. Ltd.
 
MOBILE JAMMER
MOBILE JAMMERMOBILE JAMMER
MOBILE JAMMER
Sujit George
 
Mobile Jammer
Mobile JammerMobile Jammer
Mobile Jammer
Sudhanshu kumar Sah
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Chandu Pawar
 
Cell Phone Jammer , Intro
Cell Phone Jammer , IntroCell Phone Jammer , Intro
Cell Phone Jammer , Intro
Lakshman Basnet
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
Sameer Gupta
 
Mobile jamming
Mobile jammingMobile jamming
Mobile jamming
PREMKUMAR
 

What's hot (20)

Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
 
How mobile phone jammer works
How mobile phone jammer worksHow mobile phone jammer works
How mobile phone jammer works
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Mobile jammer
Mobile jammer Mobile jammer
Mobile jammer
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Mobile phone jammers
Mobile phone jammersMobile phone jammers
Mobile phone jammers
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Mobile Jammer ppt
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
 
MOBILE JAMMER
MOBILE JAMMERMOBILE JAMMER
MOBILE JAMMER
 
Mobile Jammer
Mobile JammerMobile Jammer
Mobile Jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Cell Phone Jammer , Intro
Cell Phone Jammer , IntroCell Phone Jammer , Intro
Cell Phone Jammer , Intro
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
 
Mobile jamming
Mobile jammingMobile jamming
Mobile jamming
 

Viewers also liked

Wireless hacking - http://ouo.io/Mqc8L5
Wireless hacking - http://ouo.io/Mqc8L5Wireless hacking - http://ouo.io/Mqc8L5
Wireless hacking - http://ouo.io/Mqc8L5
phanleson
 
3 packet-hiding methods for preventing selective
3   packet-hiding methods for preventing selective3   packet-hiding methods for preventing selective
3 packet-hiding methods for preventing selective
11W91D5809
 
Caffe Latte Attack
Caffe Latte AttackCaffe Latte Attack
Caffe Latte Attack
AirTight Networks
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Preventing jamming attack by combining cryptography
Preventing jamming attack by combining cryptographyPreventing jamming attack by combining cryptography
Preventing jamming attack by combining cryptography
Rumana Firdose
 
Ppt
PptPpt
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming AttacksPacket-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
Swapnil Salunke
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
Shaik Irfan
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its types
Vishal Tandel
 
Honeypot
HoneypotHoneypot
Honeypot
Akhil Sahajan
 
Honeypot
Honeypot Honeypot
Honeypot
Sushan Sharma
 
spread spectrum technique
 spread spectrum technique spread spectrum technique
spread spectrum technique
Tauseef khan
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
Mehdi Poustchi Amin
 
Honeypots
HoneypotsHoneypots
Honeypots
Jayant Gandhi
 
Dynamic Beamforming Optimization for Anti-Jamming and Hardware Fault Recovery
Dynamic Beamforming Optimization for Anti-Jamming and Hardware Fault RecoveryDynamic Beamforming Optimization for Anti-Jamming and Hardware Fault Recovery
Dynamic Beamforming Optimization for Anti-Jamming and Hardware Fault Recovery
Jonathan Becker
 

Viewers also liked (15)

Wireless hacking - http://ouo.io/Mqc8L5
Wireless hacking - http://ouo.io/Mqc8L5Wireless hacking - http://ouo.io/Mqc8L5
Wireless hacking - http://ouo.io/Mqc8L5
 
3 packet-hiding methods for preventing selective
3   packet-hiding methods for preventing selective3   packet-hiding methods for preventing selective
3 packet-hiding methods for preventing selective
 
Caffe Latte Attack
Caffe Latte AttackCaffe Latte Attack
Caffe Latte Attack
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Preventing jamming attack by combining cryptography
Preventing jamming attack by combining cryptographyPreventing jamming attack by combining cryptography
Preventing jamming attack by combining cryptography
 
Ppt
PptPpt
Ppt
 
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming AttacksPacket-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its types
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypot
Honeypot Honeypot
Honeypot
 
spread spectrum technique
 spread spectrum technique spread spectrum technique
spread spectrum technique
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Dynamic Beamforming Optimization for Anti-Jamming and Hardware Fault Recovery
Dynamic Beamforming Optimization for Anti-Jamming and Hardware Fault RecoveryDynamic Beamforming Optimization for Anti-Jamming and Hardware Fault Recovery
Dynamic Beamforming Optimization for Anti-Jamming and Hardware Fault Recovery
 

Similar to AJAL JAMMING

Wiretapping, wireless jamming.pptx
Wiretapping, wireless jamming.pptxWiretapping, wireless jamming.pptx
Wiretapping, wireless jamming.pptx
dawitTerefe5
 
Cell phone jammers
Cell phone jammersCell phone jammers
Cell phone jammers
Saumya Ranjan Behura
 
electronic warfare.pptx
electronic warfare.pptxelectronic warfare.pptx
electronic warfare.pptx
AnuragRPYadav
 
Mobile Jammerr
Mobile JammerrMobile Jammerr
Mobile Jammerr
Swarna Gautam
 
Jam proofong
Jam proofongJam proofong
Jam proofong
kangibhai
 
Spread spectrum
Spread spectrum Spread spectrum
Spread spectrum
Vikram Jaiswal
 
They Can Hear Your Heartbeats
They Can Hear Your HeartbeatsThey Can Hear Your Heartbeats
They Can Hear Your Heartbeats
Jacob Blake
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Avay Minni
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networks
ijtsrd
 
Mobile Jammers
Mobile JammersMobile Jammers
Mobile Jammers
RamaBoya2
 
Emission Security
Emission SecurityEmission Security
Emission Security
abe8512000
 
Emission security- Tempest Attacks
Emission security- Tempest AttacksEmission security- Tempest Attacks
Emission security- Tempest Attacks
abe8512000
 
Emission security-tempest attacks
Emission security-tempest attacksEmission security-tempest attacks
Emission security-tempest attacks
abe8512000
 
Mobile jammer report
Mobile jammer reportMobile jammer report
Mobile jammer report
Amit sundaray
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Cellphone Jammer
Cellphone JammerCellphone Jammer
Cellphone Jammer
Ronson Fernandes
 
Radiations from mobile
Radiations from mobileRadiations from mobile
Radiations from mobile
SyedaQandeel
 
Negative Use of Mobile
Negative Use of Mobile Negative Use of Mobile
Negative Use of Mobile
Umar4jalil
 
Broadband Jammer
Broadband JammerBroadband Jammer
Broadband Jammer
Firoze Hussain
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
Manikandan Jeeva
 

Similar to AJAL JAMMING (20)

Wiretapping, wireless jamming.pptx
Wiretapping, wireless jamming.pptxWiretapping, wireless jamming.pptx
Wiretapping, wireless jamming.pptx
 
Cell phone jammers
Cell phone jammersCell phone jammers
Cell phone jammers
 
electronic warfare.pptx
electronic warfare.pptxelectronic warfare.pptx
electronic warfare.pptx
 
Mobile Jammerr
Mobile JammerrMobile Jammerr
Mobile Jammerr
 
Jam proofong
Jam proofongJam proofong
Jam proofong
 
Spread spectrum
Spread spectrum Spread spectrum
Spread spectrum
 
They Can Hear Your Heartbeats
They Can Hear Your HeartbeatsThey Can Hear Your Heartbeats
They Can Hear Your Heartbeats
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networks
 
Mobile Jammers
Mobile JammersMobile Jammers
Mobile Jammers
 
Emission Security
Emission SecurityEmission Security
Emission Security
 
Emission security- Tempest Attacks
Emission security- Tempest AttacksEmission security- Tempest Attacks
Emission security- Tempest Attacks
 
Emission security-tempest attacks
Emission security-tempest attacksEmission security-tempest attacks
Emission security-tempest attacks
 
Mobile jammer report
Mobile jammer reportMobile jammer report
Mobile jammer report
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Cellphone Jammer
Cellphone JammerCellphone Jammer
Cellphone Jammer
 
Radiations from mobile
Radiations from mobileRadiations from mobile
Radiations from mobile
 
Negative Use of Mobile
Negative Use of Mobile Negative Use of Mobile
Negative Use of Mobile
 
Broadband Jammer
Broadband JammerBroadband Jammer
Broadband Jammer
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
 

More from AJAL A J

KEAM KERALA ENTRANCE EXAM
KEAM KERALA ENTRANCE EXAMKEAM KERALA ENTRANCE EXAM
KEAM KERALA ENTRANCE EXAM
AJAL A J
 
Paleontology Career
Paleontology  CareerPaleontology  Career
Paleontology Career
AJAL A J
 
CHEMISTRY basic concepts of chemistry
CHEMISTRY  basic concepts of chemistryCHEMISTRY  basic concepts of chemistry
CHEMISTRY basic concepts of chemistry
AJAL A J
 
Ecology
EcologyEcology
Ecology
AJAL A J
 
Biogeochemical cycles
Biogeochemical cyclesBiogeochemical cycles
Biogeochemical cycles
AJAL A J
 
ac dc bridges
ac dc bridgesac dc bridges
ac dc bridges
AJAL A J
 
Hays bridge schering bridge wien bridge
Hays bridge  schering bridge  wien bridgeHays bridge  schering bridge  wien bridge
Hays bridge schering bridge wien bridge
AJAL A J
 
App Naming Tip
App Naming TipApp Naming Tip
App Naming Tip
AJAL A J
 
flora and fauna of himachal pradesh and kerala
flora and fauna of himachal pradesh and keralaflora and fauna of himachal pradesh and kerala
flora and fauna of himachal pradesh and kerala
AJAL A J
 
B.Sc Cardiovascular Technology(CVT)
 B.Sc Cardiovascular Technology(CVT)  B.Sc Cardiovascular Technology(CVT)
B.Sc Cardiovascular Technology(CVT)
AJAL A J
 
11 business strategies to make profit
11 business strategies to make profit 11 business strategies to make profit
11 business strategies to make profit
AJAL A J
 
PCOS Polycystic Ovary Syndrome
PCOS  Polycystic Ovary SyndromePCOS  Polycystic Ovary Syndrome
PCOS Polycystic Ovary Syndrome
AJAL A J
 
Courses and Career Options after Class 12 in Humanities
Courses and Career Options after Class 12 in HumanitiesCourses and Career Options after Class 12 in Humanities
Courses and Career Options after Class 12 in Humanities
AJAL A J
 
MANAGEMENT Stories
 MANAGEMENT Stories MANAGEMENT Stories
MANAGEMENT Stories
AJAL A J
 
NEET PREPRATION TIPS AND STRATEGY
NEET PREPRATION TIPS AND STRATEGYNEET PREPRATION TIPS AND STRATEGY
NEET PREPRATION TIPS AND STRATEGY
AJAL A J
 
REVOLUTIONS IN AGRICULTURE
REVOLUTIONS IN AGRICULTUREREVOLUTIONS IN AGRICULTURE
REVOLUTIONS IN AGRICULTURE
AJAL A J
 
NRI QUOTA IN NIT'S
NRI QUOTA IN NIT'S NRI QUOTA IN NIT'S
NRI QUOTA IN NIT'S
AJAL A J
 
Subjects to study if you want to work for a charity
Subjects to study if you want to work for a charitySubjects to study if you want to work for a charity
Subjects to study if you want to work for a charity
AJAL A J
 
IIT JEE A KERALA PERSPECTIVE
IIT JEE A KERALA PERSPECTIVE IIT JEE A KERALA PERSPECTIVE
IIT JEE A KERALA PERSPECTIVE
AJAL A J
 
Clat 2020 exam COMPLETE DETAILS
Clat 2020 exam COMPLETE DETAILSClat 2020 exam COMPLETE DETAILS
Clat 2020 exam COMPLETE DETAILS
AJAL A J
 

More from AJAL A J (20)

KEAM KERALA ENTRANCE EXAM
KEAM KERALA ENTRANCE EXAMKEAM KERALA ENTRANCE EXAM
KEAM KERALA ENTRANCE EXAM
 
Paleontology Career
Paleontology  CareerPaleontology  Career
Paleontology Career
 
CHEMISTRY basic concepts of chemistry
CHEMISTRY  basic concepts of chemistryCHEMISTRY  basic concepts of chemistry
CHEMISTRY basic concepts of chemistry
 
Ecology
EcologyEcology
Ecology
 
Biogeochemical cycles
Biogeochemical cyclesBiogeochemical cycles
Biogeochemical cycles
 
ac dc bridges
ac dc bridgesac dc bridges
ac dc bridges
 
Hays bridge schering bridge wien bridge
Hays bridge  schering bridge  wien bridgeHays bridge  schering bridge  wien bridge
Hays bridge schering bridge wien bridge
 
App Naming Tip
App Naming TipApp Naming Tip
App Naming Tip
 
flora and fauna of himachal pradesh and kerala
flora and fauna of himachal pradesh and keralaflora and fauna of himachal pradesh and kerala
flora and fauna of himachal pradesh and kerala
 
B.Sc Cardiovascular Technology(CVT)
 B.Sc Cardiovascular Technology(CVT)  B.Sc Cardiovascular Technology(CVT)
B.Sc Cardiovascular Technology(CVT)
 
11 business strategies to make profit
11 business strategies to make profit 11 business strategies to make profit
11 business strategies to make profit
 
PCOS Polycystic Ovary Syndrome
PCOS  Polycystic Ovary SyndromePCOS  Polycystic Ovary Syndrome
PCOS Polycystic Ovary Syndrome
 
Courses and Career Options after Class 12 in Humanities
Courses and Career Options after Class 12 in HumanitiesCourses and Career Options after Class 12 in Humanities
Courses and Career Options after Class 12 in Humanities
 
MANAGEMENT Stories
 MANAGEMENT Stories MANAGEMENT Stories
MANAGEMENT Stories
 
NEET PREPRATION TIPS AND STRATEGY
NEET PREPRATION TIPS AND STRATEGYNEET PREPRATION TIPS AND STRATEGY
NEET PREPRATION TIPS AND STRATEGY
 
REVOLUTIONS IN AGRICULTURE
REVOLUTIONS IN AGRICULTUREREVOLUTIONS IN AGRICULTURE
REVOLUTIONS IN AGRICULTURE
 
NRI QUOTA IN NIT'S
NRI QUOTA IN NIT'S NRI QUOTA IN NIT'S
NRI QUOTA IN NIT'S
 
Subjects to study if you want to work for a charity
Subjects to study if you want to work for a charitySubjects to study if you want to work for a charity
Subjects to study if you want to work for a charity
 
IIT JEE A KERALA PERSPECTIVE
IIT JEE A KERALA PERSPECTIVE IIT JEE A KERALA PERSPECTIVE
IIT JEE A KERALA PERSPECTIVE
 
Clat 2020 exam COMPLETE DETAILS
Clat 2020 exam COMPLETE DETAILSClat 2020 exam COMPLETE DETAILS
Clat 2020 exam COMPLETE DETAILS
 

Recently uploaded

Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
Norma Mushkat Gaffin
 
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Operational Excellence Consulting
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
bosssp10
 
The Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb PlatformThe Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb Platform
SabaaSudozai
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
Operational Excellence Consulting
 
Structural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for BuildingsStructural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for Buildings
Chandresh Chudasama
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
jeffkluth1
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Kalyan Satta Matka Guessing Matka Result Main Bazar chart
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
AnnySerafinaLove
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Neil Horowitz
 
Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
Alexandra Fulford
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
How to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM SoftwareHow to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM Software
SalesTown
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
CA Dr. Prithvi Ranjan Parhi
 
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
APCO
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
taqyea
 

Recently uploaded (20)

Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
 
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
 
The Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb PlatformThe Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb Platform
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
 
Structural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for BuildingsStructural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for Buildings
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
 
Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
How to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM SoftwareHow to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM Software
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
 
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
 

AJAL JAMMING

  • 1.
  • 2. CONCEPTS OF JAMMING AJAL.A.J Assistant Professor –Dept of ECE, Federal Institute of Science And Technology (FISAT) TM MAIL: ec2reach@gmail.com
  • 3.
  • 4. Bats are jammed by moths •Echolocation: by emitting high-pitched sounds and listening to the echoes, the microbats locate nearby objects. •A few moths have exploited the bat's senses: •In one group (the tiger moths), the moths produce ultrasonic signals to warn the bats that the moths are chemically- protected (aposematism); •In the other group (Noctuidae) the moths have a type of hearing organ called a tympanum which responds to an incoming bat signal by causing the moth's flight muscles to twitch erratically, sending the moth into random evasive maneuvers.
  • 5. History of Jamming?  During World War II a variation of radio jamming was used where ground operators would attempt to mislead pilots by false instructions in their own language.  Jamming of foreign radio broadcast stations has often been used in wartime to prevent or deter citizens from listening to broadcasts from enemy countries.  Jamming has also occasionally been used by the Governments of Germany (during WW2), Cuba, Iran, China, Korea and several Latin American countries  Jamming has also occasionally been attempted by the authorities against pirate radio stations including Radio Nova in Ireland and Radio Northsea International off the coast of Britain.  Saddam's government obtained special electronic jamming equipment from Russia that was set up around several sites in Iraq. The jammers attempted to disrupt the signals sent by U.S. GPS satellites that are used to guide joint direct attack munitions, the military's premier satellite-guided bombs.  In 2004, China acquired radio jamming technology and technical support from French state-owned company, Thales Group. It is used for jamming foreign radio stations broadcasting to China.
  • 6. “Over the Air” Threats due to wireless communication Attacks Eavesdropping, jamming, spoofing, “message attacks” Sleep deprivation torture Counter measures First attacks are not specific to ad hoc networks, well researched in military context: frequency hopping, spread spectrum
  • 7. First Mobile Radio Telephone 1924
  • 9.
  • 10. • Further advances in what became known as Electronic warfare were made during the First World War, primarily in the fields of Radio Direction Finding and signal intelligence. The sailing of the Royal Navy’s Home Fleet before the Battle of Jutland, for example, was initiated by the interception of German transmissions that indicated the German High Seas Fleet was preparing to leave port. By the end of the war, the Royal Navy had an extensive chain of RDF stations covering the North Sea.
  • 11. Dr. Reginald V. Jones 1911 – 1997 -Commissioned in Officer Training Corps 1928 -PhD in Physics 1934 -Assistant Director of Scientific intelligence 1939 -Outstanding work in all aspects of Scientific Intelligence. -Professor Emeritus -“Most Secret War” published as “The Wizard War” in United States
  • 12. HISTORICAL BACKGROUND • As Jones figures quite prominently in our story, an introduction is in order. • Reginald Victor Jones was born in London in 1911, the son of a career officer in the Grenadier Guards. As a boy he built many crystal radios, and in 1928 built a “thermonic valve” radio to receive a test transmission from Australia, receiving a QSL card in confirmation. He entered the Officer Training Corps and was commissioned in 1928. He received his doctorate in physics in 1934 at the age of 22. In the 1930s he worked on Infra-Red detection of aircraft, and at the start of the war he was appointed Assistant Director of Scientific Intelligence at the British Air Ministry. • In addition to his work with the Battle of the Beams, he discovered the tactical and technical details of the German radar-controlled night defences, correctly analyzed intelligence on V1 and V2 rockets, and conceived of chaff, the most widely used method to jam and deceive radar. In 1946 he was appointed Director of Scientific Intelligence, and later Chair of Natural Philosophy at the University of Aberdeen. He was described as a superb lecturer, interesting and amusing, and a great practical joker. He retired as a professor emeritus in 1981, and passed away in 1997 at age 86. • His awards include CBE 1942, CB 1945, US Medal for Merit and the US Medal for Freedom, honourary member of the USAF, and he was the 1st foreigner ever to speak in the CIA auditorium. In 1993 the CIA created an award in his name, and CIA Director James Woolsey described him as a “one-man, all source intelligence evaluation, collection and analysis section”. In 1994 he was appointed “Companion of Honour”, one of Britain’s highest awards, and it was declared “a national scandal” that his wartime work was not honoured with a knighthood. His book Most Secret War was published as The Wizard War in the United States.
  • 13.
  • 14. Electronic Counter Measure (ECM) • An electronic countermeasure (ECM) is an electrical or electronic device designed to trick or deceive radar, sonar or other detection systems, like infrared (IR) or lasers. It may be used both offensively and defensively to deny targeting information to an enemy. Aircraft ECM Radar ECM Shipboard ECM German Luftwaffe Tornado ECR.
  • 15. "Official“ jamming should more aptly be called Concealment or Masking
  • 16. Jammer US$150.00 • A GSM Jammer is a device that transmit signal on the same frequency at which the GSM system operates. • The jamming is success when the mobile phones in the area where the jammer is located are disabled.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Multiple False Targets Real Target
  • 22. Jamming TGT Freq True Noise Ideal Jammer Actual Spot Jammer
  • 23. Noise Jamming Definition: Noise jamming is the deliberate radiation, re- radiation, or reflection of electromagnetic energy with the purpose of impairing the use of electronic devices, equipment, or systems being used by the enemy.
  • 24. Mobile Phone Jamming. What is it? • Cell phone jamming is the use of an electronic device to prevent the transferring of data through a wireless phone
  • 25. Is Jamming useful? • Jammers can be used practically anywhere • Jammers are used primarily where silence is necessary or data transfer might be destructive • Jammers are simple to build and use
  • 26. If you’re a jammer, how would you jam the channel?
  • 27. Jamming attack models • Constant jammer – Always emit random bits of radio signal • Deceptive jammer – Always emit preamble bits • Random jammer – Alternate between sleeping and jamming states -> Conserve Energy • Reactive jammer – Transmit signal when jammer senses channel activity -> Harder to detect
  • 28. Signal strength spectral discrimination
  • 29. How do they work? • Jammers simply overflow the frequency used by wireless phones with radio waves • Enough interference caused by these waves will prevent communication between a wireless phone and a base tower
  • 30. • Some Jammers are small, hand-held sized devices while others can be very large • Smaller Jammers interfere mostly with the wireless phones themselves while devices with larger radii may interfere with the towers directly
  • 31. Some Quick Numbers… • Wireless phone network ranges generally from 800-1900Mhz • Small Jammers block all communication in this range for a 30 ft radius • Commercial size Jammers can block all communication for 5 miles Disgruntled Contractor Rogue Radio PLC PLC Plant
  • 32. • Originally much of the technology associated with jamming was developed for military purposes • A huge part of security in the military is data security; Jamming communications signals locally can prevent the loss of data • Some Law Enforcement agencies use Jammers to prevent criminals from communicating • Law Enforcement and Military both use Jammers for preventing signals from certain kinds of remote explosive detonation devices
  • 33. Can I have one? • Of course not (legally)! Jammers are highly illegal to civilians in the US • Worldwide they are used in Libraries, Banks, Prisons, Hospitals, Churches, Movie theaters, and other places where locals or govt. have deemed wireless phone use more of a problem than a plus
  • 34.
  • 36. Jamming of the Digital Microwave link OFDM based WiFi / WiMAX links and Proprietary ( QAM, QPSK ) links are extremely vulnerable These links are not designed for anti Jamming. Simple Transmitters in the same frequency can break the links easily High level of vulnerability to the signal jamming threat Needs a Jam Proof back up link for withstanding a jamming threat A Jamming attack could be conducted from the land or from the sea by using directional antennas Jamming attack from a moving platform ( Car or a boat ) is almost impossible to locate A land based low power jamming source ( in 10s of Watts) with a directional antenna can bring down the land based Radio terminal easily. The commercially available modems employing QAM, OFDM or similar techniques are highly vulnerable to signal jamming. Even a low level of jamming is able to break the link completely.
  • 37. •Jamming the Troposcater & VHF links Troposcater links are highly vulnerable VHF, HFIP , Troposcater links are not designed to withstand interference Low power jammers can bring down these links
  • 38. Wireless jamming ● blocking of the wireless channel due to interference, noise or collision at the receiver side XX XX wireless nodes 38
  • 39. Jamming Attacks Wireless Networks • Definitions and Characteristics – A jammer is an entity who is purposefully trying to interfere with the physical transmission and reception of wireless communications – A jammer continuously emits RF signals to fill a wireless channel so that legitimate traffic will be completely blocked – Common characteristics for all jamming attacks is that their communications are not compliant with MAC protocols
  • 40. Jamming Attacks Wireless Networks • Jamming Attack Models – Constant Jammer – Deceptive Jammer – Random Jammer – Reactive Jammer
  • 41. Jammer Attack Models &F*(SDJFFD(*MC*(^%&^*&(%*)(*)_*^&*FS…….  Constant jammer:  Continuously emits a radio signal Preamble CRC Payload Payload Payload Payload Payload …  Deceptive jammer:  Constantly injects regular packets to the channel without any gap between consecutive packet transmissions  A normal communicator will be deceived into the receive state
  • 42. Jammer Attack Models &F*(SDJF ^F&*D( D*KC*I^ …  Random jammer:  Alternates between sleeping and jamming  Sleeping period: turn off the radio  Jamming period: either a constant jammer or deceptive jammer Underling Payload Payload Payload normal traffic &F*(SDJ ^%^*& CD*(&FG …  Reactive jammer:  Stays quiet when the channel is idle, starts transmitting a radio signal as soon as it senses activity on the channel.  Targets the reception of a message
  • 44. Jamming Attacks Wireless Networks • Constant Jammer – Continuously emits a radio signal – Sends out random bits to the channel – Does not follow any MAC layer etiquette – Does not wait for the channel to become idle
  • 45. Jamming Attacks Wireless Networks • Deceptive Jammer – Constantly injects regular packets to the channel – Normal nodes will be deceived by the packets – Normal nodes just check the preamble and remain silent – Jammer can only send out preambles
  • 46. Jamming Attacks Wireless Networks • Random Jammer – Alternates between sleeping and jamming – After jamming for tj units of time, it turns off its radio and enters sleeping mode – After sleeping for ts units of time, it wakes up and resumes jamming (constant or deceptive) – tj and ts may be random or fixed intervals-energy conservation
  • 47. Jamming Attacks Wireless Networks • Reactive Jammer – Jammer stays quiet when the channel is idle – Jammer starts transmitting a radio signal as soon as it senses activity on the channel – Does not conserve energy because the jammer’s radio must be continuously on in order to sense the channel – However, it is harder to detect
  • 48. Jamming Attacks Wireless Networks • Level of Interference – Distance between jammer and nodes – Relative transmission power of the jammer and nodes – MAC protocol employed by the nodes
  • 49. Defend Against Jamming Attacks Wireless Local Area Networks • Wireless Jamming Attacks – RTS Jamming – CTS Jamming • Solution – Cumulative-Sum-based (CUSUM) Detection Method 49
  • 50. Defend Against Jamming Attacks Wireless Local Area Networks • RTS Jamming – Jammer occupies channel by continuously sending RTS frames with large NAV to AP – AP replies with CTS which can be heard by nearby nodes – Neighbor nodes will keep silent for a period of time indicated by NAV – Neighbor nodes can hardly occupy the channel 50
  • 51. Defend Against Jamming Attacks Wireless Local Area Networks
  • 52. Defend Against Jamming Attacks Wireless Local Area Networks • CTS Jamming – Jammer sends CTS frames with spoofed ID which is as same as AP – AP unaware of this behavior • Jammer uses directional antenna • Jammer remains far away from the AP – Neighbor nodes assume AP is busy (hidden node problem) and will remain silent – Neighbor nodes never get a chance to occupy the channel 52
  • 53. Defend Against Jamming Attacks Wireless Local Area Networks • Defending against RTS/CTS attacks – Two separate data windows for RTS & CTS – Size of the window is fixed – Source ID information of the frame is recorded – Source ID of the CTS frame is checked in the CTS window – Source ID also checked in the RTS window – Different score given to each frame using a function – Smallest index gains the highest score 53
  • 54. Defend Against Jamming Attacks Wireless Local Area Networks • CUSUM Method – Sequential Detection Change Point method Mean value of some variable under surveillance will change from negative to positive whenever a change occurs. 54
  • 55. Defend Against Jamming Attacks Wireless Local Area Networks • Channel is nearly fairly shared among nodes • Source ID distribution of CTS / RTS frames is uniform • If a node constantly occupies the channel, uniform distribution will change • CUSUM is applied to detect changes in CTS window • When a change point is detected, corresponding CTS frames are suspicious 55
  • 56. Defend Against Jamming Attacks Wireless Local Area Networks • Conclusion – CUSUM can accurately detect RTS/CTS jamming attacks with little computation and storage cost – Although these attacks cannot totally prevent other nodes from communication, they can seriously degrade the network throughput – These attacks have lower traffic rates than normal jamming attack and are more difficult to detect 56
  • 57. Adversarial physical layer jamming ● a jammer listens to the open medium and broadcasts in the same frequency band as the network – no special hardware required – can lead to significant disruption of communication at low cost for the jammer honest nodes jammer 57
  • 58. Single-hop wireless network ● n reliable honest nodes and one jammer; all nodes within transmission range of each other and of the jammer jammer 58
  • 59. Wireless communication model ● at each time step, a node may decide to transmit a packet (nodes continuously contend to send packets) ● a node may transmit or sense the channel at any time step (half-duplex) ● when sensing the channel a node v may – sense an idle channel – receive a packet – sense a busy channel v 59
  • 60. How would you detect jamming?
  • 61. Measurements to detect jamming attacks – Signal strength • Match jam signals with legitimate signal pattern – Carrier sensing time • Jamming incurs long carrier sensing time (skip) – Packet delivery ratio (PDR) • Jamming incurs lower PDR
  • 62. Attacks at various layers Physical layer: jamming --- – MAC layer: greedy sender and receiver – Network layer: routing attacks – Transport layer: cross layer attacks

Editor's Notes

  1. SomethingRabat Anam Mahmood Rabat Anam Mahmood 9 October 2007