SlideShare a Scribd company logo
1 of 33
Download to read offline
A
Project Report
On
Cell Phone RF Signal Detector & Jammer
Presented By :
1. Amar Raj (3rb08ec007)
2. Rishu Raj (3rb09ec060)
3. Aman Kumar (3rb09ec100)
4. Ravi Kumar (3rb10ec071)
Under The Guidance Of :
Mr. Dhiraj Deshpande
(Asst. Professor)
Containing
 Introduction
 Jamming Technique
 Design Parameters
 How does It Works
 Hardware Design
 Software Description
 Application
 Advantages
 Disadvantages
 Conclusion
 Introduction
 Jamming Technique
 Design Parameters
 How does It Works
 Hardware Design
 Software Description
 Application
 Advantages
 Disadvantages
 Conclusion
Introduction
 Mobile jammer is used to prevent mobile phones from receiving or
transmitting signals with the base stations.
 Mobile jammers effectively disable mobile phones within the defined
regulated zones.
 As with other radio jamming, mobile jammers block mobile phone use
by sending out radio waves along the same frequencies that mobile
phones use.
 Upon activating mobile jammers, all mobile phones will indicate "NO
NETWORK". Incoming calls are blocked as if the mobile phone were
off.
 When the mobile jammers are turned off, all mobile phones will
automatically re-establish communications and provide full service.
 Mobile jammer is used to prevent mobile phones from receiving or
transmitting signals with the base stations.
 Mobile jammers effectively disable mobile phones within the defined
regulated zones.
 As with other radio jamming, mobile jammers block mobile phone use
by sending out radio waves along the same frequencies that mobile
phones use.
 Upon activating mobile jammers, all mobile phones will indicate "NO
NETWORK". Incoming calls are blocked as if the mobile phone were
off.
 When the mobile jammers are turned off, all mobile phones will
automatically re-establish communications and provide full service.
Jamming Technique
 Spoofing :
In this kind of jamming, the device forces the mobile to turn off
itself.
 Shielding Attacks
This is known as TEMPEST or EMF shielding. This kind requires
closing an area in a faraday cage so that any device inside this
cage can not transmit or receive RF signal from outside of the
cage.
 Denial of Service
A jamming device transmits on the same radiofrequencies as the
cell phone, disrupting the communication between the phone
and the cell-phone base station.
 Spoofing :
In this kind of jamming, the device forces the mobile to turn off
itself.
 Shielding Attacks
This is known as TEMPEST or EMF shielding. This kind requires
closing an area in a faraday cage so that any device inside this
cage can not transmit or receive RF signal from outside of the
cage.
 Denial of Service
A jamming device transmits on the same radiofrequencies as the
cell phone, disrupting the communication between the phone
and the cell-phone base station.
Design Parameters
 The frequency bands
GSM900:
Uplink: 890-915 MHz
Down link: 935-960 MHz
In our Design the frequency must be the same as the downlink because it
needs lower power to do jamming.
The Distance to be jammed(D)
This parameter is very useful in our design since the amount of the output
power of the jammer depends on the area we need to jam.
Our design is established upon D=2.0 m for GSM 900.
 The frequency bands
GSM900:
Uplink: 890-915 MHz
Down link: 935-960 MHz
In our Design the frequency must be the same as the downlink because it
needs lower power to do jamming.
The Distance to be jammed(D)
This parameter is very useful in our design since the amount of the output
power of the jammer depends on the area we need to jam.
Our design is established upon D=2.0 m for GSM 900.
Design Parameters contd.
• For GSM, the specified system SNRmin is 9 dB which will be
used as the worst case scenario for the jammer. The maximum
power at the mobile device Pr is -15 dBm.
• Free space loss {F}
The free-space loss (or path loss) is given by:
Path loss(dB)= 32.44 + 20 log d km + 20 log f(MHz)
The maximum free space loss (worst case F) happens
when the maximum frequency is used in the above equation.
 Using 960 MHz gives:
 F (dB) =32.44+20 log 0.02 + 20 log 960 which gives F =58 dB.
• For GSM, the specified system SNRmin is 9 dB which will be
used as the worst case scenario for the jammer. The maximum
power at the mobile device Pr is -15 dBm.
• Free space loss {F}
The free-space loss (or path loss) is given by:
Path loss(dB)= 32.44 + 20 log d km + 20 log f(MHz)
The maximum free space loss (worst case F) happens
when the maximum frequency is used in the above equation.
 Using 960 MHz gives:
 F (dB) =32.44+20 log 0.02 + 20 log 960 which gives F =58 dB.
Process of Jamming
• Mobile Phone uses RF with a wavelength of 30 cm at 872-2170 MHz.
•Detector convert this RF signal to little current to glow LED or trigger the
buzzer.
•The output of detector goes to microcontroller where analog signal is
converted to digital signal.
•This digital signal is applied to Relay & LCD.
•The relay behave as a switch.
•The output of the Relay behaves as the i/p of the jammer circuit.
•The jammer circuit is activated for 60 sec (user specified).
• Mobile Phone uses RF with a wavelength of 30 cm at 872-2170 MHz.
•Detector convert this RF signal to little current to glow LED or trigger the
buzzer.
•The output of detector goes to microcontroller where analog signal is
converted to digital signal.
•This digital signal is applied to Relay & LCD.
•The relay behave as a switch.
•The output of the Relay behaves as the i/p of the jammer circuit.
•The jammer circuit is activated for 60 sec (user specified).
Hardware Description
Our Project Contains The Following Main Parts :
 Detector
 Relay
 Microcontroller
 Crystal Oscillator
 LCD
 On Chip RTC
 Regulated Power Supply
 Jammer Circuit
Our Project Contains The Following Main Parts :
 Detector
 Relay
 Microcontroller
 Crystal Oscillator
 LCD
 On Chip RTC
 Regulated Power Supply
 Jammer Circuit
Detector
Circuit Diagram Of the Detector
Detector contd.
• Mobile phone uses RF with a wavelength of 30cm at 872 to 2170 MHz.
•Mobile phone transmits the signal in the form of sine wave.
•The signal contains electromagnetic radiation which is picked up by the
receiver in the base station.
•A capacitor is used to detect RF from mobile phone considering that, a
capacitor can store energy even from an outside source and oscillate like
LC circuit.
• Mobile phone uses RF with a wavelength of 30cm at 872 to 2170 MHz.
•Mobile phone transmits the signal in the form of sine wave.
•The signal contains electromagnetic radiation which is picked up by the
receiver in the base station.
•A capacitor is used to detect RF from mobile phone considering that, a
capacitor can store energy even from an outside source and oscillate like
LC circuit.
Relay
A relay is an electrically operated switch. Current
flowing through the coil of the relay creates a magnetic field which
attracts a lever and changes the switch contacts. The coil current
can be on or off so relays have two switch positions and they are
double throw (changeover) switches.
Relay Circuit
Microcontroller
Pin Diagram
Microcontroller contd.
Peripheral Interface Controllers (PIC) is one of the advanced
microcontrollers developed by microchip technologies.
• RISC CPU
• Instruction Set is 35
• Operating Speed : DC-20Mhz clock input
• 200 ns instruction cycle
• 2K*14 words program memory
• 128*8 bytes data memory
• 8 level deep hardware stack
• Voltage Range : 2.0v to 5.5v
• Source or sink current : 25mA
• 8-bit, 5 channel Analog to Digital Converter
Peripheral Interface Controllers (PIC) is one of the advanced
microcontrollers developed by microchip technologies.
• RISC CPU
• Instruction Set is 35
• Operating Speed : DC-20Mhz clock input
• 200 ns instruction cycle
• 2K*14 words program memory
• 128*8 bytes data memory
• 8 level deep hardware stack
• Voltage Range : 2.0v to 5.5v
• Source or sink current : 25mA
• 8-bit, 5 channel Analog to Digital Converter
Crystal Oscillator
Crystal oscillator is made up of quartz crystal
with the desired value of resonant frequency forms
part of the frequency-selective feedback network.
The crystal oscillator speed that can be
connected to the PIC microcontroller range from DC
to 20Mhz.
Crystal oscillator is made up of quartz crystal
with the desired value of resonant frequency forms
part of the frequency-selective feedback network.
The crystal oscillator speed that can be
connected to the PIC microcontroller range from DC
to 20Mhz.
LCD
LCD screen consists of two lines
with 16 characters each. Each
character consists of 5x7dot
matrix.
Pin Details of LCD
LCD screen consists of two lines
with 16 characters each. Each
character consists of 5x7dot
matrix.
On Chip RTC
The real time clock (RTC) is a widely used device that
provides accurate time and date for many applications. The
RTC chip present in the PC provides time components of
hour, minute and second.
The RTC chip uses an internal battery that keeps the
time and date even when the power is off. One of the most
widely used RTC chips is the DS1307 from Dallas
semiconductor.
The real time clock (RTC) is a widely used device that
provides accurate time and date for many applications. The
RTC chip present in the PC provides time components of
hour, minute and second.
The RTC chip uses an internal battery that keeps the
time and date even when the power is off. One of the most
widely used RTC chips is the DS1307 from Dallas
semiconductor.
Jammer
Power Supply IF Section RF Section Jamming
Signal
Circuit Diagram
Power Supply IF Section RF Section Jamming
Signal
Power Supply for Jammer
Transformer Rectification Filter Regulator
Circuit Diagram
Block Diagram
Circuit Diagram
Signal Mixer
Triangular
Wave
Generator
If - Section
To RF
Section
Signal Mixer
To RF
Section
Noise
Generator
Triangular Wave Generator
• The main use of the triangle wave is to sweep the VCO through the desired
frequency range.
• We want to cover the downlink through our VCO, i.e., 935-960 MHz .
• The main use of the triangle wave is to sweep the VCO through the desired
frequency range.
• We want to cover the downlink through our VCO, i.e., 935-960 MHz .
Noise Generator
To achieve jamming a noise signal is mixed with the triangle wave signal
to produce the tuning voltage for the VCO. The noise will help in masking the jamming
transmission, making it look like random "noise” to an outside observer .Without the
noise generator, the jamming signal is just a sweeping, un-modulated Continuous Wave
RF carrier.
To achieve jamming a noise signal is mixed with the triangle wave signal
to produce the tuning voltage for the VCO. The noise will help in masking the jamming
transmission, making it look like random "noise” to an outside observer .Without the
noise generator, the jamming signal is just a sweeping, un-modulated Continuous Wave
RF carrier.
Signal mixer
The mixer here is just an amplifier that operates as a summer. So, the
noise and triangular wave will add together before entering the VCO.
Rf - Section
Jamming
SignalVoltage
Control
Oscillator
RF Power
Amplifiers
Antenna
From IF
section
Jamming
SignalVoltage
Control
Oscillator
RF Power
Amplifiers
Antenna
VCO
The voltage controlled oscillator (VCO) is the heart of
the RF-section. It is the device that generates the RF
signal which will interfere with the cell phone.
The output of the VCO has a frequency which
is proportional to the input voltage, thus, we can
control the output frequency by changing the input
voltage.
The voltage controlled oscillator (VCO) is the heart of
the RF-section. It is the device that generates the RF
signal which will interfere with the cell phone.
The output of the VCO has a frequency which
is proportional to the input voltage, thus, we can
control the output frequency by changing the input
voltage.
Power Amplifier
Since 5 dBm output powers from the VCO do not achieve the desired
output power of the GSM jammer, we had to add an amplifier with a
suitable gain to increase the VCO output to 34 dBm.
Since 5 dBm output powers from the VCO do not achieve the desired
output power of the GSM jammer, we had to add an amplifier with a
suitable gain to increase the VCO output to 34 dBm.
Antenna
A proper antenna is necessary to transmit the
jamming signal. In this project, we used three 1/4
wavelength monopole antennas, with 50 Ω input
impedance so that the antennas are matched to the
system. We used monopole antenna since the
radiation pattern is omni-directional.
GSM 900 antenna Specifications:
1. Frequency: 850MHz-1GHz
2. Input impedance 50Ω
3. VSWR<2
A proper antenna is necessary to transmit the
jamming signal. In this project, we used three 1/4
wavelength monopole antennas, with 50 Ω input
impedance so that the antennas are matched to the
system. We used monopole antenna since the
radiation pattern is omni-directional.
GSM 900 antenna Specifications:
1. Frequency: 850MHz-1GHz
2. Input impedance 50Ω
3. VSWR<2
Software Description
Softwares used in
this project
Express PCB –
for designing
circuit
Express PCB –
for designing
circuit
PIC C compiler -
for compilation
part
PIC C compiler -
for compilation
part
Proteus 7
(Embedded C) –
for simulation
part
Proteus 7
(Embedded C) –
for simulation
part
•Express PCB
Express PCB is a software tool to design PCBs specifically for manufacture by the
company Express PCB (no other PCB maker accepts Express PCB files). It is very easy
to use.
•PIC C compiler
PIC compiler is software used where the machine language code is written and
compiled. After compilation, the machine source code is converted into hex code
which is to be dumped into the microcontroller for further processing.
•Proteus 7
Proteus is software which accepts only hex files. Once the machine code is converted
into hex code, that hex code has to be dumped into the microcontroller and this is
done by the Proteus.
Express PCB is a software tool to design PCBs specifically for manufacture by the
company Express PCB (no other PCB maker accepts Express PCB files). It is very easy
to use.
•PIC C compiler
PIC compiler is software used where the machine language code is written and
compiled. After compilation, the machine source code is converted into hex code
which is to be dumped into the microcontroller for further processing.
•Proteus 7
Proteus is software which accepts only hex files. Once the machine code is converted
into hex code, that hex code has to be dumped into the microcontroller and this is
done by the Proteus.
Applications
•Gas stations, the air entrainment station, the fuel
depot and the flammable explosive chemical
warehouse, the refinery, the petrified factory and so on
need safely to protect place
•Governments, enterprise's each kind of
conference room
•Armies, public security department's important
conference rooms
•Hospitals, Courts, Theatres etc.
•Gas stations, the air entrainment station, the fuel
depot and the flammable explosive chemical
warehouse, the refinery, the petrified factory and so on
need safely to protect place
•Governments, enterprise's each kind of
conference room
•Armies, public security department's important
conference rooms
•Hospitals, Courts, Theatres etc.
Advantages
•Easy to operate.
•Low power consumption.
•Efficient design.
•Eliminates button operations.
•No need for training.
•Fast response.
•Sophisticated security.
•Simple and Reliable Design
•Easy to operate.
•Low power consumption.
•Efficient design.
•Eliminates button operations.
•No need for training.
•Fast response.
•Sophisticated security.
•Simple and Reliable Design
Disadvantages
•Radiation harmful for humans
•We may lose some important calls.
Result, Conclusion & Future Scope
Result:
•The project “Cell Phone RF Signal detector and Jammer” was designed to help for security
purpose.
• The activation and deactivation time schedules can be programmed with microcontroller.
Conclusion:
Integrating features of all the hardware components used have been developed in it. Presence of
every module has been reasoned out and placed carefully, thus contributing to the best working
of the unit. Secondly, using highly advanced IC’s with the help of growing technology, the
project has been successfully implemented. Thus the project has been successfully designed and
tested.
Future Scope:
Our project “Cell Phone RF Signal detector and Jammer” is mainly intended to provide an
interaction with detector and Jammer.
This project can be extended to block the signal of 3G & 4G.
Due to lack of components we won’t be able to do this.
Result:
•The project “Cell Phone RF Signal detector and Jammer” was designed to help for security
purpose.
•The activation and deactivation time schedules can be programmed with microcontroller.
Conclusion:
Integrating features of all the hardware components used have been developed in it. Presence of
every module has been reasoned out and placed carefully, thus contributing to the best working
of the unit. Secondly, using highly advanced IC’s with the help of growing technology, the
project has been successfully implemented. Thus the project has been successfully designed and
tested.
Future Scope:
Our project “Cell Phone RF Signal detector and Jammer” is mainly intended to provide an
interaction with detector and Jammer.
This project can be extended to block the signal of 3G & 4G.
Due to lack of components we won’t be able to do this.
THAnk u alL.

More Related Content

What's hot (20)

Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
 
Cell phone detector & jammer
Cell phone detector & jammerCell phone detector & jammer
Cell phone detector & jammer
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Project report on signal jammer
Project report on signal jammerProject report on signal jammer
Project report on signal jammer
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 
Mobile phone jammers
Mobile phone jammersMobile phone jammers
Mobile phone jammers
 
Cell phone detector ppt with circuit and block diagram
Cell phone detector ppt with circuit and block diagramCell phone detector ppt with circuit and block diagram
Cell phone detector ppt with circuit and block diagram
 
Mobile Jammer
Mobile JammerMobile Jammer
Mobile Jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
 
Cell Phone Detector
Cell Phone DetectorCell Phone Detector
Cell Phone Detector
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Mobile Jammer ppt
 
Mobile Jammer_2
Mobile Jammer_2Mobile Jammer_2
Mobile Jammer_2
 
Cell phone detector
Cell phone detectorCell phone detector
Cell phone detector
 
Mobile jammer
Mobile jammer Mobile jammer
Mobile jammer
 
Cellphone Jammer
Cellphone JammerCellphone Jammer
Cellphone Jammer
 

Viewers also liked

Mobile phone detector and jammer
Mobile phone detector and jammerMobile phone detector and jammer
Mobile phone detector and jammersiva23143
 
MINI PROJECT ON CELLPHONE DETECTOR
MINI PROJECT ON CELLPHONE DETECTORMINI PROJECT ON CELLPHONE DETECTOR
MINI PROJECT ON CELLPHONE DETECTORPrannoy Chakravarthi
 
Project report of Cell phone detector circuit
Project report of Cell phone detector circuitProject report of Cell phone detector circuit
Project report of Cell phone detector circuitMoin Aman
 
Cellphone detector report
Cellphone detector reportCellphone detector report
Cellphone detector reportvenu13
 
Mobile phone detector pdf
Mobile phone detector pdfMobile phone detector pdf
Mobile phone detector pdfVamshi Varun
 
cellphone detector
cellphone detectorcellphone detector
cellphone detectorvenu13
 
Mobile phone intelligent jamming system
Mobile phone intelligent jamming systemMobile phone intelligent jamming system
Mobile phone intelligent jamming systemPatel Ibrahim
 
DESIGN & WORKING OF A MOBILE PHONE DETECTOR
DESIGN & WORKING OF A MOBILE PHONE DETECTORDESIGN & WORKING OF A MOBILE PHONE DETECTOR
DESIGN & WORKING OF A MOBILE PHONE DETECTORpgayatrinaidu
 
Smart Autonomous Mobile detector Robot
Smart Autonomous Mobile detector RobotSmart Autonomous Mobile detector Robot
Smart Autonomous Mobile detector RobotPunit Tiwari
 
Bsnl 111013130746-phpapp02
Bsnl 111013130746-phpapp02Bsnl 111013130746-phpapp02
Bsnl 111013130746-phpapp02Brawin Joshua
 
MOBILE BUG ; ACTIVE CELL PHONE DETECTOR USING CMOS & BIPOLAR TRANSISTORS
MOBILE BUG ; ACTIVE CELL PHONE DETECTOR USING CMOS & BIPOLAR TRANSISTORSMOBILE BUG ; ACTIVE CELL PHONE DETECTOR USING CMOS & BIPOLAR TRANSISTORS
MOBILE BUG ; ACTIVE CELL PHONE DETECTOR USING CMOS & BIPOLAR TRANSISTORSShahrukh Javed
 
Bsnl ppt-by aswin.ppt
Bsnl ppt-by aswin.pptBsnl ppt-by aswin.ppt
Bsnl ppt-by aswin.pptAswinkumar R
 
Content curation
Content curationContent curation
Content curationtechiesue
 
Qr codes + ipads
Qr codes + ipadsQr codes + ipads
Qr codes + ipadstechiesue
 
An overview of mobile html + java script frameworks
An overview of mobile html + java script frameworksAn overview of mobile html + java script frameworks
An overview of mobile html + java script frameworksSasha dos Santos
 
Cell Phone Jammer , Intro
Cell Phone Jammer , IntroCell Phone Jammer , Intro
Cell Phone Jammer , IntroLakshman Basnet
 
Serious Games + Computer Science = Serious CS
Serious Games + Computer Science = Serious CSSerious Games + Computer Science = Serious CS
Serious Games + Computer Science = Serious CSKatrin Becker
 
Monika print ppt
Monika print pptMonika print ppt
Monika print pptMonika Raja
 

Viewers also liked (20)

Mobile phone detector and jammer
Mobile phone detector and jammerMobile phone detector and jammer
Mobile phone detector and jammer
 
MINI PROJECT ON CELLPHONE DETECTOR
MINI PROJECT ON CELLPHONE DETECTORMINI PROJECT ON CELLPHONE DETECTOR
MINI PROJECT ON CELLPHONE DETECTOR
 
Project report of Cell phone detector circuit
Project report of Cell phone detector circuitProject report of Cell phone detector circuit
Project report of Cell phone detector circuit
 
Cellphone detector report
Cellphone detector reportCellphone detector report
Cellphone detector report
 
Mobile phone detector pdf
Mobile phone detector pdfMobile phone detector pdf
Mobile phone detector pdf
 
Mobile detector grp9
Mobile detector grp9Mobile detector grp9
Mobile detector grp9
 
cellphone detector
cellphone detectorcellphone detector
cellphone detector
 
Mobile phone intelligent jamming system
Mobile phone intelligent jamming systemMobile phone intelligent jamming system
Mobile phone intelligent jamming system
 
DESIGN & WORKING OF A MOBILE PHONE DETECTOR
DESIGN & WORKING OF A MOBILE PHONE DETECTORDESIGN & WORKING OF A MOBILE PHONE DETECTOR
DESIGN & WORKING OF A MOBILE PHONE DETECTOR
 
Smart Autonomous Mobile detector Robot
Smart Autonomous Mobile detector RobotSmart Autonomous Mobile detector Robot
Smart Autonomous Mobile detector Robot
 
Bsnl 111013130746-phpapp02
Bsnl 111013130746-phpapp02Bsnl 111013130746-phpapp02
Bsnl 111013130746-phpapp02
 
Bsnl
BsnlBsnl
Bsnl
 
MOBILE BUG ; ACTIVE CELL PHONE DETECTOR USING CMOS & BIPOLAR TRANSISTORS
MOBILE BUG ; ACTIVE CELL PHONE DETECTOR USING CMOS & BIPOLAR TRANSISTORSMOBILE BUG ; ACTIVE CELL PHONE DETECTOR USING CMOS & BIPOLAR TRANSISTORS
MOBILE BUG ; ACTIVE CELL PHONE DETECTOR USING CMOS & BIPOLAR TRANSISTORS
 
Bsnl ppt-by aswin.ppt
Bsnl ppt-by aswin.pptBsnl ppt-by aswin.ppt
Bsnl ppt-by aswin.ppt
 
Content curation
Content curationContent curation
Content curation
 
Qr codes + ipads
Qr codes + ipadsQr codes + ipads
Qr codes + ipads
 
An overview of mobile html + java script frameworks
An overview of mobile html + java script frameworksAn overview of mobile html + java script frameworks
An overview of mobile html + java script frameworks
 
Cell Phone Jammer , Intro
Cell Phone Jammer , IntroCell Phone Jammer , Intro
Cell Phone Jammer , Intro
 
Serious Games + Computer Science = Serious CS
Serious Games + Computer Science = Serious CSSerious Games + Computer Science = Serious CS
Serious Games + Computer Science = Serious CS
 
Monika print ppt
Monika print pptMonika print ppt
Monika print ppt
 

Similar to Cellphone signal detector and jammer ppt

Remote Operated Spy Robot Circuit
Remote Operated Spy Robot CircuitRemote Operated Spy Robot Circuit
Remote Operated Spy Robot CircuitlaibaNoor60
 
Gsm based irrigation control
Gsm based irrigation controlGsm based irrigation control
Gsm based irrigation controlSatyam Tiwari
 
GSM Mobile Phone Jammer
GSM Mobile Phone JammerGSM Mobile Phone Jammer
GSM Mobile Phone Jammerijsrd.com
 
Abhinav End Sem Presentation Software Defined Radio
Abhinav End Sem Presentation Software Defined RadioAbhinav End Sem Presentation Software Defined Radio
Abhinav End Sem Presentation Software Defined Radioguestad4734
 
Subsampling Multi-standard receiver design, Part-1
Subsampling Multi-standard receiver design, Part-1Subsampling Multi-standard receiver design, Part-1
Subsampling Multi-standard receiver design, Part-1Ahmed Sakr
 
Smart Security System Using ARM And XBee For Boarder Areas( SYNOPSIS)
Smart Security System  Using ARM And XBee For Boarder Areas( SYNOPSIS)Smart Security System  Using ARM And XBee For Boarder Areas( SYNOPSIS)
Smart Security System Using ARM And XBee For Boarder Areas( SYNOPSIS)WizApsProjects
 
REMOTE OPERATED SPY ROBO PPT
REMOTE OPERATED SPY ROBO PPTREMOTE OPERATED SPY ROBO PPT
REMOTE OPERATED SPY ROBO PPTkiran bansod
 
Rfid system(eee499.blogspot.com)
Rfid system(eee499.blogspot.com)Rfid system(eee499.blogspot.com)
Rfid system(eee499.blogspot.com)slmnsvn
 
Smart Security System Using ARM And XBee For Boarder Areas (REPORT)
Smart Security System  Using ARM And XBee For Boarder Areas  (REPORT)Smart Security System  Using ARM And XBee For Boarder Areas  (REPORT)
Smart Security System Using ARM And XBee For Boarder Areas (REPORT)WizApsProjects
 
Dtmf based home automation without micro-controller
Dtmf based home automation without micro-controllerDtmf based home automation without micro-controller
Dtmf based home automation without micro-controllerSadiaParvinRipa
 
Navigation of Robot Vehicle using RF with Landmine Detection
Navigation of Robot Vehicle using RF with Landmine DetectionNavigation of Robot Vehicle using RF with Landmine Detection
Navigation of Robot Vehicle using RF with Landmine DetectionVeena Rani
 
Implementation of Algorithms For Multi-Channel Digital Monitoring Receiver
Implementation of Algorithms For Multi-Channel Digital Monitoring ReceiverImplementation of Algorithms For Multi-Channel Digital Monitoring Receiver
Implementation of Algorithms For Multi-Channel Digital Monitoring ReceiverIOSR Journals
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd Iaetsd
 
Bw32898902
Bw32898902Bw32898902
Bw32898902IJMER
 
Gsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cardsGsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cardsSomanchi Aditya
 
Improvement of signal coverage using wcdma signal repeater for 3 g systems
Improvement of signal coverage using wcdma signal repeater for 3 g systemsImprovement of signal coverage using wcdma signal repeater for 3 g systems
Improvement of signal coverage using wcdma signal repeater for 3 g systemsIjrdt Journal
 
IRJET-A Comparative Study of use of the Library and the Internet as Sources o...
IRJET-A Comparative Study of use of the Library and the Internet as Sources o...IRJET-A Comparative Study of use of the Library and the Internet as Sources o...
IRJET-A Comparative Study of use of the Library and the Internet as Sources o...IRJET Journal
 
Tracking and breaking system for vehicles
Tracking and breaking system for vehiclesTracking and breaking system for vehicles
Tracking and breaking system for vehicleskakanikings
 

Similar to Cellphone signal detector and jammer ppt (20)

Remote Operated Spy Robot Circuit
Remote Operated Spy Robot CircuitRemote Operated Spy Robot Circuit
Remote Operated Spy Robot Circuit
 
Gsm based irrigation control
Gsm based irrigation controlGsm based irrigation control
Gsm based irrigation control
 
GSM Mobile Phone Jammer
GSM Mobile Phone JammerGSM Mobile Phone Jammer
GSM Mobile Phone Jammer
 
Abhinav End Sem Presentation Software Defined Radio
Abhinav End Sem Presentation Software Defined RadioAbhinav End Sem Presentation Software Defined Radio
Abhinav End Sem Presentation Software Defined Radio
 
Fire fighting robot
Fire fighting robotFire fighting robot
Fire fighting robot
 
Subsampling Multi-standard receiver design, Part-1
Subsampling Multi-standard receiver design, Part-1Subsampling Multi-standard receiver design, Part-1
Subsampling Multi-standard receiver design, Part-1
 
Smart Security System Using ARM And XBee For Boarder Areas( SYNOPSIS)
Smart Security System  Using ARM And XBee For Boarder Areas( SYNOPSIS)Smart Security System  Using ARM And XBee For Boarder Areas( SYNOPSIS)
Smart Security System Using ARM And XBee For Boarder Areas( SYNOPSIS)
 
REMOTE OPERATED SPY ROBO PPT
REMOTE OPERATED SPY ROBO PPTREMOTE OPERATED SPY ROBO PPT
REMOTE OPERATED SPY ROBO PPT
 
Rfid system(eee499.blogspot.com)
Rfid system(eee499.blogspot.com)Rfid system(eee499.blogspot.com)
Rfid system(eee499.blogspot.com)
 
Smart Security System Using ARM And XBee For Boarder Areas (REPORT)
Smart Security System  Using ARM And XBee For Boarder Areas  (REPORT)Smart Security System  Using ARM And XBee For Boarder Areas  (REPORT)
Smart Security System Using ARM And XBee For Boarder Areas (REPORT)
 
Dtmf based home automation without micro-controller
Dtmf based home automation without micro-controllerDtmf based home automation without micro-controller
Dtmf based home automation without micro-controller
 
Navigation of Robot Vehicle using RF with Landmine Detection
Navigation of Robot Vehicle using RF with Landmine DetectionNavigation of Robot Vehicle using RF with Landmine Detection
Navigation of Robot Vehicle using RF with Landmine Detection
 
Implementation of Algorithms For Multi-Channel Digital Monitoring Receiver
Implementation of Algorithms For Multi-Channel Digital Monitoring ReceiverImplementation of Algorithms For Multi-Channel Digital Monitoring Receiver
Implementation of Algorithms For Multi-Channel Digital Monitoring Receiver
 
Wireless Flow Meter Solution M2M & IoT
Wireless Flow Meter Solution    M2M & IoTWireless Flow Meter Solution    M2M & IoT
Wireless Flow Meter Solution M2M & IoT
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
 
Bw32898902
Bw32898902Bw32898902
Bw32898902
 
Gsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cardsGsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cards
 
Improvement of signal coverage using wcdma signal repeater for 3 g systems
Improvement of signal coverage using wcdma signal repeater for 3 g systemsImprovement of signal coverage using wcdma signal repeater for 3 g systems
Improvement of signal coverage using wcdma signal repeater for 3 g systems
 
IRJET-A Comparative Study of use of the Library and the Internet as Sources o...
IRJET-A Comparative Study of use of the Library and the Internet as Sources o...IRJET-A Comparative Study of use of the Library and the Internet as Sources o...
IRJET-A Comparative Study of use of the Library and the Internet as Sources o...
 
Tracking and breaking system for vehicles
Tracking and breaking system for vehiclesTracking and breaking system for vehicles
Tracking and breaking system for vehicles
 

Cellphone signal detector and jammer ppt

  • 1. A Project Report On Cell Phone RF Signal Detector & Jammer Presented By : 1. Amar Raj (3rb08ec007) 2. Rishu Raj (3rb09ec060) 3. Aman Kumar (3rb09ec100) 4. Ravi Kumar (3rb10ec071) Under The Guidance Of : Mr. Dhiraj Deshpande (Asst. Professor)
  • 2. Containing  Introduction  Jamming Technique  Design Parameters  How does It Works  Hardware Design  Software Description  Application  Advantages  Disadvantages  Conclusion  Introduction  Jamming Technique  Design Parameters  How does It Works  Hardware Design  Software Description  Application  Advantages  Disadvantages  Conclusion
  • 3. Introduction  Mobile jammer is used to prevent mobile phones from receiving or transmitting signals with the base stations.  Mobile jammers effectively disable mobile phones within the defined regulated zones.  As with other radio jamming, mobile jammers block mobile phone use by sending out radio waves along the same frequencies that mobile phones use.  Upon activating mobile jammers, all mobile phones will indicate "NO NETWORK". Incoming calls are blocked as if the mobile phone were off.  When the mobile jammers are turned off, all mobile phones will automatically re-establish communications and provide full service.  Mobile jammer is used to prevent mobile phones from receiving or transmitting signals with the base stations.  Mobile jammers effectively disable mobile phones within the defined regulated zones.  As with other radio jamming, mobile jammers block mobile phone use by sending out radio waves along the same frequencies that mobile phones use.  Upon activating mobile jammers, all mobile phones will indicate "NO NETWORK". Incoming calls are blocked as if the mobile phone were off.  When the mobile jammers are turned off, all mobile phones will automatically re-establish communications and provide full service.
  • 4. Jamming Technique  Spoofing : In this kind of jamming, the device forces the mobile to turn off itself.  Shielding Attacks This is known as TEMPEST or EMF shielding. This kind requires closing an area in a faraday cage so that any device inside this cage can not transmit or receive RF signal from outside of the cage.  Denial of Service A jamming device transmits on the same radiofrequencies as the cell phone, disrupting the communication between the phone and the cell-phone base station.  Spoofing : In this kind of jamming, the device forces the mobile to turn off itself.  Shielding Attacks This is known as TEMPEST or EMF shielding. This kind requires closing an area in a faraday cage so that any device inside this cage can not transmit or receive RF signal from outside of the cage.  Denial of Service A jamming device transmits on the same radiofrequencies as the cell phone, disrupting the communication between the phone and the cell-phone base station.
  • 5. Design Parameters  The frequency bands GSM900: Uplink: 890-915 MHz Down link: 935-960 MHz In our Design the frequency must be the same as the downlink because it needs lower power to do jamming. The Distance to be jammed(D) This parameter is very useful in our design since the amount of the output power of the jammer depends on the area we need to jam. Our design is established upon D=2.0 m for GSM 900.  The frequency bands GSM900: Uplink: 890-915 MHz Down link: 935-960 MHz In our Design the frequency must be the same as the downlink because it needs lower power to do jamming. The Distance to be jammed(D) This parameter is very useful in our design since the amount of the output power of the jammer depends on the area we need to jam. Our design is established upon D=2.0 m for GSM 900.
  • 6. Design Parameters contd. • For GSM, the specified system SNRmin is 9 dB which will be used as the worst case scenario for the jammer. The maximum power at the mobile device Pr is -15 dBm. • Free space loss {F} The free-space loss (or path loss) is given by: Path loss(dB)= 32.44 + 20 log d km + 20 log f(MHz) The maximum free space loss (worst case F) happens when the maximum frequency is used in the above equation.  Using 960 MHz gives:  F (dB) =32.44+20 log 0.02 + 20 log 960 which gives F =58 dB. • For GSM, the specified system SNRmin is 9 dB which will be used as the worst case scenario for the jammer. The maximum power at the mobile device Pr is -15 dBm. • Free space loss {F} The free-space loss (or path loss) is given by: Path loss(dB)= 32.44 + 20 log d km + 20 log f(MHz) The maximum free space loss (worst case F) happens when the maximum frequency is used in the above equation.  Using 960 MHz gives:  F (dB) =32.44+20 log 0.02 + 20 log 960 which gives F =58 dB.
  • 7. Process of Jamming • Mobile Phone uses RF with a wavelength of 30 cm at 872-2170 MHz. •Detector convert this RF signal to little current to glow LED or trigger the buzzer. •The output of detector goes to microcontroller where analog signal is converted to digital signal. •This digital signal is applied to Relay & LCD. •The relay behave as a switch. •The output of the Relay behaves as the i/p of the jammer circuit. •The jammer circuit is activated for 60 sec (user specified). • Mobile Phone uses RF with a wavelength of 30 cm at 872-2170 MHz. •Detector convert this RF signal to little current to glow LED or trigger the buzzer. •The output of detector goes to microcontroller where analog signal is converted to digital signal. •This digital signal is applied to Relay & LCD. •The relay behave as a switch. •The output of the Relay behaves as the i/p of the jammer circuit. •The jammer circuit is activated for 60 sec (user specified).
  • 8. Hardware Description Our Project Contains The Following Main Parts :  Detector  Relay  Microcontroller  Crystal Oscillator  LCD  On Chip RTC  Regulated Power Supply  Jammer Circuit Our Project Contains The Following Main Parts :  Detector  Relay  Microcontroller  Crystal Oscillator  LCD  On Chip RTC  Regulated Power Supply  Jammer Circuit
  • 10. Detector contd. • Mobile phone uses RF with a wavelength of 30cm at 872 to 2170 MHz. •Mobile phone transmits the signal in the form of sine wave. •The signal contains electromagnetic radiation which is picked up by the receiver in the base station. •A capacitor is used to detect RF from mobile phone considering that, a capacitor can store energy even from an outside source and oscillate like LC circuit. • Mobile phone uses RF with a wavelength of 30cm at 872 to 2170 MHz. •Mobile phone transmits the signal in the form of sine wave. •The signal contains electromagnetic radiation which is picked up by the receiver in the base station. •A capacitor is used to detect RF from mobile phone considering that, a capacitor can store energy even from an outside source and oscillate like LC circuit.
  • 11. Relay A relay is an electrically operated switch. Current flowing through the coil of the relay creates a magnetic field which attracts a lever and changes the switch contacts. The coil current can be on or off so relays have two switch positions and they are double throw (changeover) switches. Relay Circuit
  • 13. Microcontroller contd. Peripheral Interface Controllers (PIC) is one of the advanced microcontrollers developed by microchip technologies. • RISC CPU • Instruction Set is 35 • Operating Speed : DC-20Mhz clock input • 200 ns instruction cycle • 2K*14 words program memory • 128*8 bytes data memory • 8 level deep hardware stack • Voltage Range : 2.0v to 5.5v • Source or sink current : 25mA • 8-bit, 5 channel Analog to Digital Converter Peripheral Interface Controllers (PIC) is one of the advanced microcontrollers developed by microchip technologies. • RISC CPU • Instruction Set is 35 • Operating Speed : DC-20Mhz clock input • 200 ns instruction cycle • 2K*14 words program memory • 128*8 bytes data memory • 8 level deep hardware stack • Voltage Range : 2.0v to 5.5v • Source or sink current : 25mA • 8-bit, 5 channel Analog to Digital Converter
  • 14. Crystal Oscillator Crystal oscillator is made up of quartz crystal with the desired value of resonant frequency forms part of the frequency-selective feedback network. The crystal oscillator speed that can be connected to the PIC microcontroller range from DC to 20Mhz. Crystal oscillator is made up of quartz crystal with the desired value of resonant frequency forms part of the frequency-selective feedback network. The crystal oscillator speed that can be connected to the PIC microcontroller range from DC to 20Mhz.
  • 15. LCD LCD screen consists of two lines with 16 characters each. Each character consists of 5x7dot matrix. Pin Details of LCD LCD screen consists of two lines with 16 characters each. Each character consists of 5x7dot matrix.
  • 16. On Chip RTC The real time clock (RTC) is a widely used device that provides accurate time and date for many applications. The RTC chip present in the PC provides time components of hour, minute and second. The RTC chip uses an internal battery that keeps the time and date even when the power is off. One of the most widely used RTC chips is the DS1307 from Dallas semiconductor. The real time clock (RTC) is a widely used device that provides accurate time and date for many applications. The RTC chip present in the PC provides time components of hour, minute and second. The RTC chip uses an internal battery that keeps the time and date even when the power is off. One of the most widely used RTC chips is the DS1307 from Dallas semiconductor.
  • 17. Jammer Power Supply IF Section RF Section Jamming Signal Circuit Diagram Power Supply IF Section RF Section Jamming Signal
  • 18. Power Supply for Jammer Transformer Rectification Filter Regulator Circuit Diagram Block Diagram Circuit Diagram
  • 19. Signal Mixer Triangular Wave Generator If - Section To RF Section Signal Mixer To RF Section Noise Generator
  • 20. Triangular Wave Generator • The main use of the triangle wave is to sweep the VCO through the desired frequency range. • We want to cover the downlink through our VCO, i.e., 935-960 MHz . • The main use of the triangle wave is to sweep the VCO through the desired frequency range. • We want to cover the downlink through our VCO, i.e., 935-960 MHz .
  • 21. Noise Generator To achieve jamming a noise signal is mixed with the triangle wave signal to produce the tuning voltage for the VCO. The noise will help in masking the jamming transmission, making it look like random "noise” to an outside observer .Without the noise generator, the jamming signal is just a sweeping, un-modulated Continuous Wave RF carrier. To achieve jamming a noise signal is mixed with the triangle wave signal to produce the tuning voltage for the VCO. The noise will help in masking the jamming transmission, making it look like random "noise” to an outside observer .Without the noise generator, the jamming signal is just a sweeping, un-modulated Continuous Wave RF carrier.
  • 22. Signal mixer The mixer here is just an amplifier that operates as a summer. So, the noise and triangular wave will add together before entering the VCO.
  • 23. Rf - Section Jamming SignalVoltage Control Oscillator RF Power Amplifiers Antenna From IF section Jamming SignalVoltage Control Oscillator RF Power Amplifiers Antenna
  • 24. VCO The voltage controlled oscillator (VCO) is the heart of the RF-section. It is the device that generates the RF signal which will interfere with the cell phone. The output of the VCO has a frequency which is proportional to the input voltage, thus, we can control the output frequency by changing the input voltage. The voltage controlled oscillator (VCO) is the heart of the RF-section. It is the device that generates the RF signal which will interfere with the cell phone. The output of the VCO has a frequency which is proportional to the input voltage, thus, we can control the output frequency by changing the input voltage.
  • 25. Power Amplifier Since 5 dBm output powers from the VCO do not achieve the desired output power of the GSM jammer, we had to add an amplifier with a suitable gain to increase the VCO output to 34 dBm. Since 5 dBm output powers from the VCO do not achieve the desired output power of the GSM jammer, we had to add an amplifier with a suitable gain to increase the VCO output to 34 dBm.
  • 26. Antenna A proper antenna is necessary to transmit the jamming signal. In this project, we used three 1/4 wavelength monopole antennas, with 50 Ω input impedance so that the antennas are matched to the system. We used monopole antenna since the radiation pattern is omni-directional. GSM 900 antenna Specifications: 1. Frequency: 850MHz-1GHz 2. Input impedance 50Ω 3. VSWR<2 A proper antenna is necessary to transmit the jamming signal. In this project, we used three 1/4 wavelength monopole antennas, with 50 Ω input impedance so that the antennas are matched to the system. We used monopole antenna since the radiation pattern is omni-directional. GSM 900 antenna Specifications: 1. Frequency: 850MHz-1GHz 2. Input impedance 50Ω 3. VSWR<2
  • 27. Software Description Softwares used in this project Express PCB – for designing circuit Express PCB – for designing circuit PIC C compiler - for compilation part PIC C compiler - for compilation part Proteus 7 (Embedded C) – for simulation part Proteus 7 (Embedded C) – for simulation part
  • 28. •Express PCB Express PCB is a software tool to design PCBs specifically for manufacture by the company Express PCB (no other PCB maker accepts Express PCB files). It is very easy to use. •PIC C compiler PIC compiler is software used where the machine language code is written and compiled. After compilation, the machine source code is converted into hex code which is to be dumped into the microcontroller for further processing. •Proteus 7 Proteus is software which accepts only hex files. Once the machine code is converted into hex code, that hex code has to be dumped into the microcontroller and this is done by the Proteus. Express PCB is a software tool to design PCBs specifically for manufacture by the company Express PCB (no other PCB maker accepts Express PCB files). It is very easy to use. •PIC C compiler PIC compiler is software used where the machine language code is written and compiled. After compilation, the machine source code is converted into hex code which is to be dumped into the microcontroller for further processing. •Proteus 7 Proteus is software which accepts only hex files. Once the machine code is converted into hex code, that hex code has to be dumped into the microcontroller and this is done by the Proteus.
  • 29. Applications •Gas stations, the air entrainment station, the fuel depot and the flammable explosive chemical warehouse, the refinery, the petrified factory and so on need safely to protect place •Governments, enterprise's each kind of conference room •Armies, public security department's important conference rooms •Hospitals, Courts, Theatres etc. •Gas stations, the air entrainment station, the fuel depot and the flammable explosive chemical warehouse, the refinery, the petrified factory and so on need safely to protect place •Governments, enterprise's each kind of conference room •Armies, public security department's important conference rooms •Hospitals, Courts, Theatres etc.
  • 30. Advantages •Easy to operate. •Low power consumption. •Efficient design. •Eliminates button operations. •No need for training. •Fast response. •Sophisticated security. •Simple and Reliable Design •Easy to operate. •Low power consumption. •Efficient design. •Eliminates button operations. •No need for training. •Fast response. •Sophisticated security. •Simple and Reliable Design
  • 31. Disadvantages •Radiation harmful for humans •We may lose some important calls.
  • 32. Result, Conclusion & Future Scope Result: •The project “Cell Phone RF Signal detector and Jammer” was designed to help for security purpose. • The activation and deactivation time schedules can be programmed with microcontroller. Conclusion: Integrating features of all the hardware components used have been developed in it. Presence of every module has been reasoned out and placed carefully, thus contributing to the best working of the unit. Secondly, using highly advanced IC’s with the help of growing technology, the project has been successfully implemented. Thus the project has been successfully designed and tested. Future Scope: Our project “Cell Phone RF Signal detector and Jammer” is mainly intended to provide an interaction with detector and Jammer. This project can be extended to block the signal of 3G & 4G. Due to lack of components we won’t be able to do this. Result: •The project “Cell Phone RF Signal detector and Jammer” was designed to help for security purpose. •The activation and deactivation time schedules can be programmed with microcontroller. Conclusion: Integrating features of all the hardware components used have been developed in it. Presence of every module has been reasoned out and placed carefully, thus contributing to the best working of the unit. Secondly, using highly advanced IC’s with the help of growing technology, the project has been successfully implemented. Thus the project has been successfully designed and tested. Future Scope: Our project “Cell Phone RF Signal detector and Jammer” is mainly intended to provide an interaction with detector and Jammer. This project can be extended to block the signal of 3G & 4G. Due to lack of components we won’t be able to do this.