FYP Presentation Format 3

download FYP Presentation Format 3

of 20

Transcript of FYP Presentation Format 3

  • 7/30/2019 FYP Presentation Format 3

    1/20

    Department o f Electronic Engineering

    Design and Implementationof RCIED Jamming System

    Muhammad Usman Saleem

    09-ECT-28

    Hassan Bin Qasim

    09-ECT-43

    Muhammad Waqas Qadir09-ECT-45

    Supervised by:

    Engr.Ahmad Umar Niazi

  • 7/30/2019 FYP Presentation Format 3

    2/20

    Department o f Electronic Engineering

    Problem Statement

    The radio controlled improvised explosive device (RCIED) is one of

    the deadliest threats to military personnel supporting the global war

    on terrorism and due to its success is expected to play a major role

    as a weapon of choice in future insurgencies. To mitigate the risk

    of a RCIED attack, electronic jamming devices are utilizedto interrupt the communications between a remote control

    and the RCIED trigger.

    Design, implementation, and testing of common RCIED Frequency

    Bands ,RCIED four-band jammer. This jammer works at CDMA870-

    880, GSM930-960, DCS1805-1850 and 3G 2110-2170 MHz

  • 7/30/2019 FYP Presentation Format 3

    3/20

    Aims & Objectives

    Proactive communication signal jamming between receiver and

    transmitter using denial of services

    Our proposed frequency band was 25-3000Mhz,due to inavailability

    of wide band VCO ,We have been limited to some common IED

    frequency bands GSM,CDMA,DCS and 3G This jammer works at CDMA870-880, GSM930-960; DCS1805-

    1850, 3G 2110-2170 MHz

    Jamming Radius about 2- 20 m

    Department o f Electronic Engineering

  • 7/30/2019 FYP Presentation Format 3

    4/20

    Literature Review

    RCIED jamming devices were first developed and used by military.

    This interest Comes from the fundamental objective of denying the

    successful transport of information from the sender (tactical

    commanders) to the receiver (the army personnel), and vice-versa

    The use of the IED has grown to unmatched numbers in use againstmilitary forces, religious places and public gathering. We know there

    are lot of IEDs blasts in Karachi, Quetta and Peshawar which effects

    the general public, VIP convey and military personal

    The device IED is constructed so that the receiver is connected to

    an electrical firing circuit. The transmitted signal causes the receiverto initiate the IED. Usually the receiver triggers the initiator, but it

    may also be used to remotely arm the device to be initiated by other

    means.

    Department o f Electronic Engineering

  • 7/30/2019 FYP Presentation Format 3

    5/20

    Literature Review

    The open nature of wireless radio transmissions makes them

    particularly vulnerable to communication jamming Denial-of-Service

    (DOS) attacks (the technique we used).

    The aim of these devices is to prevent devices from exchanging any

    useful information by interfering with their communication. Possiblecommunication jamming attacks include signal annihilation,

    modification and jamming as well as the insertion of forged or

    replayed signals.

    The trigger of an RCIED is a radio transmitter and receiver link. A

    few examples are car alarms, wireless door bells, cell phones,pagers and walkie-talkies.

    Department o f Electronic Engineering

  • 7/30/2019 FYP Presentation Format 3

    6/20

    Literature Review

    DOS. In this technique, the device transmits a noise signal at the

    same operating frequency of the mobile phone in order to decrease

    the signal-to-noise ratio (SNR) of the communication device (GSM)

    under its minimum value.[2]

    Swept Spectrum Jamming in which the carrier frequency is notnoise modulated but swept over the frequency ranges.[1]

    If uplink processing at the base station can be grounded on the

    availability of direct information about the concerned uplink channel

    (by the mean of a training sequence or blind methods), downlink

    processing encounters more severe difficulties: no information aboutthe downlink channel is available at the base station prior to data

    transmission so we usually jam the downlink frequencies one can

    also elaborate it as less power needed for jamming downlink.

    Department o f Electronic Engineering

  • 7/30/2019 FYP Presentation Format 3

    7/20

    ANALYSIS

    Department o f Electronic Engineering

    Uplink Downlink

    GSM 890-915MHZ 935-960MHZ

    Uplink Downlink

    DCS 1850-1910MHZ 1930-1990MHZ

    Uplink Downlink

    CDMA 824-849MHZ 869-894MHZ

    Uplink Downlink

    3G 1980-2010MHZ 2170-2200MHZ

    GSM,DCS,CDMA and 3G Frequency bands

  • 7/30/2019 FYP Presentation Format 3

    8/20

    ANALYSIS

    In our project, we need to get the duty cycle (D.C.)

    equal to 50% which means the time needed for charging

    equals the discharging time. This can be done by using

    Ra=Rb

    Sweep rate will be 4.8 KHz. Ra=Rb=1K Ohm and C=0.101 F

    Department o f Electronic Engineering

  • 7/30/2019 FYP Presentation Format 3

    9/20

    ANALYSIS

    There is no single wideband VCO which will cover our desired

    frequency band so we used two VCOs one for GSM, DCS and

    CDMA with frequency Range 800-2000 MHz model number

    0897/1747 RY57 with 7.5 dbm manufactured by Fujitsu and for 3G

    we used 2074S6 with output 3dbm manufactured by Delta Most cellular devices have a SNR handling capability of around

    12dB. A very good device might have a value of 9dB, although it is

    highly unlikely. To ensure jamming of these devices, we need to

    reduce the SNR of the carrier signal to below the 9dB level.

    J = -24dBm (Power of the jamming signal) Since SNRmin = S/JLp=32.45+20 log (f*D)

    Jt=58-24=34 dbm

    Department o f Electronic Engineering

  • 7/30/2019 FYP Presentation Format 3

    10/20

    ANALYSIS

    Output power of our VCOs is 7.5+3 dbm which needs to be

    amplified upto 37 dbm to meet required signal. The power output of

    the amplifier is 36 dbm hence it fulfills the requirement of generated

    signal. [2]

    Output power of power amplifier = 5wattPout = 10 log 5

    Pout = 6.98 db

    Pout in dbm = 6.98+30 = 37 dbm

    The received signal level for the desired signal is

    S=ERPs-32-20 log (F)-20 log (ds)+Grs

    Department o f Electronic Engineering

  • 7/30/2019 FYP Presentation Format 3

    11/20

    ANALYSIS

    The jamming to signal ratio (J/S) is the difference between these two

    numbers (JS) in dB [3]

    J/S=ERPj-ERPs-20 log (dj)+20 log (ds)+Grj-Grs

    Comparison between distance and attenuation

    Department o f Electronic Engineering

  • 7/30/2019 FYP Presentation Format 3

    12/20

    ANALYSIS

    Cost

    We have chosen ICs on the basis of same supply voltage, surface

    mount which will reduce size and more powerful and having same

    noise properties

    Hitachi Power Amplifier IC PF0114B 5,500 Rs

    VCO IC 0897/1747 RY57 3500 Rs

    VCO IC 2074S6 Delta 1500 Rs

    Mosfet Tni 112E 150 Rs

    555 Timer 10 RsZener Diode 25 Rs

    VCO Evaluation PCBs 10,000 Rs

    Copper PCB 250 Rs

    Department o f Electronic Engineering

  • 7/30/2019 FYP Presentation Format 3

    13/20

    IMPLEMENTATION

    System Diagram Simulation in AWR 2000

    Department o f Electronic Engineering

  • 7/30/2019 FYP Presentation Format 3

    14/20

    IMPLEMENTATION

    Phase one: studying the RCIED jamming to find the best jamming

    technique (spoofing, shielding, dos, spectrum distortion),

    establishing the system design and selecting suitable components.

    Phase two: buying all the needed components, drawing the overall

    schematics, fabricating the PCB layout, assembling the devices,performing some measurements and finally testing the jammer.

    Department of Electrical Engineering

  • 7/30/2019 FYP Presentation Format 3

    15/20

    IMPLEMENTATION

    Circuit Diagram on Proteus 8.0 PCB Layout on Proteus 8.0

    Department o f Electronic Engineering

  • 7/30/2019 FYP Presentation Format 3

    16/20

    IMPLEMENTATION

    Department of Electrical Engineering

    Jamming System in working

  • 7/30/2019 FYP Presentation Format 3

    17/20

    RESULTS

    According to required task we have jammed the 4-bands GSM,

    DCS, CDMA, and 3G. GSM and DCS signals are tested on mobile

    phones, CDMA is tested on spectrum analyzer and 3G is checked in

    3G EVO with range 2-25meter

    Department o f Electronic Engineering

    Before GSM Jamming After GSM Jamming

  • 7/30/2019 FYP Presentation Format 3

    18/20

    CONCLUSION

    This project includes effective multichannel jamming for GSM, DCS,

    CDMA and 3G bands. Which are major cause of IED attacks as per

    according to survey, its algorithm is satisfactory in prevention from

    RCIED attacks .We used denial of services instead of other

    techniques as its more reliable, prevents from complexity and itscheap to implement in blocking the prescribed bands .

    In future we can improve the jamming system output power, range

    of jamming signal .We can jam more common IED bands 25Mhz to

    3Ghz in multi channel design which will be reliable and effective .

    Department o f Electronic Engineering

  • 7/30/2019 FYP Presentation Format 3

    19/20

    Utilization of Research Results

    The radio controlled improvised explosive device (RCIED) is one of

    the deadliest threats to military personnel supporting the global war

    on terrorism and due to its success is expected to play a major role

    as a weapon of choice in future insurgencies. To mitigate the risk

    of a RCIED attack, electronic jamming devices are utilizedto interrupt the communications between a remote control

    and the RCIED trigger

    VIP Convoy protection

    Military application

    Department o f Electronic Engineering

  • 7/30/2019 FYP Presentation Format 3

    20/20

    References

    [1] Homeland Security Strategies GB, Homeland security

    homepage available on-line at http://www.bombjammer.com, 2010

    [2] Richard A Poisel, Introduction to Communication Electronic

    Warfare Systems, Artech House,Boston,London 2002,ISBN-13:

    978-1-59693-452-8. [3] David L. Adamy ,Introduction to Electronic Warfare, Modeling

    and Simulation, Artech House ,Boston ,London, 2002, ISBN1-

    58053-495-3.

    Department o f Electronic Engineering

    http://www.bombjammer.com/http://www.bombjammer.com/