09 ect 28,45,43ppt with demo

Upload: hassan-rao

Post on 04-Apr-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/31/2019 09 Ect 28,45,43ppt With Demo

    1/20

  • 7/31/2019 09 Ect 28,45,43ppt With Demo

    2/20

    Implementation of RCIED Jammer

    Presented ByMuhammad Usman Slaeem 09-ECT-28

    Hassan Bin Qasim - 09-ECT-43Muhammad Waqas Qadir 09-ECT-45

    Research Group Name: Electronic CommunicationProject Supervisor Name: Engr. Haq Nawaz

  • 7/31/2019 09 Ect 28,45,43ppt With Demo

    3/20

    Outline of Presentation Overview

    Deliverable

    Literature Review

    Methodology

    Implementation Tools

    Working Model

    Implementation Phases

    Expected Results & Discussion

    References

  • 7/31/2019 09 Ect 28,45,43ppt With Demo

    4/20

    Overview RCIED Remote Control improvised Explosive Device

    Improvised means the Explosive weapon was not assembled in a factory

    Objective Implementation of RCIED jammer using DOS(denial of services) or

    Swept Continuous Wave Jamming technique

  • 7/31/2019 09 Ect 28,45,43ppt With Demo

    5/20

    Deliverables Hardware Implementation PCB Design of different blocks

    Model of the hardware implement in a box

    Software simulation Circuit maker AWR(Advancing the wireless Revolution)

  • 7/31/2019 09 Ect 28,45,43ppt With Demo

    6/20

    Literature Review Electronic warfare

    Homemade devices, made from readily availablecomponents. These include fertilizer bombs andfire bombs [1]

    Radio controlled systems involve using an RF

    device to initiate a device[1] The RCIED device contains a radio receiver with

    the commander having a correspondingtransmitter to trigger the device[1]

  • 7/31/2019 09 Ect 28,45,43ppt With Demo

    7/20

    Literature Review

    transmitter used totrigger the RCIED must

    also be within range ofthe receiver[1]

  • 7/31/2019 09 Ect 28,45,43ppt With Demo

    8/20

    Literature Review Jamming techniques Spoofing

    Farada cage DOS(denial of services)[2]

  • 7/31/2019 09 Ect 28,45,43ppt With Demo

    9/20

    Methodology Three types of jamming technique can be used

    when we will implement our jammer in denialof service domain(dos).

    Swept spectrum jamming[3]

    Intelligent spot jamming[3]

    Barrage Jamming[3]

  • 7/31/2019 09 Ect 28,45,43ppt With Demo

    10/20

    MethodologySwept spectrum jamming It is the jamming technique that can be explained in

    which the carrier frequency is not noise modulatedbut swept over the frequency ranges[3]

    It is not necessary to know the exact frequency ofradio trigger ahead of time[3]

    The sweep rate must be very fast in order to re-visitall the frequencies within the swept time[3]

  • 7/31/2019 09 Ect 28,45,43ppt With Demo

    11/20

    MethodologyIntelligent spot jamming

    This effective technique, but only when the

    frequency of radio trigger is known in advance[3]Barrage Jamming

    This technique overcomes the problem of notknowing the operating frequency of radio trigger

    used to detonate the IED[3] It is effective against low-powered transmitter and

    narrow band frequency ranges[3]

  • 7/31/2019 09 Ect 28,45,43ppt With Demo

    12/20

    Implementation ToolsHardware implementation tools

    Power supply

    DMM

    Oscilloscope

    Spectrum analyzer

    Noise figure analyzer

  • 7/31/2019 09 Ect 28,45,43ppt With Demo

    13/20

    Implementation ToolsSoftware implementation tools

    Circuit maker

    AWR(Advancing Wireless Revolution)

  • 7/31/2019 09 Ect 28,45,43ppt With Demo

    14/20

    Working ModelBlock Diagram

  • 7/31/2019 09 Ect 28,45,43ppt With Demo

    15/20

    Distances (continued)

    However, the Bomb Jammer VIP Systems have beentested against multiple threats at controlled distances andoutput powers[3] Demo

    RCIED

    Transmitter withunknown power output

    As previously stated, no distance canbe guaranteed as a result of multiple

    factors which are beyond control[3]

    http://localhost/var/www/apps/conversion/current/tmp/scratch_2/rcied%20%20demo.flvhttp://localhost/var/www/apps/conversion/current/tmp/scratch_2/rcied%20%20demo.flvhttp://localhost/var/www/apps/conversion/current/tmp/scratch_2/project%20prposal%20ppt/rcied%20%20demo.flv
  • 7/31/2019 09 Ect 28,45,43ppt With Demo

    16/20

    J = the jammer signal strength to thereceiver (dBm);

    ERPJ= the jammer effective radiatedpower (dBm);

    F = the communication frequency (MHz)

    GRJ= the receiving-antenna gain in thedirection of the jammer (dB);

    dJ= the range from the jammer to thereceiver (km)

    S = the desired signal strength to thereceiver (dBm);

    ERPs = the desired transmitter effectiveradiated power (dBm);

    F = the communication frequency (MHz);

    GRS = the receiving antenna gain in thedirection to the desired signa transmitter(dB);

    dS = the range from the desired signal

    transmitter to the receiver (km)[4]

  • 7/31/2019 09 Ect 28,45,43ppt With Demo

    17/20

    Implementation Phases

    Study and research

    Design and development

    Software implementation

    Hardware implementation

    Finalizing & Presenting

  • 7/31/2019 09 Ect 28,45,43ppt With Demo

    18/20

    Expected Results & Discussion

    It is expected that the range from 25MHZ to3000MHZ signal will be jammed if the triggeringsignal frequency will be in this range

    Discussion

    We will prefer DOS because Swept CW (Continuous Wave) is ajamming technique that can be explained in which the carrier

    frequency of the jamming is not noise-modulated, but onlyswept over the frequency ranges that correspond to the bandsthat could be used by radio triggers. In this technique, theexact frequency of the radio trigger does not have to be knownahead of time.

  • 7/31/2019 09 Ect 28,45,43ppt With Demo

    19/20

    If the band is relatively narrow, then the carrier neednot be modulated to still be effective in jamming thereceiver. However, this is usually not the case, and

    therefore, the jamming effectiveness of swept CW isgreatly diminished when deployed over a widebandwidth

  • 7/31/2019 09 Ect 28,45,43ppt With Demo

    20/20

    References

    [1] Adrian Grham , Communications , Radar and ElectronicWarfare , John Wiley & Son Ltd, The Atnum. Southern Gate,Chichester , West Sussex ,2011 , ISBN 978-0-470-68871-7

    [2] NDR Resource International, Inc.,NDR Homepage ,available at on-line http://www.ndr-resource.com ,2010

    [3] Homeland Security Strategies GB,Homeland securityhomepage ,available on-line at http://www.bombjammer.com,2010

    [4] David L. Adamy , Introduction to Electronic WarfareModeling and Simulation , Artech House Boston London ,2003 ,ISBN 1-58053-495-3

    http://www.ndr-resource.com/http://www.bombjammer.com/http://www.bombjammer.com/http://www.ndr-resource.com/http://www.ndr-resource.com/http://www.ndr-resource.com/