Sei sulla pagina 1di 20

Implementation of RCIED Jammer

Presented By Muhammad Usman Slaeem 09-ECT-28 Hassan Bin Qasim - 09-ECT-43 Muhammad Waqas Qadir 09-ECT-45

Research Group Name: Electronic Communication Project Supervisor Name: Engr. Haq Nawaz

Outline of Presentation

Overview Deliverable Literature Review Methodology Implementation Tools Working Model Implementation Phases Expected Results & Discussion References

Overview

RCIED
Remote Control improvised Explosive Device Improvised means the Explosive weapon was not assembled in a factory

Objective
Implementation of RCIED jammer using DOS(denial of services) or
Swept Continuous Wave Jamming technique

Deliverables

Hardware Implementation
PCB Design of different blocks Model of the hardware implement in a box

Software simulation

Circuit maker AWR(Advancing the wireless Revolution)

Literature Review

Electronic warfare Homemade devices, made from readily available components. These include fertilizer bombs and fire bombs [1]

Radio controlled systems involve using an RF device to initiate a device[1] The RCIED device contains a radio receiver with the commander having a corresponding transmitter to trigger the device[1]

Literature Review

transmitter used to trigger the RCIED must also be within range of the receiver[1]

Literature Review

Jamming techniques
Spoofing Farada cage DOS(denial of services)[2]

Methodology

Three types of jamming technique can be used when we will implement our jammer in denial of service domain(dos). Swept spectrum jamming[3] Intelligent spot jamming[3] Barrage Jamming[3]

Methodology
Swept spectrum jamming

It is the jamming technique that can be explained in which the carrier frequency is not noise modulated but swept over the frequency ranges[3] It is not necessary to know the exact frequency of radio trigger ahead of time[3] The sweep rate must be very fast in order to re-visit all the frequencies within the swept time[3]

Methodology
Intelligent spot jamming This effective technique, but only when the frequency of radio trigger is known in advance[3] Barrage Jamming This technique overcomes the problem of not knowing the operating frequency of radio trigger used to detonate the IED[3] It is effective against low-powered transmitter and narrow band frequency ranges[3]

Implementation Tools
Hardware implementation tools Power supply DMM Oscilloscope Spectrum analyzer Noise figure analyzer

Implementation Tools
Software implementation tools Circuit maker AWR(Advancing Wireless Revolution)

Working Model
Block Diagram

Distances (continued)

RCIED

As previously stated, no distance can be guaranteed as a result of multiple factors which are beyond control[3] However, the Bomb Jammer VIP Systems have been tested against multiple threats at controlled distances and output powers[3] Demo

Transmitter with unknown power output

J = the jammer signal strength to the receiver (dBm); ERPJ= the jammer effective radiated power (dBm); F = the communication frequency (MHz) GRJ= the receiving-antenna gain in the direction of the jammer (dB); dJ= the range from the jammer to the receiver (km) S = the desired signal strength to the receiver (dBm); ERPs = the desired transmitter effective radiated power (dBm); F = the communication frequency (MHz); GRS = the receiving antenna gain in the direction to the desired signa transmitter (dB); dS = the range from the desired signal transmitter to the receiver (km)[4]

Implementation Phases

Study and research Design and development Software implementation Hardware implementation Finalizing & Presenting

Expected Results & Discussion

It is expected that the range from 25MHZ to 3000MHZ signal will be jammed if the triggering signal frequency will be in this range

Discussion

We will prefer DOS because Swept CW (Continuous Wave) is a jamming technique that can be explained in which the carrier frequency of the jamming is not noise-modulated, but only swept over the frequency ranges that correspond to the bands that could be used by radio triggers. In this technique, the exact frequency of the radio trigger does not have to be known ahead of time.

If the band is relatively narrow, then the carrier need not be modulated to still be effective in jamming the receiver. However, this is usually not the case, and therefore, the jamming effectiveness of swept CW is greatly diminished when deployed over a wide bandwidth

References
[1] Adrian Grham , Communications , Radar and Electronic Warfare , John Wiley & Son Ltd, The Atnum. Southern Gate, Chichester , West Sussex ,2011 , ISBN 978-0-470-68871-7 [2] NDR Resource International, Inc.,NDR Homepage , available at on-line http://www.ndr-resource.com ,2010 [3] Homeland Security Strategies GB,Homeland security homepage ,available on-line at http://www.bombjammer.com, 2010 [4] David L. Adamy , Introduction to Electronic Warfare Modeling and Simulation , Artech House Boston London ,2003 , ISBN 1-58053-495-3

Potrebbero piacerti anche