Uploaded by mdzaman21024021

Signal Jamming with MATLAB Project Report

advertisement
Bangabandhu Sheikh Mujibur Rahman Aviation and Aerospace University (BSMRAAU)
Project Report
Name of Project: Signal Jamming Using MATLAB.
Date of Submission: 12-May-2024
Submitted by:
Nafiz-Uz-Zaman
Tanvir Anowar
( ID - 21024021 )
(ID -21024024)
Md. Ahsan Ullah Tuhin (ID- 21024028)
Department: Aeronautical Engineering (Avionics)
Course Name: Signals and Systems
Course Code: AVE4501
Submitted to: Asst. Prof. Md Sakir Hossain
Signal Jamming Using MATLAB
Nafiz-uz-Zaman
Id-21024021
Department of Aeronautical
Engineering (Avionics)
Tanvir Anowar
Id-21024024
Department of Aeronautical
Engineering (Avionics)
Abstract— This paper presents the design and methodology
of jamming signal using MATLAB code. This code is a simulation
of how a transmitted signal gets jammed and how it looks after
jamming. It helps in understanding the effects of jamming on
wireless communication. The visualization part of the code helps
in understanding these effects more intuitively. This project
involves a MATLAB-based simulation of Radio Frequency (RF)
jamming, which is a form of denial-of-service attack targeting
wireless networks. The simulation produces both a transmitted
and a received signal, each dependent on time, frequency, and
amplitude. The target signal is determined by the difference
between the transmitted and received signals. Subsequently, a
jamming signal with designated amplitude and frequency is
introduced.
Keywords— Radio Frequency (RF), Transmitted signal,
received signal, jamming signal, Denial of Service (DoS).
I. INTRODUCTION
In the age of pervasive wireless communication,
ensuring the security and reliability of these networks is of
utmost importance. Radio Frequency (RF) jamming, a denialof-service attack that can impair network operations, stands
out as a significant threat to wireless communication. This
project is designed to simulate and illustrate the impact of RF
jamming on wireless signals.[1]
Utilizing MATLAB, a sophisticated language and
interactive platform for numerical analysis, visualization, and
programming, the project initiates by generating a transmitted
signal with defined frequency and amplitude parameters.
Subsequently, a received signal is formulated, derived from
the transmitted signal. The target signal, which depicts optimal
communication without interference, is determined by the
difference between the transmitted and received signals.
To emulate the jamming effect, a jamming signal with
designated amplitude and frequency is introduced. The
resulting jammed signal, indicative of communication postinterference, is the aggregate of the target signal and the
jamming signal.
Md. Ahsan Ullah Tuhin
Id-21024028
Department of Aeronautical
Engineering (Avionics)
The project offers graphical depictions of the transmitted,
received, target, jamming, and post-jamming signals,
facilitating a more intuitive comprehension of RF jamming's
impact on wireless communication.
This document will explore the simulation's intricacies,
including signal generation, jamming effect incorporation,
and the resultant visualizations. The insights gleaned from this
project may advance the understanding of RF jamming and
aid in forging more resilient wireless communication
frameworks.
II. OBJECTIVE
The primary goal of this project is to simulate and analyze
the impact of Radio Frequency (RF) jamming on wireless
networks using MATLAB. It will involve generating a
transmitted signal, receiving a signal, computing the target
signal, introducing a jamming signal, and visualizing the
jamming effects on the target signal. Understanding the effects
of RF jamming is crucial to improving the resilience of
wireless communication systems against such disturbances.
Moreover, this project seeks to provide a clear understanding
of RF jamming through visual aids, making it a valuable
educational tool for both students and professionals in the field
of wireless communications.
III. THEORY:
DoS: A Denial of Service (DoS) attack on wireless
networks is a type of cyber-attack that aims to disrupt the
normal functioning of the network. The attacker floods the
network with unnecessary requests, causing an overload of
the network’s resources. This prevents legitimate users from
accessing the network service.[2]
Here we used jamming attacks, which is also a type of
DoS. In jamming attacks, the attacker uses a device to emit
radio signals that interfere with the wireless network’s
frequency, causing disruption in the network’s
communication. In this project we used MATLAB instead of
any device to simulate or visualize the jamming process
using MATLAB code. [3]
The provided code is a MATLAB simulation that models
the Radio Frequency (RF) jamming process, a denial-ofservice attack on wireless networks. The theory behind this
code is divided into several key components:
Signal Generation: The simulation starts by generating a
transmitted signal based on time, frequency, and amplitude
parameters. A received signal is then produced, derived from
the transmitted signal. The target signal, which represents
ideal communication without interference, is determined by
subtracting the transmitted signal from the received signal.
Jamming Signal: A jamming signal with specified
amplitude and frequency is introduced. This signal aims to
disrupt the target signal, mimicking the impact of an actual
jamming attack.
Jammed Signal: The jammed signal is obtained by
combining the jamming signal with the target signal,
depicting the communication signal post-interference.
Visualization: The simulation plots the transmitted,
received, target, jamming, and jammed signals, offering a
clear visual representation of RF jamming's impact on
wireless communication.
In summary, the code's theory involves signal generation,
jamming signal introduction, and signal visualization preand post-jamming. This simulation offers insights into RF
jamming's effects on wireless networks and serves as a tool
for analyzing and countering such attacks.
This theoretical framework underpins our project, with
subsequent sections addressing the practical implementation
and outcomes of this simulation. A detailed examination of
RF jamming simulation in wireless networks will follow.
IV. METHODOLOGY
A. Algorithm of the MATLAB code:
I. Initialize Parameters: Clear all variables, close all
figures, and clear the command window. Set the time range,
amplitude, carrier frequency, modulation frequency, and
modulation index.
II. Generate Transmitted Signal: Generate a transmitted
signal which is a function of time, frequency, and amplitude
parameters.
III. Generate Received Signal: Generate a received signal
which is a function of the transmitted signal.
IV. Calculate Target Signal: Calculate the target signal by
subtracting the transmitted signal from the received signal.
V. Generate Jamming Signal: Generate a jamming signal
with a specific amplitude and frequency.
VI. Calculate Jammed Signal: Calculate the jammed signal
by adding the jamming signal to the target signal.
VII. Visualize Signals: Plot the transmitted signal, received
signal, target signal, jamming signal, and the jammed signal in
different subplots for visualization.
This algorithm provides a step-by-step procedure of how the
code simulates the process of Radio Frequency (RF) jamming,
a type of denial-of-service attack on wireless networks.
B. CODE:
clc;close all;clear all;
t=-.10:1e-7:.20;
A=1;
fc=200;
fm = 15;
a=.5;
m_values = 1.7;
transmittedSignal = A * (1 + m_values *
cos(2*pi*fm*t)) .* cos(2*pi*fc*t);
received_signal= a * m_values *
sin(2*pi*fm*t) .* (1+cos(2*pi*fc*t));
a1=4;
targetsignal=received_signaltransmittedSignal;
jamming_amplitude=2;
jamming_frequency = 10;
jamming=jamming_amplitude *
exp(2*pi*jamming_frequency*t);
received_signal1=exp(2*pi*100*t).*sin(2*p
i*100*t);
targetsignal1=received_signal1transmittedSignal;
jammed=targetsignal+jamming;
jammed1=targetsignal1+jamming;
figure(1);
subplot(4,2,1);
plot(t*1e3,transmittedSignal);
title('transmitted');
ylabel('Amplitude');
xlabel('Time (ns)');
grid on;
subplot(4,2,2);
plot(t*1e3,received_signal);
title('recieved');
ylabel('Amplitude');
xlabel('Time (ns)');
grid on;
subplot(4,2,5);
plot(t*1e3,targetsignal);
title('target');
ylabel('Amplitude');
xlabel('Time (ns)');
grid on;
subplot(4,2,[3,4]);
plot(t*1e3,jamming);
title('jamming signal');
ylabel('Amplitude');
xlabel('Time (ns)');
grid on;
subplot(4,2,6);
plot(t*1e3,jammed);
title('After jamming');
ylabel('Amplitude');
xlabel('Time (ns)');
grid on;
subplot(4,2,7);
plot(t*1e3,targetsignal1);
title('targetsignal1');
ylabel('Amplitude');
xlabel('Time (ns)');
grid on;
subplot(4,2,8);
plot(t*1e3,jammed1);
title('jammed1');
ylabel('Amplitude');
xlabel('Time (ns)');
grid on;
ii.
Received Signal:
Fig 02: Received Signal
iii.
Jamming Signal:
V. RESULTS:
i. Transmitted Signal:
Fig 03: Provided Jamming Signal
iv.
Target Signal: Actually, Target Signal found by
subtracting the transmitted signal from the received
signal.
Fig 01: Transmitted Signal
Fig 04: Target Signal
v.
After Jamming: After jamming Process, the target
signal become like this shape:
interference, is derived by deducting the transmitted signal
from the received signal.
Fig 05: After Jamming
vi.
Second Target Signal: This is an optional signal that
we used to find out to compare jamming that a high
frequency signal can’t jam by any low frequency
signal:
Fig 06: Target Signal 02
vii.
Second jammed Signal:
Actually, the jamming signal is introduced, possessing
a predetermined amplitude and frequency designed to
disrupt the target signal, thereby emulating the impact of
an actual jamming attack. The jammed signal is computed
by amalgamating the jamming signal with the target
signal.
A pivotal feature of this simulation is the signal
visualization. The code graphically represents the
transmitted, received, target, jamming, and jammed
signals in separate subplots, offering a transparent and
comprehensible depiction of RF jamming's influence on
wireless communication.
This simulation yields critical insights into the
ramifications of RF jamming on wireless networks,
illustrating how such a signal can impede a network's
regular operations and hinder legitimate users from
utilizing network services. This is especially beneficial for
network administrators and security experts seeking to
comprehend and counteract the impacts of RF jamming on
their networks.
It is crucial to acknowledge, however, that this
simulation represents a simplified version of RF jamming.
In actual scenarios, RF jamming can be considerably more
intricate, with adversaries employing advanced tactics to
avoid detection and interrupt communications. As such,
while this simulation provides a foundational
understanding, it does not encapsulate the full complexity
of real-world RF jamming.
VII. PRECAUTION
Fig 07: Jammed Signal 02
VI. DISCUSSION
The MATLAB code provided facilitates a detailed
simulation of Radio Frequency (RF) jamming, which is a
form of denial-of-service attack targeting wireless
networks. The code adeptly simulates the RF jamming
process, encompassing the generation of transmitted and
received signals, the introduction of the jamming signal,
and the computation of the resultant jammed signal.
The simulation begins with the generation of the
transmitted signal, characterized by a defined frequency,
amplitude, and modulation index. The received signal is
then formulated based on the transmitted signal. The target
signal, indicative of optimal communication free from
i.
Parameter
Tuning:
Parameters
like
amplitude, frequency, and modulation index are
preset in this code. Adjust these values to meet the
specific needs of your simulation.
ii.
Understanding RF Jamming: This code
models RF jamming, a denial-of-service attack on
wireless networks. Comprehending RF jamming's
impact on wireless communication is crucial for
accurate simulation results interpretation.
iii.
Signal Processing Knowledge: The code
employs signal processing concepts such as
modulation and frequency. Grasping these concepts
is vital for code comprehension and modification.
iv.
MATLAB Proficiency: Written in MATLAB,
this code requires familiarity with its syntax and
functions for effective usage.
v.
Computational Resources: The code
performs intensive computations, particularly with
large datasets. Ensure your system has adequate
computational power.
II.
Enhancing Security in Prisons: Jammers are used in
correctional facilities to prevent inmates from using
cell phones for illegal activities.
III.
Protecting Corporate Data: In corporate
environments, jammers can protect sensitive data
and meetings from unauthorized surveillance.
Preventing Disruptions: In theaters, lecture halls,
and during events or performances, jammers can be
used to prevent disruptions caused by mobile
phones.
vi.
Code Modification: Before modifying the
code or adding features, fully understand the current
code and rigorously test any changes.
IV.
vii.
Visualization: The code generates signal
visualization plots. Understand the significance of
each plot, and ensure any additional plots enhance
simulation result comprehension.
V.
viii.
Error Handling: Currently lacking error
handling, it's advisable to implement it for graceful
failure in production environments.
Blocking
Unauthorized
Communications:
Authorities often use jammers to prevent
unauthorized communications in sensitive areas.
VI.
GPS Jamming: GPS signal jamming devices can be
used for personal privacy, maintaining security,
managing drones, or supporting law enforcement
operations.
VIII. CONCLUSION
This project successfully simulated the process of Radio
Frequency (RF) jamming, a type of denial-of-service attack on
wireless networks, using MATLAB. The visualizations
provided a clear and intuitive understanding of the effects of
RF jamming on wireless communication. The project not only
contributed to the understanding of RF jamming but also
provided a valuable educational tool for students and
researchers in the field of wireless communication. Future
work could involve refining the simulation to model more
complex jamming techniques and exploring potential
countermeasures to these attacks. Overall, the project was a
significant step towards understanding and mitigating the
effects of RF jamming on wireless networks.
Besides there are so many functionalities that is useful in our
daily life. And these are:
I.
Maintaining Exam Integrity: In educational
settings, signal jammers can be used to prevent
cheating by blocking internet access during exams.
REFERENCES
L. Kong, Z. Xu, J. Wang and K. Pan, "A novel algorithm
for
jamming
recognition
in
wireless
communication", 2013 6th International Congress on
Image and Signal Processing (CISP), vol. 3, pp. 14731477, 2013.
[2] https://www.cloudflare.com/learning/ddos/glossary/denial-ofservice/
[3] https://link.springer.com/article/10.1007/s11277-020-07776-3
[4] G. Shao, Y. Chen and Y. Wei, "Convolutional neural
network-based radar jamming signal classification with
sufficient and limited samples", IEEE Access, vol. 8, pp.
80588-80598, 2020.
[1]
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnum
ber=10419450
[6] https://koreascience.kr/article/JAKO201403760397668
.pdf
[5]
Download