0% found this document useful (0 votes)
1 views

IARJSET

Uploaded by

balajigowdru231
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

IARJSET

Uploaded by

balajigowdru231
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

IARJSET ISSN (O) 2393-8021, ISSN (P) 2394-1588

International Advanced Research Journal in Science, Engineering and Technology


ISO 3297:2007 CertifiedImpact Factor 8.066Peer-reviewed / Refereed journalVol. 10, Issue 7, July 2023
DOI: 10.17148/IARJSET.2023.10707

Mobile Jammer Circuit


Vasanth Kumar1, Pavan C2, Praveen D B3, T Girish Chowdary4,
Dr. Dinesh Kumar D S5
UG Students, Department of Electronics and Communication Engineering, K S Institute of Technology,
Bangalore, Karnataka, India1-4
Guide, Assistant Professor, Department of Electronics and Communication Engineering, K S Institute of Technology,
Bangalore, Karnataka, India5

Abstract: Mobile jammer circuits are electronic devices designed to disrupt or block cellular communication signals
within a specified range. This abstract presents a concise overview of a mobile jammer circuit, outlining its purpose,
components, and functionality. Mobile jammer circuits utilize the principles of radio frequency (RF) interference to
interfere with the transmission and reception of mobile phone signals. The primary objective of these circuits is to create
a localized electromagnetic disturbance, rendering nearby mobile devices unable to establish or maintain connections
with cellular networks. The circuit consists of various components, including power sources, oscillators, amplifiers, and
antennas. The power source provides the necessary energy to operate the jammer circuit. Oscillators generate high
frequency signals that are amplified by the amplifier circuitry.

Keywords: Radio frequency

I. INTRODUCTION

A mobile jammer circuit, also known as a cell phone jammer, is an electronic devicedesigned to block or interfere with
the signals between cell phones and their respective base stations. The purpose of a mobile jammer is to create a "dead
zone" or an area where cell phones cannot establish or maintain a connection to a cellular network. Thecircuit of a mobile
jammer typically consists of various electronic components that work together to disrupt the communication signals. The
basic principle behind the operation of amobile jammer is to transmit a high-power signal on the same frequency bands
used by cellphones, effectively overpowering and interfering with the weaker signals from the mobile devices. It's
important to note that building and using mobile jammers may be illegal in many countries. They can disrupt emergency
services, legitimate phone communications, and violate privacy rights.

II. LITERATURE SURVEY

A literature survey typically involves reviewing academic papers, conference proceedings, and other reliable sources to
understand the state of the art and advances in a particular field. Pleasenote that the information below may not be up-to-
date with the latest developments, and the use of mobile jammers may be illegal in many jurisdictions due to their
potential to interfere with communication networks. Always comply with local laws and regulations when dealing with
such devices. "Design and Analysis of a Low-Cost Cell Phone Jammer" by Egea-Lopez et al.

(IEEE Transactions on Consumer Electronics, 2013).This paper presents the design and analysis of a low-cost cell phone
jammer, providing a technical overview of the components and principles used in constructing a basic mobile jammer.
"A Novel High-Power Wideband Jammer Architecture for Countering Cellular and Wireless Networks" by Naik et al.
(IEEE Journal of Selected Topics in Signal Processing, 2014).This paper discusses a novel jammer architecture for
wideband jamming of cellular and wireless networks, exploring techniques to disrupt multiple frequencies efficiently.
"Low-Cost and Portable GPS Jammer" by S. Thilak and K. Varatha Rajan (International Journal of Engineering Research
and Applications, 2015).The paper outlines the design and development of a low-cost, portable GPS jammer to prevent
GPS tracking and navigation signals.

"A Study of Jamming Attacks and Countermeasures in Wireless Sensor Networks" by I.F. Akyildiz and W. Wang (Ad
Hoc Networks, 2005).While this paper is not directly focused on mobile jammers, it provides valuable insights into the
use of jamming attacks in wireless networks and discusses potential countermeasures. "On the Feasibility of Spoofing
GPS Timein Automotive Applications" by C. Hegarty et al. (IEEE International Conference on Intelligent Transportation
Systems, 2015).This paper investigates the feasibility of spoofing GPS time, which is a technique related to jamming that
involves providing incorrect timing information to devices reliant on GPS signals.

© IARJSET This work is licensed under a Creative Commons Attribution 4.0 International License 31
IARJSET ISSN (O) 2393-8021, ISSN (P) 2394-1588

International Advanced Research Journal in Science, Engineering and Technology


ISO 3297:2007 CertifiedImpact Factor 8.066Peer-reviewed / Refereed journalVol. 10, Issue 7, July 2023
DOI: 10.17148/IARJSET.2023.10707
"Detection and Localization of Electronic Warfare and GPS Jamming Sources Using a Networkof Sensors" by N.
Levanon et al. (IEEE Transactions on Aerospace and Electronic Systems, 2011).This research explores methods for
detecting and localizing jamming sources using a network of sensors, which can be useful for identifying and mitigating
jamming threats.wirelessnetwork. Wireless network based transportation applications are discussed in Traffic Plus
Technology[3]. Please keep in mind that the usage of mobile jammers may be illegal in many countries due to the
interference they cause to licensed communication networks, and it can pose significant risks to public safety and
emergency services. Additionally, intentionally causing interference to communication systems is against the law in most
jurisdictions. It is essential to act responsibly and ethically when dealing with any devices that can interfere withwireless
communications.

CIRCUIT DIAGRAM

FLOW CHART

© IARJSET This work is licensed under a Creative Commons Attribution 4.0 International License 32
IARJSET ISSN (O) 2393-8021, ISSN (P) 2394-1588

International Advanced Research Journal in Science, Engineering and Technology


ISO 3297:2007 CertifiedImpact Factor 8.066Peer-reviewed / Refereed journalVol. 10, Issue 7, July 2023
DOI: 10.17148/IARJSET.2023.10707
III. METHODOLOGY

The methodology of a mobile jammer circuit is illegal in many countries and can have serious consequences due to its
interference with licensed communication networks. It is essential to promote ethical behavior and prioritize public safety
and communication infrastructure over personal interests. Here is a general outline of the methodology:

1. Literature Review:
Conduct a thorough literature review to understand the principles of wireless communication, signal modulation, and the
concept of jamming. Explore academic papers, books, and credible online resources.

2. Understanding Mobile Communication:


Familiarize yourself with the working of mobile communication systems, including GSM, 3G, 4G, and other wireless
protocols. Learn about frequency bands, signal types, and modulation techniques.

3. Jammer Concepts:
Study various jammer concepts, such as continuous wave jammers, sweep jammers, and random noise jammers.
Understand how these jammer types can interfere with these of the communication signals.

4. Components and Circuitry:


Learn about the components used in mobile jammers, such as power amplifiers, oscillators, antennas, filters, and control
circuits. Understand how these components work together to disrupt communication signals.

5. Frequency Range and Power:


Analyze the frequency range used by different mobile communication systems and design your jammer circuit to cover
those frequencies. Consider the power requirements and limitations to avoid causing harmful interference.

6. Safety and Legal Considerations:


Understand the legal and safety implications of jamming mobile signals. Be aware of the potential risks to public safety
and emergency services.

7. Simulation and Testing:


Use simulation tools like MATLAB or Circuit simulators to model and simulate the behaviourof your jammer circuit.
Perform testing in a controlled environment with the proper equipment.

8. Ethics and Responsible Use:


Recognize the ethical concerns surrounding mobile jammers and commit to using your knowledge responsibly, adhering
to laws and regulations.

IV. CONCLUSION

Signal jammers are a useful tool for preventing data transmission and protecting private communications. However, their
use is highly regulated and can be illegal if used inappropriately. It is important to understandthe uses and regulations of
signal jammers before using them.

REFERENCES

[1] Nation (2019)”KCSE results of a record 5,000 cheats cancelled”, Nation newspaper (Mar. 04,2019)
[2] Norris, A. (2021) Mobile Phone Detect & Deny technology for Prisons. [Online] Available: mobile-detect-deny-
prisons.pdf (June 11, 2016).
[3] Ochola, G. (2021). The effect of contraband smuggling on rehabilitation of inmates in Kenya: thecase of
[4] Kamiti-maximum-prison. Master’s thesis, Kenyatta University.
[5] CCK (2022) Communication Commission of Kenya – Annual Report 2014/2022. [Online]
[6] Available:http://www.cck.go.ke/html/annual_reports.asp (May 22, 2023).

© IARJSET This work is licensed under a Creative Commons Attribution 4.0 International License 33

You might also like