FPGA Based Wireless Jamming Networks

Anne Yasaswini Chowdary, M. Suneetha


A mobile jammeris a device which is used to jam signals of cell phone from receiving signals from base stations. Mobile jammer is used majorly where the disturbances that are occurred with the cell phones. So, in this paper we are designing a new Mobile Jammer unit which is capable of blocking the cell phone working not the signal receiving from Base Station, which make effective use of the situation where jammers actually used. This was implemented using FPGA by interfacing Mobile Device, RF Transmitter and RF Receiver and LCD Unit.


Jammers, Mobile Jammer, FPGA, RF Transmitter, RF Receiver, LCD.


SeongahJeong, Keonkook Lee, Heon Huh, and Joonhyuk Kang, “Secure Transmission in Downlink Cellular Network with a Cooperative Jammer,” IEEE WIRELESS COMMUNICATIONS LETTERS, ACCEPTED FOR PUBLICATION, 2162-2337/13$31.00 _c 2013 IEEE.

Y. Yang, W.-K. Ma, J. Ge, and P. C. Ching, “Cooperative secure beamforming for AF relay networks with multiple eavesdroppers,” IEEESignal Process. Lett., vol. 20, no. 1, pp. 35–38, Jan. 2013.

M. Vzquez, A. Prez-Neira, and M. Lagunas, “Confidential communication in downlink beamforming,” in Proc. 2012 IEEE Workshop on Sign.Proc. Adv. in Wireless Comm., pp. 349–353.

S. Jeong, K. Lee, J. Kang, Y. Baek, and B. Koo, “Cooperative jammer design in cellular network with internal eavesdroppers,” in Proc. 2012IEEE Mil. Comm. Conf., pp. 1–5.

Q. Li and W. K. Ma, “Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming,” IEEE Trans. SignalProcess., vol. 59, no. 8, pp. 3799–3812, Aug. 2011.

H. D. Ly, T. Liu, and Y. Liang, “Multiple-input multiple-output Gaussian

broadcast channels with common and confidential messages,” IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5477–5487, Nov. 2010.

R. Mochaourab and E. A. Jorswieck, “Optimal beamforming in interference networks with perfect local channel information,” submitted to

IEEE Trans. Signal Process.Preprint available on arXiv:1004.4492, Oct. 2010.

R. Liu, T. Liu, H. V. Poor, and S. Shamai (Shitz), “MIMO Gaussian broadcast channels with confidential and common messages,” in Proc.IEEE Int. Symp. Inf. Theory, Austin, TX, Jun. 2010.

E. Ekrem and S. Ulukus, “Gaussian MIMO broadcast channels with common and confidential messages,” in Proc. IEEE Int. Symp. Inf.Theory, Austin, TX, Jun. 2010.

T. Liu and S. Shamai (Shitz), “A note on the secrecy capacity of the multiple-antenna wiretap channel,” IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547–2553, Jun. 2009.

S. Shafiee, N. Liu, and S. Ulukus, “Towards the secrecy capacity of the Gaussian MIMO wire-tap channel,” IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4033–4039, Sep. 2009.

A. S. Motahari and A. K. Khandni, “Capacity bounds for the Gaussian interference channel,” IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 620–643, Feb. 2009.

Full Text: PDF [Full Text]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.