Signal Jammer
DOI:
https://doi.org/10.61841/5tbkkw21Keywords:
Frequency, Jammer, block, controlAbstract
A cell phone signal jammer is a device that blocks the transmission of signals between a cell phone and a base station. In the cell phone signal jammer, we use the frequency as a mobile handset. The cell phone signal jammer creates a strong interference between the communication between the caller and receiver. This effect blocks the transmission of the signals from the networks, including UMTS, CDMA, 3G, 4G, 4G+5G, GSM, and PHS.
Downloads
References
1. https://electronicsforu.com/electronics-projects/build-cell-phone-jammer
2. S. V. Kartalopoulos, “A primer on cryptography in communications,” IEEE Communications Magazine,
vol. 44, no. 4, pp. 146–151, 2006.
3. R. Bassily, E. Ekrem, X. He et al., “Cooperative security at the physical layer: an outline of recent advances,” IEEE Signal Processing Magazine, vol. 30, no. 5, pp. 16–28, 2013.
4. L. J. Rodriguez, N. H. Tran, T. Q. Duong, T. Le-Ngoc, M. Elkashlan, and S. Shetty, “Physical layer security in wireless cooperative relay networks: state of the art and on the far side,” IEEE Communications Magazine, vol. 53, no. 12, pp. 32–39, 2015.
5. K. Cumanan, H. Xing, P. Xu et al., “Physical layer security-jamming: theoretical limits and sensible
styles in wireless networks,” IEEE Access, vol. 5, pp. 3603–3611, 2017.
6. C. Wang and H.-M. Wang, “Robust joint beam forming and electronic jamming for secure AF networks:
low-complexity style,” IEEE Transactions on Transport Technology, vol. 64, no. 5, pp. 2192–2198, 2015.
7. L. Lai and H. El Gamal, "Relay-eavesdropper channel: cooperation for secrecy,” IEEE Transactions on
info, theory, vol. 54, no. 9, pp. 4005–4019, 2008.
8. S.Bi, C. K. Ho, and R. Zhang, “Wireless high-charged communication: opportunities and challenges,”
IEEE Communications Magazine, vol. 53, no. 4, pp. 117–125, 2015.
9. X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless networks with RF energy harvesting: a up-to-date survey,” IEEE Communications Surveys & Tutorials, vol. 17, no. 2, pp. 757–789, 2015.
10.W. Liu, X. Zhou, S. Durrani, and P. Popovski, “Secure communication with a wireless-powered friendly transmitter,” IEEE Transactions on Wireless Communications, vol. 15, no. 1, pp. 401–415, 2016.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.