You are on page 1of 23

Detection and Resolving

Jamming in RFID Wireless


Network Using Gauss
Elimination Method
Abstract
Some examples of RFID
Intro
RFID is short for Radio Frequency Identification
Military RFID chip
one historical example:
Cold war period and using RFID in spying

USA Soviet Union


One historical example:
Cold war period and using RFID in spying

Hand
carved
ceremonial
seal of us
What is “Tag”?

Tag is RF reader
which consist of
microchip
designed for
wireless data
transmission
How does it work
How does it work
Possible problems using
RFID and possible
solutions
1- Disrupted of RDID
2- Reader collision occurrence
Jamming
What is jamming?

Jamming is  the disruption of existing wireless communications by


decreasing the signal-to-noise ratio at receiver sides through
the transmission of interfering wireless signals.

Jamming occurs when the signal goes from the receiver to the
sender, at that time noise mixes with the original signal and try to destroy
the original signal.
SECURITY ISSUES IN RADIO FREQUENCY
IDENTIFICATION SYSTEM

Communication model between Jammer protection


sender and receiver
Packet Send Ratio (PSR)

Where, Ps1= Number of packets send by 1st sender


Psn= Number of packets send by nth sender
Pis1=Number of packets intended to send by
1st sender
Pis2= Number of packets intended to send by
nst sender
Packet Delivery Ratio (PDR)

Where, Pr1= Number of packets receive


by 1st receiver
Prn= Number of packets receive by nth
receiver
Ps1= Number of packets send by 1st
sender
Psn= Number of packets send by nth
sender
Types of jammers
Constant jammers Random jammers Deceptive jammers Reactive jammers
ATTACKER DETECTION AND JAMMING
IDENTIFICATION

Blockchain: Detection of Jamming Attack Algorithm 1: Detection of Jamming Attack

1. if PDR < Threshold0 then //Start checked signal is


jammed or not
2. Set the Sample Signal Strength
3. else not jammed
4. end if
5. end else
6. if Signal Strength < Threshold 1 then
7. Not Jammed
8. else jammed
9. end if
10. end else
// Checked the jammer attack condition
if PSR < Threshold 2 && PSR=0 then
12. Set Deceptive Jammer
13. else Constant Jammed
14. if PSR < Threshold 2 && PSR > 50 then
15. Set Reactive Jammer
16. else Random Jammer
17. end if
18. end else
19. end if
20. end else
GPS Anti Jamming System

▪ Basically working with a radio


Global Positioning System frequency identification
system.
▪ The System is protected by
GPS
Validation Process of Proposed
Technique

Compensates Phase Change in


Different Jamming Area
Null Steering Beam Forming

Gaussian Jordan Method


Phase Compensation

▪ Input signal is out of phase to the original phase so it will


transfer to the original phase. Mostly the signal value is same
but the angle is different to the original signal so it changing
the original phase and transfer to the output.
Simulation Setup And Experimental
Result

Different values of PSR and PDR are


given according to the type of
attack. If PSR value is nearer to 0,
then jamming type is Deceptive and
if PSR value is nearer to 1, jamming
type is Constant. If PSR value is less
than 50 but greater than 1, it will be
Random jammer else it will be
Reactive jammer.
How can we get original signal
information?
Thanks for listening 

You might also like