ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Trapping Unauthorized Signals in Jammer

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 7)

Publication Date:

Authors : ; ;

Page : 1934-1936

Keywords : Authorized Jammer; Public Key cryptography; Elliptic curve;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

This paper presents a mechanism, called Authorized Jammer, which provide jamming capability that can trapped unauthorized wireless signals and at the same time access authorized communication. The jammer jams the wireless signals continuously by using secret keys, so that the jamming signals identify the signals come from unauthorized devices, and can access the signals by authorized devices with the secret keys. To achieve this jammer by developing new design circuit for trapping the signals. This paper assume authorized devices as mobile phones signals and other than that assume unauthorized devices.

Last modified: 2021-06-30 21:50:52