You are currently viewing a new version of our website. To view the old version click .
Applied Sciences
  • Article
  • Open Access

13 November 2023

Intelligent Jammer on Mobile Network LTE Technology: A Study Case in Bucharest

,
,
,
,
and
1
E.T.T.I. Doctoral School, National University of Science and Technology Politehnica Bucharest, 060042 Bucharest, Romania
2
Department of Telecommunications, E.T.T.I. Faculty, National University of Science and Technology Politehnica, 060042 Bucharest, Romania
3
National Institute for Research and Development in Electrical Engineering ICPE-CA, 030138 Bucharest, Romania
*
Authors to whom correspondence should be addressed.
This article belongs to the Special Issue Trends and Prospects for Wireless Sensor Networks and IoT

Abstract

The purpose of this study was to develop a laboratory model that enables the monitoring of communications carried out through mobile phones and their blocking in cases where it is prohibited. The main goal was to realise an intelligent jammer that blocks only illicit communications. The jammer was built with a software-defined radio (SDR) that can be found on the market and is accessible from a financial point of view. This study consisted of an analysis of the behaviour of mobile phones and mobile networks using the long-term evolution (LTE) of UMTS technologies so that the jamming technique can disrupt the communication of the cellular mobile system by using the software-defined radio and Python ecosystem. Because the 5G standalone (5G SA) is not yet implemented in Romania, we could not start developing a laboratory model for jamming this technology. When 5G SA is implemented, we will adapt this intelligent jamming solution to the new technology.

1. Introduction

Nowadays, mobile phones have become an indispensable part of society, impacting human lives in various aspects. Mobile phones and especially smartphones have revolutionised the methods of communication, connectivity and information access and have become the main devices used to access the internet. These phones enable real-time communication through calls and texts, effortlessly connecting people across the world. Through 4G data connections, mobile phones provide access to various messaging apps and a vast store of information at our fingertips. Additionally, mobile phones provide a lifeline during emergencies, allowing users to call for help, receive emergency alerts, and access critical information during natural disasters or other crises.
Despite all the positive aspects brought about by this upward trend, from a technological point of view, mobile phones also introduce a series of elements that negatively impact society from a legal standpoint. The small dimensions, low battery consumption, ease of obtaining a SIM card with data and internet services, and extremely easy access to the internet make mobile phones a very dangerous device in areas where electronic devices are not allowed. One of the environments where phones are strictly prohibited due to security risks is a prison. Despite the regulations that completely prohibit mobile phones in prisons, there are prisoners who manage to gain access to such devices and subsequently access the internet.
Over the years, several researchers have studied various security aspects related to mobile networks, as well as the possibility of increasing their resilience. In [1], the authors made a thorough survey regarding jamming attacks that can be performed on new-generation communication systems and their effect on LTE systems. Several jamming methods that were found to be disruptive for the LTE system were enumerated and, in the final part of this paper, several research directions for increasing the system resilience are highlighted. The authors of [2] also presented a comprehensive survey regarding the security attacks on an LTE system, which were classified based on the level they are performed on the OSI protocol stack. For each type of attack, the causes, implications and possibility of defence are presented. The authors also underlined the fact that there are still unsolved security breaches in the 5G air interface and offered several directions for future research. In another survey [3], the authors presented ample material regarding jamming attacks on different wireless networks, such as WLANs, cellular systems, Zigbee, Bluetooth, LoRa and RFID links, as well as anti-jamming strategies that have been identified. In [4], the authors presented a radio jammer for suppressing a detonation code transmitted using remote-controlled detonators; it was implemented with an optoelectronic device that produced replicas of a useful radio signal that degraded the quality of the transmitted signal. The device was simulated, designed and implemented as a prototype that validated the results. The authors of [4] presented a novel approach for implementing a jammer against wireless detonating devices by using optoelectronic equipment that generated replicas of the transmitted signal to destructively interfere with the correct one, and thus, reduce the signal-to-interference ratio, making the detonating code unrecognisable. The device was designed, developed and tested in MatLab, and then implemented as a prototype. In [5], the authors studied the vulnerability of LoRa radio links using single-tone, multi-tone and band-jamming strategies, with the results showing that this type of radio connection is robust to the type of jamming, with tone jamming being the most harmful one. The authors of [6] studied issues related to security aspects of low-power wide-area networks, including a review of the recently published research papers relevant to this domain, and identifying the critical attack vectors, as well as the most suitable protection and defence mechanisms. In [7], the authors studied two types of jammers, namely, the random signal jammer and the phase shift signal jammer, which were tested against the 5G signal. In [8], the authors proposed a prototype for a cascaded detector–jammer that can block a radio signal for 2G, 3G and 4G networks within a small distance range to be used for protected areas like prisons, examination rooms, confidential facilities and military bases. The authors of [9] presented an analytical procedure for evaluating the anti-jamming capacity of an underwater acoustic direct sequence spread spectrum (DSSS) communication system under different types of jammers (single tone, partial band and wideband) and compared the theoretical results with the ones obtained based on simulations. In [10], the authors mathematically evaluated and simulation-tested the performances of a deep-reinforcement-learning-based anti-jamming method for different types of jammers and designed a jamming algorithm that was found to be effective with the anti-jamming algorithm to prove its limitations. In [11], the authors proposed a reinforcement-learning-based jamming algorithm and its universal software radio peripheral (USRP) implementation showed that it was effective for 5/6G communications systems that involved the orthogonal frequency-division multiplexing (OFDMA) technique.
As one can see, some of the abovementioned research covered only partial aspects of the issues. Some analysed the vulnerability of mobile communication technologies to jamming, while other solutions performed long-term jamming in all downlink (DL) bands of all mobile communication bands (e.g., jamming systems for explosive improvised devices). Also, when searching the literature, we found few results regarding the practical implementation of USRP-based narrowband jamming signals based on monitoring the downlink connection, and no results for the specific communication landscape offered in Bucharest.
The originality of this study consisted of the fact that it involved, at first, an analysis of the spectral domain used by each mobile communication operator, and based on this, the mobile service operator that could potentially be selected by a terminal that offered the best network parameters was chosen, and the jamming was performed only on the DL frequency of the selected service. The authors choose not to use broadband jamming for the entire DL frequency range, but only on that particular DL channel of the service with significant parameters selected by a user in a limited time interval.
Within this study, several objectives were aimed towards:
  • To determine whether downlink jamming using the SDR Hack-RF can be performed in two different scenarios: when the position of the receiver was neighbouring the cell and when it was at the edge of the cell by considering two different values for the strength of the received signal.
  • To evaluate the possibility of using reactive jamming on the downlink connection when the receiver was at the edge of the cell, to evaluate the technical limitation when the receiver was neighbouring the cell and to identify a solution for intelligent jamming.
  • To develop an intelligent jamming system using commercial equipment that can be exploited in indoor conditions to react to a downlink signal when an amplitude of the monitored uplink signal above a predetermined threshold is detected.
Based on the abovementioned objectives, the main contributions of this study are as follows:
  • This study proposed a practical approach to reveal the ease of jamming by a malicious person of communications carried by mobile network operators under indoor laboratory conditions [12].
  • The robustness and applicability of the proposed practical method were verified through extensive simulations and rigorous testing procedures. The results indicate that the intelligent jamming system’s ability to withstand dynamic changes in power provided by the network operators was limited.
Intelligent jamming consists of hardware and software that work together to block any radio event in the specific band on the DL connection, which is enabled by an amplitude above a threshold set based on radio measurements detected on UL channels.
Monitoring the DL connection provides knowledge of the availability of the network operators at a specific monitoring radio point. The list of available bands with their central frequencies is provided to Hack-RF. Python code developed from scratch is powered with the list of available DL frequencies. Based on this, it calculates the corresponding UL frequencies and starts monitoring them. An amplitude above −60 dBm on a UL-monitored frequency enables an emission on the corresponding DL frequency for 15 s. After all the input parameters are set, the jamming system is autonomous in its decisions.
The intelligence component of the process consists of the following:
Analysis of the spectral use by mobile communication operators.
The selection of the mobile communications service that has the most significant network parameters and that would cause a mobile device to register in that band/technology.
Jamming only on the DL frequency of the selected service for a limited period set by the operator (a few seconds).
The originality here lies in the fact that broadband jamming is not performed for all DL frequencies in the range including 800, 900, 1800, 2100 and 2600 MHz, but only uses targeted jamming on the DL channel of the service with significant parameters selected by the operator and in a limited period. This reduces the exposure to electromagnetic radiation of people who are in the secure area; reduces the electricity consumption of the jamming system; avoids electromagnetic interference with other electronic communication systems; and, of course, obtains results from jamming the radio connections of the mobile devices in areas where their usage is prohibited.
This article is structured as follows: Section 2 presents an overview of the radio downlink connections of the mobile network operators in Bucharest, Romania. Section 3 describes some theoretical aspects of jamming systems, conditions for jamming and simulations of the theoretical scenarios. Subsequently, Section 4 showcases the test results, confirming both the validity and sustainability of the proposed methods for analysing jamming possibilities, each with its environmental conditions and limitations. This paper concludes in Section 5, with discussions, remarks and future works.

3. Intelligent Jamming

To disrupt communications through jamming, it is sufficient to block either the downlink or uplink frequencies of the smartphones. Uplink and downlink are fundamental concepts in telecommunications that refer to the direction of data transmission within a communication system, especially in wireless networks [12].
In a wireless communication system, like a cellular network, the uplink and downlink operate on separate frequency bands to facilitate simultaneous two-way communication. This frequency division ensures non-interference between uplink and downlink transmissions to promote efficient and balanced communication between users and the network infrastructure.
The principle of jamming involves emitting interfering signals on the same frequencies as the target device’s communication signals but with greater power and the same bandwidth. This interference overwhelms the target system, rendering it unable to effectively transmit or receive information. The suitable scenarios for the experiments we took into consideration were the following [5]:
  • Frequency matching: jamming devices are designed to transmit signals on the same frequency bands or channels used by the target system.
  • Continuous jamming: Jamming can be continuous, where a constant jamming signal is transmitted, or it can be pulsed, where jamming signals are emitted intermittently. Pulsed jamming can make it more challenging for the target system to adapt or counteract the interference.
  • Partial-band jamming (PBJ): jamming can target specific frequencies or frequency bands, while broadband jamming covers a wider range of frequencies.
The choice depends on the goal and the capabilities of the jamming device.
In all our test experiments, we used frequency-match jamming, continuous jamming and partial-band jamming.
Partial-band jamming is a strategy that disrupts a specific portion of the total bandwidth. This is achieved by transmitting additive white Gaussian noise (AWGN) within that specific band section. When the jamming power remains constant, the efficiency of this approach is directly related to the proportion between the bandwidth used for jamming and the bandwidth of the original signal.
Jamming can be used for illegal purposes, such as disrupting commercial communication systems, GPS signals or even Wi-Fi networks. To mitigate the effects of jamming, organisations and governments employ techniques like frequency hopping, spread-spectrum communication and encryption to make it more challenging for jammers to interfere with their systems. Additionally, they invest in signal-analysis and jamming-detection technologies to identify and counter jamming attempts.
With the increasing prominence of SDR technology, jammers have gained greater adaptability and simplicity in usage, becoming conveniently available for online purchase at reasonably affordable costs. However, the improper use of such devices poses a significant societal challenge, as it undermines the reliability and safety of critical wireless communications. Furthermore, there is a potential economic impact that harms the earnings of mobile service providers in the event of a large-scale attack.
In this study, we conducted experiments on jamming in downlink bands based on the sensibility of the mobile phone, signal noise and strength of the signal level of the network; interesting results were obtained. Intelligent jamming methods consist of analysing the availability of the mobile network operators at a specific point of interest. To achieve this, a Python code was developed and the SDR Hack-RF Sweep was used to measure the amplitude of the uplink frequency. Based on these measurements, a jamming signal was emitted on the corresponding downlink frequency [12].
Within the context of this study, based on the theoretical considerations regarding the LTE telecommunications technologies presented above, a jamming system was tested and interesting results were obtained under laboratory conditions. First, we jammed the downlink connections received at the radio measurement point, and second, based on monitoring the amplitude of the uplink connection, we continuously jammed the corresponding downlink frequency channels.

3.1. Radio Sensitivity of a Mobile Phone

To determine the effectiveness of the jamming device, it is very important that when the mobile phone tries to register in the network, it is aware of its position in the cell, whether it is within the cell’s core coverage area, whether there are neighbouring cells or whether it is at the cell’s coverage edge. Several measurements must be undertaken to verify the signal strength of the received signal. The radio sensitivity of a mobile phone refers to its ability to detect radio signals from mobile communication networks (such as signals from cell towers) in conditions of weak reception or when the signal is faint. The sensitivity of a smartphone can vary depending on several factors, including the model, manufacturer and technology used. In general, the signal sensitivity level at which a smartphone can operate efficiently falls within the range of approximately −90 dBm to −120 dBm.

3.2. Minimal/Maximal Output on DL LTE Technology in 800 MHz Band

Radio measurements were undertaken for the downlink connection, and the range for received signal level was found to be between −50 and −80 dBm neighbouring the cell (approximately 200 m), which corresponded to a good signal level, and −80 to −100 dBm at the edge of the cell coverage area [14].
The minimal and maximal output power levels of the downlink of a wireless communication system can indeed vary depending on the technology and the specific frequency band or bandwidth being used:
  • Minimal output power: LTE devices can have minimal output powers in the range of −10 to −13 dBm, especially for low-power modes.
  • Maximal output power: the maximum output power for LTE devices can range from −23 to −33 dBm or more, depending on the frequency band and the specific LTE category.

3.3. Estimation of Jamming Effect

Estimating the effect of jamming in a communication system can be complex and depends on various factors, including the characteristics of the jamming signal, the modulation scheme and the signal-to-noise ratio (SNR) of the communication channel. There is no single formula that universally applies to all scenarios, but a simplified formula for estimating the bit error rate (BER) of a communication system under jamming conditions is presented in Equation (1) [15,16].
Calculating the minimum effective jamming power (EIRP—equivalent isotropic radiated power) and, consequently, the maximum range of a jamming device involves several factors, including the jamming device’s output power, the sensitivity of mobile phones and potential interference from the surrounding environment. This can be a complex task and should be undertaken carefully for accuracy. Below are the general steps to follow:
  • Know the jamming device’s output power (dBm): Start by knowing the output power of the jamming device, expressed in decibel-milliwatts (dBm). This is the actual power the device emits.
  • Know the sensitivity of mobile phones (dBm): Be aware of the minimum signal level that mobile phones in the affected area need to receive to operate correctly. This is their sensitivity, also expressed in dBm.
  • Calculate the power difference (dBm): The difference between the jamming device’s output power and the sensitivity of mobile phones will determine the minimum effective jamming power needed to interfere with the signal. The power is expressed in dBm, and is given by Formula (1):
P o w e r J a m m i n g d B = P o w e r O u t p u t d B P h o n e s e n s i t i v i t y d B
The SNR, or signal-to-noise ratio, is a measure used to quantify how significant a signal is compared with the noise in a communication system or measurement. It is typically expressed in decibels (dB) and represents the ratio between the signal power and the noise power.
S N R dB = 10 · log 10 P s i g n a l P n o i s e
where:
  • P s i g n a l is the power that is measured on the downlink connection from the network.
  • P n o i s e is a parameter that is measured at the output of the Hack-RF antenna.
Calculating the SNR using Formula (2) can be undertaken in two different scenarios. With an RSRP −79.5 dBm, as measured in the monitoring radio point, the following is illustrated in Figure 4:
  • First, the output of Hack-RF was 15 dBm, and using an antenna without gain, the SNR was −7.24 dB.
  • Second, the output of Hack-RF was 22 dBm, and using a directional antenna with 7 dBi gain, the SNR was −5.596 dB.
We considered the RSRP measured with QualiPock installed on a smartphone because it was the closest to measuring a real scenario. The RSRP obtained with Nestor was higher just because the sensitivity of the spectrum analyser was higher than that of a mobile phone.
In conclusion, to obtain an overview of how the SNR is modified by increasing the frequencies of the LTE technologies, we considered the RSRP obtained with Nestor for the LTE DL connections monitored (Figure 3) and P n o i s e = 22 dBm. Therefore, calculating with Formula (2):
  • The RSRP for band 20 (800 MHz) was −58.82 dBm and SNR = −4.254.
  • The RSRP for band 1 (2100 MHz) was −87.73 dBm and SNR = −6.025.
  • The RSRP for band 38 TDD (2600 MHz) was −85.29 dBm and SNR = −5.886.
  • The RSRP for band 7 (2600 MHz) was −81.94 dBm and SNR = −5.723.
In LTE networks, SNR values typically range from around −20 dB to 40 dB or more, depending on the signal conditions; an SNR below 0 dB indicates a very poor signal quality and the signal may be practically unusable [16]. In our experiments, an SNR below 0 was a very good indicator that our conditions for jamming were appropriate.
The relationship between the signal ratio from a jammer (interference device) and the network is given in [16]:
J S = E I R P j a m m e r E I R P n e t w o r k · 4 π R 2 λ · B W n e t w o r k B W j a m m e r
where:
  • J S is the signal-to-jammer to signal-to-network, also called the SIR (signal-to-interference ratio), and typically refers to the ratio of the desired signal power to the interference power, where the interference includes any unwanted signals or noise that can degrade the quality of the received signal.
  • E I R P j a m m e r is the equivalent isotropic radiated power (EIRP) of the jammer.
  • E I R P n e t w o r k is the equivalent isotropic radiated power (EIRP) of the network.
  • R is the distance between the jammer and the mobile phone.
  • λ is the wavelength and λ = c / f , where c = 3 × 108 m/s is the speed of light and f is the downlink central frequency (Hz).
  • B W n e t w o r k represents the network bandwidth.
  • B W j a m m e r represents the jammer bandwidth.
In the Matlab simulations, we considered
E I R P j a m m e r d B m = P T x d B m + G d B i = 15 + 7 = 22 ( d B m )
where P T x dBm is the transmitted power in decibel-milliwatts, G dBi represents the gain (directivity) of the antenna in decibels isotropic, E I R P n e t w o r k dBm is a measure of the effective radiated power from an antenna or transmitter in a specific direction, which is an important parameter in wireless communication systems and was −79.5 dBm at the monitored point. The distance R was considered to be 1 m, and the wavelength was
λ = c f = 3 · 10 8 793.5 · 10 6 = 0.378 ·   B W n e t w o r k = B W j a m m e r = 5   MHz
The path loss formula describes the attenuation of a signal as it propagates through a wireless communication channel. The path loss depends on various factors, including the distance, frequency and environment. One commonly used path loss model is the free-space equation, which is suitable for free-space or open-air scenarios and assumes no obstacles or interference; it is given by Formula (6):
P L dB = 20 · log 10 4 π d f c + G + L o b s t a c l e
where P L dB is the path loss in decibels (dB); d is the distance between the transmitter and receiver in meters (m), where it was considered in the range of 1–8 m (with steps of 0.5 m); f is the frequency of the signal in hertz (Hz); c = 3 · 10 8 m / s is the speed of light; G represents the antenna gain, which was considered to be +7 dBm; and L o b s t a c l e represents additional losses due to obstacles and the environment, which was considered to be 0.
Considering E I R P j a m m e r at 22 dBm, we could calculate the final E I R P j a m m e r only after we decreased the value of Hack-RF to 22 dBm for the P L dB and considered the distance from 1 to 8 m with steps of 0.5 m.
Therefore, Formula (3) can be rewritten as follows, with the same values for B W n e t w o r k = B W j a m m e r = 5   M H z and λ = c f = 3 · 10 8 793.5 · 10 6 = 0.378 m considered above:
SIR = J S = E I R P j a m m e r P L E I R P n e t w o r k · 4 π R 2 λ · B W n e t w o r k B W j a m m e r
Decreasing E I R P j a m m e r with a negative value leads to an increase. Using Formula (7) for SIR and (6) for PL, and considering SIR = 0 dB as the limit of the effectiveness of jamming.
  • E I R P j a m m e r = 22 dBm (maximum level the SDR Hack-RF could generate).
  • E I R P n e t w o r k = −79.5 dBm (maximum level of DL Digi Mobile signal received by TSMA6).
  • DL channel centre frequency from Digi Mobile = 793.5 MHz.
  • B W n e t w o r k = B W j a m m e r = 5   M H z .
  • Receiving antenna gain = 7 dB.
We calculated the SIR for different distances between 1 and 8 m and determined the maximum efficiency of the jamming system (distance between the jamming equipment and the Digi Mobile smartphone), which corresponded to the case when SIR = 0 dB.
Figure 6 presents the decreasing SIR according to the increasing distance between the system jamming and the smartphone.
Figure 6. Graph of maximum effective distance of the jamming equipment.
If we modified the system such that B W j a m m e r = 10 M H z , all SIR values calculated and presented in Table 3 would be half of the values presented.
Table 3. SIR values calculated for different distances.
If we considered the maximum B W j a m m e r = 20 M H z and B W n e t w o r k = 5   M H z , the values calculated and presented in Table 3 would be a quarter of the SIR values presented.
To perform a denial of service (DoS) through jamming, it is enough to block only one connection of the mobile terminals, i.e., the downlink or uplink. To jam downlink connections, several conditions must be fulfilled, including completing a study of the availability of the network providers and the radio environment must be suitable for this kind of jamming.
Even for academic purposes, jamming uplink connections is illegal, and thus, these kinds of simulations were excluded because the jamming device would introduce dangerous interferences in the mobile operator network.
In Digi Mobil in laboratory conditions, jamming the downlink connection was successful since the strength of the network parameters did not exceed the possibilities of the Hack-RF in terms of power. The method of jamming the whole downlink band was shown not to be a reliable one because it depended very much on the network provider emitting signals and, of course, on the limited power and bandwidth of Hack-RF.
After conducting the tests on downlink jamming, with all the constraints mentioned above, our efforts were concentrated on developing an intelligent jamming system for the downlink connection. This system aimed to block the access of smartphones from registering in the network by employing pulsatory jamming in the downlink bands that was triggered by the detection of data traffic in uplink bands. Very good results were obtained with this method of concentrating all the power only on the frequencies that carried traffic.

4. Experimental Setup and Results

In our experimental study for an intelligent jamming system, we used several tools to show the efficiency of the denial-of-service attack, including the following:
  • Nestor software by Rohde & Schwarz and TSMA 6 [13].
  • Portable receiver PR 100 [17].
  • A smartphone using QualiPock software and registered with Digi Mobil Romania.
  • Laptop with OS Kali Linux.
  • Hack-RF SDR with the following specifications [18]:
    Frequency range = 1–6000 MHz.
    Half duplex.
    ADC resolution = 8 bit.
    Bandwidth = 20 MHz.
  • Directional antenna adapted to mobile communication frequency ranges.
  • Python code.

4.1. Initial Measurements

The first scenario was when the receiver was located near the cell. Figure 6 displays the received signal level measured for a downlink frequency of 793.5 MHz. The level of signal received was −76.8 dBm, which corresponded to the proximity of the cell’s base station. Additionally, Figure 7 shows the resource block measured on the central frequency of 793.5 MHz with a bandwidth of 5 MHz.
Figure 7. Downlink measurement in the vicinity of the cell.
By applying Formula (6), the path loss P L d B was calculated at a 1 m distance as being −33.238 dBm. Subsequently, using Formula (7) with the received signal level (RSRP) of −79.5 dBm, we determined a signal-to-interference ratio (SIR) of −33.63. This calculation indicates that jamming the downlink connection in the condition of good signal strength was confirmed by the experiment.
Figure 8 presents the signal level measured on the uplink connection corresponding to an uplink frequency of 834.5 MHz, which was measured at −81 dBm; this is illustrated in green in the waterfall window and corresponds to the vicinity of the cell. We could conclude that the smartphone that was next to the cell emitted less power at the uplink frequency thanks to the signalling procedure in which the smartphone revealed its location in the network. As a result, the power level was adjusted, considering the network, to be lower.
Figure 8. Uplink measurement in the vicinity of the cell.
Figure 9 presents the received signal level measured for a downlink frequency of 793.5 MHz, which was measured at −94.1 dBm and corresponded to the edge of the cell coverage. It is shown in Figure 9 that the resource block measured on the central frequency was 793.5 MHz with a bandwidth of 5 MHz. Applying Formula (6), the path loss P L d B was calculated at a 1 m distance to be 3−3.238 dBm, and the SIR, which was calculated with Formula (7) for the signal level of the RSRP of −94.1 dBm, was −19.514. The value of the SIR was below the minimal value of the limits presented above for an LTE connection. Therefore, jamming in this condition can successfully affect the communication channel.
Figure 9. Downlink measurement at the edge of the cell coverage.
Figure 10 presents the signal level measured on an uplink connection corresponding to the uplink frequency of 834.5 MHz, which was measured at −55.8 dBm when the smartphone was transmitting to the network in a data session. We could conclude that a smartphone that was at the edge of the cell emitted more power at the uplink frequency because of the signalling procedure in which the smartphone revealed its location in the network, and thus, the power level was increased in accordance with the network.
Figure 10. Uplink measurement at the edge of the cell coverage.
Figure 11 illustrates the setup used for the experimental jamming on the downlink connection in the real case scenario (Digi Mobil smartphone presented in Figure 6), where the RSRP was −79.5 dBm. A radio monitoring spectrum analyser Nestor TSMA 6 was used to discover and measure all available frequency bands and the technologies provided at the radio-monitoring point. A list of all available frequencies was obtained and provided to the Hack-RF to prepare the jamming frequencies.
Figure 11. Experimental setup for jamming downlink connection.

4.2. Implementation of the Jammer

Figure 12 illustrates the block diagram of the experimental setup and the flow of data. It is shown that the spectrum analyser Nestor monitored the downlink connection and provided the laptop with all the measurements set by the operator. Through the internet, the list of downlink frequencies and channels with the received signal level was provided to the laptop that controlled Hack-RF. To perform a jamming attack, the operator of the jammer manually set the central frequencies of the downlink connections and the bandwidth. After all these parameters were set, jamming could be performed. PR100 confirmed the actual signal level and whether the jamming procedure affected the radio spectrum monitored.
Figure 12. Block diagram for experimental setup.
The objective of jamming the downlink connection as shown in Figure 13 was accomplished. It was shown that an emission next to the receiver interfered with the downlink and disrupted the communication between the network and the smartphone. Therefore, taking into consideration the Matlab-simulated scenarios, the jamming of the downlink was verified and demonstrated.
Figure 13. Experimental setup for jamming downlink connection with Nestor.
Monitoring the downlink frequencies can provide important information regarding the potential for employing reactive jamming on these frequencies. The efficiency of the jamming system was determined by monitoring the downlink by considering a Hack-RF output power of 15 dBm at its maximum, along with a 7 dBi antenna gain, resulting in a total of 22 dBm.
Once the downlink channels were identified with the Nestor monitoring spectrum analyser based on the frequencies, the uplink frequencies could be calculated for monitoring purposes. This allowed us to focus our monitoring efforts exclusively on these frequencies.
Basically, the block diagram and flows are illustrated in Figure 14:
Figure 14. Block diagram for experimental setup jamming downlink connection with Nestor.
Practically, any amplitude detected on the uplink frequencies provided by Nestor above −70 dBm triggered an emission at the corresponding downlink frequency at the maximum Hack-RF power. Hack-RF was used for detection and emission. After 15 s, the jamming was stopped, and the process repeated in a loop.
The usage of jamming only of the existing downlink frequencies in the respective area offers the advantage of using reduced processing power, as well as a much shorter time to act [19,20].
A Python script was developed for an intelligent jamming system that uses Hack-RF and calls upon a set of standardised Hack-RF manipulation libraries. Practically, the entire uplink band of 800 MHz LTE technology was scanned. The next step involves scanning these uplink frequencies to see whether there are radio signals emitted by mobile phones [12]. Figure 15 depicts the setup for the jamming downlink connection without using a spectrum analyser. As we can observe, the Python code acts directly on Hack-RF through the developed code.
Figure 15. Experimental setup for jamming the downlink.
Once the uplink frequency is identified, the entire scanning process stops following the jamming of the mobile phone. Stopping the scan and switching to emission brings a delay time to the whole process. This time cannot be 0 s because the SDR Hack-RF is not a full duplex; therefore, it cannot receive and emit concurrently, and thus, these processes must be independent in time.
To perform this test, a mobile phone registered on the Digi Mobil Romania network in the 800 MHz LTE technology was utilised and a voice call was made using this smartphone.
Considering the uplink frequency band and the 100 kHz channel splitting, a spectrum scan was performed using Python code on the uplink frequencies starting from 832 MHz up to 862 MHz. The first central frequency for LTE 800 was 834.5 MHz, channel 24,175; then, all central frequencies were scanned with a spacing of 100 kHz so that only the LTE 800 channels were considered [21].
The Python script was used to process the data to identify and visualise the signals across various frequency bands, making it useful for tasks like frequency analysis, signal identification and identifying potential sources of interference.
After scanning, the maximum level of amplitude on the frequency of 834.5 MHz was identified. In our laboratory conditions, the smartphone registered in the LTE 800 MHz band, the UL measurement revealed that the smartphone amplitude in this conditions was almost −68.32 dBm [22].
After identifying this frequency, Hack-RF was tuned to the identified frequency, enabling it to emit a stronger signal in terms of the amplitude and wider bandwidth in the waterfall window, as illustrated in Figure 15. After 10 s, the jamming was stopped, and the scanning procedure started to identify another amplitude level above −60 dBm. The advantage of this method of scanning only a predefined list of frequencies lies in the fact that the spectrum will be swept much faster so that the chances of an illegal phone being able to access the services are very low. Another advantage is reflected in the use of receivers and transmitters whose band does not have to cover the entire spectrum. The main disadvantage of this method consists of the fact that the spectrum must be periodically scanned to identify the changes made by mobile phone operators in the area or to be aware of the implementation of new technologies. Even if it is necessary to periodically scan the radio spectrum from the point of interest, in practice, it is known that the network operators do not make changes every day in their allocation of technologies in frequency bands. This is why we include a table (Table 1) displaying the leased bands authorised by the regulatory authority where Digi Mobil must provide services. As a result, the network operators cannot provide services in bands other than those assigned to them. In Appendix A, we present the pseudocode behind the Python code developed.
The results were determined after the distance between the Hack-RF antenna and the smartphone was reduced. After several tries, it was determined that the effect of the jamming with the power provided by Hack-RF became noticeable at 1.5 m. At 8 m, the effect of the jamming was not as clearly visible in the radio spectrum. Figure 16a presents the radio spectrum obtained with PR100, which shows the manifestation of the jamming on the downlink frequency of 793.5 MHz. Figure 16b presents the effect of the jamming device on the smartphone-received signal.
Figure 16. (a) Downlink jamming. (b) QualiPock monitoring frequency.
As demonstrated earlier, there are several methods for jamming smartphone network connections based on the characteristics of the network availability in the area and with some commercial tools available in online markets.
For a man-in-the-middle attack using denial of service, jamming devices are highly effective in indoor conditions. Therefore, an attack is most likely to occur indoors. To avoid such an attack, it is important to be careful with our smartphones, and when we notice any fluctuations in the received signal or vertical handover, it is recommended to use an application to monitor the cell parameters to discover whether it is an attack. If we discover that we are a victim of a denial-of-service attack, for our protection, it is advisable to manually activate airplane mode from the smartphone menu and leave the indoor area [3].
Fortunately, this kind of denial of service attack does not compromise subscribers’ personal data or provide the ability to track their activities. However, it can affect the possibilities to communicate by altering the radio spectrum capabilities.
Unfortunately, if the denial-of-service attack is a success and the smartphone is registered as using GSM technology, which has known vulnerabilities, attackers with the right hardware and software may be able to perform other types of attacks, including identifying unique parameters like IM-SI/IMEI or more severe actions like eavesdropping or locating the subscriber within the network [23,24].

5. Discussion, Conclusions and Future Work

In this study, we investigated and developed an intelligent jamming system that works on fixed frequencies, specific technologies and downlink connections of mobile network operators.
Jamming is a process that is made intentionally by a malicious person or by a mistake produced due to an equipment fault. Intentional jamming can alter the performance of the radio mobile connections, introducing the possibility of developing other types of attacks that are more destructive, with a lot of consequences for the personal data of the subscribers.
After conducting our experiments, we could conclude that an attacker can carry out a denial-of-service attack on the downlink connection with commercial instruments at accessible prices. According to our proposed objectives mentioned above, we could conclude the following.
For the first objective, we determined that in the case of jamming the downlink connection, it was difficult to obtain 100% jamming results. The condition of jamming depends very much on the strength of the receiving signal level from the network operators who provide services, as measured at the radio-monitored point of interest. The limitations also encompassed the limited jamming range for smartphones. The jamming effect was only pronounced at distances of less than 8 m without any obstacles.
The evaluation of the second objective brought to light that a study is required regarding the downlink frequencies available and, based on this, to calculate the uplink frequencies. Experiments were conducted to demonstrate that the feasibility of employing reactive jamming on a downlink connection hinged on a technical constraint.
The last objective was achieved successfully. We developed, tested and demonstrated that an intelligent jamming system that works completely autonomously in a specific indoor area could disrupt the downlink connection based on the detection of an uplink. A new Python script was developed.
The intelligent jamming solution presented in this paper has its technical limitations. The configuration of the hardware platform is not a compact one: it has individual equipment and antennas, which makes installation on site more difficult. The maximum transmitting power of the Hack-RF SDR equipment is only 22 dBm (158 mW). This limits the coverage area of the jamming; thus, for larger areas, is necessary to use two or three such pieces of equipment, increasing the risk of intermodulation interference. A feasible measure to increase the range is to use a power RF amplifier installed at the Hack-RF SDR output.
With respect to the jamming technologies, there are no limitations; we can adapt this system for jamming 2G, 3G and of course 5GSA, but the 5GSA standard is not available in Romania yet. Limitations include the distance of the jamming effect and logistical limitations, including the disposal of the antennas, cable installation and minimal technical requirements to ensure a stable temperature for the entire system.
Regarding further studies, researchers can identify methods to monitor security attacks and the areas where they occur, the possibility to limit the access for sensitive information applications and extensions for other technologies available in IoT (like WiFi and BLE).

Author Contributions

Conceptualization, C.C. and S.H.; methodology, C.C., S.H. and M.P. (Mădălin Popescu); software, M.P. (Mădălin Popescu); validation, S.H., O.F. and M.P. (Mircea Popescu); formal analysis, C.C.; investigation, C.C. and S.H.; resources, E.-M.B. and O.F.; data curation, C.C. and S.H.; writing—original draft preparation, C.C., M.P. and E.-M.B.; writing—review and editing, C.C., M.P. (Mădălin Popescu) and S.H.; visualization, O.F.; supervision, S.H. and O.F.; project administration, O.F.; funding acquisition, C.C. and O.F. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Ministry of Investments and European Projects through the Human Capital Sectoral Operational Program 2014–2020, Contract No. 62461/03.06.2022, SMIS code 153735 and was partially supported by a grant of the Ministry of Research, Innovation and Digitization, CNCS/CCCDI – UEFISCDI, project No. PN-III-P3-3.6-H2020-2020-0193 within PNCDI III.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data presented in this study are available within the article.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Algorithm A1: Function process_data
input: input_buffer
output: results
1:
Initialize an empty dictionary D:
2:
D
3:
Split input_buffer into easier to process tokens, then organize them into D with the frequency f i as the key and the value as list of measured amplitudes A i on that frequency in dBm:
4:
i 1 , 2 , , n
5:
for each  f i  in input_buffer:
6:
          for each  A i , j  corresponding to  f i :
7:
               A i ( j ) A i , j
8:
          end for
9:
            D ( f i ) A i
10:
end for 
11:
Initializing an empty dataframe Df with columns “frequency” and “amplitude”, and members as data type float:
D f D f ( 0 , 0 ) " f r e q u e n c y " D f ( 0 , 1 ) " a m p l i t u d e "
12:
for each  f i in D:
13:
          A m e a n a v e r a g e ( A i ) D f ( i , 0 ) f i D f ( i , 1 ) A m e a n
14:
end for
15:
Sort Df in order descending amplitude, and eliminate the rows where the frequency D f ( i , 0 ) < f s t a r t · 10 6 or D f ( i , 0 ) > f s t o p · 10 6 and the rows where the amplitude D f ( i , 1 ) < 68 dBm
16:
Separate the top 5 frequencies with the highest amplitudes in the list results:
17:
          r e s u l t s
18:
for i = 0, …, 4:
19:
          r e s u l t s ( i ) D f ( 0 , i + 1 )
20:
end for
end function
Algorithm A2: Focalized Jamming Procedure
Initialize: 
Set the start and end frequencies f s t a r t , f e n d [ MHz ] . Monitor the current time with a variable t c u r r e n t .
8:
while True and there is no Keyboard interrupt:
9:
Start the radio monitoring process rf_sweep with the f s t a r t and f e n d , and set a variable t s t a r t to the current time.
10:
    t s t a r t t c u r r e n t
11:
Initialize a boolean variable process_ended to monitor the state of rf_sweep:
12:
p r o c e s s _ e n d e d F a l s e
13:
       while process_ended is not True and there is no keyboard interrupt:
14:
       Scan the radio spectrum for a minimum of 10 s and dump the output of rf_sweep in a variable output_buffer of data type string.
15:
        if   t c u r r e n t t s t a r t > 10 :                 p r o c e s s _ e n d e d T r u e
16:
             r e s u l t s p r o c e s s _ d a t a ( o u t p u t _ b u f f e r )
17:
            Terminate the rf_sweep process.
18:
            Reset the USB port of the radio scanner.
19:
                o u t p u t _ b u f f e r
20:
            Jam the frequencies in the list results for 15 s.
21:
       end if
22:
       end while 
23:
end while

References

  1. Vachhani, K. Security threats against LTE networks: A survey. In Security in Computing and Communications, Proceedings of the 6th International Symposium, SSCC 2018, Bangalore, India, 19–22 September 2018; Revised Selected Papers 6; Springer: Singapore, 2019; pp. 242–256. [Google Scholar]
  2. Yu, C.; Chen, S.; Wang, F.; Wei, Z. Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers. Comput. Netw. 2021, 201, 108532. [Google Scholar] [CrossRef]
  3. Pirayesh, H.; Zeng, H. Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey. IEEE Commun. Surv. Tutor. 2022, 24, 767–809. [Google Scholar] [CrossRef]
  4. Belkin, M.E.; Fofanov, D.; Sigov, A. Microwave photonics approach as a novel smart fabrication technique of a radio communication jammers. Procedia Comput. Sci. 2021, 180, 950–957. [Google Scholar] [CrossRef]
  5. Demeslay, C.; Gautier, R.; Fiche, A.; Burel, G. Band & Tone Jamming Analysis and Detection on LoRa signals. arXiv 2021, arXiv:2107.07782. [Google Scholar]
  6. Torres, N.; Pinto, P.; Lopes, S.I. Security vulnerabilities in LPWANs—An attack vector analysis for the IoT ecosystem. Appl. Sci. 2021, 11, 3176. [Google Scholar] [CrossRef]
  7. Elmahi, E.; Salekzamankhani, S.; Sharma, M. In-Depth Analysis of Signal Jammers’ and Anti-Jamming Effect on 5G Signal. In Proceedings of the 2019 7th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Istanbul, Turkey, 26–28 August 2019; pp. 1–6. [Google Scholar]
  8. Arya, B.R.; Vinod, B.R. Cascaded GSM Detector-Jammer Design. In Proceedings of the 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), Thoothukudi, India, 3–5 December 2020; pp. 1471–1475. [Google Scholar]
  9. Wang, X.; Zhou, Q. Analytical Technique Leveraging Processing Gain for Evaluating the Anti-Jamming Potential of Underwater Acoustic Direct Sequence Spread Spectrum Communication Systems. Symmetry 2023, 15, 1710. [Google Scholar] [CrossRef]
  10. Li, Y.; Wang, X.; Liu, D.; Guo, Q.; Liu, X.; Zhang, J.; Xu, Y. On the performance of deep reinforcement learning-based anti-jamming method confronting intelligent jammer. Appl. Sci. 2019, 9, 1361. [Google Scholar] [CrossRef]
  11. Zhang, S.; Tian, H.; Chen, X.; Du, Z.; Huang, L.; Gong, Y.; Xu, Y. Design and implementation of reinforcement learning-based intelligent jamming system. IET Commun. 2020, 14, 3231–3238. [Google Scholar] [CrossRef]
  12. Bădulă, E.M.; Halunga, S.; Fratu, O.; Popescu, M. Intelligent Blocking System for Mobile Communications Initiated by Unauthorized Users. In Proceedings of the 2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Bucharest, Romania, 29–30 June 2023; pp. 1–6. [Google Scholar] [CrossRef]
  13. Which Runs on Hardware Platform TSMA 6. Available online: https://scdn.rohdeschwarz.com/ur/pws/dl_downloads/pdm/cl_brochures_and_datasheets/product_brochure/3607_1907_12/NESTOR_bro_en_3607-1907-12_v1500.pdf (accessed on 1 August 2023).
  14. Lara, K.V.D.F. Jammers for Mobile Cellular Systems applied to unauthorized UAVs. Master’s Thesis, Instituto Universitário de Lisboa, Lisboa, Portugal, 2020. [Google Scholar]
  15. Li, Z.; Tan, W.; Kang, C.; Cheng, J. Research on Anti-interference Ability of Direct Sequence Spread Spectrum System. J. Electron. Inf. Technol. 2021, 43, 116–123. [Google Scholar] [CrossRef]
  16. Bout, E.; Loscri, V.; Gallais, A. Energy and Distance evaluation for Jamming Attacks in wireless networks. In Proceedings of the 2020 IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications (DS-RT), Prague, Czech Republic, 14–16 September 2020; pp. 1–5. [Google Scholar] [CrossRef]
  17. PR100 Portable Receiver. Available online: https://www.rohde-schwarz.com/us/products/aerospace-defense-security/receivers-and-direction-finders/rs-pr100-portable-receiver_63493-9653.html (accessed on 1 August 2023).
  18. HackRF One 1MHz to 6GHz USB Open-Source Software Radio Platform SDR RTL Development Board Reception of Signals. Available online: www.banggood.com/pt/HackRF-One-1MHz-to-6GHz-USB-Open-Source-Software-Radio-Platform-SDR-RTL-Development-Board-Reception-of-Signals-p1545357.html (accessed on 3 August 2023).
  19. Jover, R.P. LTE security, protocol exploits and location tracking experimentation with low-cost software radio. arXiv 2016, arXiv:1607.05171. [Google Scholar] [CrossRef]
  20. Chalakkal, S.; Schmidt, H.; Park, S.; Practical Attacks on Volte and VoWiFi. ERNW White Paper 60. pp. 1–26. Available online: https://ernw.de/download/newsletter/ERNW_Whitepaper_60_Practical_Attacks_On_VoLTE_And_VoWiFi_v1.0.pdf (accessed on 2 September 2021).
  21. LTE_Vulnerabilities. Available online: https://scdn.rohde-schwarz.com/ur/pws/dl_downloads/dl_application/application_notes/1ma245/1MA245_2e_LTE_Vulnerabilities.pdf (accessed on 2 August 2023).
  22. Truong, N.B.; Suh, Y.-J.; Yu, C. Latency Analysis in GNU Radio/USRP-based Software Radio Platforms. In Proceedings of the 2013 IEEE Military Communications Conference, San Diego, CA, USA, 18–20 November 2013. [Google Scholar]
  23. Jaitly, S.; Malhotra, H.; Bhushan, B. Security vulnerabilities and countermeasures against jamming attacks in Wireless Sensor Networks: A survey. In Proceedings of the International Conference on Computer, Communications and Electronics, Jaipur, India, 1–2 July 2017; pp. 559–564. [Google Scholar]
  24. Pushpalata, T.; Chaudhari, S.Y. Need of physical layer security in LTE: Analysis of vulnerabilities in LTE physical layer. In Proceedings of the 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 22–24 March 2017; pp. 1722–1727. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.