Download as pdf or txt
Download as pdf or txt
You are on page 1of 45

Summer / Minor Project Work

On

​WIFI - JAMMER

Under the Guidance of


Mrs. Menal Dahiya

( ​Asstt. Professor ​)

Submitted by:
Anshika Nijhawan [00621202018]
Saket Bhatnagar [3421202018]
Govind Sharma [35221202018]

DEPARTMENT OF COMPUTER SCIENCE


MAHARAJA SURAJMAL INSTITUTE
C – 4, JANAKPURI, NEW DELHI – 58
August – December 2020
TO WHOMESOEVER IT MAY CONCERN

This is to certify that Anshika Nijhawan, Saket Bhatnagar & Govind


Sharma has developed “WIFI-JAMMER” under my guidance at
MAHARAJA SURAJMAL INSTITUTE from August – December, 2020
for the partial fulfillment to complete 5​th semester of “Bachelor of
Computer Applications”. This is his original work.

​ ​Signature
Mrs. Menal Dahiya
( Asstt. Professor )
CONTENTS

1. Certificate
2. Candidate’s Declaration
3. Acknowledgement
4. Abstract
5. Introduction
6. WIFI-JAMMER
a. Working of wifi jammer
b. Uses
c. Advantages
d. Drawbacks
e. Jamming problems
f. Designing problems
7. Technologies used
a. Hardware
b. Software
8. Code used
9. Bibliography
CERTIFICATE

This is to certify that the above statement made by the candidate is correct
to the best of our knowledge.

External examiner ​Dr. MENAL


DAHIYA

(Associate Professor)
Dept. Of Computer Science

Maharaja Surajmal Institute


C – 4, Janakpuri, New Delhi
CANDIDATE’S DECLARATION

We, ​Anshika Nijhawan, Saket Bhatnagar & Govind Sharma​ ,


Enrollment number’s ​00621202018, 34221202018 ​and​ 35221202018​ ,
hereby declare that the work which is being presented in the project report
entitled “WIFI-JAMMER” in partial fulfillment of the requirement to
complete the 5​th​ semester of “Bachelor of Computer Applications”
submitted in ​Maharaja Surajmal Institute, C – 4, Janakpuri, New
Delhi – 58​, is an authentic record of my work carried out during the
period from August – December, 2020 under the guidance of ​Dr. Menal
Dahiya ​Associate Professor, Department of Computer Science, Maharaja
Surajmal Institute and ​Name of​ ​External Guide .

The matter embodied in this report has not been submitted by me for the
award of any other degree.

​ ​Anshika Nijhawan, Saket Bhatnagar


& Govind Sharma
Enrollment Numbers - 00621202018,
34221202018 ,35221202018
B.C.A. V​th​ SEM
Department of Computer
Science
Maharaja Surajmal Institute
C – 4, Janakpuri, New Delhi – 58
ACKNOWLEDGEMENT

I would like to express my special thanks of gratitude to my teacher Dr.


Menal Dahiya as well as our Director who gave me the golden opportunity
to do this wonderful project on the topic WIFI JAMMER,which also
helped me in doing a lot of Research and I came to know about so many
new things I am really thankful to them.

Secondly, I would also like to thank my parents and friends who helped
me a lot in finalizing this project within the limited time frame

Anshika Nijhawan, Saket Bhatnagar


& Govind Sharma
CONTENTS

1. Certificate
2. Candidate’s Declaration
3. Acknowledgement
4. Abstract
5. Introduction
6. WIFI-JAMMER
a. Working of wifi jammer
b. Uses
c. Advantages
d. Drawbacks
e. Jamming problems
f. Designing problems
7. Technologies used
a. Hardware
b. Software
8. Code used
9. Bibliography
ABSTRACT
Access to wireless networks has become a major research problem
due to the ease of blocking connections to wireless networks.
Jamming attacks are the basis for refusing a service attack (DoS)
where malicious nodes block official communication by causing
intentional disruption to networks. To better understand this problem,
we need to discuss and analyze, in more detail, the various strategies
for competing and fighting and throwing in wireless networks. There
are two main features of vibration techniques in wireless ad hoc
networks: types of jammers and placement of jammers for effective
jamming. To address the problem of jamming, various jamming
techniques, detection and measurement methods are studied. Finally,
we describe open-ended issues in the sector, such as the effective
energy acquisition system and jammer separation.
INTRODUCTION
Today, wireless networks and their applications are getting more interest
and attention as they are available almost everywhere and anytime at a
reasonable cost. Consequently, research and industry are pushing for
higher performance and quality of service (QoS) to be provided by
wireless networks. Algorithms and protocols are being developed and
studied to address and improve solutions for different problems, like
resources’ allocation, of wireless networks. Moreover, new technologies,
standards, and architectures are introduced to allow wireless networks to
achieve higher data rates and advanced features to enhance the
performance seen by different users. The simplicity of deployment and
administration as well as low-cost hardware result in an increased reliance
on wireless communication systems. However, the blocking of wireless
communication, i.e., jamming, is one of the major security threats and
understanding the impact and complexity of such attacks and their
countermeasures is of great interest to the networking community, as this
physical attack against the availability is unique to wireless networks and
hard to mitigate on higher layers.

This is very desirable from the attacker’s point of view since it has several
benefits:

1. it allows for effective and efficient jamming , as only short jamming


bursts are required to destroy complete packets
2. reactive jamming is challenging to detect, because only limited
interference with other nodes is experienced, which minimizes the
risk of exposure
3. it enables the implementation of optimal jamming strategies, since
channel-awareness is a major factor for such strategies

On the other hand, reactive jamming is challenging to accomplish due to


the strict real-time requirements for detection and subsequent jamming.
The form of jamming signals and the jamming precision become crucial
for a successful destruction of packets. Hence, the question arises: Is
reactive jamming a realistic threat in wireless networks in terms of
technical feasibility and economic viability?

To achieve the best jamming performance, we analyze the causes of loss at


the physical layer of 802.15.4 and derive guidelines for successful reactive
jamming against ZigBee-based networks. We assess the applicability of
our approach by systematically evaluating the performance of our
prototype system in several experimental settings. The results justify that
reactive jamming should be considered a real threat with a low entry
barrier.

In this work, we take on the role of the wireless enemy and investigate one
of its most powerful tools WIFI - jamming. First, we identify the causes of
weight loss in the 802.15.4 body layer and then show how we can achieve
the best performance of effective competition. Subsequently, we apply this
information to our USRP2-based jamming prototype, which enables
real-time transmission separation, and reliable and selective jamming
performance. The prototype achieves response time in microseconds
sequence, high precision (such as individual signaling), and a joging rate
of 97.6% in real indoor conditions for one active jammer, and more than
99.9% in two compatible jammers.
WIFI - JAMMER
WiFi jammer is one of the many types of signal jammers designed to help
people solve various problems from cell phones, radio signals and wireless
communication. Every type of signal jammer is designed to work with a
certain frequency range, and WiFi jammer is no different.

The WiFi signal jammer is designed to effectively block wireless signals


in the WiFi frequency range (2.4-2.5 GHz) and in addition blocks
Bluetooth signals because they have the same frequency range. Everything
else in this type of jammer works the same as other jammers, perhaps with
a slight variation.

This is preferred by companies that deal with sensitive information to


prevent leaks. The 5GHz WiFi jammer works up to 40 meters and will
block WiFi and phone signal in a limited space.

On the plus side, the WiFi Mini Signal Blocker is smaller and cheaper than
5GHz. Designed to be carried in your pocket, this WiFi jammer provides
10 meters of protection wherever you are.

This jammer works if you work with sensitive data away from your work
or home, such as a hotel or other public place. For two hours battery life is
fully charged, and is ideal for people who feel more comfortable with a
certain barrier between themselves and other people's devices.

Wireless communication plays an important role in achieving a ubiquitous


computer where network devices installed in environments provide
continuous communication with services, thereby improving the quality of
human life. However, due to the open nature of wireless links, current
wireless networks can easily be attacked by jamming technology.
Jamming can cause a Denial-ofService (DoS) problem that can lead to
other high-security security issues, although these are often overlooked
(Wood et al, 2007). Access to wireless networks is defined as wireless
communication interference that exists by reducing signal and audio levels
on the sides of the receiver by transmitting interfering wireless signals.
Jamming differs from conventional network interference in that it
describes the deliberate use of wireless signals to attempt to disrupt
communication and the interruption refers to unintentional interference.

● Unintentional interference and disturbance may be caused due to the


wireless communications among nodes within the same networks or
other devices (e.g. microwave and remote controller).
● intentional interference and disturbances is usually conducted by an
attacker who intends to interrupt or prevent communications in
networks.

Jamming can be done at different levels, from hindering transmission to


distorting packets in legitimate communications. To understand how a
jammer attacks wireless networks and how to avoid jamming to achieve
efficient communication, we investigate three different aspects of wireless
network jamming:

1. types of existing jammers


2. protocols for localizing jammers
3. jamming detection and countermeasure.

PROCEDURE

● First, the network can be congested in a variety of ways using


different types of jammers. To avoid mixing in networks, it is
important to know how a jammer works. We therefore discuss in
detail the different types of jammers, e.g. active, efficient, functional
and hybrid-smart jammers, as well as a good placement of jammers
to achieve the best touch sensitivity.
● After that, we investigate the existing technology for making
jammers made locally. Finally, we look at how we can deal with the
problem of stagnation. This is a very serious problem when a lot of
research has been done. For example, one simple solution to use
high power transmissions in computerized channels makes this
thunderstorm less of a threat.
● Another objection to vibration is the use of directional horns instead
of omnidirectional horns. However, there are no available detection
or measurement methods that can deal with all types of jammers
without providing false alarms.

Therefore, further research is needed to identify and avoid various types of


wireless network connections.There are three main contributions to the
project. First, from the attacker's point of view, the various types of
jammers and their proper placement are discussed. The partition chart can
be used to identify the type of particular jammer. Second, from a security
standpoint, we analyze in detail the existing anti-throwing tactics and
divide them into different categories. The summary table can be used to
analyze protocols based on different parameters such as network
conditions, acquisition metrics, and over-the-counter
TYPES

1. Proactive : ​The active Jammer transmits (jamming) signals even if


there is a data connection to the network. Sends packets or random
fragments to the channel we are working on, putting all other nodes
in that channel in inactive situations. However, it does not change
channels and only operates on one channel until it expiresThere are
three basic types of proactive jammers:

1. Constant:​ Continuous jammer releases continuous, random


pieces without following the CSMA protocol (Xu et al,
2005). According to the CSMA method, the official node
must hear the state of the wireless network before
transferring. If the medium continues to be idle for the
duration of the DCF Interframe Space (DIFS), then the
frame should be transferred. If a channel is found to be busy
during the DIFS period, the channel should postpone the
transfer. Permanent jammer prevents legitimate nodes from
communicating by causing wireless media to stay busy. This
type of attack is powerless and easily accessible but is very
easy to launch and can damage network connectivity to the
point that no one can communicate at any time.
2. Deceptive​: The deceptive jammer continuously transfers
standard packets (Xu et al, 2005) instead of extracting
random pieces (as in the regular jammer). It deceives some
nodes to believe that legal transfers are possible so that they
remain in the acquisition of states until the jammer is turned
off or dies. Compared to the endless jammer, it is much
harder to find a deceptive jammer because it conveys official
packets instead of random bits. Like a permanent jammer, a
deceptive jammer also does not work well due to continuous
transmission but is easily done.
3. Random:​ ​A random jammer works randomly in both sleep
and jam intervals. During sleep interval, it sleeps
irrespective of any traffic on the network, and during jam
interval, it acts as a constant or reactive jammer. That
jammer does not follow any MAC protocol. The PDR
increases when the sleep interval increases and the packet
size decreases.

2. Reactive:​ The remunerative jammer only starts playing when it


detects that network activity is taking place in a particular channel
(Xu et al, 2005). As a result, the active jammer is focused on
limiting message reception. It can disrupt small and large pockets.
As it should regularly check the network, an effective jammer is less
effective than a random jammer. However, it is much harder to find
an effective jammer than an active jammer because the packet
delivery rate (PDR) cannot be determined precisely in operation.
According to (Pelechrinis et al, 2011), the following are two
different ways of using an effective jammer. sender. Channel
congestion starts as soon as RTS is sent.This type of jammer can
damage data packets, or wait until the data packets reach the receiver
and damage the ACK packets (Pelechrinis et al, 2011). Damage to
both data packets and ACK messages will result in a re-transfer at
the end of the sender. In the first case, because the data packets are
not properly retrieved from the receiver, they have to be transferred
again. In the second case, as the sender does not receive ACKs, it
believes that something is wrong with the recipient's side, e.g.
overflowing bathtub. Therefore, it will transmit information

3. Function-specific​: Work-related stops are used by having


pre-determined work. In addition to performance or performance,
they can operate on a single channel to conserve energy or
congestion of multiple channels and increase jamming performance
regardless of energy consumption. Even if a jammer plays one route
at a time, it is not focused on that channel and can change its
channels depending on its performance. Due to its high frequency
rating, the tracked jammer is very effective compared to other
anti-throwing techniques, e.g. frequency hopping spread spectrum
(FHSS) using fast rate. Channel-hopping jammer hops between
different channels actively (Alnifie and Simon, 2007, 2010). This
type of jammer has direct access to channels by overwriting the
CSMA algorithm provided by the MAC layer. In addition, it can
clog multiple channels at a time. During its discovery and vertex
coloring stages, the jammer is silent and invisible to its neighbors.
After that, it begins to make attacks on different channels at different
times according to the pre-sequence pseudorandom. A pulsed-noise
jammer can switch channels and jam to different bandwidths at
different times.In addition, it can be used simultaneously to fill
multiple channels. (Muraleedharan and Osadciw, 2006).

4. Hybrid-smart jammers​: We call them smart because of their


efficient and efficient nature. The main goal of these players is to
maximize their network congestion target. Moreover, they also take
care of themselves by conserving their energy. They put enough
power in the right place to restrict the network bandwidth of the
whole network or a large part of the network, to very large networks.
The obvious jamming attack is that in addition to disabling the
performance of the target target, it has caused a state of refusal to
operate on other network nodes as well (Broustis et al, 2009). This
attack uses a flexibility rate algorithm used on wireless networks,
where the AP (Access Point) takes care of this vulnerable node by
reducing its rate. As a result of this process, the AP spends more
time communicating with this weaker node than other nodes.
Therefore, when a direct attacker narrows a node speaking to the AP,
the result of the rating will increase the focus of the AP on the
crowded node while causing other clients to suffer. They try the
occasional jammers, which are unforgettable based on Poisson
processes, jammers know the channel, and jammers know
everything to conclude that jammers know the channel are the most
effective of these four types. Similarly, Wood et al (2007) used a
combination of active / random and multi-channel / pulsed-noise
jammers to create attacks such as pulse interference, scanning and
pulse vibration. In the event of a disruption, the jammer stays in the
sleeping areas and starts playing only when it is signed by the
hardware in getting the radio functions.
WORKING OF A WIFI-JAMMER

Every wireless technology works on a specific spectrum of radio


frequency, and they work under certain noise tolerance and amplitude
values. For example, cellular communication usually works upto -120dBm
signal strength, so, if someone is able to generate a high amplitude noise
signal at that particular frequency he/she maybe able to jam that cellular
spectrum. Wifi (-90dBm limit) and Bluetooth work at 2.4Ghz range if
there is a continuous (considering time division multiplexing) noise at that
frequency then the devices would not be able to communicate.

P.S: Jammers are highly illegal and depending on the spectrum, it may
lead to imprisonment or fines. Also communicating on any radio
frequency for long range without getting a proper license is illegal.
WIFI JAMMER USES

1. In contention resolution using jamming signals allows more efficient


resolution schemes that result in shorter contention periods and
higher successful medium access rates,which results in a more
predictable network behavior. Furthermore, for the next generation
wireless networks, jamming is utilized to implement contention in
the frequency domain to save time wasted in counting down in the
time domain
2. Because of its immunity to collisions, jamming signals can be used
to relay important control messages in a reliable manner
3. Jamming signals can be used to enhance security, [117, 121].
Basically, with appropriate transceivers, jam signals can be used to
intentionally collide with or shoot down suspicious or unauthorized
transmissions.
4. Jamming can be exploited to allow users of heterogeneous networks
to coexist. The performance of users may be severely affected in the
presence of users of another type. Accordingly, solutions are
proposed to provide better sharing of the wireless medium, and some
of these solutions are based on jamming.
5. Parallel transmissions are possible with jam signals. Recent research
showed that it is possible for different users to send jam signals in
parallel with data signals, and yet both transmissions can be received
correctly. This would highly enhance the performance of the
network as users can convey different requests and responses in
parallel with data transmissions. Various applications of this idea are
presented in this paper.
ADVANTAGES OF USING A WIFI-JAMMER

1. Jam signals are resistant to collisions, and thus no need to use


collision avoidance for transmitting such signals. In other words,
different users can transmit jam signals simultaneously.
2. Jam signals can travel for longer distances; receivers are required
only to detect the existence of such signals as they carry no
information and do not need to be decoded.
3. It is possible to transmit jam signals of short durations. Hence, short
jam signals can save much of the time wasted in normal operations.
For example, a one time slot jam signal can be transmitted as an
acknowledgment frame; one slot is much shorter than the time of a
normal ACK (acknowledgment) frame.
4. To improve the efficiency of different operations related 
to wireless networks especially when high performance 
is required like in contention resolution, QoS support, 
and statistics estimation. 
5. WIFI jammers are two-in-one or multi-used jammers which can not
only block the signal of wireless LAN network but also can jam the
frequencies of cell phone and other kinds of wireless transceivers
like the video recording camera.
6. The wireless signal jammer is in reality as well in name a ​portable
signal blocker​. You can put it into your pocket or briefcase in a
totally inconspicuous way. Moreover, our WIFI signal jammer has
in-built rechargeable Lithium-ion batteries and comes complete with
the charging adaptor to facilitate usage which is dual voltage for
110/240v.
DRAWBACKS OF WIFI-JAMMER

1. ​They can be a waste of bandwidth and energy as they carry no


information.
2. Jam signals may reduce spatial reuse, the possibility of having
concurrent transmissions between different pairs of nodes, as they
are often transmitted with higher power levels.
3. The use of jamming adds to the complexity of wireless devices and
protocols due to different challenges that need be addressed at the
PHY (physical) and MAC (Medium Access Control) layers. When
using jam signals, each user should have the ability to generate and
detect jam signals. In addition, synchronization may be required
especially when users are allowed to transmit jams concurrently.
Finally, different sources of errors related to jamming should be
considered including
a. False alarms or detecting noise as jam signals.
b. Not being able to detect jam signals.
4. The length of a jam signal should be considered carefully for single
and parallel transmissions, and should be kept minimal to meet two
criteria not wasting extra bandwidth and energy, and being able to
detect the jam correctly.
5. different usage scenarios may require various energy levels for the
jam signal. Therefore, it is necessary to be able to adapt the energy
of the signal to take into account trade-offs between reducing errors,
decreasing energy wastage, and increasing spatial reuse.
WIFI - JAMMING PROBLEMS

Finally, we look at how we can deal with the problem of


stagnation. This is a very serious problem when a lot of research
has been done.

For example, one simple solution to use high power transmissions


in computerized channels makes this thunderstorm less of a
threat.

Another objection to vibration is the use of directional horns


instead of omnidirectional horns. However, there are no available
detection or measurement methods that can deal with all types of
jammers without providing false alarms.

Therefore, further research is needed to identify and avoid


various types of wireless network connections. Although network
congestion is often considered a serious threat, Gollakota and
Katabi (2010) have proven that vibration can be friendly as well.

They used jamming as a defense against the onslaught of


groundbreaking attacks.

In particular, the node will encroach on its PHY (physical) layer


so that the snooper cannot downgrade the official signal.
Recipients then attach a sent signal by scanning certain pieces in
the pockets. Similarly, Gollakota and Katabi (2010) use play on
wireless channels (instead of PHY) to avoid eavesdropper attacks.
TECHNOLOGIES USED

HARDWARE USED
1. NodeMCU :

It is an inexpensive open source platform. Initially it included firmware


running on ESP8266 Wi-Fi SoC from Espress if Systems, as well as
Hardware based on the ESP-12 module.

NodeMCU is an open source LUA source firmware designed for ESP8266


wifi chip. By testing the performance of the ESP8266 chip, the NodeMCU
firmware comes with the ESP8266 Development board / kit i.e. the
NodeMCU Development board.NodeMCU is an inexpensive open source
platform. Originally included firmware running on ESP8266 Wi-Fi SoC
from Espressif Systems, as well as Hardware based module ESP-12. [6]
[7] Later, support for ESP32 32-bit MCU was added.

Since NodeMCU is an open source platform, its hardware architecture is


open to editing / modifying / building. The NodeMCU Dev Kit / board
contains an ESP8266 enabled chip. ESP8266 is a low-cost Wi-Fi chip
developed by Espressif Systems with TCP / IP protocol. For more
information on ESP8266, you can refer to the ESP8266 WiFi Module.
There is a Version2 (V2) available for the NodeMCU Dev Kit eg
NodeMCU Development Board v1.0 (Version2), which usually comes
with a black PCB.

After setting up ESP8266 with Node-MCU firmware, let's see the IDE
(Integrated Development Environment) required for NodeMCU
architecture.NodeMCU is an open source firmware where open source
board designs are available. The term "NodeMCU" includes "node" and
"MCU" (sub-unit unit). The term "NodeMCU" in strict terms means
firmware rather than compatible development kits.

NodeMCU was created shortly after the release of ESP8266. On


December 30, 2013, Espressif Systems began production of ESP8266.
NodeMCU launched on 13 October 2014, when Hong created the first
nodemcu-firmware file on GitHub.

As Arduino.cc began to build new MCU boards based on non-AVR


processors such as the ARM / SAM MCU and used in Arduino Due, they
had to change the Arduino IDE to make it easier to change the IDE to
support other hardware tools to allow Arduino C / C ++ to be integrated
into these new processors.

a. NodeMCU with ESPlorer IDE

Lua​ scripts are generally used to code the NodeMCU. Lua is an


open-source, lightweight, embeddable scripting language built on top
of C programming language.
b. NodeMCU with Arduino IDE

We can also develop applications on NodeMCU using the Arduino


development environment. This makes it easy for Arduino developers
than learning a new language and IDE for NodeMCU.

2. Deauth attacker:

Deauthentication Attack is a type of denial of a service attack


targeting a connection between a user (or all users) and a Wi-Fi
hotspot.

This attack sends separate packets to one or more clients currently


associated with a particular access point. Of course, this attack is
useless if there is no compatible wireless client or false
authentication.The Wi-Fi attack is a relative of the denial of
service-denial that identifies the connection between the user and the
Wi-Fi wireless access point.
The attacker can send a self-confirmation frame at any time to a wireless
access point, with the victim's sprayed address. The protocol does not
require encryption, even if the session is set up with Wired Equivalent
Privacy (WEP) data confidentiality, and the attacker only needs to know
the victim's MAC address, which is clearly available through the wireless
network smells.
● Accessing twins

One of the main purposes of authentication used in the hacking


community is to force clients to connect to a bad twin point that can
be used to capture network packets transferred between a client and
an access point. The intruder conducts an attack to authenticate the
targeted customer, disconnecting it from its current network, thus
allowing the client to automatically connect to the wrong access
point for the twins.

● Password Attack

In order to install a powerful attack or dictionary based on a


WiFi-enabled WPA or WPA2 user, the criminal must first withdraw
the WPA 4-way handshake. The user may be asked to provide this
sequence first by forcing them offline with a verification attack.

In a criminal style attack that steals the same sensitive information


without cracking the password, Wifiphisher begins with a verbal
attack to disconnect the user from his official channel, and then
enters the middle-level attack to collect passwords provided by an
anonymous user.
● Capture WPA/WPA2 4-Way Handshakes by forcing a user to
reconnect to the network
● Force users to connect to their own Rogue access point (search :
Evil Twin Attack)
● Force users to connect to a Captive Portal.

3. WIFI-MODULE 8266:  

The ESP8266 is a low-cost ​Wi-Fi​ microchip, with a full ​TCP/IP


stack​ and ​microcontroller​ capability, produced by ​Espressif Systems
in Shanghai, China.

The chip first came to the attention of Western ​makers​ in August


2014 with the ESP-01 module, made by a third-party manufacturer
Ai-Thinker. This small module allows microcontrollers to connect to
a Wi-Fi network and make simple TCP/IP connections using
Hayes​-style commands.  

The ESP8266 WiFi Module is a self contained SOC with integrated


TCP/IP protocol stack that can give any microcontroller access to
your WiFi network. The ESP8266 is capable of either hosting an
application or offloading all Wi-Fi networking functions from
another application processor.

There are many ways to power ESP8266 WiFi module: you can use
2 AA sized batteries for powering, PC port if you have a
TTL-Serial-to-USB adapter .The ESP8266’s maximum voltage is
3.6V, so the thing has an onboard 3.3V regulator to deliver a safe,
consistent voltage to the IC. That means the ESP8266’s I/O pins also
run at 3.3V, you’ll need to Logic Level Controller any 5V signals
running into the IC.

You can also power ESP using two AA batteries. Positive from
batteries to VCC of ESP and GND to GND of ESP 8266.
I ​have used Tinkercad to show how the board can't handle even 0.1
extra. The maximum voltage you can give is 3.5V. You should use
such simulation software to look that the power you are delivering to
ESP is safe or not.

SOFTWARE USED

1. LUA:

Lua is an extensible, lightweight programming language written in C. It


started as an in-house project in 1993 by Roberto Ierusalimschy, Luiz
Henrique de Figueiredo, and Waldemar Celes.

It was designed from the beginning to be a software that can be integrated


with the code written in C and other conventional languages. This
integration brings many benefits. It does not try to do what C can already
do but aims at offering what C is not good at: a good distance from the
hardware, dynamic structures, no redundancies, ease of testing and
debugging. For this, Lua has a safe environment, automatic memory
management, and good facilities for handling strings and other kinds of
data with dynamic size.
Lua provides a set of unique features that makes it distinct from other
languages. These include −

● Extensible
● Simple
● Efficient
● Portable
● Free and open

Lua consists of two parts - the Lua interpreter part and the functioning
software system. The functioning software system is an actual computer
application that can interpret programs written in the Lua programming
language. The Lua interpreter is written in ANSI C, hence it is highly
portable and can run on a vast spectrum of devices from high-end network
servers to small devices.

Both Lua's language and its interpreter are mature, small, and fast. It has
evolved from other programming languages and top software standards.
Being small in size makes it possible for it to run on small devices with
low memory.

USES:
● Game Programming
● Scripting in Standalone Applications
● Scripting in Web
● Extensions and add-ons for databases like MySQL Proxy and
MySQL WorkBench
● Security systems like Intrusion Detection System.

2. ARDUINO : 

Arduino code is written in C++ with an addition of special methods


and functions, which we’ll mention later on. C++ is a
human-readable programming language. When you create a ‘sketch’
(the name given to Arduino code files), it is processed and compiled
to machine language.
The Arduino Integrated Development Environment (IDE) is the
main text editing program used for Arduino programming. It is
where you’ll be typing up your code before uploading it to the board
you want to program. Arduino code is referred to as sketches.

This language is based upon the ​Wiring​ development platform,


which in turn is based upon ​Processing​, which if you are not familiar
with, is what ​p5.js​ is based upon. It’s a long history of projects
building upon other projects, in a very Open Source way. The
Arduino IDE is based upon the Processing IDE, and the Wiring IDE
which builds on top of it.

When we work with Arduino we commonly use the Arduino IDE


(Integrated Development Environment), a software available for all
the major desktop platforms (macOS, Linux, Windows), which gives
us 2 things: a programming editor with integrated libraries support,
and a way to easily compile and load our Arduino programs to a
board connected to the computer.

A sketch is normally saved with the .ino extension (from Arduino).


As for the syntax, it is not unlike that of C++. The first similarity
you might notice is the use of curly braces to wrap your code blocks.
If you miss a closing curly brace after using the opening one, the
system will throw an error. Thankfully, the Arduino IDE will
highlight the closing brace if you click on the opening one, so its a
rather simple thing to check. Just like C++, Arduino also requires
ending your statements with semicolons. Missing one causes an error
to fire.

One more clear similarity is the way you enter comments. There are
two ways to do this in Arduino language, based on whether you need
a single-line or a block comment.

3. IDE (​Integrated Development Environment)​: 

An integrated development environment (IDE) is a software suite


that consolidates basic tools required to write and test software.
Developers use numerous tools throughout software code creation,
building and testing. Development tools often include text editors,
code libraries, compilers and test platforms. Without an IDE, a
developer must select, deploy, integrate and manage all of these
tools separately. An IDE brings many of those development-related
tools together as a single framework, application or service.
An integrated development environment (IDE) is software for
building applications that combines common developer tools into a
single graphical user interface (GUI). An IDE typically consists of:

● Source code editor​: A text editor that can assist in writing


software code with features such as syntax highlighting with
visual cues, providing language specific auto-completion, and
checking for bugs as code is being written.
● Local build automation​: Utilities that automate simple,
repeatable tasks as part of creating a local build of the software
for use by the developer, like compiling computer source code
into binary code, packaging binary code, and running automated
tests.
● Debugger​: A program for testing other programs that can
graphically display the location of a bug in the original code.

There are many different technical and business use cases for IDEs, which
likewise means there are many proprietary​ and ​open source​ IDE options
on the market. Typically, the most important differentiating characterist​ics
between IDEs are:

● The number of supported languages​: Some IDEs are dedicated


to one language, and so are a better match for a specific
programming paradigm. IntelliJ, for instance, is known primarily
as a Java IDE. Other IDEs have a broad array of supported
languages all in one, like the Eclipse IDE which supports Java,
XML, Python, and others.
● Supported operating system(s)​: A developer’s operating system
will constrain which IDEs are viable (unless an IDE is
cloud-based), and if the application being developed is intended
for an end user with a specific operating system (like Android or
iOS), this may be an additional constraint.
● Automation features​: Even though most IDEs include the 3 key
features of a text editor, build automation, and debugger, many
include support for additional features like refactoring, code
search, ​and ​continuous integration and continuous deployment
(CI/CD) tools.
● Impact on system performance​: An IDE’s memory footprint
may be important to consider if a developer wants to run other
memory-intensive applications concurrently.
● Plugins and extensions​: Some IDEs include the ability to
customize workflows to match a developer’s needs and
preferences.
CODE USED

1.

2.
3.

4.

5.
6.

7.
8.

9.

10.
11.
REFERENCES

1. Ivan & Schmitt, Jens & Lenders, Vincent. (2011). Short


Paper: Reactive Jamming in Wireless Networks—How
Realistic is the Threat?. WiSec'11 - Proceedings of the 4th
ACM Conference on Wireless Network Security. 47-52.
10.1145/1998412.1998422.
2. Agarwal, Mayank & Biswas, Santosh & Nandi, Sukumar.
(2013). Detection of De-authentication Denial of Service
attack in 802.11 networks. 1-6.
10.1109/INDCON.2013.6726015.
3. Al-Mefleh, Haithem & Al-Kofahi, Osameh. (2016). Taking
Advantage of Jamming in Wireless Networks: A Survey.
Computer Networks. 99. 10.1016/j.comnet.2016.02.011.
4. https://www.thesignaljammer.com/blog/what-is-a-wifi-jamm
er-and-why-you-might-need-one
5. https://www.safety.com/signal-jammers-risk-for-wireless-sec
urity-systems/
6. https://www.perfectjammer.com/wireless-wifi-bluetooth-jam
mers.html
7. https://components101.com
8. https://searchsoftwarequality.techtarget.com/definition/integ
rated-development-environment

You might also like