Warning Cookies are used on this site to provide the best user experience and are used for ads personalisation. See our Privacy Policy to understand how they are used.
If you continue, we assume that you agree to receive cookies from this site. OK

DDS Blog


What jamming of a wireless security system is and how to resist it

 

Radio communication is regarded as the main vulnerability of wireless security systems. It can presumably be easily jammed using equipment that can be purchased “at every corner,” and without radio communication, the alarm system is deprived of the opportunity to resist the intruders. Consequently, the facility becomes defenceless.

This article dispels the myths about jammers, talks about their real capabilities, and how counteraction is implemented in Ajax for this type of sabotage.

How radio communication is “jammed”

Jamming represents unlawful creation of interference within radio channels. It is used to prevent the communication of alarms within wireless security systems. Devices for jamming are called interference generators or signal suppressors and they are commonly known as jammers.

Interference generators operate within a specific radius at the frequency of the device whose operation is to be disturbed. If the frequencies of the device and the jammer do not match, the jamming will not affect the operation of the device.

Jamming can be aimed at both individual detectors and the security system as a whole.

what is a jamming

What types of jammers exist

Interference generator can “jam” a certain band or be broadband sabotaging several communication technologies of security systems simultaneously.

For example, Ajax uses 5 frequency bands for communication:

2G/GSM (900/1800 MHz) and 3G/UMTS (2100 MHz) networks of cellular operators
Wi-Fi network (2.4 GHz)
Jeweller radio communication (868.0–868.6 MHz or 868.7–869.2 MHz depending on the region)

Broadband interference generators that can jam several networks at once (for example, Wi-Fi and GSM) can be:

Hand-held or portable with the size of a phone and relatively low power; therefore, they prevent data transmission at a distance of 5-15 meters (without obstacles).Jamming device

Stationary— such appliances are much more powerful and expensive. The higher the price, the greater the range and number of networks that they can jam. The wider the frequency band and the larger the jamming radius, the more powerful the interference generator must be. Powerful jammers can become very hot, and they require additional cooling. Also, the lower the jamming frequency, the larger the size of the interference generator antenna must be. All this affects the dimensions of the device, and jammers with a range of 100 meters (in open space) have considerable dimensions, need forced cooling, and power supply of 230 V.Jamming device

Self-made — as a rule, low-power jammers that operate over short distances. In order to increase the jamming coverage, expensive broadband amplifiers are required, and the creation of such equipment involves specialized skills.Jamming device

How the Ajax security system responds to jamming

Hub uses GSM and Ethernet for connection to Ajax Cloud service and for the transmission of alarms to the user and the security company, and Hub Plus is unique among the security system control panels — it uses four authorized communication channels at the same time: Wi-Fi, Ethernet, and two 2G/3G SIM-card slots. For communication with security system devices hub uses Jeweller radio technology.

1. GSM channel jamming

Ajax Hub

GSM channel jamming can only be successful if the GSM signal strength is weak. A strong signal is almost impossible to jam due to the high power of the transmitter tower of a cellular operator.

When communication through the GSM channel is lost, “1” is added to the fault counter (red badge) on the hub icon in the Ajax app.

ajax app

Meanwhile, the hub continues to function properly via Ethernet (and/or Wi-Fi in Hub Plus). If other communication channels are unavailable or disconnected, the hub loses connection with the server that sends an alarm to the users of the security system and the security company. Meanwhile, the system continues to operate offline logging detector alarms and sending corresponding alerts using HomeSiren / StreetSiren sirens.

Once the connection is restored, all alarms will be delivered to the application and the security company.

2. Jeweller frequency jamming

Ajax Hub

The hub and the devices connected to it constantly measure the noise level in the radio channel at Jeweller frequencies.

ajax app

The Ajax security system detects jamming if the noise power level exceeds -70 dBm over 30 seconds. After that, the hub automatically sends a jamming notification to all users and the security company. Consequently, in order to avoid the loss of connection, the hub switches to a less noise-polluted frequency.

Meanwhile, if the hub loses communication with the detector or the device, it sends the corresponding notifications to the users of the security system and the security company.

3. Wi-Fi jamming

Ajax Hub
When jammed, Hub Plus continues to operate properly via Ethernet and SIM-card if these communication channels are used. When Wi-Fi is lost, “1” is added to the fault counter (red badge) on the hub icon in the Ajax app.

ajax app

If other communication channels are unavailable or disconnected, the hub loses communication with the server that sends an alarm to the users of the security system and the security company. Meanwhile, the system continues to operate offline logging detector alarms and sending corresponding alerts using HomeSiren/ StreetSiren sirens.

4. GSM, Wi-Fi, Jeweller jamming

Ajax Hub

Interference generators capable of jamming 2G/3G, Wi-Fi, and Jeweler bands at the same time over a large area (with allowance for the walls, ceilings, and objects that reflect signals inside the premises) are overall and expensive devices that are not available commercially.

However, if the robbers have such a broadband interference generator, the Ajax security system will detect a high noise level at Jeweller frequencies and will send the appropriate alerts to the users and the security company via Ethernet (if connected). In the Ajax apps, you will see that connections via Wi-Fi and 2G/3G networks are inactive. If the Ethernet connection is absent, the hub will lose communication with the server. The server will report the problem by sending an alert to the users of the security system and the security company.

How to protect the security system from jamming

Ajax hub

1. Install the hub in a place hidden from third parties, away from doors and windows. During installation, remember that the location of the hub must ensure a stable signal strength for all Ajax devices.

2. Use all available communication channels.

If you have Hub: SIM-card and Ethernet.

If you have Hub 2: two SIM-cards of different carriers and Ethernet.

If you have Hub Plus: two SIM-cards provided by different operators supporting 3G, Ethernet, and Wi-Fi from different access points using the Internet from different providers.

If Wi-Fi and Ethernet connections are lost, Hub Plus switches to SIM-card and uses the 3G network. If the data are not transmitted through the 3G Internet, the hub switches to 2G within seconds. If the problem is not resolved, it uses the second SIM-card following the same logic: 3G as the main network and 2G as a backup one. Moreover, it takes up to 4 minutes to switch SIM-cards, while 17 minutes represents the standard for security systems.

The use of two SIM-cards will not protect against GSM jamming (since both SIM-cards use the same frequencies) but it helps in cases when one of the SIM-cards stops responding for whatever reason. For example, due to a failure on the side of the cellular operator.

Summary:

Jamming of all available radio communication channels of professional security systems over a large area can only be achieved using overall and expensive interference generators.
A reliable security system does not rely on a single channel of wireless communication with the outside world, and a wireless connection should supplement the wired connection to the Internet.
Even if intruders succeed in complete isolation of a professional security system, you and the security company will be informed of the situation — due to scheduled security system polling by the server.
If communication with the security system is lost, you should arrive at the facility as soon as possible. Security companies send rapid response teams in such cases immediately.