Next Article in Journal
Motion-Blur-Free High-Speed Video Shooting Using a Resonant Mirror
Previous Article in Journal
Determination of Chloride Content in Cementitious Materials: From Fundamental Aspects to Application of Ag/AgCl Chloride Sensors
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Adaptive Transmitting Scheme for Interrupted Sampling Repeater Jamming Suppression

1
Radar Research Laboratory, School of Information and Electronics, Beijing Institute of Technology, Beijing 100081, China
2
Key Laboratory of Electronic and Information Technology in Satellite Navigation (Beijing Institute of Technology), Ministry of Education, Beijing 100081, China
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(11), 2480; https://doi.org/10.3390/s17112480
Submission received: 12 August 2017 / Revised: 11 October 2017 / Accepted: 23 October 2017 / Published: 29 October 2017
(This article belongs to the Section Remote Sensors)

Abstract

:
The interrupted sampling repeater jamming (ISRJ) based on a digital radio frequency memory (DRFM) device is a new type of coherent jamming. This kind of jamming usually occurs as main-lobe jamming and has the advantages of low power requirements and easy parameter adjustment, posing a serious threat to the modern radar systems. In order to suppress the ISRJ, this paper proposes an adaptive transmitting scheme based on a phase-coded signal. The scheme firstly performs jamming perception to estimate the jamming parameters, then, on this basis, optimizes the waveform with genetic algorithm. With the optimized waveform, the jamming signal is orthogonal to the target echo, thus it can be easily suppressed with pulse compression. Simulation experiments are performed to verify the effectiveness of the scheme and the results suggest that the peak-to-side-lobe ratio (PSR) and integrated side-lobe level (ISL) of the pulse compression can be improved by about 16 dB and 15 dB, respectively, for the case where the jamming-to-signal ratio (JSR) is 13 dB.

1. Introduction

The application of digital radio frequency memory (DRFM) devices has greatly improved the performance and efficiency of radar electronic countermeasures (ECM) systems [1,2,3]. Based on the abilities of intercepting and storing radar transmitting signals, many new jamming strategies have been proposed [4,5,6,7]. Among them, interrupted sampling repeater jamming (ISRJ) has attracted extensive attention [8,9,10,11,12,13,14]. There are two main intercepting modes for DRFM devices, i.e., full-pulse sampling mode and interrupted sampling mode. Based on the latter, an ISRJ jammer intercepts parts of the radar signal and retransmits them for several times at a current pulse repeat interval (PRI). Therefore, the jamming signal is coherent with the radar transmission and partial processing gain can be obtained from signal processing such as pulse compression and coherent integration, greatly reducing the requirements on transmitting power. Thus the jammer can be more easily installed in small platforms such as unmanned aerial vehicles (UAVs) to form a main-lobe jamming, which increases the difficulty of radar antijamming [8]. Meanwhile, because of the digital processing capability of a DRFM system, the jammer can easily adjust the jamming parameters (such as the intercepting positions and intercepting durations, etc.) to change the distribution of the grating lobes of pulse compression, by which different jamming effects can be achieved.
ISRJ was first proposed by [9,10] in 2006, respectively (it was named as Chopping & Interleaving (C&I) jamming in [9]). According to these references, the jammer intercepts a slice of the radar transmission and retransmits it multiple times. This process will be conducted for several cycles until the falling edge of the signal is detected. After pulse compression, the jamming will appear as multiple false target groups and each of them consists of a main false target and several symmetrically distributed secondary false targets. By changing the intercepting duration and number of retransmitting times, the jamming can achieve effects of both deception and suppression. A modified strategy named interrupted sampling direct jamming (ISDJ) was also proposed in [10]. For this kind of jamming, the intercepted slices were retransmitted for only one time, whereas more slices can be intercepted. Therefore, the jamming will have only one false target group (after pulse compression), which consists of a stronger main false target and more secondary false targets. Hereafter, more publications were involved in this topic and most of them focused on jamming performance analysis and jamming strategy optimization [11,12,13]. For instance, Wang et al discussed the mathematical principle of ISRJ [11]; Li et al derived the connection between the intercepting duration and the jamming power [12] and studied the operating distance of the jammer based on coherent jamming principle [13].
In contrast, the electronic counter-countermeasures (ECCM) methods for ISRJ have not been fully studied. Some modern signal processing methods were attempted to filter out the jamming. Among them, the time-frequency (TF) analysis has been widely used. Especially, an ISRJ suppression method for dechirping radar was proposed in [15]. By making use of the discontinuity of ISRJ in the time-frequency domain, a band-pass filter was designed to suppress the jamming. However, this method requires a clear separation between adjacent false targets of the ISRJ. While in [16], the jamming was first reconstructed with the estimated jamming parameters, and then an adaptive CLEAN algorithm was employed to cancel the jamming. Despite their effectiveness, almost all of these methods are passive schemes, which means, countermeasures are taken after jamming enter the receiver. However, in the changing battlefield environment, these passive schemes require quite a lot of system resources while achieve limited performances.
For the above considerations, modern radar systems should have the ability of jamming perception [17,18,19], thus be able to choose the optimal antijamming method. Hence in this paper, an adaptive transmitting scheme based on a phase-coded signal was proposed. The scheme first carries out jamming perception to estimates the ISRJ parameters of jammer intercepting positions and intercepting durations, then performs waveform optimization with the estimated jamming information. With the optimized waveform, the intercepted jamming signal is orthogonal to the target echo, hence can be suppressed with pulse compression. Based on the iteration of jamming perception and waveform design, a dynamic active ISRJ suppression scheme can be formed. The structure of the paper is as follows: in Section 2, the mechanism of ISRJ is introduced and the operators of ISRJ are deduced. On this basis, the optimal antijamming waveform is given based on eigenvalue decomposition. In Section 3, the adaptive transmitting scheme for phase-coded signal is introduced, and the two key steps of jamming perception and waveform optimization are described in detail. In Section 4, simulation experiments are carried out to quantitatively evaluate the jamming suppression performances. Finally in Section 5, the main conclusions of the paper are summarized. The main notations used in this paper are defined in the following table (Table 1).

2. The Mechanism of ISRJ

2.1. The Operator Representation of Jamming Signal

The mechanism of ISRJ is shown in Figure 1. After detecting the rising edge of the radar transmitting signal, the jammer will intercept a slice based on the set strategy, and then delays and retransmits the slice for multiple times. The process of intercepting and retransmitting is repeated for several times until the falling edge of the signal is detected. Therefore, the ISRJ is actually emitting a partial sampled and delayed version of the radar transmitted signal.
Assuming the transmitted signal vector is s = [ s 1 s 2 s n ] T , where the subscript ‘n’ is the number of signal samples. Then the intercepted signal x I can be expressed as:
x I = A s i . e . , [ x 1 x 2 x n ] = [ a 11 0 0 0 a 22 0 0 0 a n n ] [ s 1 s 2 s n ] , a i i { 0 , 1 } .
where the sampling matrix A is a diagonal matrix and the values of the diagonal elements are ‘one’ or ‘zero’. The element ‘one’ corresponds to the intercepting period, while the element ‘zero’ corresponds to the retransmitting period. The specific structure of A (i.e., the pattern of zeros and ones) is related to the ISRJ strategy.
Compared to the radar transmitting signal, the retransmitted signal has a time delay. By making use of the characteristics of Fourier transform, namely:
fft [ s ( t τ 0 ) ] = fft [ s ( t ) ] e j 2 π f τ 0 .
where fft [ ] means fast Fourier transform (FFT) and τ 0 is the time delay.
The retransmitting of the intercepted signal can be described by the process of ‘FFT-phase shift-IFFT (inverse fast Fourier transform)’, and each of the steps can be expressed as:
  • FFT to the intercepted signal:
    X = F x I i . e . , [ X 1 X 2 X n ] = [ e j 2 π f 1 t 1 e j 2 π f 1 t 2 e j 2 π f 1 t n e j 2 π f 2 t 1 e j 2 π f 2 t 2 e j 2 π f 2 t n e j 2 π f n t 1 e j 2 π f n t 2 e j 2 π f n t n ] [ x 1 x 2 x n ] .
    where F is the Fourier transform coefficient matrix and X is the spectrum of the intercepted signal.
  • Multiply X by the phase factor (take ‘one retransmitting’ as an example):
    Y = T X i . e . , [ Y 1 Y 2 Y n ] = [ e j 2 π f 1 τ 0 0 0 e j 2 π f 2 τ 0 0 0 e j 2 π f n τ ] [ X 1 X 2 X n ] .
    where T is the phase matrix corresponding to retransmitting delay τ and Y is the phase shifted spectrum.
  • IFFT to the phase shifted spectrum:
    J = F I Y i . e . , [ J 1 J 2 J n ] = [ e j 2 π f 1 t 1 e j 2 π f 2 t 1 e j 2 π f n t 1 e j 2 π f 1 t 2 e j 2 π f 2 t 2 e j 2 π f n t 2 e j 2 π f 1 t n e j 2 π f 2 t n e j 2 π f n t n ] [ Y 1 Y 2 Y n ] .
    where F I is the inverse Fourier transform coefficient matrix and J is the retransmitted jamming signal.
In summary, the jamming signal can be expressed as:
J = F I T F A s .
where Γ = F I T F A is defined as the jamming operator. When considering the case of a slice is retransmitted for multiple times, the jamming operator can be expressed as:
Γ = F I T F A + F I T 2 F A + F I T M F A .
where M is the number of retransmitting times of each jamming slice.

2.2. The Optimal Waveform for ISRJ Suppression

According to previous analysis, the jamming signal is the output of jamming operator on radar transmitting signal. The process can be expressed as:
J = Γ s .
According to the matrix theory, we may have:
Γ u = λ u .
where u is the eigenvector of Γ and λ is the corresponding eigenvalue.
Therefore, in theory, the jamming signal can be suppressed by taking the eigenvector associated with some zero eigenvalue (or the linear combination of eigenvectors associated with multiple zero eigenvalues) as the transmitting signal.
To analyze the characteristics of the eigenvectors associated with zero eigenvalues, we still take‘one retransmitting’ as an example. Then the jamming operator can be rewritten as follows according to Equation (6):
Γ = F I T F A = E A = [ e 11 e 12 e 1 N e 21 e 22 e 2 N e N 1 e N 2 e N N ] A .
where E = F I T F , e i j = k = 1 N e j 2 π f k [ ( i j ) Δ t τ ] , Δ t is the time sampling interval, τ is the retransmitting delay and N is the total number of the signal samples.
Assuming that the jammer intercepts L signal samples at a time, then the sampling matrix can be expressed as:
A = [ 1 ( L ) 1 0 ( L ) 0 1 ( L ) 1 ] .
Thus the operator matrix Γ can be expressed as:
Γ = [ e 11 ( L ) e 1 L 0 ( L ) 0 e 1 ( 2 L + 1 ) ( L ) e 1 ( 3 L ) e 21 e 2 L 0 0 e 2 ( 2 L + 1 ) e 2 ( 3 L ) e N 1 e N L 0 0 e N ( 2 L + 1 ) e N ( 3 L ) ] .
Let λ be the eigenvalues of Γ , then the following equation can be obtained [20]:
det ( Γ λ I ) = ( λ ) α ( i = 1 N e j 2 π f i τ ) N α = 0 .
where α > 1 is the total number of the intercepted samples by the jammer.
Equation (13) shows that the operator matrix of the jamming have zero eigenvalues. Therefore, we will analyze the characteristics of eigenvectors associated with zero eigenvalues.
Firstly, since both F and F I are reversible, they are full rank. Secondly, it is easy to test that the phase matrix T is full rank as well. Therefore, their product, that is, the matrix E is full rank, which means the column vectors of E are linearly independent. Then constitutes a new matrix B with the nonzero column vectors in Γ , and the new matrix is also full rank.
Therefore, solving the matrix equation:
B x = 0 .
we have the solution x = 0 .
The optimal waveform we want should meet:
Γ x = 0 .
Substituting Equation (12) into Equation (15), we have the following equation group:
{ e 11 x 1 + e 1 L x L + 0 x L + 1 + 0 x 2 L + e 1 N x N = 0 e 21 x 1 + e 2 L x L + 0 x L + 1 + 0 x 2 L + e 2 N x N = 0 e N 1 x 1 + e N L x L + 0 x L + 1 + 0 x 2 L + e N N x N = 0 .
It could be seen from Equation (16) that:
  • For thevariables whose coefficient are not zero, the equation holds only if the variables satisfy x i = 0 .
  • While for the variables whose coefficient are zero, the equation holds for any value of variables x i .
According to the above analysis, the optimal waveform should be zero during the intercepting durations of the jammer; in other words, the optimal waveform is time discontinuous. Therefore, for convenience, we call it the time-discontinuous waveform (TDW).
For the case of multiple retransmitting, the difference lies only in the structure of the sampling matrix A :
A = [ 1 ( L ) 1 0 ( M L ) 0 1 ( L ) 1 ] .
Which means the jammer intercepts L signal samples at a time and retransmits them for M times.
For this matrix, the above analysis also applies, hence the same conclusion can be drawn, i.e., the optimal radar waveform should transmit when the jammer is not sampling.

3. Adaptive Transmitting Scheme for ISRJ Suppression

In this section, an adaptive transmitting scheme for ISRJ suppression is presented. The flowchart of the scheme is shown in Figure 2. The scheme adaptively adjusts the transmitting waveform according to the dynamic jamming environment, thus realizing the dynamic game between the radar and the jammer.
The detailed interpretations are as follows:
  • At the beginning, the radar transmits a predesigned waveform according to the mission;
  • When the ISRJ jammer starts to work, it intercepts and retransmits the radar signal according to the set strategy;
  • The radar carries out jamming perception to determine whether the jamming exists:
    • if there is no jamming, the radar maintains the transmitting waveform unchanged;
    • if there is jamming in the echo, the jamming parameters estimation is performed;
  • The radar optimizes the waveform with the jamming parameters and transmits the optimized waveform in the next PRI.
According to the analysis of previous section, it is theoretically possible to achieve ISRJ suppression by transmitting TDW whose discontinuous positions are consistent with the jammer intercepting periods. However, a TDW may imply complex hardware and large radar operational bandwidth. Besides, the jammer will always detect the rising edge of the signal, so the simple TDW will cause the jammer to change the strategy, resulting in a failure of the jamming suppression ability of the designed waveform. Therefore, we shall insert some protection pulses at the discontinuous intervals of a TDW, making the whole waveform continuous in time. For the purposes of jamming suppression, the protection pulses should be orthogonal to the TDW. With this waveform, the jammer will sample and retransmit the protection pulses, thus the jamming signal can be easily suppressed with pulse compression. The structure of the transmitting waveform is shown in Figure 3.

3.1. JammingPerception

In order to effectively jam the radar, the energy of the jamming signal generally needs to be greater than the target echo. ISRJ can achieve some coherent processing gain, thereby reducing the requirement for transmitting power. But with respect to the target echo, the processing gain achievable is small. This means that the jamming-to-noise ratio (JNR) of ISRJ needs to be significantly larger than the signal-to-noise ratio (SNR) of the target echo. For example, if each jamming slice is retransmitted once (in which case the jamming signal can achieve greatest processing gain), the peak amplitude of the jamming signal after pulse compression will be the same as that of the target when the JNR is two times of the SNR. To achieve better jamming effect, the JNR of ISRJ generally requires to be higher, which provides favorable condition for jamming perception.
The purpose of jamming perception is to estimate the intercepting positions and durations of an ISRJ jammer, and provide the necessary prior knowledge for the antijamming waveform design. This is essentially a problem of target detection and parameter estimation in noise. Similar problems have been extensively studied in the fields of target detection [21,22], edge detection and time of arrival (TOA) estimation [23]. While in this paper, the purpose is achieved with steps of wavelet denoising, amplitude difference and peak detection. These methods has been widely used in different areas [24,25,26,27], hence will not be described in detail here. According to the subsequent simulations, the jamming parameters can be accurately estimated when JNR is greater than 0dB.Besides, the JNR can be further increased by pulse accumulation if the conditions permit.

3.2. Joint Design of TDW and Protection Pulse

A phase-coded signal has the advantages of simple implementation and good clutter suppression performance [28,29], therefore is widely used in radar transmission. In this section, the binary phase-coded signal is taken as an example to illustrate the joint design of TDW and protection pulse.
Assume that the discontinuous positions of TDW are defined by:
Ω = k = 1 K ( t k 1 , t k 2 ) .
where K is the number of discontinuous positions; t k 1 and t k 2 are the start time and end time of the kth discontinuous position.
Then the TDW can be expressed as:
x = A s 1 .
where s 1 is a binary phase-coded sequence; x is the TDW; A is the sampling matrix, whose columns corresponding to the time defined in Ω are zero and the other elements are one.
Similarly, the protection pulse can be expressed as:
p = C A s 2 .
where s 2 is another binary phase-coded sequence; p is the protection pulse and C A is the sampling matrix of protection pulse which is complementary to A , i.e., the columns corresponding to the time defined in Ω are one and the other elements are zero.
In waveform design research, the peak to side-lobe ratio (PSR) and integrated side-lobe level (ISL) of the autocorrelation function are usually used to evaluate the pulse compression performance of a waveform, while those of the cross-correlation function are usually used to evaluate the orthogonality of a pair of waveforms [30,31]. The two functions can be expressed as:
The autocorrelation function of x :
γ x x ( m ) = k = 0 N 1 x ( k ) x * ( k + m ) .
The cross-correlation function of x and p:
γ x p ( m ) = k = 0 N 1 x ( k ) p * ( k + m ) .
However, for the situation considered in this paper, both the target echo and jamming signal are present in the received signal. Therefore, the autocorrelation characteristic of TDW alone cannot fully reflect the PSR and ISL of the signal after pulse compression. Considering that the jamming signal is essentially the retransmission of the protection pulse, therefore, it is necessary to consider the PSR and ISL characteristics of the summation of the autocorrelation and the cross-correlation functions. That is, the PSR of the sum function should be as large as possible while the ISL should be as small as possible.
The summation of the autocorrelation and the cross-correlation functions is:
χ ( m ) = γ x x ( m ) + γ x p ( m ) .
Then the PSR and ISL can be defined as:
P S R = | χ ( 0 ) | 2 max | k | > δ | χ ( k ) | 2 .
I S L = | k | > δ | χ ( k ) | 2 | k | δ | χ ( k ) | 2 .
where δ is the boundary of the main lobe of the autocorrelation function.
The cost function can then be expressed as the weighted sum of the two indicators:
F = α P S R + ( 1 α ) I S L .
where α is an adjusting factor.
Many modern optimization methods (such as water-filling algorithm, simulated annealing method, particle swarm optimization, compressed sensing etc.) have been used to solve such problems [32,33,34,35,36]. In this paper, the genetic algorithm (GA) [36] is used to optimize the waveform.

4. Simulations

In order to verify the effectiveness of the proposed scheme, simulation experiments are performed with the parameters shown in Table 2.
The system uses an m-sequence-based binary phase-coded signal as the transmitting signal. The code number is 100 and the code width is 0.1 μs. The jammer switches to ‘intercepting and retransmitting’ mode after detecting the rising edge of the radar signal. The intercepting duration is set 1 μs and each of the intercepted slice is retransmitted for twice. Therefore, the jammer can intercept 4 jamming slices in the whole pulse duration.
Assuming the jamming-to-signal ratio (JSR) is 15 dB, then the real part and pulse compression result of the received signals are shown in Figure 4. In Figure 4a, the black line shows the real part of the target echo, while the blue line shows the real part of the jamming signal.
The pulse compression result is shown in Figure 4b. With the set simulation parameters, the jamming signal forms two false targets after pulse compression. Since the jamming signal is just the retransmission of parts of the whole signal, the available processing gain is smaller than that of the target echo’s. Hence, the peak JSR is reduced by about 7 dB after pulse compression, but the false targets are still strong enough to cause false alarms. Besides, the random peaks caused by the superposition of the side lobes will seriously affect the detection of the real target, either.
The simulations of jamming perception are shown in Figure 5. With wavelet denoising, amplitude difference and peak detection, the typical results of jamming parameters estimation are shown in Figure 5a, in which the JNR is set 0 dB and the red curve represents the true jamming envelope, while the black curve is the estimated jamming envelope. The discontinuous position between each segment of the jamming signal corresponds to the intercepting period of the jammer. With different JNR, the estimation error of the intercepting duration is shown in Figure 5b. It can be seen that, when the JNR is 0 dB, the estimation error is about 0.054 μs (the value is the average of 100 Monte Carlo simulations), which is equivalent to 2 or 3 sampling points according to the sampling rate. The error is acceptable for subsequent waveform design.
With the estimated jamming parameters, the cost function can be given with Equations (21)–(26) and solved with genetic algorithm (GA). Performing 100 Monte Carlo simulations, the average value of the cost function in each iteration step is shown in Figure 6. The iteration is stopped when the generation number reaches 100 and the cost function is convergent to the value of about 13.
For different jamming scenarios, the typical designed waveforms can be seen from the target echo shown in Figure 7a, Figure 8a, and Figure 9a with the black line. Under the same jams shown with the blue dotted line. In Figure 7, each jamming slice is retransmitted once; in Figure 8, each jamming slice is retransmitted twice, while in Figure 9, the jamming slices are retransmitted for different times, where the first slice is retransmitted once, the second slice is retransmitted twice, and so on. It should be noted that the figure only gives a typical result of the joint design process. Signals with different codes may be outputted in the 100 simulations.
The pulse compression results of the received signal are shown in Figure 7b, Figure 8b and Figure 9b, where the black line shows the pulse compression result of the received signal with the designed waveform. While in the same figure, the pulse compression result of received signal with the conventional phase-coded signal is shown with the blue line for comparison. It can be seen that, compared with the conventional m-sequence based binary phase-coded waveform, the false targets are effectively suppressed with the designed waveform and the side lobes are also significantly reduced.
However, because the protection pulse in the designed waveform cannot provide any processing gain for the target echo, there is a target energy loss relative to the conventional waveform. The loss is related to the jamming strategy. When each intercepted slice is retransmitted for only one time, the length of the total intercepted signal can be half of the transmitting pulse duration. At this point, the target energy loss will reach the maximum, i.e., 3 dB.
The average jamming suppression performance of the obtained 100 waveforms with different JNR conditions is shown in Figure 10 and Figure 11. In Figure 10a, the blue and black lines, respectively, present the PSR of the pulse compression results with the conventional and designed waveforms, and the PSR improvement with different JSR is shown in Figure 10b. It can be seen that with the increase of the JSR, the JSR improvement will increase first and then decrease. For the simulation parameters of this paper, the optimal PSR improvement is about 15 dB, which can be obtained when the JSR is about 14 dB.
Similarly, the ISL of the pulse compression result is shown in Figure 11 and the optimal ISL improvement is about 16 dB, which is obtained at the JSR of 12.8 dB for the same simulation parameters.
The results suggest that the designed waveform has an obvious ISRJ suppression effect.

5. Conclusions

In order to suppress the ISRJ injected from the main lobe of the radar antenna, an adaptive transmitting scheme is proposed in this paper. Based on an ordinary single-channel radar, the scheme first estimates the intercepting positions and durations of the ISRJ with jamming perception technologies, then performs waveform optimization for ISRJ suppression (the designed waveform is named TDW). By inserting some protection pulses orthogonal to the TDW at the jammer intercepting positions, the processing gain obtained by the jamming signal can be greatly reduced, thereby suppressing the jamming performance. The simulation results show that the jamming parameters can be effectively estimated when the JNR is greater than 0dB. The designed antijamming waveform can achieve a JSR improvement of more than 10 dB when the input JSR is less than 20 dB, while the target energy loss less than 3 dB.

Acknowledgments

This work was supported by the Chang Jiang Scholars Programme under Grants T2012122 and 111 Project of China under Grants B14010.

Author Contributions

Zhou Chao and Liu Feifeng conceived and designed the methods; Zhou Chao and Liu Quanhua conceived and designed the experiments; Zhou Chao performed the simulations and wrote the paper.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Berger, S.D. Digital radio frequency memory linear range gate stealer spectrum. IEEE Trans. Aerosp. Electron. Syst. 2003, 39, 725–735. [Google Scholar] [CrossRef]
  2. Sounekh, M. SAR-ECCM using phase-perturbed LFM chirp signals and DRFM repeat jammer penalization. IEEE Trans. Aerosp. Electron. Syst. 2006, 42, 191–204. [Google Scholar] [CrossRef]
  3. Roome, S.J. Digital radio frequency memory. Electron. Commun. Eng. J. 1990, 2, 147–153. [Google Scholar] [CrossRef]
  4. Almslmany, A.; Wang, C.; Cao, Q. Advanced deceptive jamming model based on DRFM sub-Nyquist sampling. In Proceedings of the 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Islamabad, Pakistan, 12–16 January 2016; pp. 727–730. [Google Scholar]
  5. İspir, M.; Orduyılmaz, A.; Serin, M.; Yıldırım, A.; Gürbüz, A.C. Real-time multiple velocity false target generation in digital radio frequency memory. In Proceedings of the 2016 IEEE Radar Conference (RadarConf), Philadelphia, PA, USA, 2–6 May 2016; pp. 1–6. [Google Scholar]
  6. Pace, P.E.; Fouts, D.J.; Ekestorm, S.; Karow, C. Digital false target image synthesizer for countering ISAR. IET Radar Sonar Navig. 2002, 149, 248–257. [Google Scholar]
  7. Li, C.; Su, W.; Gu, H.; Ma, C.; Chen, J.L. Improved interrupted sampling repeater jamming based on DRFM. In Proceedings of the IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Guilin, China, 5–8 August 2014; pp. 254–257. [Google Scholar]
  8. Zhang, H.G.; Luo, J.; Chen, X.L.; Liu, Q.H.; Zeng, T. Fresnel based frequency domain adaptive beamforming for large aperture distributed array radar. In Proceedings of the IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Hong Kong, China, 5–8 August 2016; pp. 1–5. [Google Scholar]
  9. Sparrow, M.J.; Cakilo, J. ECM Techniques to Counter Pulse Compression Radar. U.S. Patent 7081846, 25 July 2006. Available online: http://www.freepatentsonline.com/7081846.html (accessed on 3 December 2016).
  10. Liu, Z. Jamming Technique for Countering LFM Pulse Compression Radar Based on Digital Radio Frequency Memory. Ph.D. Thesis, National University of Defense Technology, Changsha, China, 2006. [Google Scholar]
  11. Wang, X.S.; Liu, J.C.; Zhang, W.M.; Fu, Q.X.; Liu, Z.; Xie, X. Mathematical principle of interrupted sampling repeater jammer (ISRJ). Sci. China Ser. E Inf. Sci. 2006, 36, 891–901. [Google Scholar]
  12. Li, H.; Zhao, G.Y.; Yang, Y.K.; Gao, H.F. The performance analysis of multi-false target jamming of part copying Radar pulse. Electron. Inf. Warf. Technol. 2010, 25, 39–44. [Google Scholar]
  13. Li, H.; Mou, N.W.; Guo, L. Depressing distance of coherent jamming. Electron. Inf. Warf. Technol. 2015, 30, 33–36. [Google Scholar]
  14. Ding, Z.; Guo, Y.; Gao, W.; Kang, Q.; Zeng, T.; Long, T. A range grating lobes suppression method for stepped-frequency SAR imagery. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 2016, 9, 5677–5687. [Google Scholar] [CrossRef]
  15. Gong, S.; Wei, X.; Li, X. ECCM scheme against interrupted sampling repeater jammer based on time frequency analysis. J. Syst. Eng. Electron. 2014, 25, 996–1003. [Google Scholar] [CrossRef]
  16. Zhou, C.; Shi, F.; Liu, Q. Research on parameters estimation and suppression for C&I jamming. In Proceedings of the 2016 CIE international conference on Radar, Guangzhou, China, 10–13 October 2016; pp. 215–218. [Google Scholar]
  17. Ciuonzo, D.; Aubry, A.; Carotenuto, V. Rician MIMO channel and jamming-aware decision fusion. IEEE Trans. Signal Process. 2017, 65, 3866–3880. [Google Scholar] [CrossRef]
  18. Yang, X.; Li, S.; Hu, X.; Zeng, T. Improved MDL method for estimation of source number at subarray level. IET Electron. Lett. 2015, 52, 85–86. [Google Scholar] [CrossRef]
  19. Dudczyk, J.; Kawalec, A. Fast-decision identification algorithm of emission source pattern in database. Bull. Pol. Acad. Sci. 2015, 63, 385–389. [Google Scholar]
  20. Zhang, X. Matrix Analysis and Applications, 2nd ed.; TsingHua University Press: Beijing, China, 2013; pp. 399–413. ISBN 9787302092711. [Google Scholar]
  21. Ciuonzo, D.; de Maio, A.; Orlando, D. On the statistical invariance for adaptive radar detection in partially homogeneous disturbance plus structured interference. IEEE Trans. Signal Process. 2017, 65, 1222–1234. [Google Scholar] [CrossRef]
  22. Ciuonzo, D.; de Maio, A.; Orlando, D. A Unifying Framework for Adaptive Radar Detection in Homogeneous Plus Structured Interference—Part II: Detectors Design. IEEE Trans. Signal Process. 2016, 64, 2907–2919. [Google Scholar] [CrossRef]
  23. Xu, J.C.; Wang, Z.; Liu, Q.H.; Ren, L.X. A novel TOA estimation method for unknown signal based on intra pulse correlation accumulation. In Proceedings of the IEEE International Conference on Signal Processing, Communi-cations and Computing (ICSPCC), Hong Kong, China, 5–8 August 2016; pp. 1–4. [Google Scholar]
  24. Yin, Z.; Cui, K.; Wu, Z.; Yin, L. Entropy-Based TOA estimation and SVM-Based ranging error mitigation in UWB ranging systems. Sensors 2015, 15, 11701–11724. [Google Scholar] [CrossRef] [PubMed]
  25. Xu, T.; Wang, G.; Wang, H.; Yuan, T.; Zhong, Z. Gap measurement of point machine using adaptive wavelet threshold and mathematical morphology. Sensors 2016, 16, 2006. [Google Scholar] [CrossRef] [PubMed]
  26. Yi, T.; Li, H.; Zhao, X. Noise smoothing for structural vibration test signals using an improved wavelet thresholding technique. Sensors 2012, 12, 11205–11220. [Google Scholar] [CrossRef] [PubMed]
  27. Sanam, T.F.; Shahnaz, C. Noisy speech enhancement based on an adaptive threshold and a modified hard thresholding function in wavelet packet domain. Digit. Signal Process. 2012, 23. [Google Scholar] [CrossRef]
  28. Levanon, N.; Mozeson, E. Radar Signals, 1st ed.; John Wiley & Sons, Inc.: Hoboken, NJ, USA, 2004; pp. 100–155. ISBN 13:978-0471473787. [Google Scholar]
  29. Davis, R.M.; Fante, R.L.; Perry, R.P. Phase-coded waveforms for radar. IEEE Trans. Aerosp. Electron. Syst. 2007, 43, 401–408. [Google Scholar] [CrossRef]
  30. Tang, L.; Zhu, Y.; Fu, Q. Designing waveform sets with good correlation and stopband properties for MIMO radar via the gradient-based method. Sensors 2017, 17, 999. [Google Scholar] [CrossRef] [PubMed]
  31. Yue, W.; Zhang, Y.; Liu, Y.; Xie, J. Radar constant-modulus waveform design with prior information of the extended target and clutter. Sensors 2016, 16, 889. [Google Scholar] [CrossRef] [PubMed]
  32. Deng, H. Polyphase code design for orthogonal netted radar systems. IEEE Trans. Signal Process. 2004, 52, 3126–3135. [Google Scholar] [CrossRef]
  33. Chen, P.; Zheng, L.; Wang, X.D.; Li, H.; Wu, L. Moving target detection using colocated MIMO radar on multiple distributed moving platforms. IEEE Trans. Signal Process. 2017, 65, 4670–4683. [Google Scholar] [CrossRef]
  34. Yang, Y.; Blum, R.S.; He, Z.S.; Fuhrmann, D.R. MIMO radar waveform design via alternating projection. IEEE Trans. Signal Process. 2010, 58, 1440–1445. [Google Scholar] [CrossRef]
  35. Yang, Y.; Blum, R.S. MIMO radar waveform design based on mutual information and minimum mean-square error estimation. IEEE Trans. Aerosp. Electron. Syst. 2007, 43, 330–343. [Google Scholar] [CrossRef]
  36. Chen, Z.K.; Wang, J.; Qiao, X.L.; Ma, Y. Waveform design for MIMO radar with sparse antenna array. In Proceedings of the 2015 IET International Radar Conference, Hangzhou, China, 14–16 October 2015; pp. 1–5. [Google Scholar]
Figure 1. Mechanism of interrupted sampling repeater jamming (ISRJ).
Figure 1. Mechanism of interrupted sampling repeater jamming (ISRJ).
Sensors 17 02480 g001
Figure 2. Flow chart of adaptive transmitting scheme.
Figure 2. Flow chart of adaptive transmitting scheme.
Sensors 17 02480 g002
Figure 3. Structure of transmitting waveform for ISRJ suppression.
Figure 3. Structure of transmitting waveform for ISRJ suppression.
Sensors 17 02480 g003
Figure 4. Jamming effect of common binary phase-coded signal. (a) The real part of the received signals and (b) pulse compression of the received signals.
Figure 4. Jamming effect of common binary phase-coded signal. (a) The real part of the received signals and (b) pulse compression of the received signals.
Sensors 17 02480 g004
Figure 5. Simulations of jamming perception (a) estimation results of jamming parameters with jamming-to-noise ratio (JNR) =0 dB (b) jamming parameters estimation errors VS. JNR.
Figure 5. Simulations of jamming perception (a) estimation results of jamming parameters with jamming-to-noise ratio (JNR) =0 dB (b) jamming parameters estimation errors VS. JNR.
Sensors 17 02480 g005
Figure 6. The convergence process of the waveform design algorithm.
Figure 6. The convergence process of the waveform design algorithm.
Sensors 17 02480 g006
Figure 7. Jamming suppression result of a typical designed waveform (the intercepting duration is 1 μs and each jamming slice is retransmitted once): (a) the real part of the received signals with a typical designed waveform (b) pulse compression result of the received signal.
Figure 7. Jamming suppression result of a typical designed waveform (the intercepting duration is 1 μs and each jamming slice is retransmitted once): (a) the real part of the received signals with a typical designed waveform (b) pulse compression result of the received signal.
Sensors 17 02480 g007
Figure 8. Jamming suppression result of a typical designed waveform (the intercepting duration is 1 μs and each jamming slice is retransmitted twice): (a) the real part of the received signals with a typical designed waveform (b) pulse compression result of the received signal.
Figure 8. Jamming suppression result of a typical designed waveform (the intercepting duration is 1 μs and each jamming slice is retransmitted twice): (a) the real part of the received signals with a typical designed waveform (b) pulse compression result of the received signal.
Sensors 17 02480 g008
Figure 9. Jamming suppression result of a typical designed waveform (each jamming slice is retransmitted for different times): (a) the real part of the received signals with a typical designed waveform (b) pulse compression result of the received signal.
Figure 9. Jamming suppression result of a typical designed waveform (each jamming slice is retransmitted for different times): (a) the real part of the received signals with a typical designed waveform (b) pulse compression result of the received signal.
Sensors 17 02480 g009
Figure 10. Peak-to-side-lobe ratio (PSR) of the pulse compression result under different jamming-to-signal ratio (JSR) (a) PSR of the pulse compression result with common and designed waveforms (b) PSR improvement with different JSR.
Figure 10. Peak-to-side-lobe ratio (PSR) of the pulse compression result under different jamming-to-signal ratio (JSR) (a) PSR of the pulse compression result with common and designed waveforms (b) PSR improvement with different JSR.
Sensors 17 02480 g010
Figure 11. Integrated side-lobe level (ISL) of the pulse compression result under different JSR (a) ISL of the pulse compression result with common and designed waveforms (b) ISL improvement with different JSR.
Figure 11. Integrated side-lobe level (ISL) of the pulse compression result under different JSR (a) ISL of the pulse compression result with common and designed waveforms (b) ISL improvement with different JSR.
Sensors 17 02480 g011
Table 1. Main notations used in the paper.
Table 1. Main notations used in the paper.
SymbolsInterpretation
s Transmitted signal vector
x I Intercepted signal vector
A Jammer sampling matrix
τ 0 Time delay
F Fourier transform coefficient matrix
X Spectrum of the intercepted signal
τ Retransmitting delay
T Phase matrix corresponding to the retransmitting delay
Y Phase shifted spectrum
F I Inverse Fourier transform coefficient matrix
J Jamming signal vector
Γ Jamming operator
M Retransmitting time of each jamming slice
u Eigenvector of Γ
λ Eigenvalueof Γ
Ω = k = 1 K ( t k 1 , t k 2 ) Discontinuous positions set
K Number of discontinuous positions
t k 1 , t k 2 Start time and end time of the k th discontinuous position
s 1 , s 2 Binary phase-coded sequence
x Time-discontinuous waveform
p Protection pulse vector
C A Sampling matrix of protection pulse, complementary to A
F Cost function for waveform optimization
Table 2. Simulation parameters for ISRJ.
Table 2. Simulation parameters for ISRJ.
ParameterValue
Transmitting signalBinary phase-coded (m-sequence)
Carrier frequency6 GHz
Code width0.1 μs
Code number100
Sampling rate50 MHz
Sampling points2048
Intercepting duration1 μs
Retransmitting time2

Share and Cite

MDPI and ACS Style

Zhou, C.; Liu, F.; Liu, Q. An Adaptive Transmitting Scheme for Interrupted Sampling Repeater Jamming Suppression. Sensors 2017, 17, 2480. https://doi.org/10.3390/s17112480

AMA Style

Zhou C, Liu F, Liu Q. An Adaptive Transmitting Scheme for Interrupted Sampling Repeater Jamming Suppression. Sensors. 2017; 17(11):2480. https://doi.org/10.3390/s17112480

Chicago/Turabian Style

Zhou, Chao, Feifeng Liu, and Quanhua Liu. 2017. "An Adaptive Transmitting Scheme for Interrupted Sampling Repeater Jamming Suppression" Sensors 17, no. 11: 2480. https://doi.org/10.3390/s17112480

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop