Liu et al. EURASIP Journal on Wireless Communications and Networking (2016) 2016:1DOI 10.1186/s13638-015-0498-8
RESEARCH Open Access
Modeling and analyzing interference signal in a complex electromagnetic environment
http://crossmark.crossref.org/dialog/?doi=10.1186/s13638-015-0498-8&domain=pdf
Web End = Chun-tong Liu, Rong-jing Wu, Zhen-xin He*, Xiao-feng Zhao, Hong-cai Li and Peng-zhi Wang
Abstract
Electronic jamming is the key technology of electronic countermeasure, for which models and simulations are studied on noise jamming, deception jamming, and chaff jamming. In the noise jamming, the simulation analysis of radio frequency noise jamming is conducted and the theoretical models of other forms of noise jamming are built. The simulation analysis of range-gate pull off (RGPO) is carried out in the deception jamming. In addition, theoretical modeling and simulation analysis of chaff jamming are carried out with the Monte Carlo method. Simulation results show that the models are correct and can be used to simulate the statistical characteristics of chaff jamming. With the development and wide application of electronic technology, radar, communication, navigation, and IFF signals constitute a complex electromagnetic environment. It is a must to study electronic jamming technology in the complex electromagnetic environment, which will play an indispensable role in the construction of information team and victory in the countermeasure of information technology.
Keywords: Electromagnetic environment, Electronic jamming, Mathematical model, Simulation analysis
1 IntroductionThe Gulf war and the Kosovo war show that the electronic countermeasure kicks off and exists in the whole process of war, affecting the war process and pattern, which is the mainstream and a significant feature of information warfare [1]. Radar jamming and anti-jamming ability have become the key factors in the electronic countermeasure. The detection and intentional electronic interference of launch task of the foreign spy satellites are inevitable to affect the electromagnetic safety of the launch site, which seriously threatens the space launch task of each country [2]. In complex electromagnetic environments, the electromagnetic interference has greatly damaged the performance of the guidance equipment. Guidance equipment under electromagnetic interference cannot be properly guided and lose targets.Therefore, it is significant to study electromagnetic interference in a complex electromagnetic environment, which will play an indispensable role in the construction of information team and victory in the countermeasure of information technology. It also has practical significance in anti-interference research for guidance equipment.
Electronic attack is the fighting force which can destroy the target directly by the active use of an electromagnetic spectrum or directional energy. Electronic attacks against radar include non-destructive actions and destructive actions. Non-destructive action is to reduce or offset the operational effectiveness of enemy radar by using suppressing jamming and deception jamming [3].
The development of electronic jamming and anti-jamming technology has brought unprecedented challenges to the guidance equipment. Radar jamming reduces the lethality of the guidance equipment yet improves the survival ability of the target [4]. The new strategy should be proposed in air defense guidance equipment system to meet the current electronic warfare needs after carefully studying the development of airborne electronic countermeasure technology [5]. At present, there have been a large number of researches concerning the electronic interference, but most of them are based on a certain kind of interference. The research scope is relatively scattered and lacks comprehensive interference analysis and model study [6]. This paper analyzes the theory of mathematical modeling and simulation of common types of electronic jamming, which will play an important role in the identification of enemy electronic jamming and electronic jamming to enemies. It has important practical significance in the current
* Correspondence: mailto:[email protected]
Web End [email protected] Xian Research Institute of High Technology, Xian city, Shaan Xi Province 710025, China
2015 Liu et al. Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International
License (http://creativecommons.org/licenses/by/4.0/
Web End =http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any
medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons
license, and indicate if changes were made.
Liu et al. EURASIP Journal on Wireless Communications and Networking (2016) 2016:1 Page 2 of 9
form of electronic warfare technology and pushes forward the researches of radar anti-jamming technology.
2 Classification and mathematical model of radar jammingElectronic countermeasure is an action where both sides interfere with the equipments usage of the electromagnetic spectrum and electromagnetic information and attack the other side and their equipment by using electromagnetic energy or directional energy; in the meantime, it guarantees equipment normal function and personnels safety [7]. Radar countermeasure and counter-countermeasure is one of the important contents of electronic warfare. The interference of radar is mainly classified into background and artificial interference, and the latter is the focus of our study. Artificial interference can be classified into active jamming and passive jamming. Active jamming can be further classified into the suppression of jamming and deception jamming according to the principle of interference signal. Under the complex electromagnetic environment, how to analyze the jamming effect is of great value [8]. The mathematical modeling and analysis of common jamming signals are discussed in the following parts.
2.1 Radio frequency noise jamming
Masking jamming is used to cover or flood useful signals by using noise or jamming signals similar to noise and to prevent radar from detecting targets. Its basic principles are as follows: internal noise and external noise exist in any radar, detection of radar targets is conducted in these noises, and the detection is based on a certain probability criterion.
Radio frequency noise jamming is one of the effective ways of masking jamming. The radio frequency (RF) noise jamming can be obtained by direct amplification of microwave noise, and its mathematical model can be expressed as follows:
uj t un t
cos jt t
Fig. 1 Simulation flow chart of RF noise
8 >
<
>
:
2i
f i f f
i
j j
f r 2
3
where fi is the center frequency of the receiver and fr is the medium bandwidth of the receiver. The correlation function of the RF noise can be obtained according to Fourier transform relation between the correlation function and the power spectrum density
0 others
1
where un(t) satisfies the Rayleigh distribution and (t) satisfies uniform distribution in [0,2pi], un(t) and (t) are independent of each other, and j is the carrier frequency and it is a constant.
The noise is a power signal and its power is limited, but the energy is unlimited. So the power spectrum is used to express its frequency characteristics. Its power spectral density expression is
Gj f
8 >
<
>
:
2f j f f
2
0 others
f
j
2
j
where 2 is the average power of noise, fj is the interference bandwidth, and fj is the center frequency of RF noise jamming. If the medium frequency of the receiver
has a rectangular feature, after the radio frequency noise is received by the receiver, the output interference signal of the medium-frequency amplifier is still narrowband Gauss noise, and its power spectrum Gj (f) is as follows:
Gj f Hi f
j j2Gj f f i
Fig. 2 Time-domain wave of band-limited RF noise
Liu et al. EURASIP Journal on Wireless Communications and Networking (2016) 2016:1 Page 3 of 9
Fig. 3 Envelope distribution and phase distribution of RF noise jamming. a The envelope obeys the Rayleigh distribution. b The phase obeys the uniform distribution
function of the signal. The correlation function of the RF noise satisfies
Ri Z
0 Gi f
cos2fdf
us cos w0t
ui t
cos it t
7
where ui(t) is the amplitude of the synthesized signal and the probability distribution is the rice distribution.
2.2 Range-gate pull off
Range-gate pull off (RGPO) can be applied to radar systems of different ranging systems. Its basic principle is to make radar tracking systems track interference signal whose distance is gradually farther away from the target position and then to make radar fail to capture target position information.
RGPO can be roughly divided into three stages: stop delay period, towing period, and termination period. In the first period, jammers amplify and forward signals quickly to make time delay difference between the target echo and itself short enough to enter the radar range gate; due to its higher power of interference signal, the range gate cannot lock the exact interference signal. When the
2i
sinf r
f r cos2f
i 4
After the linear detector, the Gauss white noise distribution becomes Rayleigh distribution
Pi Uv
Uv
2v e
U2v22v ; Uv > 0 5
where 2v k2 (k is the amplification factor of the lin
ear detector).
In practice, the RF noise signals and radar signals are often simultaneously entered into the radar receiver and build the model for the mixed signals of both.
Set target echo signal as single-frequency signal, and then
s t
us cos w0t
6 The expression of the mixed signals of the output signal of the receiver and the noise is
uj t s t
un t
cos jt t
Fig. 4 Autocorrelation function of RF noise
Fig. 5 Power spectral density of RF noise
Liu et al. EURASIP Journal on Wireless Communications and Networking (2016) 2016:1 Page 4 of 9
Fig. 6 Performance simulation of echo with RF noise when us/i = 0.1. a Time-domain waveform. b Power spectral density
stop delay period ends or when the range gate locks interference signal, it comes to the second period, towing period. In this period, time delay of a jammers forwarding signal is gradually extended to increase distance between the interference signal and target signal in a range dimension. Because the range gate is locked in the interference signal, the target has been dragged out of the range gate gradually. Then the change rule of time delay of the interference signal can be expressed as d(t)/dt = v(t), where (t) and v(t) are the towing distance and towing speed, respectively. Finally, when the target is dragged out of the range gate, it comes to the termination period, in which the jammer is turned off or stops forwarding the interference signal, and the radar returns back to the search state because there is no signal within the range gate.
Based on the analysis of the target echo model, the target echo signal received by the receiver can be obtained by
s t
As exp j c d
t
2R t
c
8
The signal of RGPO satisfies
J t
Aj exp j c d
8 >
>
<
>
>
:
0 0t < t1 stop delayperiod
2v2c tt1
or
2ac tt1
2 t1t < t2 towing period
jamming off t1t < t2 termination period
11
9
where As is the signal amplitude of the real target; Aj is the amplitude of the interference signal and Aj > As; c is the carrier frequency of the radar; d is the Doppler frequency; R(t) is the real distance of the target; tj(t) is
the delay time of the signal of RGPO compared with the normal echo signal of the target and it changes with time; and C is the speed of light.
Assuming that the target is moving at a constant speed, when adopting the linear or parabolic dragging ways, the distance function of the false target can be expressed as follows:
where R is the distance of the target; V1 is the velocity of the target; V2 is the towing speed of the linear towing; and a is the towing acceleration of the parabolic towing. According to the principle of radar delay ranging, the distance change of the interference signal is converted into time delay and we can obtain
tj t
2.3 Chaff jamming
Chaff jamming takes advantage of a large number of randomly distributed metallic scatterers which are put into the air to produce scattering wave and interferes with radar [9]. Chaff jamming is widely used in electronic warfare because of its simple manufacturing, low cost, and strong applicability. The conventional chaff scattering mechanism is resonant scattering, so it has a narrow band. It will increase complexity to use broadband. The Monte Carlo method for the stochastic problems mainly consists of three steps: the first step is to build model of problems; the second step is to conduct statistical experiments; and the third step is to solve the problem based on the experimental results.
When analyzing chaff echo power, we regard each chaff as a single unit and only consider the first reflection. Assuming that the echo signal delay is known, the echoes of all chaff units are superimposed together to get the chaff cloud echo.
Based on the above assumptions, the chaff cloud echo signal can be treated as a random sampling of zero-mean
t
2R t
c tj t
Rj t
R v1t 0t < t1 stop delay period
8 <
:
R v1t1 v2 tt1
or R v1t1 a tt1
2 t1t < t2 towing period
jamming off t1t < t2 terminaton period
10
Liu et al. EURASIP Journal on Wireless Communications and Networking (2016) 2016:1 Page 5 of 9
Fig. 7 Performance simulation of echo with RF noise when us/i = 1. a Time-domain waveform. b Power spectral density
complex Gauss stochastic process. Statistical integral form of the chaff cloud echo signal is as follows:
S0 t Z
Si tt
E S0 f 1
Si f 1
S 0 f 2
S i f 2
Z
exp 2i f
1f 2
t
c 2
X
c2 t
dt
15
r dZ t
c 2
X
c2 t
12
where Si(t) is the radar emission signal, S(t) is the radar receipt signal, c is the speed of light; t0 is the echo delay; (ct0/2) is the average power of the chaff cloud reflection, and Z(t) is a zero-mean complex Gaussian random processes and it satisfies E[|dZ(t)|2] = dt.
The average power of the chaff cloud reflection is derived as
X
c2 t
Based on simple scattering theory, the frequency response to chaff cloud can be expressed as
Sc f Z
exp 2ift
c 2
r dZ t
X
c 2 t
16
Chaff cloud echo can be obtained by convolution between the emission signal and response to chaff cloud. While it corresponded to the frequency domain, its frequency response is the product of both
S0 f Si f
Sc f
17
The simulation method is used to solve the frequency response to chaff cloud. Let X(T) and Y(T) be two zero-mean real normal processes.
So the zero-mean complex Gauss stochastic process is described as
Z t
X t
iY t
18
Then,
Pt
4
3 ZA
G2t i
R4
2
=2 exp 2
dV
13
where A is the volume of chaff cloud. The mean value of the echo power is as follows:
E 12 S0 t
j j2
Z
1
2 Si tt
j j2
c 2
X
c2 t
dt 14 Fourier transform on both sides of the equation can be used to get autocorrelation function
Fig. 8 Performance simulation of echo with RF noise when us/i = 10. a Time-domain waveform. b Power spectral density
Liu et al. EURASIP Journal on Wireless Communications and Networking (2016) 2016:1 Page 6 of 9
The above formula is substituted into the chaff cloud frequency response, and the discrete processing is used to get
Sc nf X
N1
m0
exp 2i nm
N
c 2
r
X
c2 mt
1
2 N 0; t
iN 0; t
21
The above equation can be used to express the chaff cloud echo signal in the frequency domain, and the corresponding signal form in the time domain can be obtained after Fourier inverse transform.
3 Computer simulation analysis3.1 RF noise jamming simulation
We design MATLAB program for RF noise and carry out computer simulations. The simulation parameters are set as follows: the sampling frequency is 80 MHz; the bandwidth of the band-pass filter is 28 MHz; and the noise figure is 1.1. A simulation flow chart is shown in Fig. 1.
Simulation results are shown in Figs. 2 and 3.
It can be seen from the graph that the envelope of the RF noise obeys the Rayleigh distribution and the phase obeys the uniform distribution, which is consistent with the theoretical analysis.
Through the filter, autocorrelation function and power spectrum density function of the RF noise are shown in Figs. 4 and 5. It can be seen that
Fig. 9 Algorithm flow chart of distance deception jamming
j j2
j j2
dE X2 t
Y 2 t
d D X t
D Y t
f g
E dZ t
E d X t
iY t
19
For E[|dZ(t)|2] = dt, the zero-mean complex Gauss random process can be expressed as
Z t
1
2 N 0; t
iN 0; t
20
Fig. 10 Simulation of distance deception jamming
Liu et al. EURASIP Journal on Wireless Communications and Networking (2016) 2016:1 Page 7 of 9
power spectral density shows the filter shape through a band-pass filter and autocorrelation function shows characteristics of a single-frequency signal, which is consistent with the theoretical analysis.
Respectively, us/i = 0.1; 1; 10, the computer simulation results of the signal superimposed with noise are shown in Figs. 6, 7, and 8. It can be seen that the output amplitude of the receiver under RF noise jamming shows the following distribution. Echo signals magnitude is no longer the original form of a rectangular pulse under the influence of RF noise jamming and varies around the average potential of noise. As the interference power increases, the signal is submerged in the noise interference and it cannot be detected and identified.
3.2 RGPO simulation
Assume that the carrier frequency of the radar emission signal is 8 MHz, the pulse repetition frequency is 3 kHz, the duty ratio is 1/4, the sampling frequency is 80 MHz, and the range gate is towed at a constant speed. The simulation parameters are as follows: R = 4 km, V1 =
0 m/s, t1 = 0.3 ms, t2 = 2 ms, V2 = 106 m/s, and jamming to signal ratio is 12 dB. A flow chart of deception jamming simulation algorithm is shown in Fig. 9.
Figure 10 shows that the interference signal is formally exactly the same as the target signal except amplification of amplitude before 0.3 ms. They both have the same time delay compared to the emission signal, about 27 s which is consistent with the target distance. Distance towing begins at 0.3 ms, and then the interference signal and the target signal differ. Compared with the emission signal, time delay of the interference signal is gradually increased within each pulse period and the delay of target signal remains unchanged, so the distance between the interference signal and the target signal becomes larger, which is consistent with the theoretical analysis. It verifies the validity of the simulation model.
3.3 Chaff jamming simulation
Assuming chaff is uniformly distributed in a 150-m-diameter sphere, there is a total of 1.5 108 dipoles. Phase encoding signal emitted by radar is simulated at a medium frequency of 55 MHz and an algorithm flow chart of simulation is shown in Fig. 11.
It can be seen from Fig. 12 that the normalized amplitudes satisfy Rayleigh distribution; phases satisfy uniform distribution within (pi, pi); spectrum broadens to a certain extent around 55 MHz. Power spectrum satisfies the Gauss distribution whose mean value is about 55 MHz. Therefore, the simulation results are consistent with the statistic characteristics of chaff echo.
Computer simulations of RF noise jamming, RGPO, and chaff jamming are carried out in this paper. According to the results of computer simulation, the simulation achieves the expected goal and correctly reflects the mathematical model. By comparing the simulation results of the different parameters, the related interference process can be simulated.
In the simulation of RF noise jamming, the process is simulated that the useful signal is submerged by the noise signal and cannot be detected or identified. The simulation characteristics of the envelope and phase of the noise signal are consistent with the theoretical analysis. The results of RGPO simulation and chaff jamming simulation are the same as what is expected.
4 ConclusionsFor new radar electronic systems and new communication equipment that continue to emerge, the corresponding electronic countermeasure tactics technology has also been rapidly developed. To meet the objective requirements of
Fig. 11 Algorithm flow chart of chaff jamming
Liu et al. EURASIP Journal on Wireless Communications and Networking (2016) 2016:1 Page 8 of 9
Fig. 12 Simulation of chaff cloud echo. a Normalized one-dimensional range image. b Amplitude distribution. c Phase distribution. d Spectrum characteristic. e Power spectrum characteristic
the electronic warfare theory research and practical testing, many electronic warfare simulation systems have been produced at home and abroad with the help of the rapidly developed modeling theory and computer network technology. Therefore, it is urgent for electronic countermeasure researchers to comprehend and master the system simulation technology in time [10]. We analyzed the mathematical model of the common electronic interferences in a complex electromagnetic environment and conducted computer simulation of RF noise jamming, RGPO, and chaff jamming. Simulation analyses verify the validity of the mathematical model of the electronic interference. This study will be helpful
in further study on the electronic interference and suppression.
Competing interestsThe authors declare that they have no competing interests.
AcknowledgementsThis work is partially supported by the National Nature Science Foundation of China under Grant 41404022 and the Nature Science Foundation of Shannxi Province under Grant 2015JM4128.
Received: 29 September 2015 Accepted: 15 December 2015
Liu et al. EURASIP Journal on Wireless Communications and Networking (2016) 2016:1 Page 9 of 9
References1. B Gao, S Lv, J Zhao, Implementation of effectiveness evaluation simulation system for ECM. Syst. Eng. Electron 27(10), 17381739 (2005)2. Z Li, Research on Complicated Electromagnetic Environment and Its Applications for Launch Mission (Chinese Academy of Sciences, China, 2009)
3. Y Zhang, N Tong, G Zhao, Principle of Radar Electronic Warfare (National Defense Industry Press, Beijing, 2006)
4. J Su, Z Song, Q Fu et al., Joint tracking method for the unresolved decoy and target with monopulse radar. J. Radars 4(2), 160161 (2014)5. B Tao, An ECCM model and the technical development trends to the demands of the future EW combat. Syst. Eng. Electron 10, 4950 (1993)
6. F Ji, Modeling and Simulation of Radar Electronic Jamming (Dalian University of Technology, China, 2013)
7. G Zhao, Principle of Radar Countermeasure (Xidian University Press, Xian, 2005)8. X Shen, G Wang, L Wang et al., Effect evaluation for electronic jamming aircraft against netted surveillance radars. Syst. Simul 20(4), 9971001 (2008)
9. J Chen, Chaff Jamming Principle (National Defense Industry Press, Beijing, 2007)10. Y Chen, G Shao, S Zhang et al., Study on the key techniques in a simulation system of synthetic EW. Syst. Eng. Electron 22(2), 6869 (2000)
Submit your manuscript to a journal and benet from:
7 Convenient online submission7 Rigorous peer review7 Immediate publication on acceptance7 Open access: articles freely available online 7 High visibility within the eld7 Retaining the copyright to your article
Submit your next manuscript at 7 springeropen.com
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
The Author(s) 2016
Abstract
Electronic jamming is the key technology of electronic countermeasure, for which models and simulations are studied on noise jamming, deception jamming, and chaff jamming. In the noise jamming, the simulation analysis of radio frequency noise jamming is conducted and the theoretical models of other forms of noise jamming are built. The simulation analysis of range-gate pull off (RGPO) is carried out in the deception jamming. In addition, theoretical modeling and simulation analysis of chaff jamming are carried out with the Monte Carlo method. Simulation results show that the models are correct and can be used to simulate the statistical characteristics of chaff jamming. With the development and wide application of electronic technology, radar, communication, navigation, and IFF signals constitute a complex electromagnetic environment. It is a must to study electronic jamming technology in the complex electromagnetic environment, which will play an indispensable role in the construction of information team and victory in the countermeasure of information technology.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer