This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
1. Introduction
Modern warfare is information and electronic based, which is evidently replacing the conventional platforms [1]. It requires no further confrontation between soldier to soldier, trench to trench, platoon to platoon, and platform to platform; rather, it relies on nonlinear and nonsymmetric war between system to system [2]. As the 21st century unfolds, the concept of electronic information warfare has become center of the gravity in which the radar system constitutes the key components that provide early warning capabilities [3]. Radar works as an early warning system and bestows extra time space to react against imminent threat. The principle of the radar to detect the desired target is transmitting radio waves towards the target and calculates round-trip time of the reflected waves after striking with the target [3]. To counter enemy radars, ECM techniques (also known as radar jamming techniques) were introduced [4]. These techniques are used to deny the important information about the desired aircrafts (direction of arrival, range, velocity, etc.) that any foe radar seeks [4]. In the presence of strong electronic counter measure (radar jammers) systems, it is difficult to detect the target aircraft; but there are many electronic counter-countermeasure (ECCM) techniques available in literature to counter radar jammer and to locate correctly the target [5, 6]. Some ECCM (which are also known as antijamming) systems steer nulls towards strong interfering signals to secure own functioning.
Mainly, there are two types of radar jamming techniques: mechanical methods (passive jamming) and electrical methods (active jamming) [3]. In mechanical methods, physical means like chaffs, decoys, corner reflectors, and stealth are used in securing the desired aircrafts’ flights and to deceive enemy radars [4]. These physical means of radar jamming are traditional techniques which are not so effective. Electrical methods of radar jamming are effective and still in use [1, 2]. These methods can be categorized in two types: barrage jamming (also known as noise jamming) and deceptive jamming [4]. Barrage jamming methods use radar jammers to put huge powers across the desired spectrum of the frequencies which blankets the radar’s display to interrupt its normal functioning [7]. There are two main reasons of the ineffectiveness of this type which is huge power losses for longer periods of times, and even it cannot cover the entire frequency spectrum at the same time [8]. The deceptive jamming mode is used to deceive the enemy radars by showing them multiple very similar fake targets with different aircraft attitudes (range, direction, velocity, acceleration, etc.) [9].
This paper focuses only on the deception jamming, because this is the most effective way to secure the flight of the desired aircraft from the enemy radars by showing congruent false targets [10]. Therefore, implementing effective and efficient deceptive jamming (DJ) techniques has become a hotspot area of research in radar electronic countermeasures [11, 12]. Many methods have been developed in the modern literature [13–15]. In pursuit of deceptive radar jamming, the simplest way to generate multiple false targets is to hold enemy radar signals and after doing time-modulation transmit those signals back to the enemy radar [16]. When the enemy radar receives these signals, it will perceive multiple false targets with different ranges, but with the same direction along with the actual target. A modest contribution has been made using target pose and motion information to generate false targets in [17]. To deceive the opponent radar with a number of fake targets, another effort has been made in [18] using micromotion characteristics, but both have the same issue of computation complexity.
Multiple false targets also have been achieved using electromagnetic properties (EM model modulation) and translation modulation in [19]. By exploiting the concept of sub-Nyquist sampling theorem, a series of multiple fake targets have proposed in [20, 21]. Another remarkable approach has been defended to produce multiple false targets using product modulation in which an offline deceptive signal template is produced and then multiplied with enemy radar signal in [22]. Interrupted-sampling repeater jamming (ISRJ) establishes a novel approach to generate deception jamming by allowing the single radar antenna jammer to sample periodically and iterating a fraction of the intercepted enemy radar signal [23]. Inappropriately, high complexity and large computation is the main drawback of inefficiency of the above deceptive techniques in the field of electronic countermeasures. Further, these techniques are also unable to hide real target.
A recent effort has been exercised to achieve the goal by adding escort-free flight jammer drone ahead of the actual aircraft based on periodic the 0-π phase modulation which neutralizes the effectiveness of the enemy radar by displaying its multiple verisimilar false targets [24]. The escort-free flight jammer intercepts enemy radar signals and after doing phase modulation in the periodic 0-π sequence, these signals are retransmitted towards the actual target, whereby these are scattered towards the enemy radar and present multiple false targets with different ranges [24], but it considers the scenario where a separate escorting drone jammer is required which is not feasible in most practical situations.
Against to the only angle-dependent beam scanning techniques, FDA is an efficient beam scanning array used for phased array radars which has recently got tremendous attention in literature due to its greater achievement of wide angle coverage [25–28]. The radiation pattern of the phase array radar (PAR) depends only upon the direction while FDA radiation pattern depends upon the direction and range, due to its diversity in frequency across the array elements. Hence, FDA radiation pattern is capable of null steering to the particular range and direction. FDA is implemented by applying small increment in frequencies across array elements to achieve range angle-dependent beam scanning transmission [29, 30]. Hence, it enables beam scanning without need of any phase shifters and physical steering [31–33].
A good effort in field of deceptive jamming is explored in [34] which utilizes frequency diverse array. It produces multiple fake targets at different distances across the slant range but at the same azimuthal range aligned with the actual target. The technique is unable to draw false targets at different azimuthal ranges other than azimuthal range of the actual target. A novel approach in the field of deceptive jamming has been introduced in [35] with wave scattering using FDA for space-borne synthetic aperture radar (SAR). This approach considers the scenario where we offer deceptive jamming to the opponent radar for securing our valuable targets in its own territory with the help of placing deceptive reflectors. But this technique provides no solution to tackle the opponent radar operating from its own territory without the help of any ground-based situated wave scattering reflectors. Further, this method is also unable to hide its own target from the enemy foresight.
Although a modest effort has been made in [36] to introduce the deceptive jamming approach through frequency diversity, there are a few shortcomings in the proposed technique. These include (a) that deceptive jammer should be synchronized/attached or working in collaboration with a friendly GPS satellite system, (b) deceptive jammer must have prior knowledge of the location in space of the opponent radar, (c) the method is slow because it is using FFT and IFFT to convert signals from time domain to frequency domain and then back to previous domain, which makes it performance slow, and (d) it does not give any solution if the foe radar is also an FDA radar.
Paper in the reference [37] presented a deception jamming method which generates multiple scenes (multiple false targets) using FDA radar antenna, where number of false targets depend on the number of antenna array elements. The technique in reference [38] uses the simplest way to generate nulls towards the desired direction and range in order to suppress the offered range-angle dependent interference jamming, but this technique is unable to offer deceptive jamming to confuse the opponent radar, and it also does not hide its own target from the vision of the opponent radar. Further, as we know that FDA is time, angle, and range-dependent, but in this technique, the time-dependency factor of the FDA radar is diminished by considering it as zero (
Until now, best to the authors’ knowledge, available deceptive jamming techniques in the present literature are not dealing with the hiding of the actual target along the generation of false targets using FDA radars. Present literature also does not offer deceptive jamming for the opponent radars which work on FDA radar principle. The proposed study would investigate these limitations in depth and subsequently would present a probable solution against it. The main contribution of the work is summarized below.
(i) This research produces a novel deceptive jamming approach in the field of ECM
(ii) The algorithm works against the opponent FDA radar and hides the actual target from it
(iii) For this purpose, enemy radar pulse is captured by the target FDA radar, and null is placed at the radar range to hide its own target alongside after its time modulation
(iv) It is equally effective to tackle ground-based opponent FDA radar in its own territory
(v) The proposed technique efficiently works without help of ground-based wave-scattering reflectors or advance escort-free-drone jammers
(vi) The proposed algorithm also confuses the opponent FDA radar by multiple false targets at different user-defined ranges
The remaining part of the paper is organized in the following way. Sections 2 and 3 introduce mathematical background of the FDA radar and comparison with existing techniques, respectively. Section 4 depicts the proposed method to secure the flight of the actual aircraft in the enemy territory by neutralizing the dangers of enemy radars, while Section 5 shows the effectiveness and correctness of the proposed techniques via simulations in three dimensions and in two dimensions for four different cases. Finally, conclusion of the paper has been presented in Section 6.
2. Data Model for the FDA Radar
FDA radar uses small increment in frequency of each element over the antenna array. Radiation pattern of the FDA radar is a function of range, angle, and time [25–28]. FDA radar implements waveform diversity among the radiating elements which brings more functionality [29, 30]. Figure 1 depicts an FDA that consists of uniform linear array (ULA) having
[figure omitted; refer to PDF]
Four elements array with adjacent distance of half wavelength were used in FDA with frequency offset 500 kHz, and its simulation of [35] is shown in Figure 3, which reflects actual target at slant range 7500 m and azimuthal range 0 m along with four false targets which are situated at slant ranges 7300 m, 7395 m, 7615 m, and 7750 m with azimuthal range at 100 m. Figure 4 shows the effectiveness of the technique [36] by considering the jammer at the middle of the scene (7500 m, 0 m); this algorithm generates four false targets at different locations. Algorithm assumes FDA array of eight elements with frequency offset 300 kHz. It is evident from Figures 2–4 that although all three techniques [34–36] are big achievement in the field of deception jamming using frequency diverse array, none is able to hide actual target alongside generating multiple false targets.
[figure omitted; refer to PDF]
Instead of showing results like Figures 7, 11, 15, and 19 in 3-D, we have plotted the results in more simplified way using only output power in Figures 10, 14, 18, and 22, respectively. These figures (10, 14, 18, and 22) simply further elaborate the results of Figures 7, 11, 15, and 19, respectively. These figures show two scenarios. In the first scenario, it hides the actual target by simulating equation (29), whereas eq. (29) places null in the received signal at the opponent radar’s location by means when the opponent receives this signals, he will perceive min. power at the target location. In the second scenario, it generates false targets at certain ranges and angles by evaluating equation (45) which will offer maximum power at different ranges.
Figure 8 reflects 2-D results of the null position at the range of the actual aircraft to camouflage it, while Figure 9 also verifies our results of null position at the desired direction of the real target to cover it. The proposed method also generates four fake targets along the same direction of the actual target and at different ranges of 30 km, 40 km, 60 km, and 70 km. This has been proved in Figure 10 where the desired target is hidden along with fake targets at their respective ranges.
[figure omitted; refer to PDF][figure omitted; refer to PDF][figure omitted; refer to PDF]7. Case-II
For this case, we have assumed that the real-target aircraft is located at range 40 km and direction 10 degree. Carrier frequency and incremental frequency,
8. Case-III
In 3rd case, we have assumed that the real target is positioned at range of 70 km from the opponent radar along the direction 40 degrees. Our proposed technique can verify the results in Figure 15 by showing that the desired null has been place effectively at the actual target location. Its two-dimensional counterpart graphs are shown in Figures 16 and 17 to validate its correctness in the desired range and direction, respectively. Figure 18 shows multiple fake targets in the direction of the real target but at distances 40 km, 50 km, 60 km, and 80 km away from the opponent radar.
[figure omitted; refer to PDF][figure omitted; refer to PDF][figure omitted; refer to PDF][figure omitted; refer to PDF]9. Case-IV
In the last case, we have taken the actual target aircraft at distance 60 km away from the foe radar and at direction 20 degrees. The proposed model draws a null at its location to hide the aircraft from the vision of the opponent radar, and it is evident from its 3-D simulation in Figure 19. Further exploration of the method has been disclosed in Figures 20 and 21, whereby 2-dimensional graphs have been drawn to show the placement of the null at the desired range and direction, respectively. Vertical axis shows power in dB for different numbers of radiating antenna elements in the array. Lastly, to generate multiple fake targets at range 40 km, 50 km, 70 km, and 80 km along the same direction of the target aircraft, the proposed method calculates appropriate time delays. The deceptive jammer sends echoes back with these time delays to confuse the enemy radar by showing him multiple false targets at desired ranges as shown in Figure 22.
[figure omitted; refer to PDF][figure omitted; refer to PDF][figure omitted; refer to PDF][figure omitted; refer to PDF]10. Conclusion and Future Directions
A novel approach in the field of deception jamming has been developed in this research which hides actual target and displays multiple fake targets at different arbitrary ranges along the same direction to the enemy radar. This method has been developed to neutralize the effectiveness and dangers of the enemy radar which ultimately guarantees the safe penetration of the actual aircraft into the enemy territory. Moreover, a number of time modulations are performed for intercepted signal to display multiple deceptive jammer false targets at different ranges but along the same direction. It is assumed that the enemy radar has the capability of range angle-dependent radiation pattern characteristics. FDA radar’s radiation pattern is also time-dependent for larger pulse width. This effect has been covered by considering narrow radar pulse width. Hence, in this way, time dependency will not affect the radiation pattern of the FDA radar.
One of the other emerging area of research is how to counter deception jamming (anti-jamming) using FDA-MIMO radars in the field of ECCM techniques, because in the FDA-MIMO radar, we synthesize features of both radars (FDA and MIMO), and we achieve frequency diversity due to the FDA radar as well as waveform diversity due to the MIMO radar. We will try to investigate their relation with the presented method as well. We will also explore that how we can use FDA-MIMO radars to hide the actual aircraft target from the ground-based FDA opponent radar without the help of wave-scattering reflectors or advance escort-free-drone jammer. This research can give notion towards production of airborne deceptive jammers in the future.
Finally, the effectiveness and correctness of the proposed research have been verified by doing theoretical analysis and simulations by considering different cases with a number of distinct ranges of the actual target and fake deceptive targets. To put the research in the simplest form, the FDA radar is considered with the uniform linear array configuration. Moreover, the passage of time hardware computational and accuracy capabilities increases tremendously. Hence, limitations in implementing the algorithms due to hardware will be overcome; one can implement the proposed work through hardware with the collaboration of any national/international research organization.
Acknowledgments
Prof. Dr. Ijaz Mansoor Qureshi, a prolific Pakistani scholar, engineer, and scientist, suddenly died on the 10th of January 2021 at the age of 67. A renowned expert of signal array processing and evolutionary computing techniques, Professor Qureshi worked in different national universities of Pakistan for decades. He authored more than 200 publications and mentored more than 50 PhD scholars, including myself. Knowledge, wisdom, and experience in the field were aspects of his life; moreover, he was a man of great hospitality, friendship, and kindness. The authors found him warm, smiling, and engaging. Simplicity and morality were the salient features of his personality. His scholarship, penetrating mind, and truly and lovely personality will be long remembered in our minds and hearts.
[1] B. Zohuri, "Electronic countermeasure and electronic counter-countermeasure," Radar Energy Warfare and the Challenges of Stealth Technology, pp. 111-145, DOI: 10.1007/978-3-030-40619-6_2, 2020.
[2] Y. Yan-Juan, Z. Feng, A. Xiao-Feng, L. Xiao-Bin, Z.-F. Xu, "A study on effectiveness modeling of multi-false-target jamming," 2016 CIE International Conference on Radar (RADAR),DOI: 10.1109/radar.2016.8059369, .
[3] A. Farina, M. Skolnik, "Electronic counter-countermeasures," Radar handbook 2, 2008.
[4] L. Neng-Jing, Z. Yi-Ting, "A survey of radar ECM and ECCM," IEEE Transactions on Aerospace and Electronic Systems, vol. 31 no. 3, pp. 1110-1120, DOI: 10.1109/7.395232, 1995.
[5] A. Ahmed, W. Q. Wang, Z. Yuan, S. Mohamed, T. Bin, "Subarray-based FDA radar to counteract deceptive ECM signals," EURASIP Journal on Advances in Signal Processing, vol. 2016 no. 1,DOI: 10.1186/s13634-016-0403-6, 2016.
[6] S. Y. Nusenu, A. Basit, E. Asare, "FDA transmit beamforming synthesis using Chebyshev window function technique to counteract deceptive electronic countermeasures signals," Progress in Electromagnetics Research Letters, vol. 90, pp. 53-60, DOI: 10.2528/PIERL19121005, 2020.
[7] F. H. Zhao, P. Zhang, Y. S. Wang, "The study of barrage-type jamming for SAR," Wireless Communication Technology, vol. 16 no. 3, pp. 53-57, 2007.
[8] J. Schuerger, D. Garmatyuk, "Deception jamming modeling in radar sensor networks," MILCOM 2008 - 2008 IEEE Military Communications Conference,DOI: 10.1109/milcom.2008.4753118, .
[9] Y. Li, L. Gaohuan, C. Huilian, "The study of multi-false targets deception against stepped-frequency waveform inverse synthetic aperture radar," 2008 9th International Conference on Signal Processing, pp. 2481-2484, DOI: 10.1109/icosp.2008.4697652, .
[10] Y. J. Lee, J. R. Park, W. H. Shin, K. I. Lee, H. C. Kang, "A study on jamming performance evaluation of noise and deception jammer against SAR satellite," 2011 3rd International Asia-Pacific Conference on Synthetic Aperture Radar (APSAR), .
[11] B. Rao, G. Zhaoyu, Y. Nie, "Deception approach to track-to-track radar fusion using noncoherent dual-source jamming," IEEE Access, vol. 8, pp. 50843-50858, DOI: 10.1109/ACCESS.2020.2980010, 2020.
[12] S. ZHU, Q. Luo, C. Tong, "The analysis of moving targets deceptive jamming model to SAR," Electronic Information Warfare Technology, vol. 1, 2012.
[13] F. Zhou, B. Zhao, M. Tao, X. Bai, B. Chen, G. Sun, "A large scene deceptive jamming method for space-borne SAR," IEEE Transactions on Geoscience and Remote Sensing, vol. 51 no. 8, pp. 4486-4495, DOI: 10.1109/TGRS.2013.2259178, 2013.
[14] B. Zhao, F. Zhou, M. Tao, Z. Zhang, B. Zheng, "Improved method for synthetic aperture radar scattered wave deception jamming," IET Radar, Sonar & Navigation, vol. 8 no. 8, pp. 971-976, DOI: 10.1049/iet-rsn.2013.0341, 2014.
[15] Y. Liu, W. Wang, X. Pan, D. Dai, D. Feng, "A frequency-domain three-stage algorithm for active deception jamming against synthetic aperture radar," IET Radar, Sonar & Navigation, vol. 8 no. 6, pp. 639-646, DOI: 10.1049/iet-rsn.2013.0222, 2014.
[16] X. Yan, Y. Li, P. Li, J. Wang, "Multiple time-delay smart deception jamming to pseudo-random code phase modulation fuze," 2012 International Conference on Computer Distributed Control and Intelligent Environmental Monitoring, pp. 428-432, DOI: 10.1109/cdciem.2012.108, .
[17] P. Shi-rui, L. Yong-chun, L. Xin, W.-f. Dong, "Study on target pose and deception jamming to ISAR," 2009 2nd Asian-Pacific Conference on Synthetic Aperture Radar, pp. 526-530, DOI: 10.1109/apsar.2009.5374230, .
[18] Z. Zong, L. Huang, H. Wang, L. Huang, Z. Shu, "Micro-motion deception jamming on Sar using frequency diverse array," IGARSS 2019 - 2019 IEEE International Geoscience and Remote Sensing Symposium, pp. 2391-2394, DOI: 10.1109/igarss.2019.8898721, .
[19] Z. Bo, F. Zhou, X. Shi, Q. Wu, Z. Bao, "Multiple targets deception jamming against ISAR using electromagnetic properties," IEEE Sensors Journal, vol. 15 no. 4, pp. 2031-2038, DOI: 10.1109/jsen.2014.2368985, 2014.
[20] W. Wang, X.-Y. Pan, Y.-C. Liu, D.-J. Feng, F. Qi-Xiang, "Sub-Nyquist sampling jamming against ISAR with compressive sensing," IEEE Sensors Journal, vol. 14 no. 9, pp. 3131-3136, DOI: 10.1109/JSEN.2014.2323978, 2014.
[21] X.-Y. Pan, W. Wang, G.-Y. Wang, "Sub-Nyquist sampling jamming against ISAR with CS-based HRRP reconstruction," IEEE Sensors Journal, vol. 16 no. 6, pp. 1597-1602, DOI: 10.1109/jsen.2015.2503419, 2015.
[22] L. X. D. Feng, Q. Liu, X. Wang, "ISAR decoy generation by utilizing coherent multiplication modulated jamming," Acta Electronica Sinica, vol. 42 no. 12, pp. 2501-2508, 2014.
[23] D. Feng, L. Xu, X. Pan, X. Wang, "Jamming wideband radar using interrupted-sampling repeater," IEEE Transactions on Aerospace and Electronic Systems, vol. 53 no. 3, pp. 1341-1354, DOI: 10.1109/TAES.2017.2670958, 2017.
[24] Q. Shi, C. Wang, J. Huang, N. Yuan, "Multiple targets deception jamming against ISAR based on periodic 0- $\pi$ phase modulation," IEEE Access, vol. 6, pp. 3539-3548, DOI: 10.1109/ACCESS.2018.2792477, 2018.
[25] P. Antonik, M. C. Wicks, H. D. Griffiths, C. J. Baker, "Frequency diverse array radars," 2006 IEEE Conference on Radar,DOI: 10.1109/radar.2006.1631800, .
[26] P. Antonik, M. C. Wicks, H. D. Griffiths, C. J. Baker, "Multi-mission multi-mode waveform diversity," 2006 IEEE Conference on Radar,DOI: 10.1109/radar.2006.1631858, .
[27] P. Antonik, M. C. Wicks, "Method and apparatus for simultaneous synthetic aperture radar and moving target indication," . US Patent 8,803,732, 2014
[28] P. Antonik, M. C. Wicks, H. D. Griffiths, C. J. Baker, "Range-dependent beamforming using element level waveform diversity," 2006 International Waveform Diversity & Design Conference,DOI: 10.1109/wdd.2006.8321488, .
[29] M. Secmen, S. Demir, A. Hizal, T. Eker, "Frequency diverse array antenna with periodic time modulated pattern in range and angle," 2007 IEEE Radar Conference, pp. 427-430, DOI: 10.1109/RADAR.2007.374254, .
[30] P. F. Sammartino, C. J. Baker, H. D. Griffiths, "Frequency diverse MIMO techniques for radar," vol. 49 no. 1, pp. 201-222, DOI: 10.1109/TAES.2013.6404099, 2013.
[31] W.-Q. Wang, "Range-angle dependent transmit beampattern synthesis for linear frequency diverse arrays," IEEE Transactions on Antennas and Propagation, vol. 61 no. 8, pp. 4073-4081, DOI: 10.1109/TAP.2013.2260515, 2013.
[32] W.-Q. Wang, "Frequency diverse array antenna: new opportunities," IEEE Antennas and Propagation Magazine, vol. 57 no. 2, pp. 145-152, DOI: 10.1109/MAP.2015.2414692, 2015.
[33] W.-Q. Wang, "Overview of frequency diverse array in radar and navigation applications," IET Radar, Sonar & Navigation, vol. 10 no. 6, pp. 1001-1012, DOI: 10.1049/iet-rsn.2015.0464, 2016.
[34] Y. Zhu, H. Wang, S. Zhang, Z. Zheng, W. Wang, "Deceptive jamming on space-borne SAR using frequency diverse array," IGARSS 2018 - 2018 IEEE International Geoscience and Remote Sensing Symposium, pp. 605-608, DOI: 10.1109/IGARSS.2018.8518451, .
[35] B. Huang, W.-Q. Wang, S. Zhang, H. Wang, R. Gui, L. Zheng, "A novel approach for spaceborne SAR scattered-wave deception jamming using frequency diverse array," IEEE Geoscience and Remote Sensing Letters, vol. 17 no. 9, pp. 1568-1572, DOI: 10.1109/lgrs.2019.2950454, 2020.
[36] W. Mao, H. Wang, S. Zhang, X. Liu, "A novel deceptive jamming method via frequency diverse array," IGARSS 2019 - 2019 IEEE International Geoscience and Remote Sensing Symposium, pp. 2369-2372, DOI: 10.1109/IGARSS.2019.8897840, .
[37] H. Wang, S. Zhang, W.-Q. Wang, B. Huang, Z. Zheng, L. Zheng, "Multi-scene deception jamming on SAR imaging with FDA antenna," IEEE Access, vol. 8, pp. 7058-7069, DOI: 10.1109/access.2019.2963042, 2019.
[38] Y. Liao, T. Hu, X. Chen, W.-Q. Wang, M. Xing, Z. Zheng, J. Wang, Q. H. Liu, "Antenna Beampattern with range null control using weighted frequency diverse array," IEEE Access, vol. 8, pp. 50107-50117, DOI: 10.1109/ACCESS.2020.2979942, 2020.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2021 Shahid Mehmood et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
Deceptive jamming is a popular electronic countermeasure (ECM) technique that generates false targets to confuse opponent surveillance radars. This work presents a novel approach for hiding the actual target while producing multiple false targets at the same time against frequency diverse array (FDA) radar. For this purpose, the modified FDA radar is assumed to be mounted on the actual aircraft. It intercepts the opponent’s radar signals and transmits back to place nulls in the radiation pattern at the desired range and direction to exploit FDA radar’s range-dependent pattern nulling capability. The proposed deceptive jammer produces delayed versions of the intercepted signals to create false targets with multiple ranges to confuse the opponent’s radar system. The novel mathematical model is proposed whose effectiveness is verified through several simulation results for different numbers of ranges, directions, and antenna elements.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details

1 Department of Electrical Engineering, International Islamic University, Islamabad, Pakistan
2 Department of Electrical Engineering, Air University Islamabad, Pakistan
3 Department of Electrical & Computer Engineering, COMSATS University Islamabad, Pakistan