Modeling and analyzing interference signal in a complex electromagnetic environment
© Liu et al. 2015
Received: 29 September 2015
Accepted: 15 December 2015
Published: 4 January 2016
Electronic jamming is the key technology of electronic countermeasure, for which models and simulations are studied on noise jamming, deception jamming, and chaff jamming. In the noise jamming, the simulation analysis of radio frequency noise jamming is conducted and the theoretical models of other forms of noise jamming are built. The simulation analysis of range-gate pull off (RGPO) is carried out in the deception jamming. In addition, theoretical modeling and simulation analysis of chaff jamming are carried out with the Monte Carlo method. Simulation results show that the models are correct and can be used to simulate the statistical characteristics of chaff jamming. With the development and wide application of electronic technology, radar, communication, navigation, and IFF signals constitute a complex electromagnetic environment. It is a must to study electronic jamming technology in the complex electromagnetic environment, which will play an indispensable role in the construction of information team and victory in the countermeasure of information technology.
The Gulf war and the Kosovo war show that the electronic countermeasure kicks off and exists in the whole process of war, affecting the war process and pattern, which is the mainstream and a significant feature of information warfare . Radar jamming and anti-jamming ability have become the key factors in the electronic countermeasure. The detection and intentional electronic interference of launch task of the foreign spy satellites are inevitable to affect the electromagnetic safety of the launch site, which seriously threatens the space launch task of each country . In complex electromagnetic environments, the electromagnetic interference has greatly damaged the performance of the guidance equipment. Guidance equipment under electromagnetic interference cannot be properly guided and lose targets. Therefore, it is significant to study electromagnetic interference in a complex electromagnetic environment, which will play an indispensable role in the construction of information team and victory in the countermeasure of information technology. It also has practical significance in anti-interference research for guidance equipment.
Electronic attack is the fighting force which can destroy the target directly by the active use of an electromagnetic spectrum or directional energy. Electronic attacks against radar include non-destructive actions and destructive actions. Non-destructive action is to reduce or offset the operational effectiveness of enemy radar by using suppressing jamming and deception jamming .
The development of electronic jamming and anti-jamming technology has brought unprecedented challenges to the guidance equipment. Radar jamming reduces the lethality of the guidance equipment yet improves the survival ability of the target . The new strategy should be proposed in air defense guidance equipment system to meet the current electronic warfare needs after carefully studying the development of airborne electronic countermeasure technology . At present, there have been a large number of researches concerning the electronic interference, but most of them are based on a certain kind of interference. The research scope is relatively scattered and lacks comprehensive interference analysis and model study . This paper analyzes the theory of mathematical modeling and simulation of common types of electronic jamming, which will play an important role in the identification of enemy electronic jamming and electronic jamming to enemies. It has important practical significance in the current form of electronic warfare technology and pushes forward the researches of radar anti-jamming technology.
2 Classification and mathematical model of radar jamming
Electronic countermeasure is an action where both sides interfere with the equipment’s usage of the electromagnetic spectrum and electromagnetic information and attack the other side and their equipment by using electromagnetic energy or directional energy; in the meantime, it guarantees equipment normal function and personnel’s safety . Radar countermeasure and counter-countermeasure is one of the important contents of electronic warfare. The interference of radar is mainly classified into background and artificial interference, and the latter is the focus of our study. Artificial interference can be classified into active jamming and passive jamming. Active jamming can be further classified into the suppression of jamming and deception jamming according to the principle of interference signal. Under the complex electromagnetic environment, how to analyze the jamming effect is of great value . The mathematical modeling and analysis of common jamming signals are discussed in the following parts.
2.1 Radio frequency noise jamming
Masking jamming is used to cover or flood useful signals by using noise or jamming signals similar to noise and to prevent radar from detecting targets. Its basic principles are as follows: internal noise and external noise exist in any radar, detection of radar targets is conducted in these noises, and the detection is based on a certain probability criterion.
In practice, the RF noise signals and radar signals are often simultaneously entered into the radar receiver and build the model for the mixed signals of both.
2.2 Range-gate pull off
Range-gate pull off (RGPO) can be applied to radar systems of different ranging systems. Its basic principle is to make radar tracking systems track interference signal whose distance is gradually farther away from the target position and then to make radar fail to capture target position information.
RGPO can be roughly divided into three stages: stop delay period, towing period, and termination period. In the first period, jammers amplify and forward signals quickly to make time delay difference between the target echo and itself short enough to enter the radar range gate; due to its higher power of interference signal, the range gate cannot lock the exact interference signal. When the stop delay period ends or when the range gate locks interference signal, it comes to the second period, towing period. In this period, time delay of a jammer’s forwarding signal is gradually extended to increase distance between the interference signal and target signal in a range dimension. Because the range gate is locked in the interference signal, the target has been dragged out of the range gate gradually. Then the change rule of time delay of the interference signal can be expressed as dτ(t)/dt = v(t), where τ(t) and v(t) are the towing distance and towing speed, respectively. Finally, when the target is dragged out of the range gate, it comes to the termination period, in which the jammer is turned off or stops forwarding the interference signal, and the radar returns back to the search state because there is no signal within the range gate.
2.3 Chaff jamming
Chaff jamming takes advantage of a large number of randomly distributed metallic scatterers which are put into the air to produce scattering wave and interferes with radar . Chaff jamming is widely used in electronic warfare because of its simple manufacturing, low cost, and strong applicability. The conventional chaff scattering mechanism is resonant scattering, so it has a narrow band. It will increase complexity to use broadband. The Monte Carlo method for the stochastic problems mainly consists of three steps: the first step is to build model of problems; the second step is to conduct statistical experiments; and the third step is to solve the problem based on the experimental results.
When analyzing chaff echo power, we regard each chaff as a single unit and only consider the first reflection. Assuming that the echo signal delay is known, the echoes of all chaff units are superimposed together to get the chaff cloud echo.
The simulation method is used to solve the frequency response to chaff cloud. Let X(T) and Y(T) be two zero-mean real normal processes.
The above equation can be used to express the chaff cloud echo signal in the frequency domain, and the corresponding signal form in the time domain can be obtained after Fourier inverse transform.
3 Computer simulation analysis
3.1 RF noise jamming simulation
It can be seen from the graph that the envelope of the RF noise obeys the Rayleigh distribution and the phase obeys the uniform distribution, which is consistent with the theoretical analysis.
3.2 RGPO simulation
3.3 Chaff jamming simulation
Computer simulations of RF noise jamming, RGPO, and chaff jamming are carried out in this paper. According to the results of computer simulation, the simulation achieves the expected goal and correctly reflects the mathematical model. By comparing the simulation results of the different parameters, the related interference process can be simulated.
In the simulation of RF noise jamming, the process is simulated that the useful signal is submerged by the noise signal and cannot be detected or identified. The simulation characteristics of the envelope and phase of the noise signal are consistent with the theoretical analysis. The results of RGPO simulation and chaff jamming simulation are the same as what is expected.
For new radar electronic systems and new communication equipment that continue to emerge, the corresponding electronic countermeasure tactics technology has also been rapidly developed. To meet the objective requirements of the electronic warfare theory research and practical testing, many electronic warfare simulation systems have been produced at home and abroad with the help of the rapidly developed modeling theory and computer network technology. Therefore, it is urgent for electronic countermeasure researchers to comprehend and master the system simulation technology in time . We analyzed the mathematical model of the common electronic interferences in a complex electromagnetic environment and conducted computer simulation of RF noise jamming, RGPO, and chaff jamming. Simulation analyses verify the validity of the mathematical model of the electronic interference. This study will be helpful in further study on the electronic interference and suppression.
This work is partially supported by the National Nature Science Foundation of China under Grant 41404022 and the Nature Science Foundation of Shannxi Province under Grant 2015JM4128.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
- B Gao, S Lv, J Zhao, Implementation of effectiveness evaluation simulation system for ECM. Syst. Eng. Electron 27(10), 1738–1739 (2005)Google Scholar
- Z Li, Research on Complicated Electromagnetic Environment and Its Applications for Launch Mission (Chinese Academy of Sciences, China, 2009)Google Scholar
- Y Zhang, N Tong, G Zhao, Principle of Radar Electronic Warfare (National Defense Industry Press, Beijing, 2006)Google Scholar
- J Su, Z Song, Q Fu et al., Joint tracking method for the unresolved decoy and target with monopulse radar. J. Radars 4(2), 160–161 (2014)Google Scholar
- B Tao, An ECCM model and the technical development trends to the demands of the future EW combat. Syst. Eng. Electron 10, 49–50 (1993)Google Scholar
- F Ji, Modeling and Simulation of Radar Electronic Jamming (Dalian University of Technology, China, 2013)Google Scholar
- G Zhao, Principle of Radar Countermeasure (Xidian University Press, Xi’an, 2005)Google Scholar
- X Shen, G Wang, L Wang et al., Effect evaluation for electronic jamming aircraft against netted surveillance radars. Syst. Simul 20(4), 997–1001 (2008)Google Scholar
- J Chen, Chaff Jamming Principle (National Defense Industry Press, Beijing, 2007)Google Scholar
- Y Chen, G Shao, S Zhang et al., Study on the key techniques in a simulation system of synthetic EW. Syst. Eng. Electron 22(2), 68–69 (2000)Google Scholar