Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2018 Apr 18;18(4):1249. doi: 10.3390/s18041249

A Sparse-Driven Anti-Velocity Deception Jamming Strategy Based on Pulse-Doppler Radar with Random Pulse Initial Phases

Zhen Liu 1, Jinping Sui 1,*, Zhenhua Wei 2, Xiang Li 1
PMCID: PMC5948862  PMID: 29670028

Abstract

This paper focuses on developing an anti-velocity jamming strategy that enhances the ability of a pulse-Doppler (PD) radar to detect moving targets in the presence of translational and/or micro motion velocity jamming generated by the digital radio frequency memory (DRFM) repeat jammers. The strategy adopts random pulse initial phase (RPIP) pulses as its transmitted signal and thus gets DRFM jammers not adaptable to the randomness of initial phase of the transmitted pulses in the pulse repetition interval (PRI) domain. The difference between the true target echo and the false target jamming signal at each PRI is then utilized to recognize the true and false target signals. In particular, an entropy based multi-channel processing scheme is designed to extract the information of the received signal without the assumption that true and false targets must be both included within one coherent processing interval (CPI). Information such as the component of the received signal (target echo only, jamming only or both) or the operating manner of DRFM repeat jammer can be gained (if jamming exists). Meanwhile, we solve the false target recognition problem under sparse theory frame and our previous work named the short-time sparse recovery (STSR) algorithm is introduced to recover the motion parameters of the true and/or false targets in the time-frequency domain. It should be pointed out that both the translational false target jamming and micro motion target jamming can be recognized in our strategy. The performance of the proposed strategy is compared with the correlated processing (CP) method used by most extant strategies. It is shown that the proposed strategy can successfully recognize the existence of true and/or false targets and keep its power in recovering corresponding motion parameters even when the jamming environment is strong.

Keywords: anti-velocity false target jamming, random pulse repetition interval, pulse diversity, electronic counter-countermeasures

1. Introduction

Pulse-Doppler (PD) radars are radar systems that utilize moving target detection (MTD) or moving target indication (MTI) techniques to detect targets in the midst of noise, clutter and jamming [1,2,3]. Essentially, these systems are based on the fact that moving targets induce frequency modulations on the detecting signal, known as Doppler effect or Doppler frequency shift [3,4,5,6,7]. By extracting the Doppler frequency shift, radars can measure the radial velocity of the moving object. With the remarkable capability of distinguishing between slowly moving or relatively stationary targets and fast moving ones [1], PD radars are widely used in civilian and military fields, such as air surveillance, ground moving target recognition and the detection of low aircraft [3,8,9].

Meanwhile, the prominent usage of these radars in the military has directly contributed to the rapid development of the corresponding jamming techniques, namely velocity deception jamming (VDJ), in electronic countermeasures (ECM) fields. Especially with the development and maturity of digital radio frequency memory (DRFM) techniques, the DRFM-based jammer, also called DRFM repeat jammer [3,10,11,12], is capable of generating deceptive/false velocity targets by interrupting, storing, modulating and repeating the radar’s transmitted signal. In addition to jamming the detection of radar on translational motion targets by generating translational false targets (TFT), recent research [13,14,15] has shown that modern VDJ techniques have accomplished the generation of the micro motion false targets (MMFT) by modulating additional micro-Doppler frequency shift besides the Doppler frequency shift on its jamming signals. Hence, DRFM-based VDJ techniques severely threaten the survival of the PD radars in modern warfare.

Countering DRFM-based velocity deception jamming has been one of the hottest topics in the electronic counter-countermeasures (ECCM) field. Researchers solve the problem by proposing different strategies based on pulse diversity [3,10,16,17], polarization [18], DRFM quantization [19,20,21], etc. Pulse diversity is commonly considered to be the most effective method to counter the DRFM-based jamming [3,10]. Pulse diversity refers to the technique that the pulses transmitted by the radar vary at each pulse repetition interval (PRI) and such variation is only known to the radar [3,10]. The DRFM repeat jammer needs to analyze the intercepted pulse before retransmitting so it chooses to utilize the pulse intercepted at previous PRI or some other past PRI to generate the jamming signal at current PRI. Therefore, the pulse retransmitted by DRFM differs from the pulse transmitted by the radar at a given PRI. Aiming at enlarging and/or utilizing the difference, various pulse-diversifying methods are currently being researched to counter DRFM-based false velocity jamming [3,17,22,23,24]. Refs. [3,22,23] all utilized the adaptive initial phases pulses as the transmitted signals and recognized the true target(s) from the false targets via the obvious differences of two kinds of targets in the frequency domain. Ref. [10] proposed a pulse diversity scheme that varies the rate of the chirp or the phase at each PRI and suppressed the DRFM repeat jamming in the range-Doppler domain. Though numerous pulse diversifying measures have been proposed to suppress the jamming signal in order to detect the target and estimate the targets’ parameters further, this subject is far from well-researched. In particular, firstly, most of the extant methods are based on the assumption that the jamming signal and target echo must exist simultaneously in one coherent processing interval (CPI) while ignoring the cases that only jamming signal or true target echo is received in reality. Here, we just take velocity gate pull off (VGPO) jamming as an example [25]. Only a true target exists at the first stage (when the jammer just retransmits the signal of the true targets) or the last stage (when the jammer is shut off) of the jamming. Secondly, only the TFT jamming is considered in most approaches that cannot directly be used to suppress the MMFT jamming. Thirdly, most researches adopt the traditional detection methods [3,10], i.e., correlated processing (CP), to process the pulse-diversifying signal (a random or a quasi-random signal), which will lead to a higher side lobe.

Actually, we have successfully proposed a sparse-based method to counter TFT [26,27] and MMFT [28] in our previous work. The basic idea can be summarized as follows. Under the sparse representation theory, we built two corresponding dictionaries (called true target and false target sparse representation dictionary respectively) and meanwhile the true target echo or false target jamming signal can only be represented sparsely under their own dictionary. With the help of sparse theory, the two kinds of signals can be separated. Meanwhile, we have already proved that the sparse recovery performs better when processing the random signal than CP-based methods. However, though promising results have been gained, the method needs to be optimized to be capable of automatically recognizing the components of the received signal and countering both TFT and MMFT jamming.

In this paper, a more powerful sparse-driven anti-velocity deception jamming strategy is proposed based on our previous work. The random pulse initial phase (RPIP) signal is adopted as the transmitted signal by the radar. The proposed strategy can counter both TFT and MMFT jamming generated by the DRFM repeat jammer. Moreover, the components of the received signal will be automatically recognized and the motion parameters of true target and/or false target will be recovered in the time-frequency domain. Firstly, an entropy-based multi-channel processing scheme is designed to analyze the received signal about its components. Meanwhile, the information about the DRFM repeat jammer operating manner will be extracted if the jamming exists. Then, the corresponding dictionaries for the true and false targets will be built based on the information pre-known (for true target) and/or extracted (for false target). At last, the motion parameters will be recovered in the time-frequency domain by a short-time sparse representation algorithm (STSR), which was proposed in our previous work [29].

The paper is organized as follows. In Section 2, the problem that moving target detection using an RPIP signal is formulated and the target echo and the jamming signal are modeled. In Section 3, we propose an entropy-based multi-processing scheme to extract the information from the received signal. A method is also propose here to build the sparse representation dictionaries for the true target echo and jamming signal. Meanwhile, the STSR algorithm is introduced to get the two signals separated. Section 4 carries out some comparative simulations to testify to the performance and superiority of our proposed strategy and the study concludes in Section 5.

2. Problem Formulation

2.1. Transmitted Signal and Target Echo

Different from pulses with constant initial phase (CPIP), RPIP signals belong to random modulated signals, whose phases vary at each PRI. Figure 1a,b illustrate differences between CPIP signal and RPIP signal during a CPI briefly.

Figure 1.

Figure 1

The comparison of three kinds of signals with different phase modulations. (a) CPIP (Constant Pulse Initial Phase) signal; (b) RPIP signal; (c) DRFM repeat jamming signal (i=2).

Now, we assume that the radar system transmits a RPIP signal, as is shown in Figure 1b. The transmitted signal during a CPI can be represented as

st(t)=1MTm=0M1rect(tmTrT)exp(j2πf0t+jφm), (1)

where M, T, Tr and f0 denote the number of pulses in a CPI, the pulse width, PRI and carrier frequency, respectively. Function rect() is the rectangular envelope of the transmitted pulse and φm is the initial phase of the mth pulse, which is assumed to follow a certain distribution and statistically independent of that of other pulses.

Assume that there is a moving target (denoted as Or ) in the radial direction of radar. The initial distance between target Or and radar is denoted as R0r. Note that not only the translational motion but also micro motion are considered in this paper. Thus, the motion of Or can be divided into two parts: one is translational motion, i.e., Or has relative motion for radar at a radial velocity vr(t). It should be pointed out that vr(t) will be positive when Or is approaching the radar and be negative when Or is away from the radar. The other one is the micro motion. Assume that there are P scattering centers in total and they are all making micro motion in addition to the bulk motion of Or. It should be noted that, in this paper, we mainly consider the case that the P scattering centers are moving in the same range gate. Then, the echo returned from Or and received by the radar at the mth PRI can be expressed as Equation (2) after being mixed with st(t)

smr(t)=p=1PAprMTrect(tmTrtprT)exp(j2πf0tpr)+er(t), (2)

where Apr, tpr and er(t) denote the reflectivity coefficient, delay time of the pth scattering center and observation noise, respectively. Considering the existence of the jamming signal, we use φmr to denote the initial phase of the mth of received pulse from target for avoiding confusion. It also should be pointed out that φmr is cancelled during the mixing process. Additionally, tpr can be expressed as

tpr=2(R0r+Rr(t)+Rpr(t))/c, (3)

where Rr(t) denotes the instantaneous distance from the radar receiver to Or and Rpr(t) denotes the instantaneous distance change that arises from the scattering centers. Note that, if no micro motion exists, Rpr(t) will be equal to 0, i.e., Or just has translational motion.

2.2. Velocity False Target Jamming Signal

In this paper, the velocity false target refers to the jamming signal emitted by the DRFM repeat jammer that is set on the moving target (called self-defense jammer) to protect the target itself. To this end, the jammer needs to conduct the following steps to generate a jamming signal that can be coherent to the transmitted signal of the radar and form the false velocity targets after being processed. Firstly, the transmitted pulse st is intercepted. Then, the key parameters such as carrier frequency, pulse width, initial phase, etc., are obtained. Thirdly, translational modulation and micro motion modulation function are generated based on the information gained, and the intercepted pulse is modulated by the functions. Finally, the modulated pulse will be retransmitted [13]. Based on this work flow, the jamming pulses are coherent to the pulses transmitted by radar and easy to get the radar processing gain. However, when the radar transmits RPIP signal, the jammer cannot adapt easily to the change of the pulse initial phase in each PRI. Hence, the pulse emitted by the jammer will lag iPRI (i=0,1,,M1) behind the pulse transmitted by the radar [3]. Concretely, at the mth PRI, the jammer emits the modulated pulse, which is intercepted in the (mi)th PRI. As for the case that m<i, the emitted pulses will be generated based on the corresponding pulses intercepted during previous CPI, or generated randomly (at the beginning period of jamming). Figure 1b,c show the RPIP pulses transmitted by the radar and the typical case of the jamming pulses received in one CPI (when i=2).

For the receiver of radar, the DRFM repeat jammer generates false velocity targets (denoted as Od) via the method mentioned above. The received jamming pulse at the mth PRI of radar can be expressed as Equation (4) after being mixed

smd(t)=q=1QAqdMTrect(tmTrtqdT)exp(j2πf0tqd+j(φmdφmr))+ed(t), (4)

where Q, Aqd, tqd denote the number, the reflectivity coefficient, and the delay time of the scattering centers of the jamming target Od, respectively. φmd denotes the initial phase of the mth jamming pulse. As already mentioned, the initial phases of pulses back from the jammer φd in one CPI can be viewed as a lag iPRI behind those of the pulses from the (true) target, i.e., φr. We formulate this lag as a function named Lag(), which is Lag(φr,φd)=i. The parameter i is named the lag information in this paper and it should be pointed that i is of paramount importance for recognizing the jamming pulses, which will be explained further later. The tqd stands for the modulation part from the jammer. Generally, it can be expressed as Equation (5)

tqd=2(R0d+Rd(t)+Rqd(t))/c, (5)

where R0d is the initial distance set by the jammer. Rd(t) and Rqd(t) are directly decided by the translational and micro motion of the false target and its scattering center, respectively.

3. An ECCM Strategy Based on Sparse Representation Theory

We have formulated the two kinds of signals that the radar will receive under the velocity jamming scenarios. It is difficult to distinguish the target echo (denoted as sr) and the jamming signal (denoted as sd) because the DRFM jamming signals can easily get into the receiver and get the processing gain after the matching filter. According to the sparse theory, if we can build two dictionaries Ur and Ud, and sr (sd) can be only be sparsely represented under Ur (correspondingly Ud), then we can get sr and sd be separated. It is noticeable that the difference of the pulse initial phases have the potential to help us to distinguish the two signals when comparing Equations (2) and (4). In this section, we propose a velocity false target recognition strategy that can separate the true target echo and the jamming signal.

3.1. Information Extraction Based on Entropy by Multi-Channel Processing

For most extant antivelocity jamming methods, fundamental assumptions are that the existence of the jamming is pre-known or the jamming and the true target echoes are always being received in the same CPI. Obviously, these are not always the cases in real world scenarios. The first requirement for an ECCM scheme should be judging the component of the receiving signal (denoted as sb), i.e., (i) only the target echo (sr); (ii) only the jamming signal (sd); (iii) or that both sr and sd exist simultaneously. This would be more realistic for an ECCM when working on a battle field. Meanwhile, if the jamming exists, the lag information should be extracted for further processing. Hence, a multi-channel matched filtering pre-processing mechanism is designed for extracting the basic information about the jamming. The corresponding mechanism of the multi-channel preprocessing is plotted in Figure 2.

Figure 2.

Figure 2

Entropy-based multi-channel processing scheme for analyzing the received signal.

Considering the mentioned operating manner of the repeat-back jammer, i.e., the jamming pulses sd are generated based on the transmitted pulses st with a certain lag PRI (for example i0), sd must be matched well with the pulses with lag i0PRI compared other pulses (ii0). Consequently, as shown in Figure 2, all the possible i values are taken into consideration. The sb is matched with a specific matrix Ul in the lth (l=0,1,,M1) channel. Note that, in this paper, we mainly consider the case that the range and velocity are both unambiguous. The unambiguous velocity is vu=λ/2Tr (λ is the wavelength of the radar signal). We divide vu into G parts uniformly and then the velocity resolution is Δv=vu/G. For the lth channel, the corresponding matrix Ul is built of which elements are Umgl=exp(j4πf0mTrgΔv/c+jφml) (g=0,1,,G1). Then, when we input sb into the lth channel, the corresponding matching result sHl can be expressed as Equation (6):

sHl=sbUl=[s0l,s1l,,sgl,,sG1l]1×G. (6)

Then, the Shannon information entropy Hl of sHl is calculated by Equation (7):

Hl=g=0card(sHl)1P(sgl)log2P(sgl), (7)

where P() is the possibility function, and card(sHl) denotes the number of different elements in sHl. It should be pointed that P(sgl) corresponds to the frequency that sgl occurs in sHl. The frequency fe of sgl is calculated by Equation (8)

P(sgl)=fe(sgl)=zglG, (8)

where zgl denotes the number of occurrence of sgl among sHl. Here information entropy is used to quantitatively represent the randomness of a matching result sHl. By this approach, we can gain an entropy set H={H0,H1,,Hl,,HM1} when we successively put sb into each channel. We call the H the entropy spectrum. According to the property of the entropy, a smaller entropy indicates that sb is more correlated with the Ul.

Now let us reconsider the possible cases for the component of sb. When sb=sr, we have the lowest value in the entropy spectrum i.e., H0 is the lowest value in H. If sb=sd and Lag(φr,φd)=i0, the corresponding entropy Hi0 will be the lowest value. As for the case that sb=sr+sd, there will be two negative peaks in the entropy spectrum. Besides the component of sb being detected, the lag information will also be extracted by this multi-channel approach. Typical entropy based information extraction approach results are illustrated in Figure 3.

Figure 3.

Figure 3

The outputs of multi-channel processing scheme (M=640). (a) No echo detected; (b) Only sr exists (i=423); (c) Only sd exists (i=0); (d) sr and sd exists simultaneously (i=0 and 423).

Figure 3a–d illustrate the cases that the component of sd could be. The x-axis and the y-axis of Figure 3a–d correspond to possible lag information, i.e., i, and the corresponding entropy value for each possible i. An additional case is shown for better comparison that no signal is received (see Figure 3a). Accordingly, if no output from a certain channel is much lower that the rest (see Figure 3a), it indicates that no target or jamming is detected. If the output of the first channel is the only negative peak (one which is considerably lower than the rest) in the entropy spectrum, then only sr exists. (corresponding to Figure 3b). When the lowest output is from other channel but not the first channel and the first channel’s output is not much lower than the others (as shown in Figure 3c), only sd exists. As for the last case, two outputs (one is from the first channel) are the two much lower points in the entropy spectrum, which denotes that sr and sd exist simultaneously.

3.2. Motion Parameters Separation and Recovery Based on Sparse Representation Theory

The micro-Doppler effect has time-varying and periodic properties [6,7,30], so the Fourier transform is not suitable for extracting time-dependent information of target and jamming signals. In this paper, we employ a time-frequency method named STSR that was proposed in our previous work [29]. Here, the main idea is given (depicted in Figure 4). Interested readers can refer to [29] for more details about STSR.

Figure 4.

Figure 4

The main idea of the STSR (Short-time Sparse Representation) algorithm.

Assume x=[x[0],x[1],,x[N1]] is a discrete signal. There is a rectangular sliding window function w(n)=u(n)u(n+L1) of which the length is L. u(k) is the unit step function. Substantially, time-frequency analysis (TFA) is actually to find a representation in Fourier domain for the windowed signal. The main idea of the STSR algorithm is getting the sparse representation of discrete signal x in the frequency domain at each time instant and then synthesising the results [29]. At each time instant k(k=0,1,,L1), we have

xk=xw(k). (9)

Assume that the Φ is a dictionary under which the xk can be represented sparsely. According the sparse theory, we then have xk=(Φyk)T. yk is called the sparse representation of xk under Φ. yk can be obtained by working out the convex optimization problem as follows:

yk^=argminyk0s.t.(Φyk)Txk2ε, (10)

where 0 and 2 denote the l0-norm (i.e., the number of nonzero components in the vector) and l2-norm, yk^ indicates the estimated frequency distribution of the signals, and ε is the fitting error threshold. Obviously, direct optimization of Equation (10) is an NP-hard (non-deterministic polynomial-time hard) problem. We therefore do a convex relaxation of the problem by using l0-norm to replace l1-norm. Thus, the optimization problem of Equation (10) is relaxed into the following optimization problem:

yk^=argminyk1s.t.(Φyk)Txk2ε. (11)

There have been various kinds of methods proposed to solve the problem. Here, we use the Lasso algorithm to get Equation (11) solved. In Section 4, more details about the parameter settings are given. Hence, we can get L sparse results and we synthesise them by regarding each yk as a column of the matrix Y and then Y=[y0,y1,,yL1] , which is called the results under the STSR method, which is

Y=STSR(Φ,x). (12)

If the signal received sb only contains sr ( or sd), we only need to recover its motion parameters. Here, the Ul that was built in Section 3.1 is used. Specifically, if only sr is contained, U0 is used to recover the motion in time-frequency domain, which is

ar=STSR(U0,sr). (13)

As for the case that only sd is contained, then the lag information i=i0 is used to build the Ui0 and the corresponding result is

ad=STSR(Ui0,sd). (14)

The U0 and Ui0 are called true target dictionary and jamming dictionary, respectively. When the sr and sd exist simultaneously, we build a union dictionary UΣ=[U0Ui0] to process the back signal sb:

aΣ=STSR(UΣ,sb). (15)

aΣ can be obtained by applying Equation (11) and aΣ contains two parts, namely, the time-frequency estimation of two kinds of signals.

3.3. The Working Flow of the Anti-Velocity Deception Jamming Strategy

The proposed strategy mainly contains the following steps, that is, information extraction, dictionaries construction and motion parameters recovery. Figure 5 depicts the working flow of the anti-velocity deception jamming strategy.

Figure 5.

Figure 5

The working flow of the anti-velocity deception jamming strategy.

As illustrated in Figure 5, the RPIP signal is transmitted firstly (denoted as st) and, if a moving target is detected, sr will be received by the radar. Simultaneously, the jammer may generate the jamming signal sd. The signal that the radar received needs to be analyzed regarding its components firstly by using the multi-channel processing method. If sr and sd are contained, the true target dictionary and jamming dictionary will be built. When only sr or sd is contained, the corresponding dictionary will be built. Then, the STSR method is applied to recover the motion parameters in the time-frequency domain. Note that the working flow is valid for both TMFT and MMFT.

4. Numerical Simulations

In this paper, the performance and the superiority of the proposed strategy is tested by comparing with the traditional MTD and anti-velocity jamming method, namely, the CP-based method. Our simulations are performed in the MATLABR2016a environment (2016a, The MathWorks, Natick, MA, USA) using an Intel CPU 1.6 GHz processor with 8 GB of memory (Santa Clara, CA, USA). The convex optimization problems are solved by employing the SolveLasso function in cvx [31,32]. The parameter settings of the SolveLasso are: algType=lasso,maxIters=500,lamdaStop=0,resStop=0,solFreq=0,verbose=0,OptTol=epsi. The radar simulated in this paper works on X-band and transmits RPIP signal to detect the velocity target. The carrier frequency is 10 GHz, the PRI is 1kHz and the number of pulses in one CPI is 640.

The simulation scenario is given here, which is demonstrated in Figure 6. Assume that there is a velocity target (denoted as Or) and a jamming target (Od) located in the radial direction of radar. Note that Or can be either a TMT or a MMT. Correspondingly, for a better jamming effect, Od will be a TMFT or a MMFT. Both the uniform linear motion (ULM) and uniform acceleration linear motion (UALM) are taken into consideration in the simulations. The instantaneous velocity, the initial velocity and the accelerated speed of Or (Od) are denoted as vr(vd), v0r(v0d) and ar(ad). Hence, for ULM cases, Rr(t)=vrt (Rd(t)=vdt) and for UALM cases, Rr(t)=v0rt+12art2 (Rd(t)=v0dt+12adt2). Because the rotation is one of the major micro motion forms [6,7], here we mainly consider the rotation as the micro motion form in our simulations without loss of generality. Assume that there are three (four) scattering centers rotating around the centroid of Or (Od) and the corresponding radius and angular velocity of rotation are denoted as rr (rd) and ωr (ωd).

Figure 6.

Figure 6

The corresponding results of Case 1–Case 4.

4.1. The Effectiveness of the Proposed Strategy

Here, the validity of our proposed method under different motion cases with regard to recognizing the target and separating the true motion target and false motion target is tested. It should be noted that the signal noise ratio (SNR) is 20 dB and the jamming signal ratio (JSR) is 7 dB. Firstly, we test its performance on the cases that only true motion targets or false motion targets are included. We consider that the motion of the true and false target can be either UALM or micro motion. The parameters are set as shown in Table 1. Case1 and Case 2 are the cases that only the true target echo is received and the motion can be either UALM (Case 1) or Micro Motion (Case 2). Case 3 and Case 4 take the case that only jamming signal is received. The corresponding results of Cases 1–4 are shown in Figure 6a–d. As shown in Figure 6, the proposed method can correctly identity the component of the received signal and recover the corresponding motion parameters.

Table 1.

The corresponding parameter settings of Case 1–Case 4.

Case True Motion True Parameters False Motion False Parameters
Case 1 UALM v0r=7.5 m/s; ar=2 m/s2
Case 2 ULM with rotation rr=0.5 m;
wr=2π;
vr=4 m/s
Case 3 UALM v0d=7.5 m/s;ad=4 m/s2
Case 4 ULM with rotation rd=0.5 m;
wd=5π;
vd=7 m/s

Then, we consider the most common cases that the target echo and jamming signal exist simultaneously, putting emphasis on testing the proposed strategy’s performance of separating the two signals and recovering their motion parameters. We take the motion of the target into full consideration, which includes ULM (Case 5), UALM (Case 6), ULM with rotation (Case 7), and UAML with rotation (Case 8). The corresponding parameter settings are shown in Table 2. As can be seen from Figure 7, Figure 8, Figure 9 and Figure 10, the target echo and jamming signal can be separated accurately under all cases considered. The ULM motion will be recovered as a straight line in a time-frequency domain, as depicted in Figure 7. The velocity will be gained by applying the corresponding Doppler frequency into the Doppler formulation, namely, fDop=2vDop/λ [6,7].

Table 2.

The corresponding parameter settings of Case 5–Case 8.

Case True Motion True Parameters False Motion False Parameters
Case 5 ULM v0r=4 m/s ULM v0d=7 m/s
Case 6 UALM v0r=7.5 m/s;
ar=2 m/s2
UALM v0d=7.5 m/s;
ad=4 m/s2
Case 7 ULM with rotation rr=0.5π m;
wr=2π;
vr=4 m/s
ULM with rotation rd=0.3 m;
wd=5π;
vd=6 m/s
Case 8 UALM with rotation rr=0.5 m;
wr=2π;
v0r=7.5 m/s;
ar=2 m/s2
UALM with rotation rd=0.3 m;
wd=5π;
v0d=7.5 m/s;
ad=4 m/s2

Figure 7.

Figure 7

The recovery of motion of true (a) and false (b) target in Case 5.

Figure 8.

Figure 8

The recovery of motion of true (a) and false (b) target in Case 6.

Figure 9.

Figure 9

The recovery of motion of true (a) and false (b) target in Case 7.

Figure 10.

Figure 10

The recovery of motion of true (a) and false (b) target in Case 8.

4.2. The Superiority of the Proposed Method

Due to the fact that most extant VDJ recognition methods are mainly based on CP theory, it is necessary to compare our proposed strategy with CP-based methods to show the superiority of our proposed method. However, considering the fact that most extant CP-based methods have no time-varying property, we modify the CP method slightly (called CP-based) according to the basic idea of STSR to get it sensitive to the time. As we have proven the correctness of the proposed strategy in different cases, we will only compare the performance of two methods under the same parameter settings of Case 8 for the sake of brevity. For a better comparison, we perform the simulations in different jamming intensity, that is, JSR=−2 dB, 0 dB, 4 dB. The corresponding results are illustrated in Figure 11, Figure 12 and Figure 13.

Figure 11.

Figure 11

The motion of true and false target recovered by the proposed method (a,b) and the CP-based method (c,d) under JSR = −2 dB.

Figure 12.

Figure 12

The motion of true and false target recovered by the proposed method (a,b) and the CP-based method (c,d) under JSR = 0 dB.

Figure 13.

Figure 13

The motion of true and false target recovered by the proposed method (a,b) and the CP-based method (c,d) under JSR = 4 dB.

When the target is more intense than the jamming signal, the CP-based method can only recover the true signal (as shown in Figure 11c,d), while the proposed method can recover the two signals well with a much lower noise in the time-frequency domain. As shown in Figure 12, when the two kinds of signals are equivalent with regard to the intensity (JSR = 0 dB), the proposed method can recover the motion parameters accurately. However, the CP-based method cannot recover the motion of the jamming target. Moreover, the whole noise level is much higher than that of the proposed method, which is much more difficult for further researching. When the JSR = 4 dB, the CP-based method loses its effectiveness in recovering the motion parameters of the true target, as depicted in Figure 13. However, the proposed method keeps its validity under such jamming conditions. As can be seen from the results of Figure 11, Figure 12 and Figure 13, the CP-based method is more sensitive to the JSR conditions and it is easier to lose its effectiveness of the separation and recovery of the motion parameters for the true and false targets. By contrast, the proposed method is relatively robust in recognizing the true and false targets with more precise results and lower sidelobe noise floor for both true and false targets and a lower side-lobe noise base.

5. Conclusions

We study the problem of moving targets detection for PD radar in the presence of a translation/micro motion velocity false target. We propose an anti-velocity strategy based on sparse theory that can efficiently recognize the components of the received signal, recognize the false velocity target jamming if it exists, and accurately recover the motion parameters of true and false targets. Concretely, RPIP signal is transmitted by the radar and the difference between the target echo and jamming signal in phase domain is utilized. The strategy detects the components of the received signal by a multi-channel processing method based entropy and recovers the motion parameters in a time-frequency domain with the help of our previous work STSR. Compared with most extant measures, the key advantages of the proposed strategy are, firstly, not only the translational false target, but also the micro motion false target, which is a quite new trend in VDJ fields, are taken into account. Secondly, unlike current methods, assuming that the jamming and target echo exist simultaneously in the received signal, our approach considers more possibilities, namely only the target echo or jamming exists, or both of them are included. These possibilities are integrated into a unified framework and can be automatically detected and responded to by our strategy. Finally, we estimate the target parameters in the time-frequency domain based on sparse recovery theory and the recovery results are more accurate with a lower noise side-lobe base. Experiments show the effectiveness of our strategy and its superiority over the state of the art. It should be pointed out that, at present, our strategy is still in the simulation analysis and prototype testing stage. Future work includes real conditions verification and improvement of the prototype.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (No. 61401481).

Author Contributions

Zhen Liu and Jinping Sui provided the idea of this work. Zhen Liu, Jinping Sui and Zhenhua Wei designed the experiments. Jinping Sui performed the experiments. Jinping Sui and Zhen Liu wrote the paper. Xiang Li supervised this work and revised the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  • 1.Mahafza B.R. Radar Systems Analysis and Design Using MATLAB. 3rd ed. CRC Press; Boca Raton, FL, USA: 2013. [Google Scholar]
  • 2.Meikle H. Modern Radar Systems. Artech House; Norwood, MA, USA: 2008. [Google Scholar]
  • 3.Zhang J., Zhu D., Zhang G. New Antivelocity Deception Jamming Technique using Pulses with Adaptive Initial Phases. IEEE Trans. Aerosp. Electron. Syst. 2013;49:1290–1300. doi: 10.1109/TAES.2013.6494414. [DOI] [Google Scholar]
  • 4.Liu Y., Wang W., Pan X., Dai D., Feng D. A frequency-domain three-stage algorithm for active deception jamming against synthetic aperture radar. Sonar Navig. IET Radar. 2014;8:639–646. doi: 10.1049/iet-rsn.2013.0222. [DOI] [Google Scholar]
  • 5.Zhao B., Zhou F., Bao Z. Deception Jamming for Squint SAR Based on Multiple Receivers. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 2015;8:3988–3998. doi: 10.1109/JSTARS.2014.2322612. [DOI] [Google Scholar]
  • 6.Chen V.C. The Micro-Doppler Effect in Radar. Artech House; Norwood, MA, USA: 2011. Google-Books-ID: eJ7eMHpxt30C. [Google Scholar]
  • 7.Chen V.C., Li F., Ho S.S., Wechsler H. Micro-Doppler effect in radar: Phenomenon, model, and simulation study. IEEE Trans. Aerosp. Electron. Syst. 2006;42:2–21. doi: 10.1109/TAES.2006.1603402. [DOI] [Google Scholar]
  • 8.Dudczyk J. Radar emission sources identification based on hierarchical agglomerative clustering for large data sets. J. Sens. 2016;2016 doi: 10.1155/2016/1879327. [DOI] [Google Scholar]
  • 9.Dudczyk J. A method of feature selection in the aspect of specific identification of radar signals. Bull. Polish Acad. Sci. Tech. Sci. 2017;65:113–119. doi: 10.1515/bpasts-2017-0014. [DOI] [Google Scholar]
  • 10.Soumekh M. SAR-ECCM using phase-perturbed LFM chirp signals and DRFM repeat jammer penalization. IEEE Trans. Aerosp. Electron. Syst. 2006;42:191–205. doi: 10.1109/TAES.2006.1603414. [DOI] [Google Scholar]
  • 11.Roome S. Digital radio frequency memory. Electron. Commun. Eng. J. 1990;2:147–153. doi: 10.1049/ecej:19900035. [DOI] [Google Scholar]
  • 12.Pace P., Fouts D., Ekestorm S., Karow C. Digital false-target image synthesiser for countering ISAR. IEE Proc. Radar Sonar Navig. 2002;149:248–257. doi: 10.1049/ip-rsn:20020635. [DOI] [Google Scholar]
  • 13.Shi X.R., Zhou F., Zhao B., Tao M.L., Zhang Z.J. Deception jamming method based on micro-Doppler effect for vehicle target. Sonar Navig. IET Radar. 2016;10:1071–1079. doi: 10.1049/iet-rsn.2015.0371. [DOI] [Google Scholar]
  • 14.Zhu B.Y., Xue L., Bi D.P. A novel method of ISAR jamming based on synthesizing equivalent micro-motion point. Mod. Radar. 2011;33:33–36. [Google Scholar]
  • 15.Bo Z., Zhou F., Shi X., Wu Q., Zheng B. Multiple targets deception jamming against ISAR using electromagnetic properties. IEEE Sens. J. 2015;15:2031–2038. doi: 10.1109/JSEN.2014.2368985. [DOI] [Google Scholar]
  • 16.Liu N., Zhao S., Zhang L. A radar ECCM scheme based on full-rate orthogonal pulse block. J. Comput. Inf. Syst. 2013;9:9771–9779. [Google Scholar]
  • 17.Akhtar J. Orthogonal block coded ECCM schemes against repeat radar jammers. IEEE Trans. Aerosp. Electron. Syst. 2009;45 doi: 10.1109/TAES.2009.5259195. [DOI] [Google Scholar]
  • 18.Huang C., Chen Z., Duan R. Novel discrimination algorithm for deceptive jamming in polarimetric radar; Proceedings of the 2012 International Conference on Information Technology and Software Engineering; Beijing, China. 8–10 December 2012; pp. 359–365. [Google Scholar]
  • 19.Greco M., Gini F., Farina A. Combined effect of phase and RGPO delay quantization on jamming signal spectrum; Proceedings of the 2005 IEEE International Radar Conference; Arlington, VA, USA. 9–12 May 2005; pp. 37–42. [Google Scholar]
  • 20.Greco M., Gini F., Farina A. Radar detection and classification of jamming signals belonging to a cone class. IEEE Trans. Signal Process. 2008;56:1984–1993. doi: 10.1109/TSP.2007.909326. [DOI] [Google Scholar]
  • 21.Nouri M., Mivehchy M., Sabahi M.F. Novel Anti-Deception Jamming Method by Measuring Phase Noise of Oscillators in LFMCW Tracking Radar Sensor Networks. IEEE Access. 2017;5:11455–11467. doi: 10.1109/ACCESS.2017.2655040. [DOI] [Google Scholar]
  • 22.Yang Y., Wu J., Cui G., Li L., Kong L., Huang Y. Optimized phase-coded waveform design against velocity deception; Proceedings of the 2015 IEEE Radar Conference (RadarCon); Arlington, VA, USA. 10–15 May 2015; pp. 0400–0404. [Google Scholar]
  • 23.Xiong W., Wang X., Zhang G. Cognitive waveform design for anti-velocity deception jamming with adaptive initial phases; Proceedings of the 2016 IEEE Radar Conference (RadarConf); Philadelphia, PA, USA. 2–6 May 2016; pp. 1–5. [Google Scholar]
  • 24.Soumekh M. SAR-ECCM using phase-perturbed LFM chirp signals and DRFM repeat jammer penalization; Proceedings of the 2005 IEEE International Radar Conference; Arlington, VA, USA. 9–12 May 2005; pp. 507–512. [Google Scholar]
  • 25.Townsend J.D., Saville M.A., Hongy S.M., Martin R.K. Simulator for velocity gate pull-off electronic countermeasure techniques; Proceedings of the RADAR’08 Radar Conference; Rome, Italy. 26–30 May 2008; pp. 1–6. [Google Scholar]
  • 26.Sui J., Liu Z., Wei X., Li X., Peng B., Liao D. Velocity false target identification in random pulse initial phase radar based on compressed sensing; Proceedings of the 2015 3rd International Workshop on Compressed Sensing Theory and Its Applications to Radar, Sonar and Remote Sensing (CoSeRa); Pisa, Italy. 17–19 June 2015; pp. 179–183. [Google Scholar]
  • 27.Sui J., Zhang X., Liu Z., Wei X., Li X. Sparse-based false target identification in pulse-Doppler radar with random pulse initial phase; Proceedings of the International Conference on Wireless Communications & Signal Processing (WCSP); Nanjing, China. 15–17 October 2015; pp. 1–5. [Google Scholar]
  • 28.Sui J., Liu Z., Li X., Wei X., Wang S. Micro-motion false target identification in random pulse initial phase radar based on compressed sensing; Proceedings of the 2017 Progress in Electromagnetics Research Symposium-Spring (PIERS); St. Petersburg, Russia. 22–25 May 2017; pp. 573–578. [Google Scholar]
  • 29.Liu Z., You P., Wei X., Liao D., Li X. High Resolution Time-Frequency Distribution Based on Short-Time Sparse Representation. Circuits Syst. Signal Process. 2014;33:3949–3965. doi: 10.1007/s00034-014-9832-3. [DOI] [Google Scholar]
  • 30.Chen V.C. Micro-Doppler effect of micromotion dynamics: A review. Independ. Comp. Anal. Wavel. Neural Netw. 2003;5102:240–250. [Google Scholar]
  • 31.CVX Research, I. CVX: Matlab Software for Disciplined Convex Programming, Version 2.0. [(accessed on 16 April 2018)]; Available online: http://cvxr.com/cvx.
  • 32.Grant M., Boyd S. Graph implementations for nonsmooth convex programs. In: Blondel V., Boyd S., Kimura H., editors. Recent Advances in Learning and Control. Springer Limited; London, UK: 2008. [(accessed on 16 April 2018)]. pp. 95–110. Lecture Notes in Control and Information Sciences. Available online: http://stanford.edu/~boyd/graph_dcp.html. [Google Scholar]

Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES