Suppression of Repeat-Intensive False Targets Based on Temporal Pulse Diversity

This paper considers the problem of suppressing the repeat-intensive false targets produced by a deception electronic attack (EA) system equipped with a Digital Radio Frequency Memory (DRFM) device. Different from a conventional repeat jammer, this type of jamming intensively retransmits the intercepted signal stored in a DRFM to the victim radar in a very short time-delay interval relative to a radar pulse wide. A multipeak matched-filtering output is then produced other than the merely expected true target. An electronic protection (EP) algorithm based on the space time block code (STBC) is proposed to suppress the adverse effects of this jammer. By transmitting a pulse sequence generated from the STBC in succession and the following cancellation process applied upon the received signal, this algorithm performs successfully in a single antenna system provided that the target models are nonfluctuating or slow fluctuating and the pulse repetition frequency (PRF) is comparatively high. The performance in white and correlated Gaussian disturbance is evaluated by means of Monte Carlo simulations.


Introduction
In electronic warfare (EW) area, the false target is a common deception electronic attack (EA) method employed to counter against radar systems [1][2][3].However, just repeating the intercepted radar signal, as done in the conventional repeat jammer, is not effective because only one false target is produced.The jamming type of repeat-intensive false targets is presented in recent researches, and it can produce high-intensive matched-filter output peaks which are similar to the true target and commonly have power higher than the true one.Moreover, based on the Digital Radio Frequency Memory (DRFM) device, these false targets generally have all the qualities typical of the true target specified.It is difficult for the radar to detect and discriminate the true target from a multitude of spikes which are positioned ahead or behind the true target and spaced closer than the time duration of the radar backscattering signal.
The pulse diversity-based approach is a powerful electronic protection (EP) to counter multiform jammers [4,5].Based on varying the radar chirp rate or utilizing a phase modulated signal for phase perturbations in a linear frequency modulated (LFM) signal, Soumekh [4] used penalization measures to reduce the power of a conventional DRFM jammer in synthetic aperture radar.Another signalling scheme is proposed to combat the impact of repeat jammers by continuously emitting modified version of previous waveforms or a new waveform following a specific orthogonal structure [5].And that, if orthogonal signal in sequence is permitted, the jammer can be rejected or mitigated by transmitting signals orthogonal to each other.
On the other hand, the mentioned approaches do not involve the repeat-intensive false targets jammer, but the conventional one.Generally, the concept of diversity can be used to reduce multipath effect.Moreover, the diversity of frequency, space, time, and so forth is successfully applied in space-time adaptive processing (STAP) or multiple-input multiple-output (MIMO) system to reduce channel fading, suppress interferences or clutters, and improve system performance [6][7][8][9].
Here, we employ a space time block code (STBC) to counter against the repeat-intensive false targets jammer.In our work, however, we focus on a single antenna system.

International Journal of Antennas and Propagation
The rest of this paper is organized as follows.In Section 2, the repeat-intensive false targets are briefly introduced.The signal models, as well as the concept of algorithm, are developed in Section 3 based on STBC by using temporal pulse diversity scheme specifically.Numerical performance simulations and analysis are described in Section 4. Finally, conclusions are drawn in Section 5.

Repeat-Intensive False Targets
The jammer of repeat-intensive false targets originates from the common DRFM false target.By repeating an intercepted radar data recorded in a DRFM device, a common false target jammer produces one target which is not really existent to protect the true target.And, an improved version of it, the jammer of multifalse targets, provides an enhanced jamming effect by yielding more than one imaginary targets dispersed along the ranges in victim radar side.If the number of produced target is large and the interval between every two leading edge of each pulse is short (compared with a pulse duration), high dense of false targets can be generated and the desired echoes will be suppressed in view of the positive jammer-to-signal ratio (JSR).This is referred to as repeatintensive false targets jammer, where the signal interval of compressed narrow spike is short relative to the original radar pulse duration.
It is assumed that radar signals are intercepted by a hostile ECM equipment.At the time of repeating, the data stored in a DRFM are read and then converted from a digital signal into an analog signal with a digital-to-analog converter.Subsequently, the analog signal is upconverted in frequency and transmitted back to the victim radar.After a time-delay interval, the data are read again from the initial address and added to the former data (untransmitted segments), and then they were manipulated in the same way until the predestined number of false target is reached (or transmitted circularly).Thus the produced repeat-intensive false targets can be expressed as where j  (t) denotes the column vector of the intercepted radar signal and   and   are the complex amplitude and time-delay interval of each subjamming signal, respectively.

Algorithm Formulation
3.1.Signal Models.We assume here that the complex vector recorded by the radar during the time on target (ToT) is as follows: where  is the number of samples during a single pulse.It is assumed that the recorded samples consist of the sum of the target and the disturbance; that is where s is the signal vector,  is the complex amplitude, d is the Gaussian disturbance which is defined as the sum of white thermal noise n and correlated Gaussian clutter c, where n ∼ CN(0,  2  I), c ∼ CN(0,  2  R), and I and R are the identity matrix and normalized clutter covariance matrix, respectively.Consequently, d is modeled as complex Gaussian distributed random vector with zero mean and covariance matrix  2  M = (zz  ), where  2  =  2  +  2  is the total disturbance power and M is the normalized disturbance covariance matrix formulated as follows: Denote by CNR the clutter-to-noise power ratio, more precisely, CNR =  2  / 2  .In shorthand notation, d ∼ CN(0,  2  M).Furthermore, we suppose that a set of secondary data free of signal components but sharing the same statistical properties of the disturbance in the cell under test is available.
Here, M is Hermitian, and we assume that M is full rank also (this condition is almost satisfied in practice).Therefore, it can be factored as M = LL  , where L is a lower triangular matrix.The output of the whitening-matched filter (WMF) [10] is given by In this formulation, L −1 z denotes the new whitening received vector, while L −1 s denotes the new whitening transmitting signal replica of radar.If the filter realization form is used, the corresponding impulse response of the WMF is h = s.Then at time , the whitening matched-filtering output is given by () = h  M −1 z(), where M −1 z() denotes the transformed input signal vector at time .

STBC Pulse Sequence.
If multiple antennas are available, it is convenient to implement space diversity.In our algorithm, however, a STBC is applied in sequence (temporally); therefore we focus on a single antenna system.We formulate the suppression approach as a temporal pulse diversity problem on the STBC Q [11]: where A  and B  are  ×   matrices and {x  }  =1 is the transmission signal set.Particularly, Q is also referred to as Alamouti code [12] if  =   =  = 2 and the following expressions are satisfied: We use this scheme in view of that  =   =  = 2 is the minimum order block code.Certainly, the higher-order block codes can be handled in the same way and may provide further features [13,14].
Suppose that the radar transmission pulses in the first 4pulse repetition intervals (PRI) are given by where s  (),  = 1 to 4, denotes the radar transmission signal vector in sequence PRI.
When radar signals are received by a jammer, the jammer needs to detect and analyze the incoming pulses in order to handle the valid signals and produce effective jamming pulses.It requires a certain amount of time to accomplish the whole process with the updated pulse [4,5].It is then possible for the radar to operate with the jamming signal recorded in previous PRI.Moreover, even if a jammer could detect and retransmit the current pulse at once, it would have to repeat the pulse recorded at previous PRI when it attempts to protect targets which are closer to the victim radar than itself [5].As a consequence, it is assumed that the jammer lags one PRI behind the victim radar.If the delayed PRI is greater than one, a higher-order STBC can be utilized to overcome this challenge.
Conclusively, the jamming pulses can be expressed as where the bounded linear operator Γ denotes the process or transformation performed on the radar signals to produce the repeat-intensive false targets.In the initial pulse diversity block, s 0 () may be any arbitrary pulse (signal stored in a DRFM), while, on the contrary, it is definite in subsequent blocks, just the last radar transmission pulse.
The received pulse blocks at the radar side can therefore be modeled as follows: where   () and    () ( = 1 to 4) denote the complex amplitude of the target and jamming signal, respectively,   () and    () ( = 1 to 4) denote the time delay of the target and jamming signal, respectively, and d  () ( = 1 to 4) denotes the complex Gaussian disturbance.

Concept of Jamming Suppression.
In this work, the magnitude of the target is assumed to be relatively constant during the dwell time.More precisely, we assume that the targets are nonfluctuating or slow fluctuating.Therefore,   () and    () in ( 10) can be replaced succinctly by   and    , respectively.Under the condition of static state, it is clear that   () =   and    () =    for  = 1 to 4. Otherwise, if this condition is not satisfied, the same conclusion can be drawn in most practical cases provided that pulse repetition frequency (PRF) is comparatively high.In order to explain it, we first model the round-trip delay   () as () = 2( − V)/, where  is the initial range of target, V is the average radial velocity of target, and  is the velocity of light.Actually, the magnitude of time-delay difference in a pulse block is very small, generally in the level of nanosecond.As we will see later, the pulses in intervals 2 and 4 (or intervals 1 and 3) in one block are picked out to process together in order to suppress the false target.The corresponding time-delay difference is then Δ = 4V/(  ), where   denotes PRF.Here, because V is much smaller than  and   is comparatively high just as we assumed, the errors introduced by the time-delay difference are less than one sampling point for narrow band radars in most practical cases.If this condition is not satisfied in some exceptional cases, that is, the time-delay difference cannot be neglected, we can compensate it by a delay factor when it can be estimated or known as a priori.Due to similar reasons (except the single-trip), the same conclusion can be drawn for    ().Therefore,   () and    () can be replaced by   and    , respectively.Then, (10) can be expressed in the following form: where .In order to suppress the repeat-intensive false targets, we resort to the second-order STBC here; that is, inserting (7) and  =   =  = 2 into (6), we obtain the transmission pulses: International Journal of Antennas and Propagation Then (11) can be recast as It is convenient to reshape the vectors Z and S  into matrices Ẑ and Ŝ , respectively; that is, As a result, we can use a WMF to handle the received data, more precisely: Actually, the diagonal elements of matrix Y denote the output with regard to the true target.In consequence, the 2nd and 4th diagonal elements, which are corresponding to the pulses in intervals 2 and 4, are picked out to suppress the false targets and focus on the true targets (actually the 1st and 3rd elements can play the same role, but other elements are not necessary for this purpose).More precisely, the filter outputs in intervals 2 and 4 with respect to the true targets are given in detail by Denote by ∑    [x * 2 ( −   )] and ∑    [x * 1 ( −   )] the matched-filtering outputs that contain target echoes of interest.Evidently, the second terms in the right side of (15) and ( 16), that is, , both relate to the jammer.In view of (1), it is clear that j() = Γ{x  ()} and that j  () = x  () here, and this results in Γ{x  ()} = ∑    x  ( −   ).Consequently, we have It is easy to verify that, in our case, the jammer-related terms are equal by noting that M −1 = (LL  ) −1 .Substitution of ( 17) and ( 18) into the sum of ( 15) and ( 16) yields It is clear that the jamming terms have been eliminated in (19), and the target echoes are preserved.Therefore, the repeat-intensive false targets can be cancelled out by exploiting the temporal pulse diversity techniques.

Simulations
As described in Section 3, the jammer-related terms can be cancelled completely if the required conditions are satisfied.No other special constrains have been imposed upon the derivation process.
In order to evaluate the performance of the proposed method, we define the signal-to-jammer-plus-disturbance ratio (SJDR) improvement factor as IF = SJDR 2 /SJDR 1 , where SJDR 1 is the input SJDR, while SJDR 2 is the output SJDR after using the algorithm.
In the simulations, x 1 () is set identical with x 2 ().Here, a LFM signal with bandwidth 5 MHz and time width 10 s and a biphase coded signal with 1 MHz and time width 40 s are utilized as the original radar signals.It is assumed that the target echoes are received in the presence of the repeatintensive false targets jammer.For simplicity, we also assume that the intercepted radar signal in the jammer is repeated for 10 times in uniform time-delay interval.Additionally, we utilize the model {M} , =  2   |−| concerning the disturbance covariance matrix, and we would investigate the two cases of  = 0 (the Gaussian white disturbance) and  = 0.9 (the Gaussian correlated disturbance).
In Figures 1 and 2, we show the performance IF, for the LFM signal, as a function of the signal-to-disturbance ratio (SDR).The improvement factor IF has been calculated by Monte Carlo simulation with 200 trials.
In Figure 1, the IF is plotted versus SDR for  = 0, where the concerned time-delay interval of each subjamming signal is 1 s.The simulation curves show that the approach ensures at least about 20 dB performance gain under the conditions where JSR is set to 4, 8, and 12 dB, respectively.It is clear that each IF curve approximates to a constant value which exceeds 30 dB with the increase of SDR under the simulation conditions.Similarly, the performance IF is given in Figure 2, where the simulation parameters remain unchanged except for  = 0.9.As a result there is a slight performance reduction in low SDR for this condition, but it keeps above 18 dB.As SDR increases, the performance difference in the two cases gradually decreases, and the IF also exceeds 30 dB in high SDR.It is evident that the algorithm performs better in white Gaussian disturbance.The cases of jammer with respect to a biphase coded radar are analyzed in Figure 3 ( = 0) and Figure 4 ( = 0.9), where the time-delay interval is 2 s and JSR is also set to 4, 8, As shown in Figures 3 and 4, the improvement factor IF in Gaussian white disturbance and correlated disturbance is approximately the same.Moreover, by investigating the IF, it can be concluded that the SDR has little impact on the final performance curves under the considered conditions.
In simulations, the JSR is set to 4, 8, and 12 dB due to the fact that a whole radar pulse is stored and repeated; namely, the processing gain can also be achieved by a jammer.

Conclusions
In this paper, we investigated the problem of suppressing the so-called repeat-intensive false targets jammer by processing the data during the ToT.By applying the STBC temporally, we can use this technique in surveillance radar systems without multiple antennas.Therefore, a STBC pulse sequence should be used successively in such a system, and if a multiantenna radar system is assumed, namely, if a true STBC can be implemented in different antenna and time slots, a better consequence could be achieved as expected.A WMF is utilized to handle the received radar signals in the presence of jammers with a second-order STBC pulse diversity signal.We analyzed and compared the performance of the proposed algorithm both in white and correlated Gaussian disturbance.This EP technique can be used effectively to cancel a repeatintensive false targets jammer both for LFM and phase-coded radars.