Research Article  Open Access
A Method against InterruptedSampling Repeater Jamming Based on Energy Function Detection and BandPass Filtering
Abstract
Interruptedsampling repeater jamming (ISRJ) is a new kind of coherent jamming to the large timebandwidth linear frequency modulation (LFM) signal. Many jamming modes, such as lifelike multiple false targets and dense false targets, can be made through setting up different parameters. According to the “storagerepeaterstoragerepeater” characteristics of the ISRJ and the differences in the timefrequencyenergy domain between the ISRJ signal and the target echo signal, one new method based on the energy function detection and bandpass filtering is proposed to suppress the ISRJ. The methods mainly consist of two parts: extracting the signal segments without ISRJ and constructing bandpass filtering function with low sidelobe. The simulation results show that the method is effective in the ISRJ with different parameters.
1. Introduction
Interruptedsampling repeater jamming (ISRJ) [1] based on the digital radio frequency memory (DRFM) technology is a new kind of smart jamming, which aims especially at the linear frequency modulation (LFM) signals with large timebandwidth product. The prominent characteristics of ISRJ are embodied in its antenna system and its manner of sampling and storing signals. ISRJ can be used in receivetransmit timesharing antenna system as well as antenna system with two receivetransmit antennas which work asynchronously. Besides, sampling and storing the whole radar signal without distortion are not necessary. Therefore, the problems of highspeed sampling and receivetransmit antenna isolation are settled satisfactorily, which means great value of practical application on the occasions of small jammerplatform like missileborne jammer.
Compared with ISRJ, the Chopping and Interleaving (C&I) proposed in [2] by Sparrow and Cakilo can only be accomplished in the next or after several radar pulse repetition periods and the signal is continuous, while the ISRJ signal can be generated in the current radar pulse repetition period and the signal is intermittent, which leads the methods such as phase perturbation [3], adjusting the chirp rate [4], and pulse diversity [5–8] to failure. The fundamental ISRJ, whose repeat sampling interval is constant and the duty ratio is 50%, has many deficiencies. For example, the amplitudes of the subfalse targets decay rapidly and the main false target is always behind the true target on the selfdefense occasion. For solving these problems, some further studies have been presented like interruptedsampling and periodic repeater jamming [9], irregularly interruptedsampling and repeater jamming [10], interruptedsampling and nonuniform periodic repeater jamming [11], and interruptedsampling and successive repeater jamming [12]. For sharing the common operating mode “storagerepeaterstoragerepeater,” they are collectively called ISRJ in this paper. Compared with the ISRJ with fixed repeat sampling interval, interruptedsampling and periodic repeater jamming and interruptedsampling and successive repeater jamming can form a mass of lifelike false targets and have obvious advantages in fidelity and amount of false targets, flexibility of system, computation burden, and requirement of hardware environment [13]. The ISRJ with irregular sampling periods and interruptedsampling and nonuniform periodic repeater jamming can achieve the desired jamming effect through setting up different parameters like sampling pulse width, delay time of repeater, pulse width of repeater, and repeat sampling interval. Moreover, the false targets with different amplitudes can be generated without changing the instantaneous transmit power which reduce the complexity of hardware system and the energy loss caused by the power switching frequently. Besides the studies on jamming methods, Feng made some researches on the performance of ISRJ on monopulse radar [14], dechirping radar [15], and the impact of ISJR on radar constant false alarm rate (CFAR) detection [16]. There are also many researches on 2dimension (2D) ISRJ methods and their application on synthetic aperture radar (SAR) or inverse synthetic aperture radar (ISAR) [17–19].
Due to the sensitivity of the military, there is only limited public research literature on electronic countercountermeasure (ECCM) schemes with respect to the extensive researches on ISRJ. As a coherent repeater jamming method, ISRJ has both deception and blanket jamming effects under certain parameters and cannot be suppressed by traditional radar antijamming methods such as matched filter and coherent integration. Furthermore, ISRJ is mostly used as selfdefense jamming, so the traditional sidelobe cancellation and sidelobe blanking are also useless. Aiming at the recognition of ISRJ, Jiang et al. [20] have put forward some recognition methods by using the differences on frequency spectrum of the jamming signal and the target signal, which is really important for further research on ECCM methods against ISRJ. According to the discontinuity in time domain of the ISRJ signal, Gong et al. [21] have proposed an effective ECCM scheme for eliminating the ISRJbased false targets from the pulse compression result based on the timefrequency analysis method. The segments not disturbed by ISRJ are detected by finding the modulus minimum of the shorttime Fourier transform (STFT) result, and the bandpass filter is constructed to filter out the ISRJ signal. However, Gong does not give a method to determine the length of the time unit in which only the target echo signal exists.
In this paper, a new method against the ISRJ is proposed based on the “storagerepeaterstoragerepeater” characteristics of the ISRJ and the differences in the timefrequencyenergy domain between the ISRJ signal and the target signal. The new method does not need to make the timefrequency analysis such as shorttime Fourier transform and only needs to compute the simple energy function of the radar signal. Then the signal segments not disturbed by the ISRJ are obtained by comparing the energy function with a threshold value. The rest of the paper is organized as follows. Section 2 first reviews the signal models of the target echo signal and the ISRJ signal before and after the dechirping processing, respectively, and then analyzes their timefrequencyenergy domain characteristics. Section 3 puts forward the antijamming method based on the energy function detection and bandpass filtering. The methods of extracting the signal segments without ISRJ, determining the threshold value, and building the bandpass filtering function with low sidelobes are presented. Section 4 carries out some simulations to demonstrate that the proposed ECCM method is effective in ISRJ with different parameters resulting in different jamming results including the multiple lifelike false targets and the intensively distributed false targets.
2. Signal Model and Properties on TimeFrequencyEnergy Domain
2.1. Signal Model
Dechirping processing is one of the common methods of wideband LFM signal, which can convert the time delay of the target echo signal into frequency; that is, the target echo signal after dechirping is a singlefrequency signal whose frequency is proportional to the target distance. Then, the pulse compression result can be obtained by doing the Fourier transform to the radar echo signal after dechirping processing. This method can not only keep the high rangeresolution but also reduce the radar’s intermediate frequency (IF) bandwidth. ISRJ can also form effective multiple false targets to the dechirping wideband LFM pulse compression radar [16]. Furthermore, the prime component of the jamming signal’s pulse compression output can be ahead of the target by controlling the time delay of repeater, which means that the spatial distributions of the false targets are more flexible.
Assume that the normalized LFM signal emitted by the radar iswhere represents a rectangular pulse with pulse width and center location 0, is the radar carrier frequency, represents the chirp rate, and is the bandwidth of the signal. For the convenience of researching, assume that the true target used in this paper just has one scatter point and the distance between them is . Then, the target echo signal can be denoted aswhere is the time delay of the target echo signal, is the velocity of light, and is the amplitude of the target echo signal. are the peak power of the radar signal, antenna gain, wavelength, and the target radar cross section (RCS), respectively.
The reference signal of dechirping radar can be expressed bywhere is the reference range, is the receiving window, and generally .
The dechirping processing consists of mixing radar signals and reference signal and lowpass filtering. Using the analytic signal, the target echo signal after dechirping can be denoted as
The basic idea of ISRJ is “storagerepeaterstoragerepeater,” which means that the jammer firstly samples and stores parts of the radar signal and then transmits it once or more than once, uniformly or nonuniformly to the radar. Repeat like this until the end of the radar signal. Without loss of generality, we analyze the interruptedsampling and periodic repeater jamming. Figure 1 shows the jamming principle. is the repeat sampling interval. is the sampling pulse width. is times of . Then the interruptedsampling and periodic repeater jamming can be described bywhere denotes the delay of the jammer and denotes the amplitude of the jamming signal. is the transmit power of the jammer. Then the jamming signal after dechirping can be expressed by
2.2. Properties on TimeFrequencyEnergy Domain
The instantaneous frequency of a signal is defined by [22] as the derivative of phase with respect to time.
Then according to (3), (5), (6), and (7), the instantaneous frequency of the target echo signal and the jamming signal before and after dechirping processing can be obtained as follows:
According to (9), we can realize the TF distribution of the target signal and the jamming signal before and after dechirping by Figure 2. It can be seen from Figure 2 that the TF distribution of the jamming signal is discontinuous no matter before or after dechirping because the ISRJ jammer does not transmit the jamming signal when it is receiving the radar signal, which is also the main advantage of ISRJ. However, in pulse duration, the target echo signal before and after dechirping is continuously changing with time. Especially after dechirping, the frequency of the target echo signal is invariable. Based on the great difference between the TF characteristics of the ISRJ signal and the target echo signal, we can build a bandpass filter using the target echo signal segments which are not disturbed by the ISRJ signal to eliminate most of the false targets.
(a) Before dechirping processing
(b) After dechirping processing
Using the energy function defined as the square of the signal’s modulus, we analyze the distribution characteristics of the radar signal in the timeenergy domain under the jamming condition. The energy functions of the target echo signal , the ISRJ signal , and the radar received signals under the jamming condition after dechirping arerespectively, where .
For , satisfies during transmitting the jamming signals. Figure 3 shows the curves of the energy functions of the target echo signal, the ISRJ signal, and the radar received signals under the jamming condition after dechirping.
It can be seen from Figure 3 that, during the sampling duration, the energy is stable and small because the jammer does not transmit the jamming signal and only the target echo signal is received, while the energy is fluctuant quickly and strong during the time of transmitting the jamming signal.
3. ECCM Scheme against ISRJ
3.1. Executing Steps of ECCM Scheme
According to the above analysis, an ECCM scheme against the ISRJ can be summarized by the following steps.
Step 1. Calculate energy function of (see (12)).
Step 2. Determine a threshold value .
Step 3. Extract the signal segments not disturbed by the ISRJ signal.
For any time during the radar received signals, when , ; otherwise, . Then the signal segments not disturbed by ISRJ signal can be expressed as
Step 4. Get the bandpass filtering function by doing the Fourier transform on and then carry out the normalization process.Doing the Fourier transform on , we can get the pulse compression result with ISRJ signal .
Step 5 (filtering). Multiplying with the bandpass filtering function , the ISRJ can be suppressed and then the final pulse compression result can be obtained as
3.2. How to Determine the Threshold Value
Not considering the noise or when the noise is small enough and can be negligible, we can get that according to (12). Then, when , that is, (this is a necessary condition to form an effective jamming), we always can find a threshold value , satisfying . Then the target echo signal segments not disturbed by the ISRJ signal can be found by comparing with which can be set aswhere represents the minimum envelope of the energy function and denotes the expectation operation.
Forwe haveand generally , so satisfies .
When the noise is not small enough and cannot be negligible, the envelope of the energy function is not constant any more. There will be large error using the above methods of determining the threshold value and extracting the signal segments not disturbed by the ISRJ signal. Then an improved method is proposed as follows:(1)Calculating the maximum and the minimum envelopes of the energy function, and , respectively(2)Calculating the mean envelope of the maximum and the minimum envelopes:(3)Comparing with : when ; otherwise, . According to (13), we can get the signal segments not disturbed by the ISRJ signal
This method can maximally avoid the influence of noise on extracting the signal segments not disturbed by the ISRJ signal.
3.3. The Improved Method of Designing the BandPass Filtering Function
Theoretically, should be a rectangular envelope pulse train with pulse duration and pulse repeat sampling interval , which can be defined bywhere denotes convolution operator.
The frequency spectrums of and , respectively, arewhere . Then the frequency spectrum of iswhere .
From , we can clearly see that the frequency corresponding to the maximum value of is just . But there exist high sidelobes beside the mainlobe which may cause the result that there are still some strong false targets after filtering and the radar system still cannot detect the true target correctly.
In this paper, the method of windowing in the frequency domain is designed as follows to suppress the sidelobes of .
Step 1. Choose a window function , such as hamming window. By doing Fourier transform on , we get its frequency spectrum whose center frequency is located in zero.
Step 2. Constructing a onedimensional optimization function,And find that makes get the maximum value.Then, the window function in frequency domain can be obtained as
Step 3. Multiplying and to get the filtering function with low sidelobes ,
4. Simulations
In this section, we analyze the performance of the proposed ECCM scheme to the ISRJ through some simulations. The simulation parameters employed are illustrated in Table 1. Here, the system delay of the jammer is too small to consider.

The influences of the jamming repeat sampling interval and the duty ratio on the jamming performance of ISRJ have been studied in [22]. The distance between the false targets and the amplitudes of the false targets are determined by the jamming repeat sampling interval and the duty ratio , respectively. Higher produces false targets intensively distributed, and smaller generates false targets sparsely distributed. There are only three to five strong false targets while the amplitudes of the highorder false targets attenuate rapidly under the high duty ratio conditions. A large number of false targets with slowly attenuated amplitudes and more serious power loss are generated under the small duty ratio conditions. Assume that the jamming sampling duration is invariable in the following simulations.
When , that is, the duty ratio is 50%, the theoretical analysis and the simulation result shown in Figure 4 reveal that there exist three strong lifelike false targets resulting in a confusion that the radar system cannot judge which one is the true target. The axis in the simulation figures is represented by the relative distance to reference point as a result of the proportional relationship with the singlefrequency target echo signal after dechirping.
Figure 5 shows the magnitudefrequency responses of the filters before and after windowing in frequency domain. It can be seen from Figure 5 that the sidelobes of the filtering function are suppressed by a wide margin through windowing in frequency domain.
The suppression result with the filter not windowed is shown in Figure 6. It can be seen that there still exist one strong false target for high sidelobes resulting in a confusion to the radar system. Figure 7 shows the suppression result with the windowed filter. From Figure 7, we can see that all false targets are removed for the extremely low sidelobes of the windowed filter.
When , that is, the duty ratio is 10%, the theoretical analysis and the simulation result shown in Figure 8 illustrate that the intensively distributed false targets are generated resulting in a confusion to the radar system.
Similarly, Figure 9 shows the magnitudefrequency response of the filters before and after windowing in frequency domain and has similar interpretation to Figure 5.
The suppression result with the filtering function not windowed is shown in Figure 10. It can be seen that there are still many false targets left surrounding the true target for high sidelobes. Figure 11 shows the suppression result with the windowed filtering function. From Figure 11, we can see that the suppression efficiency is obviously good for the extremely low sidelobes of the windowed filtering function.
Signaltonoise ratio (SNR) and jammingtosignal ratio (JSR) will affect the validity of the proposed ECCM method. SNR and JSR are defined aswhere represents the power of noise. Then under different JSR, assume that the peak value of the compression result after executing the ECCM scheme proposed above is the target and make the MonteCarlo simulation 1000 times in every SNR. When the noise power is increasing gradually, Figure 12 shows the detection probability of the true target.
From Figure 12, it can be seen that the larger JSR, the larger detection probability of the true target. Under the condition of and , the true target can be detected with almost 100% probability when and , respectively. The larger JSR is beneficial to extract the signal segments not disturbed by the ISRJ signal and construct the bandpass filter exactly.
5. Conclusions
Based on the discontinuity characteristics of the ISRJ signal in TF domain and the great differences in timeenergy domain, a simple and effective ECCM scheme against the ISRJ is proposed in this paper. Firstly, a simple energy function is defined and used to extract the target echo signal segments without jamming. It is not necessary to perform the complicated timefrequency decomposition. Then, the bandpass filtering function with low sidelobes is obtained by doing the Fourier transformation directly on the extracted signal and windowing in frequency domain. The simulation results show that the proposed method is effective not only in multiple lifelike false targets, but also in intensively distributed false targets generated through setting different jamming repeat sampling intervals. Moreover, this method is effective even with low SNR under certain JSR, and we can acquire the detection probability of almost 100% to the true target.
Conflicts of Interest
The authors declare that there are no conflicts of interest regarding the publication of this paper.
Acknowledgments
This work was granted partially by National Natural Science Foundation of China (61501500).
References
 X. Wang, J. Liu, W. Zhang, Q. Fu, Z. Liu, and X. Xie, “Mathematic principles of interruptedsampling repeater jamming (ISRJ),” Science in China, Series F: Information Sciences, vol. 50, no. 1, pp. 113–123, 2007. View at: Publisher Site  Google Scholar  Zentralblatt MATH
 M. J. Sparrow and J. Cakilo, “ECM techniques to counter pulse compression radar,” United States Patent, 7081846, 2006. View at: Google Scholar
 M. Soumekh, “SARECCM using phaseperturbed LFM chirp signals and DRFM repeat jammer penalization,” IEEE Transactions on Aerospace and Electronic Systems, vol. 42, no. 1, pp. 191–205, 2006. View at: Publisher Site  Google Scholar
 X.Z. Feng and X.J. Xu, “Study of countermeasures to deceptive jamming using random linear modulation frequency ratio SAR,” Systems Engineering and Electronics, vol. 31, no. 1, pp. 69–73, 2009 (Chinese). View at: Google Scholar
 J. Akhtar, “An ECCM signaling approach for deep fading of jamming reflectors,” in Proceedings of the IET International Conference on Radar Systems, pp. 1–5, Edinburgh, UK, October 2007. View at: Google Scholar
 J. Akhtar, “Orthogonal block coded ECCM schemes against repeat radar jammers,” IEEE Transactions on Aerospace and Electronic Systems, vol. 45, no. 3, pp. 1218–1226, 2009. View at: Publisher Site  Google Scholar
 J. Schuerger and D. Garmatyuk, “Performance of random OFDM radar signals in deception jamming scenarios,” in Proceedings of the IEEE Radar Conference, pp. 1–6, May 2009. View at: Publisher Site  Google Scholar
 J. D. Zhang, X. H. Zhu, and K. R. Wang, “A waveform diversity technique for countering RGPO,” in Proceedings of the IET International Radar Conference, pp. 1–4, Guilin, China, April 2009. View at: Google Scholar
 Z. Liu, X.S. Wang, J.C. Liu, G.Y. Wang, and S.P. Xiao, “Jamming technique of interruptedsampling and periodic repeater based on digital radio frequency memory,” Acta Armamentarii, vol. 29, no. 4, pp. 405–410, 2008 (Chinese). View at: Google Scholar
 Z. Zhou, H. Tang, Y. S. Zhang, and C. Y. Wang, “A study on smart noise jamming based on time domain sampling,” Modern Radar, vol. 32, no. 5, pp. 53–55, 2010 (Chinese). View at: Google Scholar
 J.C. Liu, X.S. Wang, Z. Liu, J.H. Yang, and G.Y. Wang, “Preceded false target groups jamming against LFM pulse compression radars,” Journal of Electronics and Information Technology, vol. 30, no. 6, pp. 1350–1353, 2008 (Chinese). View at: Google Scholar
 Y.R. Zhang, Y.J. Li, M.L. Li, M.G. Gao, and X.J. Fu, “Suppress jamming technique of multiple false targets on interruptedsampling and nonuniform periodic repeater,” Acta Electronica Sinica, vol. 44, no. 1, pp. 46–53, 2016 (Chinese). View at: Publisher Site  Google Scholar
 X. S. Wang, S. P. Xiao, D. J. Feng et al., Modeling and Simulation of Modern Radar and Electronic Warfare Systems, Publishing House of Electronic Industry, Beijing, China, 2010 (Chinese).
 D. J. Feng, L. T. Xu, and X. S. Wang, “Phase signature of active decoy and its application in angular deception jamming using interruptedsampling repeater,” Journal of National University of Defense Technology, vol. 36, no. 3, pp. 135–140, 2014 (Chinese). View at: Publisher Site  Google Scholar
 D. Feng, Y. Yang, and L. Xu, “Impact analysis of CFAR detection for active decoy using interruptedsampling repeater,” Journal of National University of Defense Technology, vol. 38, no. 1, pp. 63–68, 2016. View at: Publisher Site  Google Scholar
 D. J. Feng, H. M. Tao, Y. Yang, and Z. Liu, “Jamming dechirping radar using interruptedsampling repeater,” Science China: Information Sciences, vol. 54, no. 10, pp. 2138–2146, 2011. View at: Publisher Site  Google Scholar  MathSciNet
 L. Xu, D. Feng, W. Zhang, and X. Wang, “Group targets generation against ISAR based on intermittentsampling repeater jamming (ISRJ),” Journal of National University of Defense Technology, vol. 35, no. 5, pp. 140–145, 2013 (Chinese). View at: Google Scholar
 X.Y. Pan, W. Wang, D.J. Feng, Q.X. Fu, and G.Y. Wang, “Jamming dechirping ISAR based on intermittent sampling repeater,” Journal of Astronautics, vol. 34, no. 9, pp. 1274–1280, 2013 (Chinese). View at: Publisher Site  Google Scholar
 Y. Wang, C. Y. Shu, S. J. Zhang, P. Huang, and J. Ji, “Array ISAR of precessional cone target generated by intermittent sampling repeater jamming in fast and slow time,” Journal of Electronics and Information Technology, vol. 38, no. 2, pp. 450–454, 2016 (Chinese). View at: Publisher Site  Google Scholar
 Y. Jiang, M. H. He, H. B. Liu, and C. L. Yu, “Recognition of interruptedsampling repeater jamming based on resemblance coefficient,” Modern Radar, vol. 38, no. 5, pp. 72–76, 2016 (Chinese). View at: Google Scholar
 S. X. Gong, X. Z. Wei, and X. Li, “ECCM scheme against interrupted sampling repeater jammer based on timefrequency analysis,” Journal of Systems Engineering and Electronics, vol. 25, no. 6, pp. 996–1003, 2014. View at: Publisher Site  Google Scholar
 N. E. Huang, Z. Shen, S. R. Long et al., “The empirical mode decomposition and the Hilbert spectrum for nonlinear and nonstationary time series analysis,” Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol. 454, no. 1971, pp. 903–995, 1998. View at: Publisher Site  Google Scholar  MathSciNet
Copyright
Copyright © 2017 Hui Yuan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.