A Novel Interrupted-Sampling Repeater Jamming Suppression Method Based on Time-Frequency Analysis and Target Sparse Reconstruction
Interrupted-sampling repeater jamming (ISRJ) is a new kind of coherent jamming for linear frequency modulation (LFM) signals. Based on digital radio frequency memory (DRFM), ISRJ can generate multiple false target groups by intercepting, storing, and retransmitting radar signal fragments, which significantly affects the postprocessing results of radar systems. Furthermore, due to the fragment interception of ISRJ, ISRJ false targets present a regular and discontinuous time-frequency (TF) distribution in contrast with real targets. Considering this intrinsic property and the coherent nature of ISRJ, this study proposes a new method based on TF analysis and target sparse reconstruction to address the ISRJ suppression issue. In this method, the echo signal is first sparsely represented to obtain both the real and false target positions. Then, according to the acquired target positions, information entropy features of targets are extracted in TF data for subsequent target identification. Finally, guided by the identification result, the real targets can be retained and reconstructed by adaptive filtering in the sparse domain to realize ISRJ suppression. Simulations have validated the effectiveness of the proposed method under various situations.
Linear frequency modulation (LFM) signal is widely used in modern radar systems, and its large time-bandwidth product enables it to obtain a large coherent processing gain , which greatly mitigates the effect of noise jamming and other noncoherent jammings . Therefore, coherent jamming is receiving increasing attention. With the widespread use of digital radio frequency memory (DRFM) in electronic countermeasures (ECM), many types of active coherent jammings have been developed. DRFM can coherently duplicate radar signals so that the transmission power requirement of jammers is lowered . Meanwhile, DRFM is also characterized by adjustable jamming parameters and portability on different platforms, posing a severe threat to the radar system [4, 5].
There are two main working modes for DRFM-based jammers . The first working mode is to intercept and forward the entire radar signal pulse, thus the generated jamming signal is able to obtain the coherent processing gain to the maximum extent and form a highly realistic deceptive target. Nevertheless, this kind of jamming cannot take effect until the next pulse repetition interval (PRI), so radar systems can adopt strategies such as interpulse waveform agility [7, 8], frequency agility [9, 10], and protecting signal  to counter such jamming. Besides, this working mode is restricted by the high isolation of two receive-and-transmit antennas and the sampling rate of the wideband signal, so it cannot be flexibly applied to small platforms such as missiles and unmanned aerial vehicles (UAVs) .
In order to solve the inherent defects of the first working mode, the other working mode named the interrupted-sampling-repeating mode came into being. In this mode, interrupted-sampling repeater jamming (ISRJ) is proposed . It intercepts, stores, and repeatedly forwards radar signals within a pulse duration and can generate a series of false targets after pulse compression (PC). The intrapulse jamming characteristic of ISRJ solves the application limitation of the first working mode and also invalidates the abovementioned jamming countermeasures. On this basis, scholars have further explored the application prospect and derivative forms of ISRJ [14–22]. In terms of specific application, the jamming theory and effect of ISRJ have been tested on various LFM wideband radars, such as PC radar , dechirping radar , and range doppler (RD) imaging radar [16–18]. In addition, Li et al.  quantify the influence of signal interception ratio on jamming power loss and evaluate the corresponding jamming effect. In the aspect of derived jamming types, Liu  proposes interrupted-sampling loop jamming (ISLJ) by changing the forwarding mode of intercepted radar signal fragments. In , ISRJ is combined with the scatter wave, and the jamming effect of resulting intermittent sampling scatter-wave jamming on SAR is verified. In , an improved ISRJ is proposed, which can generate false targets ahead of real targets by means of frequency shifting. However, the jamming thus formed may lead to an inevitable energy loss of the generated false targets.
On account of the practicality of ISRJ, the suppression methods against ISRJ have attracted extensive attention since ISRJ was proposed. These methods can be divided into waveform design methods and signal filtering methods. The waveform design methods divide the transmitted signal into multiple segments and then perform subpulse compression separately to destroy the intrapulse coherence of ISRJ as much as possible. For instance, Zhang et al. use a stepped LFM signal  and an intrapulse LFM-Costas frequency stepping signal  to increase the orthogonality among subpulses, thus the jammed subpulses can be easily eliminated through the energy threshold after subpulse compression. Similarly, a mixed modulation of frequency-shift keying (FSK)/phase-shift keying (PSK) signal is employed in  to distinguish the real targets from false ones via the accumulated target detection results after subpulse compression. In , guided by the estimated jamming parameters, Zhou et al. optimize the transmitted waveform by adopting protective pulses and genetic algorithms. Overall, the performance of the waveform design methods mainly depends on the orthogonality between the transmitted signal and ISRJ, and the energy loss of the real target increases when the jamming duty ratio becomes larger.
The signal filtering methods realize jamming removal by filtering in a certain transform domain. In these methods, one option is to extract the jamming-free radar signal fragments through energy function [27, 28], time-frequency (TF) function , and neural network . This option, however, relies heavily on the intensity of the jamming signal and performs relatively poorly under weak jamming conditions. The other option is based on TF analysis. For the dechirping radar, a band-pass filtering process is carried out in the frequency domain [31, 32] by finding the TF local minimum value, but there are still some false targets remaining after processing. For the PC radar, Zhou et al. estimate the key parameters of ISRJ  through TF analysis and deconvolution for jamming cancellation, and Meng et al. further adopt the Hilbert transform  to improve the estimation accuracy of ISRJ sampling slice width. Yet, the performance of these methods is sensitive to the parameter estimation accuracy [35, 36] and provides new ideas for jamming suppression. In , Lu et al. initially apply a TF mask to filter out the wideband jamming signal and then reconstruct the target signal according to the compressed sensing theory. In , the PC result is transformed into the TF domain, and a TF filter can be designed to filter out the false targets directly after determining the range gates of real targets. Nevertheless, this approach is limited by the contradiction between time resolution and frequency resolution in the TF transform, so it cannot accurately determine the extraction locations and the spectrum widths of the target range gates simultaneously. In , a new method for ISRJ suppression is proposed based on real target locating and recovery; the success rate of this method depends on the real target locating precision of the neural network. Although the method is limited to a single real target recovery, for the time being, it provides a new solution for ISRJ suppression.
In this context, according to the coherence of ISRJ and the different TF distribution characteristics between ISRJ false targets and real targets, this study proposes a new ISRJ suppression method for LFM PC radars based on TF analysis and target sparse reconstruction. This method converts the jamming suppression problem into a target binary classification problem, and the targets of interest can be recovered through sparse reconstruction assisted by the target identification result. Owing to the use of TF information entropy (TFIE) features, the proposed method can achieve an overall high target identification accuracy, and ISRJ false targets as well as the noise signal can be greatly suppressed after real target reconstruction. Furthermore, in the stage of TF feature extraction, the proposed method can locate the targets precisely by means of sparse representation and thus is free from the time resolution limit in the TF transform.
The structure of this study is as follows. Section 2 first introduces the ISRJ signal model and then analyzes the PC result of ISRJ and its corresponding TF distribution. Section 3 proposes the ISRJ suppression method, in which the procedures of target identification using TFIE and target sparse reconstruction are introduced in detail. Section 4 conducts lots of simulations to verify the effectiveness of the proposed method and also studies the factors affecting the antijamming probability. Finally, the main conclusions are drawn in Section 5.
2. Principle of ISRJ
2.1. ISRJ Signal Model
ISRJ is mainly used for self-defensive purposes in defense penetration scenarios . For the formation process of ISRJ, the jammer first intercepts and stores a fragment of the radar-transmitting signal and then forwards it repeatedly many times. This process is repeated till the end of the radar signal pulse, as shown in Figure 1.
We assume that the radar transmits LFM signal with pulse width and bandwidth , and the distance between the radar and the real target is , then the target echo signal can be represented aswhere is a rectangular window function with window length and starting point 0, and represent the intensity and the propagation time delay of the target echo signal, respectively. is the frequency modulation rate of the LFM signal, and is the speed of light.
As Figure 1 illustrates, the jammer samples the radar signal at a certain repeat sampling interval within a signal pulse width, and the sampling slice width is . Accordingly, the sampling function can be defined aswhere denotes the convolution operator, is the number of sampled radar signal fragments [29, 30], and is the round-up operator. Note that the relationship between the repeat sampling interval and the sampling slice width is , in which is the forwarding time of a jamming slice.
Therefore, the radar signal fragments sampled and stored by the jammer can be obtained as
Finally, the jammer forwards the stored radar signal fragments for times to generate the resulting jamming signal, which can be expressed aswhere indicates the intensity of the jamming signal.
2.2. PC Result of ISRJ
For LFM radar, the PC process can be regarded as the time-domain convolution between the echo signal and LFM radar matched filter . For the jamming slice formed by the th forwarding of the th sampled signal fragment, the PC result can be formulated as follows:where . is omitted for convenience, which does not affect the derivation result. Equation (5) shows that the PC result of a jamming slice is a “sinc” form function with corresponding time delay and phase shift. Moreover, for all jamming slices with the th forwarding time, their PC results can be represented aswhere . Therefore, the amplitude response of the whole ISRJ PC result can be expressed as
As depicted by equation (7), it can be seen that ISRJ can generate false target groups after PC, and different false target groups are formed by the sampled radar signal fragments of different forwarding times. For a particular false target group, when , a local peak value can be achieved with .
In summary, ISRJ can generate multiple false target groups whose amplitude responses are codetermined by , , , and . Among them, , , and jointly determine the amplitude peak value. At the same time, also decides the distribution intervals among false target groups. Finally, determines the number of false target groups.
2.3. TF Analysis of PC Result
As a joint function of time and frequency, the TF transform can explicitly describe the variation of signal frequency over time and has become an essential tool for analyzing nonstationary signals. In general, linear TF transform is realized by short-time Fourier transform (STFT), which can be expressed aswhere is the input signal to be analyzed, and is a sliding window function.
For the PC results of ISRJ, taking as an example, when a rectangular window is employed, the TF distribution can be formulated aswhere is the sliding time, and is the sliding window length.
Equation (9) is a Fresnel integral, so an exact analytical solution cannot be derived. An approximation is obtainable through the principle of stationary phase. According to the principle of stationary phase, let the derivative of phase be zero, and we can get that the relationship between time and frequency is
It can be seen from (10) that the TF distribution of a certain ISRJ jamming slice after PC presents the form of “sinc” in the time domain and frequency domain, respectively, and its corresponding positions in these two signal domains separately depend on the interception order and the forwarding order of the sampled radar signal fragment. Therefore, the PC result of the whole ISRJ appears as multiple sinc-shaped fluctuations regularly arranged in the TF domain.
Besides ISRJ, the echo signal also contains target echo signals and noise signal , i.e.,where the TF distributions of the noise signal and target echo signal after PC are easy to learn. The energy of the noise signal scatters evenly throughout the TF domain because the noise signal cannot obtain coherent processing gain in the PC process. In contrast, the energy of the target echo signal after PC concentrates on a specific range gate and distributes uniformly within the bandwidth as a result of linear frequency modulation, presenting a time-unvarying and continuous line in the TF domain.
The TF distribution of the echo signal after PC is shown in Figure 2, which is consistent with the above analysis. In the TF domain, the target echo signal after PC presents a continuous strip distribution, while the false targets present a regular and discontinuous distribution due to the fragment interception and forwarding of ISRJ. Therefore, real targets and false target groups can be well distinguished on the basis of different TF distribution characteristics.
3. The Proposed Method
3.1. Target Identification Based on TF Information Entropy
Information entropy is an important metric for measuring the uncertainty of the information source, which solves the problem of quantitative measurement of information. We assume that the occurrence probability of each event in an event set is , where is the total number of events in , and . Then, information entropy can be defined aswhere is set at 2 in this study.
When the influence of noise is not considered, the instantaneous spectrums of target range gates are shown in Figure 3. For the range gate of the real target, the instantaneous spectrum has the spectrum characteristic of LFM signals. By contrast, for the range gate of the ISRJ false target, in line with the analysis in Section 2.3, the instantaneous spectrum has a regular distribution of sinc-shaped fluctuations, resulting in a lower TFIE. In practice, due to the signal edge effect in the TF transform, the instantaneous spectrums of real targets and ISRJ false targets will affect each other.
In consideration of the different TF distribution characteristics between real targets and ISRJ false targets in the TF domain, this study proposes a target identification method based on TFIE. Specifically, the target range gates can be determined through sparse representation, which has been an emerging signal-processing approach in recent years. Signal sparse representation aims to capture the intrinsic nature of the signal and represent the signal with a few atoms in a given overcomplete dictionary, so as to obtain a more concise representation of the signal, which facilitates further signal processing as well as information acquisition. With the radar-transmitting signal dictionary, the real targets and main false targets can be precisely located due to the energy matching by range gates. After locating the target range gates, features of target instantaneous spectrums can be extracted for target identification. In this study, a support vector machine (SVM), a generalized linear classifier for multivariate classification based on supervised learning, is employed in the target identification process. By learning the data distribution, SVM can determine the decision boundaries among different target groups, thus realizing target distinguishment.
The process of TFIE extraction is as follows:(1)Transforming the PC result of the echo signal into the TF domain through STFT.(2)Extracting the instantaneous spectrum of the target range gates according to the sparse representation result .(3)Guided by the bandwidth and the center frequency , performing bandwidth normalization on to exclude the effect of noise outside the bandwidth.(4)Carrying out amplitude normalization, and calculating the probability of each amplitude value within the bandwidth of the normalized instantaneous spectrum , i.e., , where is the amplitude of each frequency point, is the total amplitude value, and is the fixed sampling number of the instantaneous spectrum after bandwidth normalization.(5)Calculating TFIE values of the corresponding targets using equation (13).
After the above feature extraction steps are completed, the extracted TFIE features are input into an SVM for target identification.
3.2. Sparse Reconstruction of Real Target
Since ISRJ is generated by fragment interception, storage, and repeated forwarding of radar-transmitting signals, each generated jamming slice can be seen as a radar-transmitting signal with shorter pulse width and different time delay. Therefore, based on the intrapulse coherence of ISRJ, a dictionary of radar-transmitting signals can be designed to match the echo signal under ISRJ, where is the sampling number in range direction, and is the number of range gates. Hence, the echo signal can be rewritten aswhere and the specific element in this dictionary can be represented aswhere is the round-off operator, and is the sampling interval. It can be seen from equation (15) that each column in is a delayed form of the radar-transmitting signal, and the time interval between two adjacent columns is . Thus, the range resolution of the dictionary can be calculated as .
Sparse representation of the echo signal in nature can be viewed as the coherent matching of targets from different range gates, and represents the matching energy at each range gate. If there are a relatively limited number of significant targets compared with in the imaging scene, the targets can be regarded as sparsely distributed in the range domain. Consequently, contains only several nonzero values, and the indexes of these nonzero values correspond to the target positions. It is worth noting that the noise signal cannot obtain the radar processing gain due to its incoherence, resulting in corresponding negligible energy in the sparse domain.
The sparse representation of the echo signal can be realized through the following convex optimization equation:where is the norm, and is a trade-off coefficient to balance the optimization proportion between the sparsity and the residual component . In (15), the larger the is, the more the is taken into account in the optimization process, and the resulting optimization result is relatively sparser. However, the residual component is larger in this case. On the contrary, there is less residual component left when is smaller, but the sparsity of the sparse representation result will accordingly decrease. A typical sparse representation result is shown in Figure 4.
As shown in Figure 4, there are many peaks (nonzero values) at the corresponding positions of the real targets and ISRJ false targets because of their matching characteristics with the dictionary , and the peak values of the false targets within the same false target group conform to the modulation of envelope, which is in consistency with the derivation result of equation (7). Based on the sparse representation result, the obtained target positions can be expressed aswhere is a threshold to distinguish between the range gates with and without targets, and denotes not a number value.
With the acquired target positions, TFIE features can be extracted from the instantaneous spectrums for target identification. Assuming that the positions of the identified false targets are in the target identification result , then an adaptive filter can be accordingly constructed in the sparse domain to retain the peaks of real targets and filter out the peaks caused by ISRJ, which can be expressed as
Finally, after amplitude compensation, the reconstructed target echo signals can be obtained aswhere is the amplitude compensation factor, which is the amplitude ratio of the real targets before ISRJ suppression to the corresponding reconstructed targets.
3.3. Main Steps of the Proposed Method
As analyzed in Section 2.3, real targets and ISRJ false targets have different distribution characteristics in the TF domain. Therefore, in view of this inherent difference and to make full use of the coherence of ISRJ, this study proposes a method for ISRJ suppression, which can be mainly divided into three steps: sparse representation, target identification, and real target sparse reconstruction. Firstly, considering the coherence of ISRJ, a dictionary of radar-transmitting signals is designed to represent the echo signal sparsely. Due to the matching with the dictionary, there will be peaks at the corresponding positions of the real targets and the ISRJ false targets in the sparse representation domain. Then, the echo signal is pulse compressed and transformed into the TF domain. According to the obtained target positions, the TFIE features of the corresponding targets are extracted for target identification. Consequently, only the identified real targets can be retained in the sparse domain to complete target reconstruction. The detailed steps of the proposed method are listed in Algorithm 1.
4.1. Target Identification Result
In order to verify the effectiveness of TFIE in distinguishing real targets from ISRJ false targets, we set the jamming slice width at 5 , the forwarding time , and the jamming-to-signal ratio (JSR) at 15 dB, respectively. Radar transmits LFM signals with bandwidth and pulse width . Under these settings, the mean TFIE values of real targets and ISRJ false targets are calculated on different signal-to-noise ratio (SNR) conditions, as shown in Figure 5. Each value is the average result of 500 Monte Carlo simulations.
It can be seen from Figure 5 that the mean TFIE value of real targets is hardly affected by the change of SNR and remains stable at around 8.94, while that of ISRJ false targets decreases slowly as SNR increases, and at length levels off when SNR is greater than 0 dB. From an overall perspective, the mean TFIE value of ISRJ false targets is lower than that of real targets because of the regular TF distribution of ISRJ false targets. In addition, there is no overlap between the curves of real targets and ISRJ false targets, presenting an obvious distinction.
In , Yang et al. use the variance feature to detect ISRJ according to the fluctuation of spectrum energy. However, on account of the difference in data dimension and mean value between the variance feature and the TFIE feature, we cannot compare the dispersion degree of these two features directly through standard deviation. Therefore, the coefficient of variation (C.V) is introduced in this study, which is a normalized metric to measure the dispersion degree and can be defined as the ratio of standard deviation to mean value , i.e.,
As a dimensionless quantity, C.V is a better metric to compare the stability among data groups with different dimensions or mean values, as it eliminates the effect brought by various data values. Specifically, the C.V values of these two features are separately calculated by 500 Monte Carlo simulations under each SNR scenario. As demonstrated in Figure 6, both features of targets tend to be more stable with the increase of SNR. But on the whole, the C.V of the TFIE feature is remarkably smaller than that of the variance feature, indicating that the TFIE feature is less discrete and possesses better stability.
The proposed method in this study transforms the jamming suppression problem into a binary classification problem for targets. ISRJ suppression can be achieved by adaptive filtering based on the identification result. Therefore, the performance of the proposed method depends directly on the target identification accuracy, which can be expressed aswhere is the total target number, and represents the number of targets correctly identified.
In the supervised learning process, 4000 sets of TFIE features, including 2000 real target features and 2000 ISRJ false target features (with different orders), are generated under different parameter settings, and they are further divided into the training set and test set by the ratio of 4 : 1. The parameter ranges of training samples are listed in Table 1. After several rounds of data generation and training in accordance with the above settings, the average based on TFIE can reach 99.46%.
The hypothesis test is usually applied to test the robustness of certain conclusions . To further prove the superiority of TFIE in the task of target identification, a one-tailed t-test is carried out in this study, in which serves as the evaluation metric. For the generated datasets, the average test value using TFIE is , and the variance is . Subsequently, the critical value can be obtained by (where is the assumed minimum value) and is larger than the 4.032 given by the one-tailed t-test table. This result means that the using the TFIE feature is greater than the assumed test value (0.99) at a confidence level of ().
In contrast, we also perform a hypothesis t-test on the variance feature with the same datasets, and the intermediate results of the statistical calculation process are listed in Table 2. The TFIE feature can contribute to a higher with stronger robustness compared with the variance feature.
4.2. Factors Affecting Target Identification Accuracy
As previously mentioned in Section 3.1, TF features may be affected by the interactions among targets resulting from the signal edge effect in the TF transform. Therefore, some key parameters such as , (JSR), SNR, , and may have an impact on the target identification result. In this section, extensive experiments are done to explore the effect of these key parameters on .
As can be learned from equation (7), the forwarding time decides the number of false target groups. In other words, merely decides how far the false targets are distributed in the range domain and is unrelated to target intensity, so it can hardly affect . To substantiate this claim, we fix the experimental parameters for the purpose of controlling variables, as shown in Table 3 (for convenience, if not specifically specified, the basic experimental parameters remain unchanged as those in Table 3 in the following simulations). Also, we set the sampling slice width uniformly distributed within the range of so that remains at 3. Then, two datasets with 10000 features are generated when the forwarding time is 4 and 5, respectively. The result demonstrates that the values of both datasets are 0.9903, thus indicating that basically has no direct effect on .
In order to study the effect of JSR, SNR, and sampled fragment number on the target identification accuracy , a series of Monte Carlo experiments are carried out in this study. As for the parameter settings, under the condition that the sampling slice width , test datasets under four modes are generated, as shown in Table 4. In each mode, the test datasets are generated from −10 dB to 10 dB with a 2.5 dB SNR interval and from 5 dB to 20 dB with a 1.5 dB JSR interval, respectively. This results in a total of 99 test datasets per mode and 100 Monte Carlo experiments are conducted in each dataset.
The variation trends of versus SNR and JSR in different jamming modes are illustrated in Figure 7. Simultaneously, the misidentified real targets and false targets are separately counted, and the number distribution versus JSR is shown in Figure 8.
Some key conclusions can be drawn from Figures 7 and 8, which are summarized in the following:(1)When the signal fragment is forwarded immediately after being intercepted, i.e., , the jamming signal at this time is called interrupted-sampling direct jamming (ISDJ), which differs from ISRJ only in the forwarding time. The Monte Carlo experiment results shown in Figure 7 demonstrate that the proposed method can maintain high levels of in these four modes, which means that the proposed method can effectively counter both kinds of jamming signals.(2)According to equation (7), the peak amplitudes of the generated false targets become larger with larger , which is unfavorable for the correct identification of real targets as they are more likely to be covered by ISRJ false target groups. On the other hand, as analyzed in Section 2.2, false targets are generated at the interval of within a false target group, so a broader jamming area is yielded when becomes larger ( is smaller accordingly), exacerbating the overlapping between real targets and false targets. The above two factors lead to an overall lower .(3)When JSR is fixed, generally rises with the growth of SNR.(4)In the case of low JSR, false targets are relatively weak, and their TF features are more affected than the real target features by the mutual effect among targets. In consequence, the primary cause of identification error in this circumstance is ISRJ false targets, and the error rate drops gradually with the increase of JSR.(5)The same rule applies to real targets in the case of high JSR. Compared with false target features, the TF features of real targets suffer considerably more from the mutual effect among targets. As a result, the misidentified samples mainly come from real targets, and the target identification accuracy falls as JSR increases.
According to equation (6), not only determines the intensity of the ISRJ false target group but also decides the distribution intervals among targets. In order to learn the specific influence of on , two test datasets, including 2000 target features (1000 real target features and 1000 ISRJ false target features), are generated under the conditions of and , respectively. Correspondingly, is uniformly distributed in the interval of and for controlling variables ( remains constant). The misidentified data is statistically analyzed, and the statistical distributions are shown in Figure 9.
Through statistical histograms, the error probability of target identification is seen to fall steadily with the increase of after a sharp rise at first. In terms of the upward trend, the target distribution interval is relatively small, and the mutual effect among targets cannot be ignored. At this time, the intensity of the false target group becomes stronger as increases, so the TF features of the real targets are prone to be affected, bringing about more misidentified real targets. However, when grows to a certain degree, the target distribution interval is large enough to significantly weaken the interactions among targets. Consequently, the error rate starts to decline in general.
4.3. The Jamming Suppression Performance of the Proposed Method
On the ground of an overall high target identification accuracy, the jamming suppression performance of the proposed method is tested. We set three real targets at 1.5 km, 3 km, and 5 km, respectively. The sampling slice width is fixed at 5 , and the intercepted radar signal fragments are forwarded three times. The ISRJ jammer is implemented on the real target at 1.5 km to cover all these three targets.
As shown in Figure 10, under the influence of ISRJ, the real targets are mixed with multiple false target groups in the range direction after PC, leading to the inability of radar systems to acquire effective information on real targets. By sparse representation, the positions of targets are obtained so that the TFIE features of targets can be extracted for the subsequent target identification procedure.
With the target identification result, an adaptive filter can be constructed in the sparse domain by equation (18) to remove the corresponding peaks of ISRJ false targets. After amplitude compensation, the final jamming suppression result is obtained, as shown in Figure 11. It can be seen that based on the correct target identification result, all the ISRJ false targets are filtered out, and only the real targets are reconstructed. Moreover, the noise signal in the original echo signal is also suppressed to a significant extent since its energy cannot match with the dictionary in the process of sparse representation.
Furthermore, when the real targets and the generated false targets are aliasing in the range direction, which is also a typical scene in common practice, the jamming suppression performance of the proposed method still needs to be tested. Concerning this issue, we set the real target at 3.5 km from the reference point, and the intercepted radar signal is forwarded once to form ISRJ. 4000 sets of target TFIE features are generated with ranging uniformly from 1–30 to ensure the real target is aliasing in the different positions (from the middle to the edge) of the false target group, and the training range of SNR and JSR is in line with Table 1.
Although the mutual effect among targets brought by the signal edge effect in the TF transform cannot be ignored at this time, the overall target identification accuracy still reaches 90.0% in this case, which proves the validity of the proposed method in the target aliasing situation. When the sampling slice width 2.5 , the corresponding sparse representation and ISRJ suppression results are shown in Figures 12 and 13, respectively.
In practice, another frequently encountered scenario is that the generated ISRJ false target is located ahead of the real target, which can be achieved by frequency shifting . Similarly, 4000 sets of target TFIE features are generated with the sampling slice width set as 4 and frequency shift ranging from 0.54 MHz to 1.92 MHz to produce false targets preceding the real target. This range also keeps the real target aliasing in the different positions (from the middle to the edge) of the false target group (if not aliasing, there is no difference from the regular case). Other training parameters remain unchanged. Under this circumstance, the overall is 86.0%, demonstrating the effectiveness of the proposed method in the frequency-shifting situation. The decline in is caused by frequency shifting, which lowers the regularity of the false target instantaneous spectrums and reduces the feature difference between the real targets and ISRJ false targets. When the frequency shift is 1.2 MHz, the corresponding sparse representation and ISRJ suppression results are shown in Figures 14 and 15, respectively.
In order to evaluate the jamming suppression performance quantitatively, the signal-to-jamming ratio improvement factor (SJRIF) is introduced in this study, which is defined as the difference between the signal-to-jamming ratio (SJR) after and before ISRJ suppression, i.e.,
In (21), SJR can be formulated aswhere denotes the total number of real targets, is the peak amplitude of the real target, and is the maximum amplitude besides the real targets.
Monte Carlo simulations are conducted in this study to compare the jamming suppression performance of the proposed method with two typical competing methods proposed in [33, 36]. The simulations are carried out from −10 dB to 10 dB at 5 dB SNR intervals in the low JSR and high JSR scenarios, respectively. Each result is the averaged result of 500 Monte Carlo simulations, which is displayed in Figure 16.
It can be seen from Figure 16 that the method in  is prone to be affected by low SNR situations, while the proposed method outperforms the other two methods for PC radars both in high and low JSR situations, demonstrating its superiority against ISRJ.
ISRJ is a promising intrapulse coherent jamming that regularly intercepts and retransmits radar-transmitting signals by fragments, resulting in noticeable TF distribution differences between ISRJ false targets and real targets. Given these characteristics, this study proposes a new ISRJ suppression method based on TF analysis and real target sparse reconstruction. The proposed method innovatively converts jamming suppression into a target binary classification problem. Firstly, the echo signal is sparsely represented to obtain the target positions. Then, guided by the previously acquired positions, the target features are extracted in the TF domain for subsequent target identification. In the end, the real targets are reconstructed according to the target identification result, thus realizing ISRJ suppression.
Simulation experiments are conducted to validate the effectiveness of the proposed method under various situations, and the factors that may affect the target identification accuracy are also studied in detail. In the scheme of target identification, hypothesis tests reveal that the adopted TFIE feature can achieve improved performance than the variance feature, with an overall target identification accuracy of 99.46%. As for the final ISRJ suppression result, only the real targets are retained and reconstructed, while the false ISRJ targets and the noise signal are suppressed considerably. Through quantitative evaluation, the proposed method shows better performance than competing methods for pulse compression radar.
The simulation data used to support the findings of this study are available from the corresponding author upon reasonable request.
Conflicts of Interest
The authors declare that there are no conflicts of interest regarding the publication of this paper.
This work was supported by the National Natural Science Foundation of China (61971026).
D. C. Schleher, Electronic Warfare in the Information Age, Artech House, Boston, MA, USA, 1999.
G. Liu, K. Zheng, and M. Gao, “Design and implementation of deception jamming signal generator against SAR,” Transactions of Beijing Institute of Technology, vol. 32, no. 2, pp. 184–188, 2012.View at: Google Scholar
A. Almslmany, C. Wang, and Q. Cao, “Advanced deceptive jamming model based on DRFM Sub-Nyquist sampling,” in Proceedings of the 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST), pp. 727–730, Islamabad, Pakistan, January 2016.View at: Google Scholar
J. Zhang, Y. Li, and X. Zhu, “Approach of radar against deception jamming based on waveform diversity,” Journal of Data Acquisition & Processing, vol. 25, no. 2, pp. 138–142, 2010.View at: Google Scholar
Y. Li, X. Jia, Y. Chen, and C. Yin, “Frequency agility MIMO-SAR imaging and anti-deception jamming performance,” in Proceedings of the 2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS), pp. 1–4, Beijing, China, August 2014.View at: Google Scholar
S. Jin, C. Wang, C. Qiu, and X. Li, “Design of RF protecting signal for transponder jamming suppression,” Journal of China Academy of Electronics and Information Technology, vol. 9, no. 4, pp. 377–381, 2014.View at: Google Scholar
Z. Sun, M. Dong, and B. Chen, “Interrupted sampling repeater jamming suppression based on time-frequency analysis and band-pass filtering,” Journal of Xidian University, vol. 48, no. 2, pp. 139–146+180, 2021.View at: Google Scholar
H. Li, G. Zheng, Y. Yang, and H. Guo, “The performance analysis of multi-false targets jamming of part copying radar pulse,” Electronic Information Warfare Technology, vol. 25, no. 3, pp. 39–44, 2010.View at: Google Scholar
Z. Liu, “Jamming technique for countering LFM pulse compression radar based on digital radio frequency memory,” Doctoral Thesis, National University of Defense Technology, China, 2006.View at: Google Scholar
W. Yang, J. Lin, and T. Wang, “Intermittent sampling scatter-wave jamming against SAR,” Journal of Astronautics, vol. 3, no. 33, pp. 367–373, 2012.View at: Google Scholar
C. Li, W. Su, G. Hong, C. Ma, and J. Chen, “Improved interrupted sampling repeater jamming based on DRFM,” in Proceedings of the 2014 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), pp. 254–257, Guilin, China, August 2014.View at: Google Scholar
J. Zhang, H. Mu, S. Wen, and Y. Li, “Anti interrupted-sampling repeater jamming method based on stepped LFM waveform,” Systems Engineering and Electronics, vol. 41, no. 5, pp. 1013–1020, 2019.View at: Google Scholar
J. Zhang, H. Mu, S. Wen, S. Liao, and M. Sha, “Anti-intermittent sampling jamming method based on intra-pulse LFM-Costas frequency stepping,” Systems Engineering and Electronics, vol. 41, no. 10, pp. 2170–2177, 2019.View at: Google Scholar
J. Zhang and C. Zhou, “Interrupted sampling repeater jamming suppression method based on hybrid modulated radar signal,” in Proceedings of the 2019 IEEE International Conference on Signal, Information and Data Processing (ICSIDP), pp. 1–4, Chongqing, China, December 2019.View at: Google Scholar
H. Yuan, C. Wang, X. Li, and L. An, “ECCM scheme against interrupted-sampling repeater jamming based on compressed sensing signal reconstruction,” Systems Engineering and Electronics, vol. 40, no. 4, pp. 717–725, 2018.View at: Google Scholar
S. Yang, B. Tian, and R. Zhou, “ECCM against interrupted sampling repeater jamming based on time-frequency analysis,” Journal of Signal Processing, vol. 32, no. 10, pp. 1244–1251, 2016.View at: Google Scholar
Y. Meng, L. Yu, Y. Wei, and P. Tong, “A novel parameter estimation method of interrupted sampling repeater jamming,” in Proceedings of the 2019 IEEE International Conference on Signal, Information and Data Processing (ICSIDP), pp. 1–5, Chongqing, China, December 2019.View at: Google Scholar
C. Zhou, Q. Liu, and C. Hu, “Time-frequency analysis techniques for recognition and suppression of interrupted sampling repeater jamming,” Journal of Radars, vol. 8, no. 1, pp. 100–106, 2019.View at: Google Scholar