Research Article  Open Access
ZhengZhao Tang, YangYang Dong, ChunXi Dong, Xin Chang, GuoQing Zhao, "A Deception Jamming Method Countering Bi and Multistatic ISAR Based on MicroDoppler Effect", Mathematical Problems in Engineering, vol. 2018, Article ID 3689382, 6 pages, 2018. https://doi.org/10.1155/2018/3689382
A Deception Jamming Method Countering Bi and Multistatic ISAR Based on MicroDoppler Effect
Abstract
Bi and multistatic inverse synthetic aperture radar (ISAR) operate with spatially separated transmitting and receiving antennas. A deception jamming method countering bi and multistatic ISAR is proposed in this paper based on the study of microDoppler effect. The jammer modulates the intercepted ISAR signals with added microDoppler information and retransmits them to the real target, which scatters the jamming signals to the radar receivers. Deceptive falsetarget images with interference bands in the crossrange direction will be induced by the jamming signals through the imaging process of radar receivers. Additionally, realtime movement features of the falsetargets can be flexibly adjusted by changing the modulation parameters, which improves the fidelity of the falsetargets. The equivalent number of looks (ENL) index is used to evaluate the jamming effects. Simulation results validate our theoretical analysis and show the effectiveness and practicability of our method.
1. Introduction
ISAR has been widely used in many military fields such as target classification, enemy recognition, and precision weapon guidance because of its allday and allweather surveillance and highresolution imaging on the target. In the complex electromagnetic environment of modern warfare, bi and multistatic ISAR have drawn more and more attention due to their advantages in target information acquisition [1], identification, antijamming, and concealment. Bi and multistatic ISAR can generate highresolution images of highspeed moving targets with one transmitter and several receivers that are spatially separated. The characteristics of pseudobistatic ISAR system are analyzed by Palmer et al in [2]. Y. Huang et al. discussed the imaging resolution of bistatic ISAR system in [3, 4]. Afterwards, Z.Z. Gao et al. discussed the variation regulations of bistatic angle and equivalent lineofsight azimuths in the wavenumber domain [5]. Bi and multistatic ISAR show great potential to be widely applied in many military applications.
In recent years, the microDoppler effect introduced from laser radar has been developed and utilized in several applications such as feature extraction [6] and the accurate identification of targets [7, 8]. Meanwhile, with the development of highresolution timefrequency analysis algorithm [7], the feature extraction algorithm [9] of ISAR targets based on microDoppler effect shows great potential [10] in the application of target identification [11]. MicroDoppler effect also has an impact on the countermeasures to ISAR [12, 13]. The study of bi and multistatic ISAR countermeasures is scarce according to the literature available [14]. Shi et al. proposed an ISAR jamming idea based on the microDoppler effect capable of inducing a train of falsetargets in the ISAR images [15]. A method capable of generating deceptive images in the downrange direction of bistatic ISAR based on subNyquist sampling is proposed in [16]. However, this method cannot interfere with the crossrange direction and the features of the falsetargets are fixed.
Based on the previous study, a method capable of generating deceptive falsetarget images with interference bands in the crossrange direction was proposed in this paper. The jammer modulates the intercepted ISAR transmitting signals with added microDoppler information and retransmits them to the target, which then scatters the jamming signals to the radar receivers. Deceptive falsetarget images will be induced near the real target images, as well as interference bands in the crossrange direction, through the motion compensation and twodimensional pulse compression imaging process of the radar receivers. The features of the falsetarget images can be flexibly adjusted to improve the fidelity of the falsetargets, so that the decision to engage the target may be delayed even impractically to make without accurate target recognition. Although most of the analyses are directed based on the principle of bistatic ISAR, it can easily be extended to the applications in countering multistatic ISAR for the jamming signals are theoretically scattered in all directions and in all angles.
This remainder of this paper is organized as follows. Section 2 introduces the principle of multistatic ISAR system. Section 3 presents the jamming signal analysis on the basis of the bistatic configuration. Section 4 shows the simulation results together with some performance and key parameter discussion. And the ENL index is utilized to evaluate the jamming effect. Finally, some conclusions are presented in Section 5.
2. Multistatic ISAR System Model and Mathematical Analysis
We show the whole signal processing steps from coherent processing to final image forming in a certain given multistatic system setup. For the purpose of simplicity, suppose that the radar transmitter, receivers, and the jammer are all stationary. The target of multistatic ISAR can be equivalent to a rotating platform model with an angular velocity ω after ideal motion compensation, as in Figure 1. The radar transmitter and receivers are located at , , , and and the instantaneous slant ranges between the target and the radar transmitter and receivers are , , , and , respectively. The bistatic angle of , , and the target is denoted as β. The 2D coordinate xOy is embedded on the target and the origin O is the centre of the moving target. The yaxis is the bisector of angle β and the xaxis is perpendicular to the yaxis. is the range between point scatterer P(x_{0}, y_{0}) and O, and is the included angle between and the xaxis. M and N are the projection of P in the line of sight of radar transmitter and receiver, respectively.
The LFM signal is widely used as the transmitting signal due to its advantage of enhancing transmit power and widening the bandwidth. Suppose that the transmitting signal of the ISAR transmitter is a linear frequency modulated (LFM) pulse whose central frequency is defined as f_{0} and the chirp rate is defined as k. The waveform of the transmitting signal in the fast time and the slowtime domain can be expressed as is the fast time, is the slow time, is the pulse width, m is an integral number, and T is pulse repetition period.
Since , , and can be equivalent to and , respectively. Suppose that the sum of ranges from the point O to the radar transmitter and receiver (bistatic range) is R_{0} and the bistatic range of point scatterer P isThe rotation angle of target is negligible during the processing time of radar imaging, therefore has and , and then (2) can be expressed asand thus the echo signals of point scatterer P collected by radar receiver are is the scattering coefficient of P. Carrying out the Fourier transform (FT) in the slowtime domain, then the Doppler frequency of point scatterer P has a form asIt can be seen from (5) that the Doppler frequency of each point scatterer of the target is proportional to its position in the range direction. The use of spectrum analysis methods such as FT can separate different point scatterer in each range resolution cell. Thus the rangeDoppler image of the target can be obtained.
The imaging principle of other radar receivers is same as R1x.
3. Jamming Signal Analysis
Without loss of generality, a bistatic configuration is used to analyze the jamming signal, as in Figure 2. Denote the radar transmitter, receiver, and the jammer , , and , respectively. The jammer modulates the intercepted ISAR transmitting signals with added microDoppler information and retransmits them to the target. Therefore the jammer and the radar receiver can be equivalent to a bistatic ISAR system with a bistatic angle denoted as β. The 2D coordinate xOy is embedded on the target and the origin O is the centre of the target. The yaxis is the bisector of β and the xaxis is perpendicular to the yaxis. Denote the false rotating point scatterer as P() and it is rotating centre as O_{1}. P has both the same translational movement as point O_{1} and the rotational movement with a radius denoted as in the xOy plane. Additionally, the initial phase and the angular velocity of P are denoted as and , respectively. M and N are the projections of P in the line of sight of the jammer and radar receiver. Denote the initial angle included in and the xaxis as θ.
The jammer generates deception jamming signals through three steps: intercepting, modulating, and retransmitting. Suppose that the radar transmitting signal is same as Section 2.
The bistatic range of P can be written as
is the slow time. Then the jamming signal modulated by the jammer can be expressed asCarrying out the FT in the slowtime domain, then the Doppler frequency of P has a form as
It can be seen from (8) that when the target scatters the jamming signals to the radar receiver, falsetarget images with microDoppler features are induced in the ISAR images. The falsetarget images rotate at an additional angle which equals β/2 compared with the real target images. And the false micromotion points will induce interfere bands in the crossrange direction.
4. Simulations and Image Result Analysis
4.1. Simulation Description
A plane model of 74 point scatterers is adopted to demonstrate the effect of the jamming idea which takes up to 20m (downrange) × 20m (crossrange). The simulation process is described in Figure 3.
Simulation parameters are listed in Table 1. The radar is assumed operating at 10GHz (f_{0}) and transmitting a LFM waveform with 1GHz bandwidth (B). The pulse width (τ) is 10μs and the pulse repetition frequency (PRF) is 200Hz. A total of 512 pulses are transmitted. Values of , , and are set as 50km, 60km, and 70km, respectively, which satisfy the approximation of farfield back scattered field. The bistatic angle (β) is 120°. The transmitting power of the jammer is 140W and the antenna gain () is 30dB. The rotating angular velocity (ω) of the target is 0.02rad/s.

4.2. Image Result
Figure 4(a) shows the rangeDoppler image of the plane model. The single and multiple falsetarget images of ordinary deception jamming method are illustrated in Figures 4(b) and 4(c), respectively. It can be seen that the falsetarget images are distributed in different range cells but the Doppler frequency of each falsetarget is the same.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
Figure 4(d) depicted a single falsetarget image with two rotating micromotion points, whose rotation radius is 3m and the angular velocity is 20rad/s. The falsetarget image rotates an additional angle of 60° (β/2) compared with Figure 4(b) and has two interference bands in the crossrange direction, which verifies the conclusions in Section 3.
In order to flexibly control the image features and motion information of the falsetarget, we further studied the jamming effect with the changing of certain parameters compared to Figure 4(d), and the simulation results are shown in Figures 4(e)–4(h). In Figure 4(e) the equivalent bistatic angle is reduced to 60° and as a result the falsetarget image rotates 30°. In Figure 4(f) the rotation radius of the micromotion points has increased to 5m; it can be seen that the width of the interference bands has broaden. Figure 4(g) illustrates the falsetarget image when the jammer’s retransmitting time delay reduced to 60ns. And Figure 4(h) illustrates the falsetarget images with the angular velocity of micromotion points reducing to 10rad/s. It can be seen that the sparse degree of interference bands has decreased.
Compared to Figure 4(c), the image of multiple falsetarget and micromotion points was depicted in Figure 4(i). It can be seen that the real target image was hidden within the falsetargets images and interference bands, making it difficult for ISAR to distinguish.
Through the above simulation, we can arbitrarily set the position, number, and movement information of the falsetarget and the micromotion point scatterers according to the operational needs, which greatly improves the fidelity of deception jamming.
4.3. Analyses of Jamming Effect
The equivalent number of looks (ENL), which is an indicator of the grayscale of an image’s pixels, is used to analyze the jamming effect. It is the most commonly used standard for image evaluation and is defined as the ratio of the mean of the image to the standard deviation of the image:
The mean value of the image reflects the average gray level of the image. The standard deviation of the image represents the degree of deviation of all points in the image area from the average, which reflects the nonuniformity of the image. There will be big changes of the mean and standard deviation of the ISAR images when they are jammed. The bigger the changes are, the more significant the jamming effect is. The ENLs of the images in Figure 4 are listed in Table 2.

It can be seen that the jamming method proposed in this paper has a more significant effect on ISAR images in both cases of single and multiple falsetarget deception jamming than ordinary deception jamming method.
5. Conclusions
The novelties of this paper are that multiple falsetarget images with additional microDoppler information will be induced by the jamming signals. Additionally, the realtime movement features of the falsetarget images can be flexibly adjusted as needed. Multiple falsetarget images which are similar to the real target can increase the cost burden and waste the finite resource of radar for identifying the real one. The deceptive jamming method could have a negative impact on the ISAR target recognition applied to aircrafts, ships, and missiles.
Data Availability
Data is obtained by computer simulation.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
Acknowledgments
This work was supported by the China Postdoctoral Science Foundation under Grant 2017M623123.
References
 D.J. Feng, X.S. Wang, S.P. Xiao, and G.Y. Wang, “Phase signatures and compensating approach to moving target echoes by dechirping processing,” Journal of Electronics and Information Technology, vol. 30, no. 4, pp. 916–920, 2008 (Chinese). View at: Google Scholar
 B.S. Kang, J.H. Bae, M.S. Kang, E. Yang, and K.T. Kim, “BistaticISAR crossrange scaling,” IEEE Transactions on Aerospace and Electronic Systems, vol. 53, no. 4, pp. 1962–1973, 2017. View at: Publisher Site  Google Scholar
 J. E. Palmer, M. Martorella, and I. D. Longstaff, “Ariborne ISAR imaging using the emulated bistatic radar system,” in Proceedings of the 5th European Conference on Synthetic Aperture Radar, pp. 25–29, 2004. View at: Google Scholar
 Y. Huang and W. Junfeng, “Study of imaging algorithm in bistatic ISAR,” Signal Processing, vol. 23, no. 4, pp. 514–517, 2007 (Chinese). View at: Google Scholar
 Y. Zhang, Z. Zhu, Z. Tang et al., “Bistatic ISAR imaging formation,” Journal of Electronics & Information Technology, vol. 28, no. 6, pp. 969–972, 2006 (Chinese). View at: Google Scholar
 Y. Jiang, S. Sun, T. S. Yeo, and Y. Yuan, “Bistatic ISAR distortion and defocusing analysis,” IEEE Transactions on Aerospace and Electronic Systems, vol. 52, no. 3, pp. 1168–1182, 2016. View at: Publisher Site  Google Scholar
 Z.Z. Gao, Y. Liang, M.D. Xing, and S.H. Zhang, “Analysis of ISAR imagery for bistatic radar,” Systems Engineering and Electronics, vol. 31, no. 5, pp. 1055–1059, 2009 (Chinese). View at: Google Scholar
 S. Wang, C. Fan, and X. Huang, “BP imaging and microDoppler analysis in bistatic ISAR system,” in Proceedings of the 2016 CIE International Conference on Radar, RADAR 2016, China, October 2016. View at: Google Scholar
 Y. Zhang, Y. Zhiping, W. Dongjin et al., “Instant rangedoppler imaging of high speed targets,” Journal of University of Science And Technology of China, vol. 39, no. 9, pp. 954–960, 2009 (Chinese). View at: Google Scholar
 Z.Z. Gao, M.D. Xing, S.H. Zhang, and H.Y. Zhang, “Isar imaging of high speed targets based on LMSF signal,” Journal of Electronics & Information Technology, vol. 30, no. 12, pp. 2813–2817, 2008 (Chinese). View at: Google Scholar
 X. Pan, W. Wang, D. Feng, Y. Liu, Q. Fu, and G. Wang, “On deception jamming for countering bistatic ISAR based on subNyquist sampling,” IET Radar, Sonar & Navigation, vol. 8, no. 3, pp. 173–179, 2014. View at: Publisher Site  Google Scholar
 M. K. Baczyk, P. Samczyński, K. Kulpa, and J. Misiurewicz, “MicroDoppler signatures of helicopters in multistatic passive radars,” IET Radar, Sonar & Navigation, vol. 9, no. 9, pp. 1276–1283, 2015. View at: Publisher Site  Google Scholar
 W. Wang and J. Cai, “A technique for jamming Bi And multistatic SAR systems,” IEEE Geoscience and Remote Sensing Letters, vol. 4, no. 1, pp. 80–82, 2007. View at: Publisher Site  Google Scholar
 X.R. Shi, F. Zhou, B. Zhao, M.L. Tao, and Z.J. Zhang, “Deception jamming method based on microDoppler effect for vehicle target,” IET Radar, Sonar & Navigation, vol. 10, no. 6, pp. 1071–1079, 2016. View at: Publisher Site  Google Scholar
 A. Liu, X. Zhu, and Z. Liu, “ISAR range profile compensation of fastmoving target using modified discrete chirpfourier transform,” Acta Aeronaitica & Astronaitica Sinica, vol. 25, no. 5, pp. 495–498, 2004 (Chinese). View at: Google Scholar
 Q. Hou, Y. Liu, and Z. Chen, “Reducing microDoppler effect in compressed sensing ISAR imaging for aircraft using limited pulses,” IEEE Electronics Letters, vol. 51, no. 12, pp. 937–939, 2015. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2018 ZhengZhao Tang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.