Abstract

Frequency hopping (FH) communication technology is adopted widely in military and civil fields, due to its excellent communication characteristics such as antisearch and anti-interference. Efficient reconnaissance methods of FH communication are becoming a research hotspot. In this paper, a novel reconnaissance approach for FH communication emitters is proposed, by using the TMDA protocol behavior identification. Based on the signalling used in the TDMA protocol, the protocol behavior for FH communication can be specified. These behaviors are usually used for the process controlling of FH communication and network maintenance. Therefore, recognition of FH communication protocol behaviors can be used for emitter intention reasoning indirectly. Simulation results show that the proposed approach is effective and potential for application.

1. Introduction

Frequency hopping (FH) communication is an important application of spread spectrum communication, which was widely used in both military and civil affairs [15]. Due to its excellent anti-interference ability, as well as its capability to increase the security of wireless services, FH has been implemented diffusely, e.g., in Bluetooth [6], advanced extremely high-frequency (AEHF) communication satellites [7], Military Strategic and Tactical Relay (MILSTAR) communication satellites [8], and emerging dynamic communication systems [9]. FH communication proves practical in various radiofrequency systems, and it is developing toward faster hopping speed and higher hopping-frequency bandwidth, which will strengthen the original advantages of FH communication in both military and civil applications.

Meanwhile, due to a wide application in military fields, the activities of FH communication emitters gradually become an important source of information in electronic reconnaissance. However, advanced FH technology has brought great challenges to electronic countermeasures. Wider bandwidths, more complex frequency variations, along with many other factors further complicate the electromagnetic spectrum, increasing the difficulty of extracting effective information. Therefore, many researchers have devoted efforts to spectrum cognition in complex electromagnetic environments [1014]. The cognition process, which is an integral section for the awareness of complex situations, connects the perception of signals with decision making process [1519].

Electromagnetic countermeasures in a complex electromagnetic environment necessitate not only the analysis of the signal but also the cognition of communication emitter behaviors, such as broadcast, relay, and link establishment. Specifically, various parameters of FH signals and control signalling used in protocols manifest the behavior of communication emitters. Therefore, the identification of protocol behaviors can be a novel approach information retrieval for electronic countermeasures. If the mapping relation between signals and the behavior of the FH communication emitter can be successfully established, it would provide a tremendous positive impact on future communication countermeasures. However, to our best knowledge, the research on frequency hopping communication signals mainly lies in the reconnaissance of frequency hopping communication signals, including signal detection, interception, sorting, and parameter estimation [2023], few on the cognition of radiation source target.

Against this background, this paper proposes a new scheme for electromagnetic countermeasures based on FH communication signals, that is, through signal processing technology, according to the electromagnetic signal law formed by the radiation source target performing specific functions, the behavior and related task information of the radiation source target can be recognized. The proposed method solves two main problems, i.e., the positioning of the signalling signal and the identification of the signalling signal, by using noncooperative signal blind demodulation and machine learning.

The rest of this paper is organized as follows. Section 2 presents the system model. Section 3 introduces the positioning of the signalling signal. Section 4 presents the recognition of the radiation source target behavior, followed by performance evaluation in Section 5. Finally, Section 6 concludes this paper.

2. System Model

In this research, we propose a new scheme for communication emitter reconnaissance. We consider a frequency hopping communication system in the VHF band. There are two important models to be built in the system. One is the time frame sequence model of FH communication. The other is the radiation source target model of FH communication.

The time frame sequence model of FH communication is built based on the TDMA communication protocol, which is complete, representative, and widely used in many kinds of frequency hopping communication equipment, such as frequency hopping radio. Besides, the method proposed in this paper is generalizable to recognition under other protocols. Therefore, it is assumed that a TDMA protocol is adopted in the FH communication system, where there exist nodes in the network. In a super time frame (STF), each node has a time frame (TF) for transmitting, and each time frame contains 14 time slots (TS). In this protocol, the frequency hopping rate of the radio communication is 64000/105 hops/sec, namely, 64000 frequency hops within 105 seconds. The time for 40 frequency hops is defined as a time slot, and 140 bytes are transmitted within the duration of a time slot.

A time slot is divided into three parts: synchronization sequence, data, and control sequence. From the 0th to 7th hops, the Walsh synchronization sequence is transmitted, which is used for time slot synchronization. From the 8th to 37th hops, the information data sequence is transmitted for radio communication, which includes signalling sequence and voice data sequence. Within the last 2 hops, the control sequence is transmitted, which is used for transmit-receive switching, information proofreading and protection.

The time slot types in a time frame are generally divided into three types: fixed time slot type (fixed slot (FS)), static time slot type (static slot (SS)), and dynamic time slot type (dynamic slot (DS)). The fixed time slot type refers to the time slot that is permanently occupied by a certain node. Generally, the first time slot of a frame is the fixed time slot fixedly occupied by the central node. The static time slots refer to the time slots that are fixedly allocated to certain nodes in a time frame. The allocation of the static time slots in different time frames is different. The dynamic time slots refer to the time slots that can be reserved and occupied by any node, that is, the occupancy of time slots is dynamically allocated. The allocation formula for static and dynamic time slots in each time frame is as follows:

Static time slots (SS):

Dynamic time slots (DS): where denotes the time slot number; denotes the time frame number in a superframe, and the value is ; denotes the static time slot number in a time frame, and the value is ; denotes the number of nodes in the network; and denotes the dynamic time slot number in a time frame, and the value is .

We assume that the protocol in this research is conflict free, where only the node with the time slot occupancy can send data in the time slot, while other nodes cannot send and can only be in the receiving state.

In order to match the encoding rate of the voice encoder in the frequency hopping radio communication system, one-way unidirectional voice data transmission needs to occupy two time slots in a time frame. Two time slots form a group, and 8 dynamic time slots are divided into 4 groups. The 4 groups are called reserved time slots, which are used to transmit voice data.

Signalling is used in the communication protocol to establish and remove communication links and transmit voice data. According to the different functions, signalling can be divided into three types: time slots reservation control signalling (AC), reservation links control signalling (RC), and voice data transmission signalling (RD). The three types of signalling include 11 specific signalling types, and each signalling has a length of 19 bits, including 8-bit long feature codes and 11-bit long signalling content. The voice transmission types in the protocol are generally divided into three types: unicast direct voice transmission, relay voice transmission, and broadcast voice transmission. Among them, unicast direct voice transmission can be divided into unicast one-way voice transmission and unicast bilateral voice transmission; relay voice transmission can be divided into relay one-way voice transmission and relay bilateral voice transmission. Each transmission type corresponds to a different signalling transfer process, which is also the theoretical basis for us to realize the target behavior recognition of the radiation source based on the signalling signal.

So far, we can achieve time-frame sequence modeling, the schematic diagram of the time-frame sequence model is shown in Figure 1.

The target modeling of the frequency hopping communication radiation source is realized based on the composition and working principle of the frequency hopping communication system. The composition and working principle of the frequency hopping communication system are shown in Figures 2 and 3.

In the transmitter, the baseband signal is digitally modulated to generate the corresponding modulation signal , and the frequency synthesizer is controlled by the FH sequence generator to synthesize the local oscillator signal of the corresponding frequency. The local oscillator signal can be expressed as where denotes the center frequency of transmitter and denotes the FH interval of the frequency synthesizer.

The modulated signal is then mixed with the local oscillator signal to obtain the transmitted signal whose frequency hops with time:

During transmission, there are other frequency interferences and noise in the channel at this time, and the FH signals transmitted by other network stations in the FH communication system . Therefore, the mixed signal that reaches the receiver part is

In the case of FH synchronization at the receiver part, the local oscillator frequency synthesized by the frequency synthesizer has the same hopping rule as the transmitter part and there is always an intermediate frequency difference between the local oscillator frequency at the transmitter part and the receiver part. The local oscillator frequency synchronously generated by the frequency synthesizer at the receiver part is , where is the center frequency, , is an integer that changes over time, and is the FH interval of the frequency synthesizer.

Mixing the received signal with the local oscillator signal of the receiver can get

If the transmitting and receiving parts maintain a high degree of synchronization, the transmitted signal is substituted into the above formula to obtain

In order to extract the intermediate frequency signal carrying the relevant information of the modulation signal in the above formula, we can use the intermediate frequency filtering method to extract the intermediate frequency signal and filter out other interference signals. Therefore, the useful signal component obtained by intermediate frequency filtering is

Then, the intermediate frequency signal is sent to the intermediate frequency mixer to obtain the information modulated signal . The modulated signal is demodulated and decoded to obtain the source information it carries.

3. Signalling Signal Location

In order to identify the behavior of the FH communication emitter, the signalling information should be extracted. Because signalling is usually used for link control, such as establishment, supervision, and teardown, the technical route of the entire implementation method is shown in Figure 4.

According to the TDMA communication protocol mentioned, the signallings are at the beginning of the time slot sequence. Therefore, in order to recognize the kind of signalling through signalling signal accurately, signalling signal location is necessary. Otherwise, the length of signal input to CNN is too long, and the recognition accuracy cannot be guaranteed. Therefore, to extract the signalling information, the signalling should be located first. Signalling location can be realized in two steps: frame length estimation and frame structure analysis. The frame structure analysis is to determine the location of signalling according to the frame length estimation result. After the location of signalling is determined, the signalling signal location is realized combining the relevant parameters of the intermediate frequency signal.

3.1. Frame Length Estimation

Frame structure analysis refers to the following: For noncooperative communication systems, through intercepted communication signals, to obtain the greatest understanding of the time frame encapsulation structure used by the communication system to transmit information. To achieve frame structure analysis of noncooperative signals, the first thing to achieve is to accurately estimate the length of the time frame.

Since most of the frame header sequences in communication systems are sequences with good autocorrelation or cross-correlation characteristics, the sequence length between two frame headers can be regarded as the length of a frame. Thereby, the autocorrelation search algorithm can be used to find the frame header sequence, and then, the length of frame can be estimated.

In this paper, a simple and convenient estimation approach is adopted for frame length based on cyclic autocorrelation. The algorithm realization schematic diagram is shown as in Figure 5.

The input of this algorithm is the 0-1 bit stream data obtained after the noncooperative signal is demodulated, and the output is the curve corresponding to the cyclic autocorrelation result. Cyclic autocorrelation is to perform autocorrelation processing after the sequence is cyclically shifted. Because the beginning of the time frame is generally a synchronous sequence, which has good autocorrelation and cross-correlation characteristics. So, periodic spikes will appear in the cyclic autocorrelation results. The peak appearance period corresponds to the length of the time frame. So the average correlation peak distance can be calculated according to the position of correlation peak, and then, the estimation of the frame length can be realized. The corresponding formula of the frame length estimation algorithm for cyclic autocorrelation is where is the sequence of the frame length to be estimated, is the result of point cyclic shift of , is the autocorrelation result of the sequence and , and the values of and are ; , where is the length of the sequence.

3.2. Frame Structure Analysis

After the frame length estimation is realized, the next step is to analyze the frame structure according to the frame length estimation result. The algorithm used is a frame structure analysis algorithm based on cumulative filtering. The basic principle of this algorithm is based on the similarity of the frame structure in each frame and the similar content of the frame header. The symbol stream data recovered by demodulation is accumulated in the unit of frame length, so as to realize the analysis of the frame structure. The schematic diagram of the algorithm principle is shown in Figure 6.

Based on the above processing steps, the length of a time frame, the number of time slots in a time frame, the length of a time slot, the position of the time slot in a time frame, and the beginning sequence length of the time slot are determined through the above processing. Based on this information obtained, the possible position of the signalling sequence is determined, and the carrier frequency, symbol rate, and other parameters related to the signal are combined to realize the location and interception of the signalling signal in the dehopping signal.

4. Signalling Recognition

Machine learning has a good performance in many types of recognition, because it can extract features from the input training data and reduce the incompleteness caused by artificial settings. The convolutional neural network (CNN) is a widely used machine learning structure. CNN is a feed-forward neural network whose artificial neurons can respond to surrounding units within a certain coverage area. In this paper, our network input is signalling signals, which are fixed-length time series. Since one-dimensional CNN has higher recognition accuracy when processing signals in large length, it is chosen for the recognition of signalling signals in this paper. Using the three characteristics of CNN (local perception, weight sharing, and maximum pooling), we can realize the type recognition of signalling signals. Figure 7 shows the basic principle of one-dimensional convolution.

After the feature map is obtained, in order to further refine the features, pooling technology is also used. Similar to the two-dimensional convolution technology, methods such as maximum pooling and average pooling are also used in one-dimensional convolution. Besides, before using the pooling technique, an activation function is also needed to increase the nonlinear factor.

After the refined features are obtained, the flatten method or the global average pooling method is also used to turn many feature maps into a feature vector so that the classification function can be used to classify the samples. The flatten method is to connect all the elements of each feature map to a single neuron. The principle is shown in Figure 8.

Although the flatten method looks simple, it has a big problem, namely, the amount of calculation. When the number and scale of feature maps are very large, adding a fully connected layer will increase the number of model parameters dramatically. In order to solve this problem, the global average pooling method can be used.

The global average pooling method is to form a feature vector by the average value of the elements in each feature map and then send the obtained feature vector to the classification function to obtain the classification result of the sample. Because the global average pooling method obtains the average value of each feature map without using a fully connected layer, it saves a lot of computing resources. The principle diagram of the global average pooling method is shown in Figure 9.

Before the data is input to the neural network, the data needs to be preprocessed. The main purpose of preprocessing is to reduce the dimensionality of the input signal data, making it easier to be processed by the neural network, while maintaining the information in the original signal, and improving the accuracy of network classification and recognition. Our convolutional network processes fixed-length signal sequences, so we need to perform fixed-length interception when intercepting signalling signals to make them have a uniform length. At the same time, the intercepted signals can be sampled at intervals to reduce the data dimension. If not preprocessed, the dimensionality of the input signal data will be quite large, which may contribute to long training time and low accuracy of network recognition. Therefore, the input of network is preprocessed IF signal which is converted from frequency hopping signal after dehopping and have a uniform length, while the output of network is the signalling type of the communication protocol. The one-dimensional CNN network structure is shown in Figure 10. And the structural parameters of the network are shown in Table 1.

5. Protocol Behavior Identification

During the positioning and recognition of signallings, types and time of arrival of signallings can be obtained. Next step is to identify the behavior of the emitter based on the signalling used. A schematic diagram of time slot signalling transmission of each node in the voice transmission process is shown in Figure 11.

The time slots allocation of each node is different, and the occupancy of the node time slots in voice transmission is also different. At the same time, because the communication protocol supports two unidirectional voice transmissions at the same time, the time slot signallings between nodes are interleaved and mixed together. Therefore, it is more difficult to recognize the behavior of the emitter directly based on the time slot signalling types of all nodes in the entire network. It is necessary to further divide and intercept the time slot signallings based on the nodes participating in the communication. The specific division and interception steps are as Algorithm 1:

nodes of the network
→number of time slot signalling of the node
→SOR signalling search results
→UCL signalling search results
for do
 for do
  , search the SOR signalling
  , search the UCL signalling
  if find the SOR signalling then
   
  end
  if find the UCL signalling then
   
  end
 end
end
determine the central node and the calling node of voice transmission
based on
determine the called node of voice transmission based on
divide the three nodes(the calling node, the called node, and the central node)
for →the calling node number do
 for do
  , search the SOF signalling
   if find the SOF signalling then
   
   end
  end
end
based on ,
intercept all the middle time slot signallings of the three nodes

The results obtained by dividing the time slot signalling are shown in Figures 12 and 13.

Based on the characteristic signalling in the time slot signallings, the type of the emitter voice transmission is temporarily determined and then calculated the chronological matching degree between the intercepted time slot signallings and the theoretical signalling combination and use it as the correct identification rate of the emitter behavior. The calculation formula of the chronological matching degree is as follows:

In the above formula, is the consistency between the time slot signalling type and the theoretical signalling type in the voice transmission process; if they are consistent, is 1; otherwise, it is 0; and is the total number of theoretical signallings from the beginning to the end of a voice transmission process.

The calculation of matching degree can guarantee high accuracy in protocol behavior recognition despite multiple signalling recognition results being incorrect. Even though multiple signalling recognition results are incorrect, we can still calculate the chronological matching degree, which is used as the correct identification rate of the protocol behavior. And by comparing the correct identification rate of different protocol behaviors, we can choose the maximum of them to ensure high accuracy in protocol behavior recognition.

6. Experiment and Analysis

In this section, we achieve frame length estimation and frame structure analysis using related algorithms, then achieve signalling signal positioning and interception based on the analysis results, and finally achieve the emitter behavior identification based on the signalling signal identification results.

Firstly, we consider a FH communication network with 8 nodes, including 1 master node and 7 ordinary nodes. It is assumed that the transmission of information between nodes follows the aforementioned FH radio TDMA networking protocol, and the digital modulation mode of baseband signal is MSK (minimum shift keying), which is a modulation method having good performance and widely used in communication systems. The relevant parameter settings for signalling signal simulation are shown in Table 2.

Next, we estimate the length of the time frame using cyclic autocorrelation, and the simulation results of the algorithm are shown in Figure 14. Periodic spikes appear in the cyclic autocorrelation results, with the continuous increase of the cyclic shift length. There are multiple secondary peaks between the highest spikes.

The results of the algorithm in Figure 14 are partially enlarged, and the distance between the highest peaks and the second peaks can be measured more accurately, as shown in Figure 15. Taking the average of multiple measurements of the peak distance in the amplified cyclic autocorrelation results, the distance between the highest peaks is about 15680, and the distance between the second peaks is about 1120, which is exactly consistent with the hypothetical communication protocol, indicating that the simulation results of the algorithm are completely correct.

Then, based on the estimation result of the time frame length, we achieve the analysis of the frame structure using the cumulative filtering algorithm, and the simulation result of the algorithm is shown in Figure 16. It can be found that there is a periodic structure inside the time frame. The number of the periodic structure in a time frame is about 14, which is in full compliance with the hypothetical communication protocol.

Similarly, the analysis result of the frame structure is further partially enlarged to more accurately determine the length of the periodic structure and the length of the initial sequence. The analysis result of the partially enlarged frame structure is shown in Figure 17. In the time frame analysis result, the length of the periodic structure is about 1240, and the length of the beginning sequence is about 224. Based on this, the position of the signalling sequence in the time frame is determined, and the positioning and interception of the signalling signal is realized combining the signal-related parameters.

After that, we identify the intercepted signalling signals using the convolutional neural network to obtain the signalling type of each signalling signal. The variation of the recognition accuracy of the 12 signalling signals with the signal-to-noise ratio is shown in Figure 18. The average recognition accuracy of 12 types of signalling is calculated to be 95.2% according to the single signalling recognition accuracy under the condition of single signal-to-noise ratio. In addition, we made statistics on the misidentification of each signalling signal under the condition of single signal-to-noise ratio. It is found that identification confusion among several types of signalling signal is prone to occur, and error detection and correction of signalling signal recognition can be realized based on this.

At the same time, the stability and robustness of the neural network have been verified. We have generated signals in different lengths by other digital modulation methods to verify the stability and robustness of the neural network. The digital modulation methods include BPSK, FSK, ASK, and MSK. The accuracies of signal recognition for the four modulation methods are all above 90% on average, and longer signal data can also be well recognized by the neural network, which indicate the stability and robustness of the neural networks we used in this paper.

At last, we realize the behavior recognition of the emitter by logical inversion according to the protocol, based on the recognition result of the signalling signal. Figure 19 shows the average recognition accuracy of the signalling signal and the emitter behavior under the condition of 0-15 dB signal-to-noise ratio. It can be seen from the figure that when the signal-to-noise ratio is 3 dB, the average behavior recognition accuracy has reached over 85%.

7. Conclusions

Based on the existing related technologies and theories of frequency hopping communication, this paper focuses on solving the two major technical problems of signalling signal positioning and signalling signal recognition. Finally, by identifying the type of the time slot signalling signal, the FH communication emitter behavior recognition is realized. This paper is oriented to the intelligent reconnaissance needs of FH communication stations and explores the cognitive mechanism and methods of the FH communication emitter behavior. According to the electromagnetic signal law formed by the FH communication emitter performing specific functions, the method of identifying the behavior of the emitter based on the signalling signal identification is studied. This paper focuses on the realization of key technologies such as signalling signal positioning and interception and signalling type recognition, lays a foundation for the emitter cognition of related information such as the behavior and tasks in complex electromagnetic environments, and is of great significance to improve the intelligent countermeasures in the electromagnetic spectrum domain.

Data Availability

The data used in this study is generated by simulation according to frequency hopping communication TDMA protocol. The [MAT] data used to support the findings of this study are included within the manuscript.

Conflicts of Interest

The authors declare that they have no conflicts of interest