This paper reports a photonics-assisted millimeter-wave (mm-wave) joint radar jamming and secure communication system constructed through a photonic upconversion technique. In the experiments, a 30 GHz constant envelo...This paper reports a photonics-assisted millimeter-wave (mm-wave) joint radar jamming and secure communication system constructed through a photonic upconversion technique. In the experiments, a 30 GHz constant envelope linear frequency-modulated orthogonal frequency division modulation(CE-LFM-OFDM) signal with an instantaneous bandwidth of 1 GHz is synthesized by encoding 1 GBaud encrypted 16-quadrature amplitude modulation(16-QAM) OFDM signal. The velocity deception jamming is achieved with a spurious suppression ratio over 30 dB. Furthermore, we efficiently execute range deception jamming with a time shift of 10 ns. Simultaneously, the encrypted 16-QAM OFDM signal is successfully transmitted over a 1.2 m wireless link, with a data rate of 4 Gbit/s.展开更多
Stepped frequency chirp signal obtains high-resolution radar images by synthesizing multiple narrowband chirp pulses.It has been one of the most commonly used wideband radar waveforms due to its lower demand for radar...Stepped frequency chirp signal obtains high-resolution radar images by synthesizing multiple narrowband chirp pulses.It has been one of the most commonly used wideband radar waveforms due to its lower demand for radar instant bandwidth.In this paper,we propose a radar jamming method using two-dimensional nonperiodic phase modulation against stepped frequency chirp signal imaging radar.Using the unique property of nonperiodic phase modulation,the proposed method can generate high-level sidelobes that perform as a special blanket jamming along both the range and azimuth directions and make the target unrecognizable.Then,the influence of different modulation parameters,such as the code width and duty ratio,are further discussed.Based on this,the corresponding parameter design principles are presented.Finally,the validity of the proposed method is demonstrated by the Yake-42 plane data simulation and measured unmanned aerial vehicle data experiment.展开更多
A modified chaff jamming recognition method of radar is investigated using grey relational analysis( GRA) based on the difference in echo correlation characteristics between a complex rigid target and chaff cloud in...A modified chaff jamming recognition method of radar is investigated using grey relational analysis( GRA) based on the difference in echo correlation characteristics between a complex rigid target and chaff cloud in time domain. Slice method( SM),a novel modeling approach,is proposed to construct an electromagnetic scattering model of chaff cloud in a scenario with slowly moving platform that is targeted. The diffusion characteristics and echo characteristics of the chaff cloud are analyzed. The GRA of a real target and chaff cloud shows that the adjacent return waves have a good correlation for the target but a weak correlation for chaff cloud. Since the correlation degree of chaff cloud's echo is far lower than that of a complex rigid target's,the chaff jamming can be identified by setting a reasonable threshold. Simulation results are presented to verify the effectiveness of this method.展开更多
A simple generation approach for chaotic sequences with Gauss probability distribution is proposed. Theoretical analysis and simulation based on Logistic chaotic model show that the approach is feasible and effective....A simple generation approach for chaotic sequences with Gauss probability distribution is proposed. Theoretical analysis and simulation based on Logistic chaotic model show that the approach is feasible and effective. The distribution characteristics of the novel chaotic sequence are comparable to that of the standard normal distribution. Its mean and variance can be changed to the desired values. The novel sequences have also good randomness. The applications for radar mask jamming are analyzed.展开更多
Tolerance sensitivity limits the practical application of the cross-eye jammer.Previous literature has demonstrated that retrodirective cross-eye jamming with multiple antenna elements possesses the advantage of loose...Tolerance sensitivity limits the practical application of the cross-eye jammer.Previous literature has demonstrated that retrodirective cross-eye jamming with multiple antenna elements possesses the advantage of loose tolerance requirements compared to traditional cross-eye jamming.However,the previous analysis was limited,because there are still some factors affecting the parameter tolerance of the multiple-element retrodirective cross-eye jamming(MRCJ)system and they have not been investigated completely,such as the loop difference,the baseline ratio and the jammer-to-signal ratio.This paper performs a comprehensive tolerance analysis of the MRCJ system with a nonuniformspacing linear array.Simulation results demonstrate the tolerance effects of the above influence factors and give reasonable advice for easing tolerance sensitivity.展开更多
For real-time jamming signal generation in deceiving inverse synthetic aperture radar(ISAR),the target characteristics modulation is always processed in the expensive field programmable gate array(FPGA).Due to the...For real-time jamming signal generation in deceiving inverse synthetic aperture radar(ISAR),the target characteristics modulation is always processed in the expensive field programmable gate array(FPGA).Due to the large computational complexity of the traditional modulating operation,the size and structure of simulated false-target are limited.With regard to the principle of dechirping in range compression of linear frequency modulated(LFM) radar,a novel algorithm named "inverse dechirping" is proposed for target characteristics modulation.This algorithm only needs one complex multiplier in the FPGA to generate the jamming signal when the radar signal is intercepted,which can be obtained by multiplication of radar signal samplings and the equivalent dechirped target echo in the time domain.As the complex synthesis of dechirped target echo can be realized by cheap digital signal processor(DSP) within the interpulse time,the overall cost of the jamming equipment will be reduced and the false-target size will not be limited by the scale of FPGA.Numerical simulations are performed to verify the correctness and effectiveness of the proposed algorithm.展开更多
基金supported by the National Key Research and Development Program of China (No.2022YFB2804502)the National Natural Science Foundation of China (No.62175143)。
文摘This paper reports a photonics-assisted millimeter-wave (mm-wave) joint radar jamming and secure communication system constructed through a photonic upconversion technique. In the experiments, a 30 GHz constant envelope linear frequency-modulated orthogonal frequency division modulation(CE-LFM-OFDM) signal with an instantaneous bandwidth of 1 GHz is synthesized by encoding 1 GBaud encrypted 16-quadrature amplitude modulation(16-QAM) OFDM signal. The velocity deception jamming is achieved with a spurious suppression ratio over 30 dB. Furthermore, we efficiently execute range deception jamming with a time shift of 10 ns. Simultaneously, the encrypted 16-QAM OFDM signal is successfully transmitted over a 1.2 m wireless link, with a data rate of 4 Gbit/s.
基金Project supported by the Natural Science Foundation of Hunan Province,China(No.2022JJ40561)the Scientific Research Program of National University of Defense Technology,China(No.ZK22-46)the National Natural Science Foundation of China(Nos.61890542,62001481,and 62071475)。
文摘Stepped frequency chirp signal obtains high-resolution radar images by synthesizing multiple narrowband chirp pulses.It has been one of the most commonly used wideband radar waveforms due to its lower demand for radar instant bandwidth.In this paper,we propose a radar jamming method using two-dimensional nonperiodic phase modulation against stepped frequency chirp signal imaging radar.Using the unique property of nonperiodic phase modulation,the proposed method can generate high-level sidelobes that perform as a special blanket jamming along both the range and azimuth directions and make the target unrecognizable.Then,the influence of different modulation parameters,such as the code width and duty ratio,are further discussed.Based on this,the corresponding parameter design principles are presented.Finally,the validity of the proposed method is demonstrated by the Yake-42 plane data simulation and measured unmanned aerial vehicle data experiment.
基金Supported by the National Natural Science Foundation of China(61571043)111 Project of China(B14010)
文摘A modified chaff jamming recognition method of radar is investigated using grey relational analysis( GRA) based on the difference in echo correlation characteristics between a complex rigid target and chaff cloud in time domain. Slice method( SM),a novel modeling approach,is proposed to construct an electromagnetic scattering model of chaff cloud in a scenario with slowly moving platform that is targeted. The diffusion characteristics and echo characteristics of the chaff cloud are analyzed. The GRA of a real target and chaff cloud shows that the adjacent return waves have a good correlation for the target but a weak correlation for chaff cloud. Since the correlation degree of chaff cloud's echo is far lower than that of a complex rigid target's,the chaff jamming can be identified by setting a reasonable threshold. Simulation results are presented to verify the effectiveness of this method.
基金This work was supported by the NEW Laboratory Funding under Grant No.w090403.
文摘A simple generation approach for chaotic sequences with Gauss probability distribution is proposed. Theoretical analysis and simulation based on Logistic chaotic model show that the approach is feasible and effective. The distribution characteristics of the novel chaotic sequence are comparable to that of the standard normal distribution. Its mean and variance can be changed to the desired values. The novel sequences have also good randomness. The applications for radar mask jamming are analyzed.
基金the National Natural Science Foundation of China(61801488,61921001,61601008).
文摘Tolerance sensitivity limits the practical application of the cross-eye jammer.Previous literature has demonstrated that retrodirective cross-eye jamming with multiple antenna elements possesses the advantage of loose tolerance requirements compared to traditional cross-eye jamming.However,the previous analysis was limited,because there are still some factors affecting the parameter tolerance of the multiple-element retrodirective cross-eye jamming(MRCJ)system and they have not been investigated completely,such as the loop difference,the baseline ratio and the jammer-to-signal ratio.This paper performs a comprehensive tolerance analysis of the MRCJ system with a nonuniformspacing linear array.Simulation results demonstrate the tolerance effects of the above influence factors and give reasonable advice for easing tolerance sensitivity.
基金supported by the National Natural Science Foundation of China(6127144261401481)
文摘For real-time jamming signal generation in deceiving inverse synthetic aperture radar(ISAR),the target characteristics modulation is always processed in the expensive field programmable gate array(FPGA).Due to the large computational complexity of the traditional modulating operation,the size and structure of simulated false-target are limited.With regard to the principle of dechirping in range compression of linear frequency modulated(LFM) radar,a novel algorithm named "inverse dechirping" is proposed for target characteristics modulation.This algorithm only needs one complex multiplier in the FPGA to generate the jamming signal when the radar signal is intercepted,which can be obtained by multiplication of radar signal samplings and the equivalent dechirped target echo in the time domain.As the complex synthesis of dechirped target echo can be realized by cheap digital signal processor(DSP) within the interpulse time,the overall cost of the jamming equipment will be reduced and the false-target size will not be limited by the scale of FPGA.Numerical simulations are performed to verify the correctness and effectiveness of the proposed algorithm.