Skip to main content

Anti-jamming approach based on radar transmitted waveform matching

Abstract

This study proposes a novel approach to suppress noise jamming and smart jamming. The traditional method of using auxiliary channels to cancel interference requires pure interference samples to calculate weights, which is almost impossible for pulsed interference signals. In this work, to avoid the difficulty of choosing suitable interference samples, we construct the parameterized expected signal according to the time-delay relation between target reflecting echo and transmitted signal. The objective function is established in the form of the minimum mean square error between the recovered signal and the expected signal. The optimization problem is solved by an alternating iteration method. Simulation results demonstrate that the proposed method achieves excellent performance for suppressing noise jamming and smart jamming and is not sensitive to signal-to-noise ratio and jamming-to-noise ratio. The processing results of the measured data show that the method has a certain practical application value.

1 Introduction

The complex electromagnetic interference environment seriously threatens the survival and performance of the radar system [1].

Noise jamming (NJ) is a kind of noise-like signal, which greatly reduces the signal-to-noise ratio (SNR) on hostile radar receivers, making it difficult to detect valuable signals or generate errors [2]. Target detection in the background of noise interference [38] is a basic way to reduce its masking impact. If the interference is much powerful, the receiver will be saturated, and the valuable signal will be completely submerged. It is not very meaningful to apply the detection algorithms in this scenario. Some technical measures have been proposed to eliminate noise jamming in [911]. However, these methods usually rely on mathematical models of interference. Due to the noise-like characteristics of the interference, a slight deviation between the actual interference signal and the ideal model will degrade the performance of the anti-jamming algorithm and even fail. These methods will be limited in practical situations. Besides, the idea of blind source separation is used to separate target signal and interference [12, 13]. The methods based on blind source separation have low requirements on the prior information and improve anti-interference effectiveness to a certain extent. Due to the inherent amplitude and ordering uncertainty of the algorithm, it is necessary to further identify the separated signal properties, which is also the limitation of this series of methods.

Smart jamming [2] is a kind of interference with excellent application prospects. This type of interference can obtain pulse compression (PC) gain and effectively use signal power. There are several methods to suppress smart noise jamming, like fractional domain filtering [14], smeared spectrum [15], atomic decomposition [16] and blind separation [17]. These methods usually rely on prior assumptions on interference delay, frequency shift and other information heavily. From this point, we hope to find a method with fewer prior assumptions, which is more in line with the randomness of the interference scene and can deal with a variety of modulation sequences.

Multi-channel data provides more freedom for adaptive processing. The correlation of multi-channel data can be used to further improve the output SNR and achieve better detection performance [18]. Combining the main channel and the auxiliary channel for filtering is a very effective method to deal with various interferences [17, 19]. Similarly, we propose a novel approach to suppress noise jamming and smart jamming in which two aliased signals are weighted to recover the target. Interference suppression is transformed into the problem of target signal recovery based on radar transmitted waveform matching. The optimization goal is to minimize the mean square error between the recovered signal and the expected signal. The expected signal expression is constructed according to the time-delay relation of target echo and transmitting waveform and is updated continuously during iteration. The alternating iteration method is used to solve the optimization problem and recover the target echo.

Compared with existing methods, the proposed algorithm does not require pure interference signal samples, making it easy to implement. The proposed algorithm can be used to deal with the case of NJ and smart jamming. Flexible modulation of interference parameters does not affect the suppression effect. These advantages make it more suitable for the practical application scenario. Simulation and measured data are used to verify the correctness of the theoretical analyses.

The paper is organized as follows. Section 2 introduces the model of two receiving channels. Section 3 introduces NJ and smart jamming and proposes the algorithm to suppress these two kinds of jamming. In Section 4, simulation results and performance analysis are given. An example of measured data is provided to illustrate the practicability of the proposed method. Finally, Section 5 concludes the paper.

Notations: (·)T denotes transpose operation, (·) denotes complex conjugate operation, (·)H denotes conjugate transpose operation, denotes the convolution operation, denotes the Hadamard product. · denotes the Euclidean norm.

2 Channel model

Radar should tap as much potential as possible based on existing hardware resources to improve the adaptability and survivability in different work scenarios. The polarization difference between the main antenna and the auxiliary antenna is used to realize two independent observation channels. The polarization mode between the auxiliary antenna and the main antenna is orthogonal.

Under the horizontal and vertical polarization basis, the target signal and jamming signal in the main channel can be expressed as

$$ {\mathbf{v_{x}}} = {\mathbf{S}_{\mathrm{p}}}{\mathbf{h}_{\mathrm{m}}} {A_{{\mathrm{m,x}}}} x(t) $$
(1)
$$ {\mathbf{v_{j}}}= {\mathbf{h}_{\mathrm{j}}} {A_{{\mathrm{m,j}}}} j(t) $$
(2)

where x(t),j(t) represent the target scattering waveform and the interference waveform with normalized amplitude 1; hm,hj denote the polarization vector of the radar main antenna and the jammer transmitting antenna; Sp is the polarization scattering matrix of the radar target at the current attitude and current frequency. Am,x,Am,j represent target signal amplitude and jamming amplitude in the main channel considering transmission power, antenna gain, working wavelength, radar cross-section (RCS) and other factors except for the polarization information.

The mixed signal received by the main channel is expressed as:

$$ {y_{1}}(t) = \mathbf{h}_{\mathrm{m}}^{\mathrm{T}} {\mathbf{v_{x}}} + \mathbf{h}_{\mathrm{m}}^{\mathrm{T}} {\mathbf{v_{j}}} + n_{1}(t) $$
(3)

where n1(t) is the Gaussian white noise in the main channel.

Similarly, the polarization vector of the cross-polarization auxiliary antenna is ha. The target signal and jamming signal of the auxiliary channel is decomposed under the polarization basis and expressed as:

$$ {\mathbf{u_{x}}} = {\mathbf{S}_{\mathrm{p}}}{\mathbf{h}_{\mathrm{m}}} {A_{{\mathrm{a,x}}}} x(t) $$
(4)
$$ {\mathbf{u_{j}}} = {\mathbf{h}_{\mathrm{j}}} {A_{{\mathrm{a,j}}}} j(t) $$
(5)

where Aa,x,Aa,j denote target signal amplitude and jamming amplitude in the auxiliary channel.

The mixed signal received by the auxiliary channel is expressed as

$$ {y_{2}}(t) = \mathbf{h}_{\mathrm{a}}^{\mathrm{T}} {\mathbf{u_{x}}} + \mathbf{h}_{\mathrm{a}}^{\mathrm{T}} {\mathbf{u_{j}}}+ n_{2}(t) $$
(6)

where n2(t) is the Gaussian white noise in the auxiliary channel.

3 Suppression method

Interference suppression can be understood as recovering the target echo from the aliased signal or extracting target information through various technical means. The target reflects the radar transmitted signal, and the waveform of the echo signal is consistent with the radar transmitted signal, with time-delay and Doppler information modulation. In this section, this feature of the target echo is used to model the interference suppression problem as finding the minimum mean square error (MMSE) between the recovered signal and the expected signal. An optimized objective function is established.

3.1 Signal model of jamming

In this section, the signal models of NJ, smart jamming are given. NJ has similar characteristics with radar internal noise and completely covers the target echo in the time domain and frequency domain. The implementation of NJ does not require accurate information about the radar working mode.

This article takes radio frequency (RF) noise jamming as an example. RF noise jamming is a narrow-band Gaussian random process, usually generated by filtering and amplifying low-power noise. The interference signal can be expressed as

$$ {J_{n}}(t) = {U_{n}}(t) \exp \left[ {\mathrm{j}} \left({{w_{\mathrm{j}}t + \varphi (t)}} \right) \right] $$
(7)

where, Jn(t) follows the normal distribution, and its envelope function Un(t) follows the Rayleigh distribution; the phase function φ(t) follows the uniform distribution of [0,2π], and is independent of Un(t). The carrier frequency wj is constant and much larger than the spectral width of Jn(t).

In addition to the RF noise jamming, there are other common NJ forms: noise amplitude modulation, noise frequency modulation, noise phase modulation, etc. The proposed anti-jamming method is effective for all of these interference forms, and no specific distinction is made here.

Smart jamming is generated by convolving the radar transmitted signal copy stored in the digital radio frequency memory (DRFM) with a random pulse train, giving the jamming signal the same PC gain as the real target echo and making the jamming power utilized fully. It has both deception and blanket effects.

Assume the transmitted radar signal is s(t). The jammer intercepts the radar signal, and the sample signal is formed after a series of processing [2]. Then, the sample signal is convolved with a random pulse train to obtain a new convolution sequence. The random pulse train is expressed as:

$$ m(t) = \sum\limits_{k = 1}^{K} {{A_{k}}\delta (t - k\Delta t)} $$
(8)

where K represents the total length of the random pulse train, Δt is the sampling time interval, δ(t) represents the Dirac delta function, and Ak is the amplitude of kth shock signal.

The convolution of the random pulse train and the intercepted radar signal yields:

$$ \begin{aligned} {J_{c}}(t) = s(t) \otimes m(t) &= s(t) \otimes \sum\limits_{k = 1}^{K} {{A_{k}}\delta (t - k\Delta t)} \\ &= \sum\limits_{k = 1}^{K} {{A_{k}}s(t - k\Delta t)}. \end{aligned} $$
(9)

Smart noise interference has similar characteristics to target echo. It is a kind of coherent jamming that matches the radar transmitted waveform and can effectively utilize the PC gain. Compared with the traditional noise modulation interference and other non-coherent interferences, smart interference with the same power can form a better effect.

The parameters of the random pulse train determine that smart jamming will have a blanket or deception effect. When the sampling interval of the modulation sequence used by the jammer is less than or equal to the radar sampling interval, convolution noise jamming (CNJ) is formed, and such interference generally exerts a blanket effect. On the contrary, when it is far beyond the radar sampling interval, a train of false targets is produced at the processing output of the victim radar. It is called dense false target jamming (DFTJ).

3.2 Objective function

Assume radar transmits a pulsed linear frequency modulated (LFM) signal. Since the echo signal is processed after being down-converted, the effect of the carrier frequency can be ignored. The complex envelope of transmitted signal can be expressed as:

$$ s(t) = {\text{rect}} \left({\frac{t}{{{T_{\mathrm{p}}}}}} \right)\exp \left({{\mathrm{j}}\pi \mu {t^{2}}} \right),t \in \left({ - \frac{{{T_{\mathrm{r}}}}}{2},\frac{{{T_{\mathrm{r}}}}}{2}} \right) $$
(10)

where Tr is the pulse repetition interval (PRI), Tp is the pulse duration, μ=B/Tp is the chirp rate, and B is the bandwidth of the frequency modulation, which generally satisfy BTp>>1. The function rect(t) has the following form

$$ {\text{rect}} \left({\frac{t}{{{T_{\mathrm{P}}}}}} \right) = \left\{ {\begin{array}{lll} 1&{\left| t \right| \le {\text{\(\scriptstyle {{T_{\mathrm{P}}}}\)} /\text{\(\scriptstyle 2\)}}}\\ 0&{\left| t \right| > {\text{\(\scriptstyle {{T_{\mathrm{P}}}}\)} /\text{\(\scriptstyle 2\)}}} \end{array}} \right.. $$
(11)

Suppose a target with distance R and velocity v, the target echo in ith pulse can be expressed as:

$$ \begin{aligned} {x_{i}}(t) &= {\alpha_{i}}s\left({t - \tau} \right)\exp \left({{\mathrm{j}}2\pi {f_{\mathrm{d}}}\left({t + \left({i - 1} \right){T_{\mathrm{r}}}} - \tau\right)} \right)\\ &= \widetilde {\alpha_{i}}s\left({t - \tau} \right)\exp \left({{\mathrm{j}}2\pi {f_{\mathrm{d}}}t} \right) \end{aligned} $$
(12)

where i=1,2,…,M, M is the pulse number in one correlation processing interval (CPI). τ=2R0/c is the delay corresponding to the distance of the target, \({f_{\mathrm {d}}} = \frac {{2v}}{\lambda }\) is the Doppler frequency corresponding to the velocity, λ denotes wavelength, αi represents target signal amplitude in ith PRT. \(\widetilde {\alpha _{i}} = {\alpha _{i}}\exp \left ({{\mathrm {j}} 2\pi {f_{\mathrm {d}}}\left ({\left ({i - 1} \right){T_{\mathrm {r}}}} - \tau \right)} \right)\). For the target echo in ith pulse, the Doppler information of slow-time domain is contained in complex amplitude \(\widetilde {\alpha _{i}}\). The Doppler information of fast-time domain is contained in the exponential term exp(j2πfdt) which will be ignored in the following derivation.

For the sake of brevity, we omit the sign i. Radar receives the mixed signal of target echo and jamming and an inevitable noise. Design the filter to appropriately weigh the received two-way signal (amplitude and phase weighting) so that the output result of the filter contains the target echo as much as possible. The filter coefficient is a and b. c represents the amplitude information of the target echo. This is equivalent to solving the following optimization problem:

$$ \min \;\;{\left\| {{a}{y_{1}}(t) + {b}{y_{2}}(t) - c{x}(t)} \right\|^{2}} $$
(13)

Before the interference suppression processing is performed on the received signal, the target echo cannot be known, and the above optimization problem cannot be directly solved. This section uses the characteristics of the target echo to transform the form of the objective function and obtain a new optimization problem that is easy to solve.

The signal is transformed to the frequency domain and expressed as a function of frequency. The frequency spectrum of the target signal can be written as:

$$ {X}({e^{{\mathrm{j}}w}}) = S({e^{{\mathrm{j}}w}}) \exp(- {\mathrm{j}}w\tau) $$
(14)

For smart jamming, the frequency spectrum has the following form:

$$ {J}({e^{{\mathrm{j}}w}}) = S({e^{{\mathrm{j}}w}})\sum\limits_{i = 1}^{K} {} \exp (- {\mathrm{j}}w{\tau_{i}}) $$
(15)

Define a characteristic factor in the form of the ratio of the frequency spectrum to characterize the matching relationship between two signals, for target echo,

$$ \left| {\frac{{{X}({e^{{\mathrm{j}}w}})}}{{S({e^{{\mathrm{j}}w}})}}} \right|{\mathrm{ = }}\left| {{e^{- {\mathrm{j}}w\tau }}} \right|{\mathrm{ = }}1 $$
(16)

When K1, this feature of the smart jamming is

$$ \left| {\frac{{{J}({e^{{\mathrm{j}}w}})}}{{S({e^{{\mathrm{j}}w}})}}} \right|{\mathrm{ = }}\left| {\sum\limits_{i = 1}^{K} {} \exp (- {\mathrm{j}}w{\tau_{i}})} \right| \ne 1 $$
(17)

Obviously, the unequal relationship between the characteristic factor and 1 is also valid for NJ. In the following derivation, we ignore noise component n(t) for now and try to recover the target echo x(t) from y(t) based on the difference in the characteristic factor of interference and target echo.

The actual signal will be processed by discrete sampling, so the waveforms of (12) are separately rewritten as a finite-length sequence \(\left \{ {{x_{n}}} \right \}_{n = 1}^{N}\) and \(\left \{ {{s_{n}}} \right \}_{n = 1}^{N}\), expressed as N×1 vector x and s, where N represents the number of effective sampling points in a PRI.

Perform Fourier transform on the two sides of (12)

$$ \sum\limits_{n=1 }^{N} {x(n)} {{\mathrm{e}}^{- {\mathrm{j}} wn}} = {e^{- {\mathrm{j}} wn_{0} }}{\kern 1pt} {\kern 1pt} {\kern 1pt} \sum\limits_{n=1 }^{N} {s(n)} {{\mathrm{e}}^{- {\mathrm{j}} wn}} $$
(18)

where n0 is the index of the range bin corresponding to the target delay, Let

$$ \mathbf{a}_{p}^{\ast} = \left[ {{e^{- {\mathrm{j}} {w_{p}}}} \cdots {e^{- {\mathrm{j}} N{w_{p}}}}} \right] $$
(19)

where wp are the following Fourier frequencies \({w_{p}} = \frac {{2\pi }}{N}p,p = 1, \cdots,N\)

Let A be the following unitary N×N fast Fourier transform (FFT) matrix

$$ {\mathbf{A}^{\ast}} = \frac{1}{{\sqrt N }}\left[ {\begin{array}{l} {\mathbf{a}_{1}^{\ast}}\\ \vdots \\ {\mathbf{a}_{N}^{\ast}} \end{array}} \right] $$
(20)

and introduce an auxiliary vector d, (18) is rewritten as:

$$ {\mathbf{A}^{\ast}}\mathbf{x} = {\mathbf{A}^{\ast}}\mathbf{s} \odot \mathbf{d} $$
(21)

where d=cv, v has the following form

$$ \mathbf{v} = {\left[ {{e^{- {\mathrm{j}} {w_{1}}n_{0} }},{e^{- {\mathrm{j}} {w_{2}}n_{0} }}, \cdots,{e^{- {\mathrm{j}} {w_{N}}n_{0} }}} \right]^{\mathrm{T}} }. $$
(22)

Multiply (As) on both sides of (21), which is equivalent to perform matching operation to LFM signal in frequency domain, i.e.,

$$ ({\mathbf{A}^{\ast}}\mathbf{x}) \odot ({\mathbf{A}^{\ast}}\mathbf{s})^{\ast} = ({\mathbf{A}^{\ast}}\mathbf{s}) \odot ({\mathbf{A}^{\ast}}\mathbf{s})^{\ast} \odot \mathbf{d}. $$
(23)

The waveform y1(t) in the main channel can be expressed as N×1 vector y1, and the waveform y2(t) in the cross-polarization auxiliary channel can be expressed as N×1 vector y2. Using the prior information, the target echo can be recovered from the two aliased signals. To facilitate the derivation of the formula, the time domain aliased signal is converted into the frequency domain.

Perform FFT and frequency-domain matching operation on the two mixed signals separately to obtain

$$ {\mathbf{z}_{\mathbf{1}}} = ({\mathbf{A}^{\ast}}{\mathbf{y}_{\mathbf{1}}}) \odot ({\mathbf{A}^{\ast}}\mathbf{s})^{\ast} $$
(24)
$$ {\mathbf{z}_{\mathbf{2}}} = ({\mathbf{A}^{\ast}}{\mathbf{y}_{\mathbf{2}}}) \odot ({\mathbf{A}^{\ast}}\mathbf{s})^{\ast} $$
(25)

The radar transmitted signal is used as a reference signal. Perform FFT and frequency-domain matching operation on the reference signal in time domain to obtain the frequency-domain reference signal, that is

$$ \mathbf{z} = ({\mathbf{A}^{\ast}}\mathbf{s}) \odot ({\mathbf{A}^{\ast}}\mathbf{s})^{\ast} $$
(26)

A set of coefficients is used to weight the two frequency-domain aliased signals. According to (21), the expected signal is expressed as the Hadamard product of the reference signal spectrum and the auxiliary vector. The variable c controls the amplitude scaling of the reference signal. The optimization function is expressed in the MMSE form between the recovered signal and the expected signal:

$$ O = {\left\| {a{\mathbf{z}_{\mathbf{1}}} + b{\mathbf{z}_{\mathbf{2}}} -c \mathbf{z} \odot \mathbf{v}} \right\|^{2}} $$
(27)

where a, b denote weight coefficient in the main channel and the auxiliary channel.

The traditional methods directly collect some interference samples from the rest area of the radar as the desired signal. The proposed method is significantly different from it, which takes the target echo as the desired signal. In this paper, the algorithm is derived based on the idea of transmitting waveform matching, and its core is to restore the target component without interference sample collection.

3.3 Optimization

The objective function in (27) is the function of a, b, and auxiliary variable c and auxiliary vector v. This is a multivariate optimization problem. Since the expected signal is not completely sure and needs to be obtained through auxiliary vector v, the optimal solution of a and b cannot be found directly. It should be noted that the modulus of the auxiliary vector v is always equal to 1 during optimization. This is equivalent to apply a constant modulus constraint to v and causes the problem (27) to non-convex.

In this section, an alternating iteration method is proposed to solve the optimization problem. Both the expected signal and the weighting coefficients are updated in the process of objective function optimization constantly.

Firstly, for given a, b and c, v making the objective function optimal is immediate, let

$$ \mathbf{u} = \left({a{\mathbf{z}_{\mathbf{1}}} + b{\mathbf{z}_{2}}} \right) \odot \left({1/c\mathbf{z}} \right) $$
(28)

Consider constant modulus constraint on v, the optimal

$$ \mathbf{v} = \exp \left({{\mathrm{j}} \arg \left(\mathbf{u} \right)} \right) $$
(29)

where arg(·) denotes argument of a complex number.

Then, fix b, c and v to optimize a. When these three variables are fixed, the analytic solution of the optimal a can be obtained directly. Differentiate O with respect to a

$$ \frac{{\partial O}}{{\partial a}} = a{\mathbf{z}_{\mathbf{1}}}^{\mathrm{H}} {\mathbf{z}_{\mathbf{1}}} - {\mathbf{z}_{\mathbf{1}}}^{\mathrm{H}} \left(c{\mathbf{z} \odot \mathbf{v} - b{\mathbf{z}_{2}}} \right) $$
(30)

Let (30) equal to 0 to get the optimal a

$$ a = \frac{{{\mathbf{z}_{\mathbf{1}}}^{\mathrm{H}} \left(c{\mathbf{z} \odot \mathbf{v} - b{\mathbf{z}_{2}}} \right)}}{{{\mathbf{z}_{\mathbf{1}}}^{\mathrm{H}} {\mathbf{z}_{\mathbf{1}}}}} $$
(31)

Similarly, fix a, c and v to optimize b

$$ b = \frac{{{\mathbf{z}_{2}}^{\mathrm{H}} \left(c{\mathbf{z} \odot \mathbf{v} - a{\mathbf{z}_{\mathbf{1}}}} \right)}}{{{\mathbf{z}_{2}}^{\mathrm{H}} {\mathbf{z}_{2}}}} $$
(32)

Fix a, b and v to optimize c

$$ c = \frac{({\mathbf{z} \odot \mathbf{v}})^{\mathrm{H}} \left(a{\mathbf{z}_{\mathbf{1}}} + b{\mathbf{z}_{2}} \right)}{\left({\mathbf{z} \odot \mathbf{v}}\right)^{\mathrm{H}} \left({\mathbf{z} \odot \mathbf{v}}\right)} $$
(33)

The flow for the cyclic local minimization of the MMSE metric in (27) can be summarized as follows.

Step 0: Set the a, b and c to some initial values;

Step 1: Compute v for a, b and c fixed [see (28), (29)];

Step 2: Compute a for b, c and v fixed [see (31)];

Step 3: Compute b for a, c and v fixed [see (32)];

Step 4: Compute c for a, b and v fixed [see (33)];

Iteration: repeat Steps 1–4 until a prespecified stop criterion is satisfied, e.g. a(i)a(i+1)ε,b(i)b(i+1)ε,a(i),b(i) are the values obtained at the ith iteration, ε is a predefined threshold, such as 10−6. In addition, if the algorithm reaches the maximum iteration number, the optimization process should stop immediately.

At the end of iteration, inverse fast Fourier transform (IFFT) operation is performed on the weighted signal to obtain the final output signal:

$$ {\mathbf{y}} = {\mathbf{A}}\left(a_{\mathrm{o}}{\mathbf{z}_{\mathbf{1}}} + b_{\mathrm{o}}{\mathbf{z}_{2}} \right) $$
(34)

where ao,bo denote the final output of a and b after optimization. After IFFT operation, the signal is converted from frequency domain to time domain for subsequent target detection and parameter estimation.

3.4 Summary

The flow chart of the method presented in this paper is shown in Fig. 1. A LFM radar also needs to do FFT and IFFT operation on the received signal when performing conventional PC processing. The computational burden of the proposed algorithm is mainly for the iterative optimization of several variables. Only simple matrix addition and multiplication are involved.

Fig. 1
figure 1

Flowchart of the proposed algorithm

It can be seen from (16) and (17) that the constant modulus constraint of the auxiliary vector v makes the recovered signal match the target feature as much as possible, while eliminating the interference signal.

For moving targets, the Doppler frequency is very critical information. It plays a vital role in subsequent target recognition and tracking. We hope to retain the Doppler information of the target while suppressing jamming. According to the previous analysis, the Doppler information in the slow-time domain is reflected in the parameter c and participates in the optimization process, while fast-time domain information is ignored in the derivation. The received data contains complete fast-time domain Doppler information that is not corrupted by the product of the received data vector and a scalar. The method proposed in this paper restores the target echo without losing the Doppler information. The conclusion will be reflected in the processing results of the measured data in Section 5.

In the above derivation, we directly ignore the noise component, which is very reasonable in the scenario with high SNR or jamming-to-noise-ratio (JNR). Considering various application scenarios, we discussed the situation where noise cannot be ignored relative to the target component and the interference component. In all PRI sampling points, the target echo only occupies a part, and (21) is valid only at these points. For the points without target echo (noise or noise plus interference only), the optimization objective function in (27) is meaningless to them. These points can disrupt the target recovery process to some extent. In practice, instead of sampling all the points for processing, some points within a certain range gate are taken. This operation reduces the energy of the disturbance component and weakens the negative influence of noise on the target signal recovery.

4 Results and Discussion

In this section, we present numerical studies to illustrate the performance of the proposed algorithm. The performance is evaluated from two aspects. The first metric is the ability of the algorithm to suppress jamming. The second metric is the ability of the algorithm to recover the target echo.

NJ and smart jamming are used to verify the robustness of the proposed algorithm. The characteristics of jamming signals are described as follows:

A complex Gaussian random sequence with zero mean and variance of 1 was used to simulate NJ. NJ is a kind of continuous-wave whose duration is much longer than the transmitting pulse width of radar.

Smart jamming is generally implemented in the form of a pulse, and the duration is related to the length of the convolution sequence. The simulation of smart jamming includes two scenarios. The Gaussian distribution random sequence with zero mean and variance of 1 is used to convolve with a copy of the transmitted signal stored in DFRM to generate CNJ. Affected by the difference of sampling period between jammer and radar, the other kind of smart jamming forms several false range targets at the radar receiver with long intervals. The sequence used to gain DFTJ consists of 0 and 1. The elements 1 lie in the [1, 101, 201, 301, 401, 501, 601, 701]th indexes and 0 lie in others. The length of the sequence used to obtain CNJ and DFTJ is equal to the pulse width of the radar signal.

Assume the polarization vector of the main antenna hm=[1,0.05]T; the polarization vector of the cross-polarization auxiliary antenna ha=[0.05,1]T; the polarization scattering matrix of the target \({\mathbf {S}_{\mathrm {p}}}=\frac {1}{{2}}\left [ {\begin {array}{*{20}{c}} 1.0&{0.4\mathrm {j}}\\ {-0.4\mathrm {j}}&{ 0.9} \end {array}} \right ]\); the polarization vector of the jammer’s transmitting antenna \({\mathbf {h}_{\mathrm {j}}}=\frac {1}{{\sqrt 2 }}{\left [ {1,\mathrm {j}} \right ]^{\mathrm {T}} }\); Both of the channel noise in the main channel and the auxiliary channel are modeled by complex Gaussian distribution with zero mean and variance \(\sigma _{n}^{2}=1\), and independent of each other.

4.1 Simulation for jamming suppression

In this section, the results of traditional PC and the proposed algorithm to suppress jamming are compared.

We set up a specific application scenario. Assume radar transmits a pulsed LFM signal, and the relevant waveform parameters are displayed as follows: the pulse duration is 10 μs, the bandwidth is 40 MHz, and pulse repetition period is 200 μs. The sampling frequency is 80 MHz.

In practical applications, the radar signal processor only does the digital sampling of signals within a certain range gate, rather than on the entire PRT. In the simulation, 1600 points near the range gate of the target are taken. For interference with a long duration, complete interference samples are not taken, which will not affect the target recovery.

Define SNR as \( 20\log \left ({\mathbf {h}_{\mathrm {m}}^{\mathrm {T}}{\mathbf {S}_{\mathrm {p}}}{\mathbf {h}_{\mathrm {m}}}{A_{{\mathrm {m,x}}}}} / {\sigma _{n}^{2}}\right)\), JNR as \( 20\log \left ({\mathbf {h}_{\mathrm {m}}^{\mathrm {T}}{\mathbf {h}_{\mathrm {j}}}{A_{{\mathrm {m,j}}}}} / {\sigma _{n}^{2}}\right)\). Adjust Am,x and Am,j to change the SNR and JNR (refer to SNR and JNR of the main channel unless otherwise specified), and set Aa,x equal to Am,x, and Aa,j equal to Am,j.

Assume the target is located in the 6051st range bin. NJ covers 15,000 range bins from 1001st to 16,000th. CNJ and DFTJ located in the 6000th range bin. In this scenario, we use the proposed method to recover the target echo. The sampling process starts at the 5900th point. For comparison, we also plot the result of the ideal case which means no interference.

Set the iteration stop threshold ξ=10−6, and the maximum iteration number is 1000. Set the initial values of a=1,b=1,c=1.

Figure 2 shows the final output of the traditional PC and the proposed jamming suppression algorithm in NJ scenario. NJ is a kind of incoherent interference, and there is no gain in PC processing. Effective NJ has certain requirements for interference power. We set SNR as 5dB and JNR as 20 dB. It can be seen that before interference suppression, high-power NJ drowned the target echo, and the base noise level of radar is raised with no target output. After interference suppression, the target echo is successfully recovered. Compared with the ideal case, the range bin where the target is located remains consistent, and there is almost no SNR loss.

Fig. 2
figure 2

Contrast between the traditional PC and the proposed algorithm to suppress jamming in the NJ scenario. (SNR = 5 dB, JNR = 20 dB). a Traditional PC. b The proposed algorithm

Figure 3 shows the results in CNJ scenario. We set SNR as 5 dB and JNR as 15 dB. After PC, the CNJ appears as false targets occupying continuous range bins. When the real target is located in the false target group, the radar cannot detect the real target. CNJ jamming plays the dual role of deception and blanket. After interference suppression, the false target group disappears, while the real target is preserved completely.

Fig. 3
figure 3

Contrast between the traditional PC and the proposed algorithm to suppress jamming in the CNJ scenario. (SNR = 5 dB, JNR = 15 dB). a Traditional PC. b The proposed algorithm

Figure 4 shows the results in DFTJ scenario. The input SNR and JNR are consistent with the CNJ scenario. After PC, DFTJ presents as multiple false targets. Each false target is located at a certain range cell, and the real target can be detected, but it is difficult to distinguish the true target from the false targets. After the interference suppression, only the real target is retained, and there is no need to identify the true or false target.

Fig. 4
figure 4

Contrast between the traditional PC and the proposed algorithm to suppress jamming in the DFTJ scenario. (SNR = 5 dB, JNR = 15 dB). a Traditional PC. b The proposed algorithm

The simulation results show that the proposed method can achieve the two metrics mentioned above.

Figure 5 shows the convergence of the optimization algorithm. In the figure, ‘NJ-10’ represents the simulation result when JNR is 10 dB under the background of NJ. The other symbols have a similar meaning and are not tautological here. When JNR = 10 dB, the algorithm reached the optimal value after 300 iterations. When JNR = 20 dB, the algorithm stopped iteration after reaching the maximum iteration number 1000. The higher the JNR is, the slower the convergence speed is.

Fig. 5
figure 5

Cost function in iteration process (SNR = 5 dB, JNR = 10 dB or JNR = 20 dB)

4.2 Performance analysis

In this section, a set of experiments are designed to show the performance of the proposed algorithm under different SNR. Adjust Am,x to change the SNR from − 12dB to 8dB in the scenario where JNR is 10 dB, 15 dB, and 25 dB, respectively, the echo was processed with the proposed method, and the signal-to-jamming and noise ratio (SJNR) before and after interference suppression was calculated as an evaluation index.

Considering the requirement for radar to process real-time data with high speed, the maximum iteration number was set as 300 in the subsequent simulation.

The final output signal in time domain is used to calculate the SJNR, the range bin where the target is located (152nd point in the output sequence) is used to calculate the signal power. For NJ, take points from 250th to 1200th in the output sequence as interference samples to calculate the power of interference and noise. For CNJ, take points from 250th to 850th as samples. For NJ and CNJ, SJNR determines whether the target can be detected normally. For DFTJ, SNR determines whether the target is detected or not, and JNR determines whether the false target is valid. The interference power is calculated by [101, 201, 301, 401, 501, 601, 701, 801]th points, the noise power is calculated by points from 1200th to 1500th, and the maximum value of the two is taken as the power of interference plus noise to calculate SJNR. The difference between the actual SJNR and the ideal SJNR can be understood as the JNR with the residual false target. Statistical results are obtained from 500 Monte Carlo experiments.

Figures 6, 7, and 8 show how the output SJNR change with the input SNR, before and after suppression of the three kinds of interference, respectively. In the figure, “PC-only-10” represents the SJNR value of the signal processed only by traditional PC when JNR is 10dB, “proposed-10” represents the SJNR of the signal processed by the proposed algorithm when JNR is 10dB, and so on with the other symbols. It can be seen from Figs. 6 and 7 that the output SJNR after NJ and CNJ suppression can almost reach the ideal condition without interference under different SNR and JNR. The simulation results in Fig. 8 show a 3–4 dB SNR loss after DFTJ suppression, which can be interpreted as JNR of the residual false target is 4 dB, and valid false targets cannot be formed at the detection result. It is reasonable to think DFTJ suppression is successful. It is proved that the proposed method can suppress the three interference effectively.

Fig. 6
figure 6

The output SJNR under different input SNR in the NJ scenario

Fig. 7
figure 7

The output SJNR under different input SNR in the CNJ scenario

Fig. 8
figure 8

The output SJNR under different input SNR in the DFTJ scenario

For the scenario with high SNR, the 300 iterations may not achieve the optimal effect, but it can be seen from Figs. 6, 7, and 8 that the impact of this problem on the results can be completely ignored.

4.3 Measured data

In this section, the effectiveness of the proposed method is verified by radar measured data. The jamming in the data is NJ. The transmitted signal is LFM with a pulse duration of 24 μs, and bandwidth of 85 MHz. Three thousand points were collected at a sampling frequency of 100 MHz. Figure 9 shows the real part of the original and the recovered signal in one PRI. The recovered signal is the result of inverse matched filtering to the output of the proposed algorithm. Coherent integration is done with 24 pulses at the same beam position. Figures 10 and 11 show the result of coherent integration. Before and after interference suppression, the target is in the same Doppler channel, which verifies the interference suppression process does not lose Doppler information of the target. Figure 12 shows the slice of according Doppler channel, the signal processed only by PC and processed by the proposed algorithm are compared in the same axis. After interference suppression, the SJNR gain is 13dB. It can be concluded from the figure that the proposed method can suppress this batch of jamming effectively.

Fig. 9
figure 9

Real part of the original signal and the recovered signal

Fig. 10
figure 10

Coherent integration output of signal processed only by traditional PC

Fig. 11
figure 11

Coherent integration output of signal processed by the proposed algorithm

Fig. 12
figure 12

Doppler channel slice corresponding to the target velocity

5 Conclusion

In this paper, the method for suppressing NJ and smart jamming is studied based on radar transmitted waveform matching. The signal extraction problem is converted into an optimization problem, and the optimal weighting coefficients are obtained by optimizing the objective function iteratively. By weighting the two aliased signals in main channel and cross-polarization auxiliary channel, the target signal can be recovered successfully, which is very close to the ideal performance in the non-interference scenario. The proposed method can suppress the jamming and retain the real target signal component simultaneously, overcome the disadvantage of poor versatility of the suppression method and reduce the adverse effects caused by the loss of echo information during the suppression process. The results of the measured data indicate that the method is effective in practice. The optimization algorithm only needs about 300 iterations to achieve a good interference suppression effect and will not bring too much computational burden for radar signal processing.

It should be concerned that due to the limitation of the number of independent observation channels, this method can only cope with one interference source. However, the proposed idea of constructing a reference signal based on the radar transmitted signal can be transferred to a multi-channel scenario such as a digital array radar to deal with multiple interference sources.

Availability of data and materials

Not applicable.

Abbreviations

NJ:

Noise jamming

SNR:

Signal-to-noise ratio

PC:

Pulse compression

RCS:

Radar cross-section

MMSE:

Minimum mean square error

RF:

Radio frequency

DRFM:

Digital radio frequency memory

CNJ:

Convolution noise jamming

DFTJ:

Dense false target jamming

LFM:

Linear frequency modulated

CPI:

Correlation processing interval

PRI:

Pulse repetition interval

FFT:

Fast Fourier transform

IFFT:

Inverse fast Fourier transform

JNR:

Jamming-to-noise ratio

SJNR:

Signal-to-jamming and noise ratio

References

  1. N. Li, Y. Zhang, A survey of radar ECM and ECCM. IEEE Trans. Aeros. Electron. Syst.31(3), 1110–1120 (1995).

    Article  Google Scholar 

  2. D. C. Schleher, Electronic Warfare in the Information Age (Artech House, the Unites States, 1999).

    Google Scholar 

  3. D. Orlando, A novel noise jamming detection algorithm for radar applications. IEEE Signal Process. Lett.24(2), 206–210 (2017).

    Article  Google Scholar 

  4. V. Carotenuto, A. De Maio, D. Orlando, L. Pallotta, Adaptive radar detection using two sets of training data. IEEE Trans. Signal Process.66(7), 1791–1801 (2018).

    Article  MathSciNet  Google Scholar 

  5. A. Aubry, V. Carotenuto, A. De Maio, D. Orlando, Coincidence of maximal invariants for two adaptive radar detection problems. IEEE Signal Process. Lett.23(9), 1193–1196 (2016).

    Google Scholar 

  6. A. De Maio, D. Orlando, Adaptive radar detection of a subspace signal embedded in subspace structured plus gaussian interference via invariance. IEEE Trans. Signal Process.64(8), 2156–2167 (2016).

    Article  MathSciNet  Google Scholar 

  7. S. Ahmed, Product-based pulse integration to combat noise jamming. IEEE Trans. Aeros. Electron. Syst.50(3), 2109–2115 (2014).

    Article  Google Scholar 

  8. S. Ahmed, Novel noncoherent radar pulse integration to combat noise jamming. IEEE Trans. Aeros. Electron. Syst.51(3), 2350–2359 (2015).

    Article  Google Scholar 

  9. M. Sun, B. Tang, Noise amplitude modulation jamming signal suppression based on weighted-matching pursuit. J. Syst. Eng. Electron.20(5), 962–967 (2009).

    Google Scholar 

  10. D. Du, B. Tang, A high performance algorithm of noise amplitude modulation interference suppression based on frequency domain cancellation. J. Electron. Inf. Technol.29(3), 557–559 (2007).

    Google Scholar 

  11. X. Dai, H. Li, J. Ren, N. Wang, Parameters estimation of noise amplitude modulation signal. IET Radar, Sonar Navigat.11(1), 161–170 (2016).

    Google Scholar 

  12. S. Guo, W. Jun, G. Chen, J. Wang, Mainlobe interference suppression based on independent component analysis in passive bistatic radar. IET Signal Process.12(9), 1193–1201 (2018).

    Article  Google Scholar 

  13. M. Ge, G. Cui, X. Yu, D. Huang, L. Kong, in 2018 IEEE Radar Conference (RadarConf18). Mainlobe jamming suppression via blind source separation (IEEEOklahoma City, 2018), pp. 0914–0918.

    Chapter  Google Scholar 

  14. J. Ren, P. Wang, Novel smart noise jamming suppression method based on smeared spectrum. Prog. Electromagn. Res. Lett.67:, 81–88 (2017).

    Article  Google Scholar 

  15. B. Han, X. Yang, X. Wu, S. Li, Smart noise jamming suppression method based on fast fractional filtering. J. Eng.2019(19), 6201–6205 (2019).

    Article  Google Scholar 

  16. Z. Zhang, Y. Wu, J. Ren, K. Dong, in 2017 3rd IEEE International Conference on Computer and Communications (ICCC). Smart noise jamming suppression by using atomic decomposition, (2017), pp. 1377–1380.

  17. W. Yu, W. Chen, Smart noise jamming suppression technique based on blind source separation. Int. J. Sig. Process. Syst.7(1), 14–19 (2019).

    Article  MathSciNet  Google Scholar 

  18. W. Liu, J. Liu, C. Hao, Y. Gao, Y. -L. Wang, Multichannel adaptive signal detection: Basic theory and literature review. Sci China Inf Sci (2021). https://doi.org/10.1007/s11432-020-3211-8.

  19. L. Griffiths, C. Jim, An alternative approach to linearly constrained adaptive beamforming. IEEE Trans. Antennas Propag.30(1), 27–34 (1982).

    Article  Google Scholar 

Download references

Acknowledgements

Not applicable.

Funding

This work was supported by the National Defense Science and Technology Foundation Strengthening Program (2019-JCJQ-ZD-067-00).

Author information

Authors and Affiliations

Authors

Contributions

Xiaoying Chen found the idea and wrote this article and Baixiao Chen put forward some constructive suggestions for revision. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Baixiao Chen.

Ethics declarations

Ethics approval and consent to participate

Not applicable.

Consent for publication

Not applicable.

Competing interests

The authors declare that they have no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, X., Chen, B. Anti-jamming approach based on radar transmitted waveform matching. EURASIP J. Adv. Signal Process. 2021, 59 (2021). https://doi.org/10.1186/s13634-021-00776-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13634-021-00776-w

Keywords