 Research
 Open access
 Published:
Antiinterruptedsampling repeater jamming method based on frequency agility waveform and sparse recovery
EURASIP Journal on Advances in Signal Processing volume 2024, Article number: 55 (2024)
Abstract
Interruptedsampling repeater jamming (ISRJ) is a type of intrapulse coherent jamming that poses a significant threat to radar detection and tracking of targets. This paper proposes an ISRJ suppression method based on frequency agile waveform and sparse recovery, starting from the temporal discontinuity and modulation characteristics of ISRJ. This method is particularly suitable for scenarios with high jamming duty ratio (JDR) and high jammer sampling duty ratio (SDR). By dividing the transmitted waveform into subpulses with different carrier frequencies and applying a tworound block sparse algorithm, the method accurately recovers three parameters of ISRJ, achieving effective jamming identification, reconstruction, and cancellation. Additionally, a target detection technique based on robust sparse recovery is proposed, significantly improving the stability and accuracy of target detection. Comparative experimental results conducted in three scenarios confirm the effectiveness and superiority of this method under high JDR and SDR conditions.
1 Introduction
In modern electronic warfare, radar’s antijamming ability plays a pivotal role in determining combat effectiveness and achieving information superiority [1,2,3]. Digital radio frequency memory (DRFM) technology allows jammers to accurately intercept and replicate radar signals quickly. In intermittent sampling storage mode, DRFM can repeatedly transmit jamming slices within the current pulse repetition period (PRI), creating intrapulse coherent interruptedsampling repeater jamming. Leveraging the coherence characteristics of pulse compression (PC) radar and the high Doppler tolerance of wideband signals, ISRJ appears as a false target cluster on the range profile, with a primary false target and symmetric secondary ones, achieving both blanket and deceptive jamming effects [4, 5]. Currently, ISRJ is widely employed in electronic countermeasures. Compared with traditional jamming, ISRJ is more difficult to counter with current methods like intrapulse waveform agility [6, 7] and multicarrier frequency phase encoding [8] than traditional jamming, highlights the need to research and develop of effective antijamming strategies.
To address the challenges posed by ISRJ, scholars have developed a series of countermeasures. Due to the flexibility and diversity of ISRJ, there is currently no unified classification method for these measures. However, they can generally be divided into two main categories: active counterstrategies and passive counterstrategies. The passive strategies focus on signal processing at the receiver end. Within this category, time–frequency (TF) analysis stands out as an effective method. It helps distinguish the target signals from ISRJ by analyzing their differences in the time and frequency domains. Chen et al. analyzed the time–frequency characteristics of the target echo after stretching, introducing the maxTF function for jammingfree period extraction and a smoothing filter for jamming elimination [9]. Wei et al. proposed an efficient filter for extended targets based on time–frequency analysis for ISRJ suppression [10]. Based on the concept of reconstructioncancellation, Zhou et al. used TF analysis to estimate jamming slices number and forwarding times, allowing iterative jamming component cancellation [11]. Meng et al. used TF analysis and Hilbert transform to estimate sampling pulse width and intervals, further calculating sampling and forwarding times [12]. Chen et al. applied TF analysis to distributed radar systems, identifying jamming and extracting data for adaptive beamformer training. [13]. The TF analysis method’s limitation emerges under high jamming duty ratio. In this case, obtaining jammingfree periods proves to be particularly challenging, leading to a substantial decrease in the accuracy of jamming parameter estimation. While collaborative spatial processing can mitigate the effects of high JDR to some extent, the deployment of a distributed radar system necessitates additional resources. Based on time–frequency analysis, several derivative signal processing methods have been developed to counter ISRJ. Han et al. first used shorttime fractional Fourier transform to initially locate the jamming fragments, further refined the jamming edges through differential filtering and deconvolution, thus improving the parameter estimation accuracy [14]. Yuan et al. designed the energy function to detect the jammingfree period, and used a specific filtering method to suppress ISRJ [15]. However, the performance of the two methods significantly decreases with weaker jamming intensity. Chen et al. designed a neural network filtering method to improve the extraction accuracy of jammingfree periods [16]. However, this method cannot cope with high JDR situations. Wu et al. developed an efficient ISRJ identification method based on integral decomposition [17], focusing on energy distribution differences. While successful in realtime radar applications, its effectiveness against strong jamming is constrained by its postCFAR implementation.
Active antijamming strategies that combine waveform design and signal processing show great promise. Shen et al. compared ISRJ performance of different waveforms, showing stepped frequency and linear frequency modulation waveforms yield similar jamming, while random frequency waveforms, in direct forwarding, create only one false target, with effectiveness declining with more subpulses [18]. Dai et al. analyzed downchirp and upchirp’s quasiorthogonal properties to design an orthogonal waveform, identifying ISRJ false targets by comparing peak positions [19]. However, this is effective only in direct forwarding. Zhou et al. developed a phase codingbased adaptive transmission scheme that dynamically suppresses ISRJ by estimating jammer position and duration with jamming perception, and optimizing the waveform using a genetic algorithm [20]. Liu et al. designed an intrapulse agile waveform to enhance the distinction between ISRJ and targets, combining fractional Fourier transform and filter design to suppress ISRJ [21]. However, the above four methods are less effective under intense jamming conditions. Zhang et al. utilized segmented LFM pulse orthogonality to achieve the sorting of jamming and targets [22]. They further designed an LFM waveform with intrapulse Costa frequency stepped, which effectively reduced the jamming bands and jamming harmonics caused by segmented pulse compression [23]. However, this method cannot cope with the high SDR of the jammer. In summary, although various strategies have achieved certain results against ISRJ, each has limitations and specific application scenarios. Most methods recognize targets and ISRJ primarily in the time–frequency domain, which is a limited approach. This is particularly evident when the target and ISRJ overlap in the time domain, as the inability to discern target periods covered by jamming based solely on TF information forces the discarding of target echo segments contaminated by jamming. This significantly reduces the processing gain of subsequent PC for target identification, leading to poor performance in subsequent target recognition and jamming suppression stages. Especially in scenarios with high JDR and high jammer SDR, these methods suffer from a more severe decline in performance. Therefore, it is necessary to explore more efficient and robust strategies to effectively counter ISRJ.
In recent years, some scholars have successfully applied sparse recovery algorithms for antijamming and target identification, making some progress [24,25,26,27]. The central premise is that, even within complex electromagnetic environments, target signals can be accurately or approximately represented in specific transform domain with minimal basis vectors. Radar systems can detect the sparsity characteristics of these signals in the transform domain, enabling the effective separation of the target from jamming signals, ensuring stable target detection and tracking. However, current antijamming approaches based on sparse recovery still face challenges. The low signaltonoise ratio (SNR) before PC complicates the stable recovery of target parameters. Furthermore, while designing dictionary matrices, most methods primarily focus on the waveform of real target, often simplistically treating the jamming slice as target echo with short pulse width. This approach overlooks the incompleteness of the ISRJ waveform caused by interrupted sampling in DRFM. Such an oversight can led to difficulties in accurately representing jamming echo sparsely, especially when the number of jamming slices is excessive, rendering the initial assumptions of sparsity no longer valid [28]. Moreover, few techniques consider designing radar transmission waveform at the transmission end, leading to dictionary matrices that often do not satisfy the restricted isometry property (RIP) [29], compromising the stability of sparse recovery.
To this end, this paper proposes an ISRJ suppression method with intrapulse frequency agility, based on sparse recovery. Given that the intensity of ISRJ in actual scenarios is usually higher than that of real targets, the recoverability of ISRJ in sparse domains is more stable. Therefore, our work focuses on accurate recovery of jamming parameters. The method includes the following steps: First, divide the transmit pulse into multiple subpulses, and destroy the correlation between each subpulse through carrier frequency agility. This involves designing a dictionary matrix that satisfies the RIP, enabling effective sparse representation of both the target and ISRJ. Secondly, the received data undergo a sparse representation of delayfrequency to extract the modulation delay and frequency information from the DRFM. Based on this information, the block delayslicing dictionary is designed and updated. Finally, based on the sparse recovery results in the two domains of delay and slice, the jamming characteristics of ISRJ are identified and the jamming data is reconstructed to achieve the purpose of suppressing ISRJ. Furthermore, to address the potential impact of residual jamming on target recognition, we propose a robust method for the sparse representation of targets in the range domain. In contrast to traditional approaches, we have optimized the adaptive selection of regularization parameters, significantly improving the method’s practicality. Combining this method with the PC results after jamming suppression can further enhance target recognition accuracy. Experimental results show that our method can effectively suppress ISRJ. Particularly, our method demonstrates stable antiISRJ performance when both the JDR and the total jammer SDR exceed 90%.
The structure of the paper is organized as follows. In Sect. 2, the signal model is introduced. In Sect. 3, an improved ISRJ parameter recovery and suppression method is proposed. In Sect. 4, numerical simulation experiments are presented to verify the effectiveness and analyze the performance. Finally, Sect. 5 presents some conclusions and discusses future work.
2 Signal model
2.1 Principle of ISRJ
The basic principle of ISRJ is shown in Fig. 1. When the DRFM operates in intermittent sampling storage mode, reconnaissance and jamming are performed alternately, with the jammer antenna operates asynchronously. The jammer first intercepts and samples the signal emitted by the radar. According to the research by Oliver [30], the current leading DRFM performance specifications are approximately an internal bandwidth of 800 MHz and 10 to 12 bits of ADC and DAC sampling at a frequency of 2000 MHz. This ensures highfidelity sampling of radar emission signals by the DRFM. The jammer then retransmits the current sampled signal, continuing this process until the radar pulse transmission ceases. Assuming the jammer samples using a rectangular pulse sequence, the sampling timing can be specifically expressed as:
where \(L\) represents the jammer sampling times. \(T_{{\text{s}}} = {\tau \mathord{\left/ {\vphantom {\tau L}} \right. \kern0pt} L}\) is the time interval of intercepted slices, and \(\tau_{{\text{j}}}\) is the jammer sampling pulse width. Generally, \(\tau_{{\text{j}}}\) remains fixed.
Assume that the radar transmits signal is \(s\left( t \right)\), and there is a moving target with a radial velocity of \(v_{s}\) at the distance \(R_{s}\) from the radar. Then, the target signal echo can be expressed as:
where \({{\tau_{s} = 2R_{s} } \mathord{\left/ {\vphantom {{\tau_{s} = 2R_{s} } c}} \right. \kern0pt} c}\) represents the real target delay and \(c\) is the speed of light. Correspondingly, the intercepted signal slices can be expressed as:
The study in [31] reveals that by modulating the jamming slices with a fixed positive frequency, DRFM is able to change the position of the jamming peak after PC. This technique allows for the generation of advanced false target jamming, making it unreliable to distinguish between real and false targets based solely on timedelay. In light of this situation, the subsequent discussion in this paper is based on the assumption that the jammer modulates a fixed frequencyshift onto all jamming slices of the same forwarding within a single PRI. These modulated jamming slices are then continuously forwarded by the jammer K times, and thus, the forwarded signals from the jammer can be expressed as follows:
where \(f_{{\text{F}}}\) represents the modulation frequency, and \(\tau_{{\text{F}}}\) is the forwarding delay of the jammer.
By comparing (2) and (4), it can be seen that the modulation of radar signals mainly consists of three domains. Firstly, there is slice modulation: the intercepted signal slices contain only part of the subpulses of the original emitted signal, and our interest lies in identifying the specific positions of these subpulses in the original emitted signal. Secondly, timedelay modulation is involved: If the jammer does not apply additional modulation delay to the intercepted signal slices, then all the slices forwarded by the jammer on its \(k{\text{th}}\) forwarding within a single PRI can be considered as a composite signal, with the timedelay between these composite signals exactly equal to the jammer sampling pulse width \(\tau_{j}\). Lastly, there is frequency modulation: compared to the corresponding subpulses in the original emitted signal, the jamming subpulses exhibit a fixed modulation frequencyshift. Moreover, the Doppler caused by the radial movement of the target or jammer is also considered a form of frequency modulation. Therefore, by accurately estimating these three parameters, we can precisely reconstruct the jamming waveform. This discussion provides the possibility for effectively suppressing ISRJ from the perspectives of jamming reconstruction and cancellation.
2.2 Intrapulse frequency agile waveform
Traditionally, the radar system emits linearfrequency modulation pulse with large timebandwidth product to achieve high Doppler resolution and longrange detection. In order to design the dictionary matrix that satisfies the recoverable conditions, in this research, the LFM pulse is divided into \(M\) subpulses. By modulating the carrier frequency of these subpulses, the frequency bands between subpulses are staggered, and the subpulses are approximately orthogonal. Different from the traditional step frequency, the carrier frequency of the subpulse is not stepped sequentially, but arranged randomly. Therefore, the transmitted signal can be expressed as follows:
where \(\tau_{{\text{sub}}}\) represents the subpulse width, \(f_{0}\) refers to the carrier frequency. \(c_{m}\) is the frequency modulation code, \(\Delta f\) is the step size of the carrier frequency. The transmitted signal is shown in Fig. 2. The reasons for adopting intrapulse frequency agile waveform will be discussed in detail in 3.4. In fact, we primarily take advantage of the ambiguity function characteristics of this type of waveform. As shown in Fig. 3, there is a significant difference between the ambiguity functions of stepped frequency LFM waveform and agile frequency LFM waveform. As mentioned in [22], the ambiguity function of the stepped frequency resembles a ‘slanted knifeedge’, indicating the presence of coupling between range and frequencyshift. In contrast, the ambiguity function of the agile frequency is closer to the ideal pushpin shape, showing lower sidelobe levels in both the zerodelay plane and the zerofrequency plane.
Therefore, the target echo after downconversion received by the radar can be expressed as:
and the jamming echo after downconversion can be expressed as:
When the sampling slice of the jammer happens to contain several complete subpulses, Eq. (7) can be simplified to:
Therefore, the complete received echo \(x\left( t \right)\) can be expressed as:
where \(n\left( t \right)\) represents the white Gaussian noise.
3 Proposed method
3.1 Sparse recovery of ISRJ timedelay and frequencyshift
According to the analysis in Sect. 2.1 and 2.2, under the premise that the subpulse width is much shorter than the DRFM sampling pulse width, both the target echo and ISRJ can be regarded as a collection of partial transmitted signal subpulses modulated by timedelay and frequencyshift. In other words, the specific forms of the target and jamming echo can be determined by three parameters: timedelay, frequencyshift and the subpulse sequence number. If the jammer frequencyshift can be accurately estimated, then it is possible to extract the other two key parameters of ISRJ using sparse recovery techniques on the delayslice plane, thereby effectively achieving jamming identification.
Based on the previous assumptions, all slices belonging to the same forwarding from the jammer have the same amount of frequency modulation within a single PRI. Thus, the jamming echo can be regarded as multiple synthetic signals equivalent to the number of forwarding \(K\). For the two most common jamming modes: intermittent sampling direct forwarding and intermittent sampling repeated forwarding, to ensure strong coherence between the jamming echo and the real target echo, the jammer usually forwards each intercepted signal slice no more than 3 times. This implies that the sampling duty ratio of the jammer,which is also the duty ratio of the synthesized signal is at least 25%. Therefore, when estimating the frequencyshift parameter, these synthetic signals can be considered as target echoes that have undergone frequency shift modulation at different time delays. Additionally, these echoes only present as a few scatter points on the delayfrequency plane, exhibiting significant sparsity. Consider all possible timedelays and frequencyshifts in the echo, we assume that all timedelays are concentrated in \(\left[ {\tau_{\min } ,\tau_{\max } } \right]\). By sampling it at an interval of \(\Delta \tau\), the number of atoms in the timedelay domain is \(N = {{\left( {\tau_{\max }  \tau_{\min } } \right)} \mathord{\left/ {\vphantom {{\left( {\tau_{\max }  \tau_{\min } } \right)} {\Delta \tau }}} \right. \kern0pt} {\Delta \tau }} + 1\). Similarly, all frequencyshifts are concentrated in \(\left[ {f_{\min } ,f_{\max } } \right]\). By sampling it at an interval of \(\Delta f\), the number of atoms in the frequencyshift domain is \(J = {{\left( {f_{\max }  f_{\min } } \right)} \mathord{\left/ {\vphantom {{\left( {f_{\max }  f_{\min } } \right)} {\Delta f}}} \right. \kern0pt} {\Delta f}} + 1\). Thus, for the received \(P\) snapshots from \(t_{1}\) to \(t_{P}\), the following block model can be used for sparse representation:
where \({\mathbf{X}} = \left[ {x\left( {t_{0} } \right),x\left( {t_{1} } \right), \cdots ,x\left( {t_{P} } \right)} \right]^{\text{T}}\) is the received data, \({\mathbf{N}} = \left[ {n\left( {t_{1} } \right),n\left( {t_{2} } \right), \cdots ,n\left( {t_{P} } \right)} \right]^{\text{T}}\) is the noise data. \({{\varvec{\upalpha}}} \in {\mathbb{R}}^{NJ}\) represents the unknown coefficient vector, which can be expressed as follows:
where \({{\varvec{\upalpha}}}_{n}\) represents the \(n^{th}\) block of \({{\varvec{\upalpha}}}\).
Furthermore, the block dictionary matrix \({{\varvec{\Psi}}} \in {\mathbb{C}}^{P \times NJ}\) can also be expressed as a concatenation of column blocks \({{\varvec{\Psi}}}_{n} \in {\mathbb{C}}^{P \times J}\):
where \(\Psi_{n} \left[ q \right]\) is the \(q^{th}\) column of \({{\varvec{\Psi}}}_{n}\). \(\Psi_{n} \left[ q \right]\) is designed as the waveform atom corresponding to timedelay \(\tau_{n} = \tau_{\min } + \left( {n  1} \right)\Delta \tau\) and frequencyshift \(f_{q} = f_{\min } + \left( {q  1} \right)\Delta f\). Referring the transmitted signal shown in (5), it is designed as follows:
Although the window function in (13) may appear dissimilar to the function in (8), in reality, the former can be represented as a superposition of several instances of the latter. Therefore, employing the dictionary in Eq. (12) enables an accurate sparse representation of the jamming echo.
The structure of \({{\varvec{\Psi}}}\) is shown in Fig. 4.
From (10), the coefficient vector \({{\varvec{\upalpha}}}\) can be recovered by solving the following problem:
where \(\left\ {{\varvec{\upalpha}}} \right\_{2,0} = \sum\nolimits_{n = 1}^{N} {I\left( {\left\ {{{\varvec{\upalpha}}}_{n} } \right\_{2} > 0} \right)}\), \(I\left( \cdot \right)\) represents the indicator function. To solve the NP hard problem like (14), it is usually approximated as the following problem in practice:
where \(\left\ {{\varvec{\upalpha}}} \right\_{2,1} = \sum\nolimits_{n = 1}^{N} {\left\ {{{\varvec{\upalpha}}}_{n} } \right\_{2} }\). In 2010, Eldar proposed the block orthogonal matching pursuit (BOMP) algorithm [32], which is a fast solution to the above block sparsity problem. Typically, after the sparse reconstruction is completed, we can observe the target signal in the delayfrequency plane. The frequency shift of the target signal is usually zero, or equal to the Doppler frequency. Moreover, the jamming signal is composed of \(K\) synthesized signals of the same frequency modulation amount, and they appear as a few scattering points with the same frequency shift. The delay interval of these scattering points is equal to the sampling pulse width of the jammer. Therefore, by using the BOMP algorithm, the peak value generated by the jamming signal can be accurately located. The timedelay set \(\tau_{Jam} \in {\mathbb{C}}^{K \times 1}\) and the frequencyshift amount \(f_{Jam}\) of the jammer synthetic signals can be effectively extracted.
3.2 Sparse recovery of ISRJ timedelay and subpulse
In the delayfrequency recovery process described in 3.1, we have determined the frequency shift modulation amount of the jammer. Despite this, the specific sequence numbers of each subpulse in the jamming echo are still unknown, which makes the specific forwarding mode of the jamming unclear. Therefore, in this section a more indepth delayslice sparse recovery of the jamming signal will be performed using the known information about the amount of jammer frequency modulation. The implementation of this recovery process is based on the following two core condition:

(i)
Since all subpulses from the same forwarding share the same timedelay, the subpulses in the received echo occupy only a limited number of timedelay blocks. This number is determined by the number of forwarding from the jammer plus the number of targets. Based on this, we can achieve a sparse representation of the jamming signal on the delaysubpulse plane.

(ii)
In practical scenarios, the intensity of the target echo is often lower than the noise intensity, which makes it more difficult to identify the delay block containing the target echo. However, the intensity of the interfering signal fragments usually exceeds that of the target signal, which means that the interfering subpulses are easier to detect and locate on the delaysubpulse plane, thus making the parameter estimation of the interfering subpulses more accurate.
Therefore, the delayslice block sparse model can be constructed as:
where \({{\varvec{\upbeta}}} \in {\mathbb{R}}^{NM}\) represents the coefficient vector, which can be expressed as:
where \({{\varvec{\upbeta}}}_{n}\) represents the \(n^{th}\) block of \({{\varvec{\upbeta}}}\).
Similarly, the block dictionary matrix \({{\varvec{\Phi}}} \in {\mathbb{C}}^{P \times NM}\) can also be expressed as the concatenation of column blocks \({{\varvec{\Phi}}}_{n} \in {\mathbb{C}}^{P \times M}\):
where \(\Phi_{n} \left[ m \right]\) is the \(m^{th}\) column of \({{\varvec{\Phi}}}_{n}\). The structure of \({{\varvec{\Phi}}}\) is shown in Fig. 5.
The setting of \({{\varvec{\Phi}}}\) is similar to \({{\varvec{\Psi}}}\), but the difference is that the atoms within the block are set to correspond to different subpulses under the block delay. Therefore, \(\Phi_{n} \left[ m \right]\) is designed as the waveform atom corresponding to timedelay \(\tau_{n} = \tau_{\min } + \left( {n  1} \right)\Delta \tau\) and the \(m^{th}\) subpulse. However, this design does not consider the influence of frequencyshift. Using the timedelay and frequencyshift information of the jamming synthetic signal obtained in 3.1, the waveforms of the subpulses in the timedelay block where the jamming echo is located can be corrected in batches. Therefore, \(\Phi_{n} \left[ m \right]\) can be expressed as follows:
Similar to (15), the solution of \({{\varvec{\upbeta}}}\) can be transformed into the following problem:
After applying the BOMP method to solve the block sparse problem, the jamming slices can be identified on the recovered delayslice plane according to the following characteristics:

(i)
Target echo The target echo contains all subpulses in the transmitted signal. The timedelay of these subpulses is equal to the real target timedelay. Therefore, on the delayslice plane, the target echo appears as a continuous envelope. This continuous envelope is formed due to the ability of the target echo to retain the timeintact structure of the transmitted signal.

(ii)
Jamming echo On the contrary, because the jamming slices belonging to the same forwarding have the same timedelay modulation amount, the jamming echo appears as \(K\) discontinuous envelopes on the plane. The JDR of these discontinuous envelopes is equal to the sampling duty ratio of the jammer. In addition, the energy of jamming signal is usually significantly stronger than the background noise, making the jamming echo more conspicuous on the plane.

(iii)
Noise In contrast, noise appears on the delayslice plane as a scattered envelope distributed over the entire block, with an irregular amplitude distribution, thereby contrasting with target echo and jamming echo.
In summary, if the duty ratio of a block is between 20 and 60%, and its energy is significantly higher than the noise level, then the recovered subpulses on the block can be considered to correspond to ISRJ.
3.3 Jamming cancelation and target extraction
Based on the estimated timedelay and subpulse sequence number of ISRJ, all subpulses in each jamming block can be reconstructed and integrated into \({{\varvec{\Theta}}}\), by which ISRJ can be linearly represented. The jamming amplitude vector \({{\varvec{\upgamma}}}\) can be calculated by LS (linear solution):
Although there is a slight error in the estimation of jamming amplitude, this does not prevent the effective suppression of most jamming slices. After the jamming cancellation is completed, only sporadic jamming fragments remain in the received echo, further enhancing the waveform difference between the jamming echo and the radar transmitted waveform. Such changes mean that the jamming echo cannot approximate the original transmit waveform through simple timedelay modulation. In addition, the energy of these residual jamming slices is weakened but still higher than the target echo, and can be treated as a stronger noise signal during processing.
Thus, the remaining signal \({\hat{\mathbf{x}}}\) can be expressed as:
It can be seen that the real target is still submerged in strong noise after jamming suppression. Although this kind of noise exhibits the characteristics of color noise, its waveform is still significantly different from the echo waveform of the real target. In addition, real targets show sporadic and discontinuous distribution characteristics in the timedelay domain. Therefore, we propose to transform the real target detection problem into a sparse recovery problem by sparsely representing the processed echo signal in the timedelay domain. The corresponding sparse model can be expressed as:
where \(\xi\) is the coefficient vector. \({\hat{\mathbf{\Phi }}} \in {\mathbb{C}}^{P \times N}\) represents the timedelay dictionary matrix, which can be expressed as:
which is actually the sum of atoms in \({{\varvec{\Phi}}}_{n}\). The design of \({\hat{\mathbf{\Phi }}}\) does not consider the influence of the Doppler effect, because the phase change caused by the Doppler frequency within a single PRI is small, and the impact on the waveform envelope is negligible.
In 2016, Chen et al. proposed the adaptive regularized smoothing l0 norm algorithm (AReSl0) [33, 34]. This method is specifically designed to handle robust sparse recovery problems such as (23). The core idea is to use the Gaussian function family to approximate the discontinuous l0 norm, thus transform solving (23) into an optimization problem with constraints. According to the philosophy of this method, the coefficient vector \(\xi\) can be reconstructed by solving the following problem:
where \(F_{\sigma } \left( \xi \right) = \sum\limits_{i = 1}^{N} {f_{\sigma } \left( {\xi_{i} } \right)}\). In fact, \(f_{\sigma }\) can be any family of functions that approaches the KroneckerDelta function, such as the family of Gaussian functions. \(\varepsilon\) represents the noise level.
A small \(\sigma\) results in multiple local maxima for \(F_{\sigma } \left( \xi \right)\), which makes it difficult to apply the steepest descent method to find the global optimal solution. Fortunately, \(F_{\sigma } \left( \xi \right)\) will smooth out as \(\sigma\) increases. Therefore, we design a nested loop, and adapt a large value of \(\sigma\) at the beginning of the external loop to avoid the iterative solution from falling into a local optimum. As \(\sigma\) decreases, \(F_{\sigma } \left( \xi \right)\) will more accurately approximate the \(l_{0}\) norm. The internal loop iterates a small fixed value, which can be described as the following two steps: Firstly, iteratively optimizes the solution of the coefficient matrix through the steepest descent algorithm, then projects the solution into the feasible set. In the first step, the iterative form of the steepest descent method is:
where \(\tilde{\xi }\) represents the iterative solution and \(\nabla F_{\sigma } \left( \xi \right)\) is the derivative of \(F_{\sigma } \left( \xi \right)\). The step \(\mu_{j}\) should be proportional to \(\sigma^{2}\), we choose a fixed constant \(\mu\) such that \(\mu_{j} = \mu \sigma^{2}\).
The iterative solution \(\hat{\xi }\) obtained by the first step does not satisfy the constraints of (25), so it needs to be projected into the feasible set, which is equivalent to solve the following optimization problem:
A common solution to (27) is the Lagrange multiplier method, and the Lagrange form of (27) is:
where \(\lambda\) represents the regularization parameter, it is used to balance the sparsity and residual fitting \(\xi\). Then the projection solution \(\xi^{\left( j \right)}\) can be calculated by the weighted least squares (WLS):
The update of regularization parameter \(\lambda\) directly affects the recovery performance. However, Chen et al. did not provide a suitable method for selecting the regularization parameter in [34]. Therefore, we design an adaptive iterative method for the update of \(\lambda\). Since the number of iterations in the internal loop is small and fixed, \(\lambda\) is updated along with the external loop. It can be seen from (28) that the former term of \(J\left( \xi \right)\) is used to control the approximation of the solution to the steepest descent solution, aiming to ensure the sparsity of the result. The latter term is the regularization term that minimizes the residual. Therefore, an ideal \(\lambda\) should balance the sparsity and robustness of the solution, The partial derivative of \(J\left( \xi \right)\) can be calculated by the following formula:
Let \(\frac{\partial J\left( \xi \right)}{{\partial \xi }} = 0\) then taking the \(l_{2}\) norm of the both sides of the equation, we have:
The projected solution \(\xi\) in (31) is an unknown prior. The projected solution \(\xi^{{\left( {j  1} \right)}}\) of the \(j  1^{th}\) external loop is chosen as its replacement in [34], then \(\lambda\) can be estimated by:
where \(\hat{\xi }^{\left( j \right)}\) represents the iterative solution of the \(j^{th}\) loop. However, it will bring the following two problems:

(i)
In general, large \(\lambda\) corresponds to small \(\sigma\) [34]. \(\sigma\) is a large value under strong noise. For the initial solution \(\xi_{0}\), the minimum norm solution with \({\hat{\mathbf{X}}} = {\hat{\mathbf{\Phi }}}\xi\) is generally selected as the initial solution, which causes the denominator of (32) to be a very small value, resulting in the initial solution \(\hat{\lambda }_{1}\) being too large.

(ii)
Since the projection solution \(\xi^{{\left( {j  1} \right)}}\) of \(j  1^{{\text{th}}}\) external loop satisfies the following equation:
$$\left( {\xi^{{\left( {j  1} \right)}} {\mathbf{  }}\hat{\xi }^{{\left( {j  1} \right)}} } \right) + \hat{\lambda }_{j  1} \left( {{\hat{\mathbf{\Phi }}}^{\text{H}} {\hat{\mathbf{\Phi }}}\xi^{{\left( {j  1} \right)}}  {\hat{\mathbf{\Phi }}}^{\text{H}} {\hat{\mathbf{X}}}} \right) = 0$$(33)
Equation (32) can be simplified to \(\hat{\lambda }_{j} = u_{j  1} \hat{\lambda }_{j  1}\), where \(u_{j  1}\) is the iteration factor. It can be expressed as:
where \(\left( {\hat{\xi }^{\left( j \right)} {\mathbf{  }}\xi^{{\left( {j  1} \right)}} } \right)\) represents the variation of the gradient solution in the \(j^{{\text{th}}}\) external loop, \(\left( {\xi^{{\left( {j  1} \right)}} {\mathbf{  }}\hat{\xi }^{{\left( {j  1} \right)}} } \right)\) represents the variation of the projection solution in the \(j  1^{{\text{th}}}\) external loop. It can be seen that \(\hat{\lambda }\) is not strictly decreasing.
The above two points make it difficult for \(\hat{\lambda }\) to converge to an appropriate order of magnitude. Therefore, we give the following iterative formula:
by replacing \(\xi^{{\left( {j  1} \right)}}\) in the denominator with \(\hat{\xi }^{\left( j \right)}\), the problem of too large initial solution is solved. Compared with \(\xi^{{\left( {j  1} \right)}}\), the new expression contains the gradient information of this loop, which is closer to the estimated value of \(\xi^{\left( j \right)}\). Therefore, the new \(\hat{\lambda }_{j}\) is more accurate than the traditional method. The pseudocode of the optimized robust SL0 algorithm is shown in Algorithm 1.
By using the optimized robust sparse recovery algorithm, the coefficient vector \(\xi\) can be stably restored even in a strong noise environment. Finally, referring to the recovery results and the PC results after jamming suppression, the real target is accurately detected and its position information is extracted. The flowchart of the proposed method is shown in Fig. 6.
3.4 Recovery condition
In this section, we discuss the recovery condition of block sparse model and regular sparse model respectively.
3.4.1 Recovery condition of block model
The restricted isometric property is a common criterion for evaluating the recovery capabilities of dictionary matrices. In 2010, Eldar proposed that for the block models such as (10), to be stably restored by BOMP, the sufficient condition is [32]:
where \(U\) is the block sparsity. \(\mu_{S}\) represents the subcoherence, which is defined as:
\(\mu_{S}\) is used to measure the similarity between subpulses. In order to satisfy the recovery condition, \(\mu_{S}\) should be as low as possible. \(\Psi _{l} \left[ i \right]\) represents the echo signal with timedelay \(\tau_{l}\) and frequency modulation \(f_{i}\).Therefore, \(\Psi _{l} \left[ i \right]^{\text{H}}\Psi _{l} \left[ j \right]\) represents the correlation between echoes with the frequency modulation \(f_{i}\) and \(f_{j}\) under the same timedelay, which is essentially equivalent to the transmitted signal’s ambiguity function with zero timedelay and the Doppler of \(f_{i}  f_{j}\). Therefore, in order to design intrablock atoms with low subcoherence, it is critical to ensure that the side lobes of the Doppler plane of the transmitted waveform ambiguity function at zero delay are low.
\(\mu_{B}\) represents the blockcoherence, it is defined as:
\(\mu_{B}\) is used to measure the similarity between timedelay blocks. In order to satisfy the recoverability condition, \(\mu_{B}\) should be as low as possible. From an intuitive point of view, the blockcoherence of the dictionary matrix \({{\varvec{\Psi}}}\) reflects the correlation between echoes with different timedelays and frequency modulations. Similar to the analysis of \(\mu_{S}\), if the transmitted waveform exhibits low sidelobe characteristics on both timedelay plane and Doppler plane, low blockcoherence can be ensured.
Similar to (10), the recovery condition of (16) can also be defined by the sufficient condition in (36). \(\Phi _{l} \left[ i \right]\) represents the \(i{\text{th}}\) subpulse echo with timedelay \(\tau_{l}\). Considering that the frequency bands between subpulses are staggered from each other, it can be reasonably assumed that these subpulses are approximately orthogonal, so their subcoherence is close to zero. In addition, the blockcoherence of dictionary matrix \({{\varvec{\Phi}}}\) reflects the correlation between transmitted waveforms at different timedelays. Different from the stepped frequency waveform, the subpulse frequency bands of the agile frequency waveform are randomly distributed. This feature significantly reduces the similarity of waveforms under different timedelays, thereby ensuring low blockcoherence of \({{\varvec{\Phi}}}\).
3.4.2 Recovery condition of regular model
Calculating the RIP constant of a given dictionary matrix is very challenging, but in recent years a friendlier property has emerged—Mutual Incoherence Property (MIP). It has been widely applied in analyzing the performance guarantees of sparse recovery algorithms. Simply put, if a matrix satisfies the MIP condition, then the performance of the sparse recovery algorithms is theoretically guaranteed. Typically, discussing the MIP property of a matrix is easier than its RIP property. The maximum coherence coefficient of the dictionary matrix \({\hat{\mathbf{\Phi }}}\) is defined as:
If \(\mu \left( {{\hat{\mathbf{\Phi }}}} \right) < \frac{1}{2U  1}\), then \({\hat{\mathbf{\Phi }}}\) has the MIP property and can be recovered stably. Since \(\hat{\Phi }_{i}\) represents the signal echo of timedelay \(\tau_{i}\), \(\mu \left( {{\hat{\mathbf{\Phi }}}} \right)\) is equivalent to the highest side lobe of the transmitted waveform ambiguity function on the timedelay plane. Therefore, if the ambiguity function of the transmitted waveform has a low timedelay plane side lobe, then \({\hat{\mathbf{\Phi }}}\) can be stably recovered.
Based on the above analysis, in order to ensure the stability of the three sparse recovery processes proposed in this article, it is necessary to ensure that the transmitted waveform meets a series of specific conditions. These conditions mainly involve the ambiguity function of the transmitted waveform, requiring its sidelobe levels to be kept low in the timedelay plane and Doppler plane. In addition, the frequency bands of each subpulse in the transmitted waveform should be appropriately staggered. The ambiguity function of the agile frequency LFM waveform shown in Fig. 3 presents a unique “pushpin” shape. This feature ensures that the recovery conditions are met and provides an important guarantee for achieving stable sparse recovery.
4 Experiments
4.1 Analysis of block sparse recovery results
In this section, we first explore the characteristic differences between the target and ISRJ on the delayfrequency plane and the delayslice plane under noisefree conditions. Please refer to Table 1 for specific parameter settings. During the two rounds of sparse recovery, we set the following meshing parameters: \(\tau_{\min }\) and \(\tau_{\max }\) are chosen as \(1000{\mu s}\) and \(1100{\mu s}\), with an interval of \(1{\mu s}\), so there were a total of grids in the timedelay domain. \(f_{\min }\) and \(f_{\max }\) are chosen as 0 MHz and 20 MHz, with an interval of 0.2 MHz, so there were a total of grids in the frequencyshift domain. This is mainly because in order to ensure that the false target after PC is ahead of the real target, the frequency modulation amount of the jammer is positive and maintained at the \(\text{MHz}\) level. In order to ensure that the jammer can sample subpulses approximately completely, we set the number of subpulses to \({\text{M}} = 100\), and the pulse width of each subpulse is 1us. The two sparse recovery processes share the same sparsity upper limit U, and the specific value of this parameter will be determined according to the actual application scenario. All simulation experiments are conducted on a personal computer equipped with a 3.2 GHz i7 CPU and 32 GB RAM (Table 1).
As shown in Fig. 7, the delayfrequency recovery results of the target and ISRJ with two different forwarding times are shown. In the delayfrequency plane analysis, the target appears as a single peak, and since it is not frequency modulated, its frequencyshift amount is zero. In contrast, the peak number of ISRJ depends on the forwarding time of the jammer. Specifically, jamming 1 only produces a peak value of nonzero frequencyshift in the plane. Jamming 2 presents three peaks with similar amplitudes and the same amount of frequencyshift. It is worth noting that since all jamming slices for each forwarding are treated as a complete target in the modeling, this causes the recovered peak amplitude to decrease relatively as the forwarding time increases. However, in order to ensure the coherence of the jamming, the jammer limits the forwarding time, thus ensuring the effectiveness of the recovery process.
Figure 8 shows the delayslice recovery results. Observing the delayslice plane, the recovered target subpulses are concentrated in the same block. The performance is continuous distribution and similar amplitude, indicating that the SDR is close to 100%. For ISRJ in direct forwarding mode, the recovered jamming subpulses are all concentrated in a single block, the subpulse sequence numbers are discontinuous, and the JDR is equal to the jammer SDR of 50%. Due to the asynchronous operating characteristics of DRFM, the timedelay of this block is equal to the sum of the target delay, jammer modulation delay and jammer sampling pulse width. For ISRJ in repeated forwarding mode, the recovered jamming pulses are distributed in \(K = 3\) blocks. Since the jamming pulses on each block originate from the same set of signal slices intercepted by the jammer, the subpulse sequence numbers of each block are the same. Thus, the JDR on each block is equivalent to the jammer SDR of 33%. In addition, the last \(K  1\) jamming blocks can be regarded as equal delay translations of the first jamming block, and their intervals are the jammer sampling pulse width.
Discussing the iteration stop conditions of BOMP is crucial. Since all jamming slices from the same forwarding are treated as a composite signal during the block recovery process, the block sparsity of ISRJ remains consistent across both block models, a fact that is validated in Figs. 7 and 8. For instance, for directforward jamming, a sharp peak can be recovered on the delayDoppler plane, and a series of envelopes can be recovered on the delayslice plane. For repeatedforward jamming (forwarding times = 3), three sharp peaks can be recovered on the delayDoppler plane, and three series of envelopes can be recovered on the delayslice plane. Based on this, we set a reasonable sparsity upper limit \(U\), which should be greater than the total number of forwarding times by all jammers in the scene. If the number of iterations reaches \(U\), the iteration stops. Moreover, since the preset sparsity limit exceeds the actual sparsity, some blocks recovered incorrectly containing only noise are identified in the last few iterations. Therefore, if the residual energy is lower than the noise energy \(E_{n}\) in the \(i^{th}\) iteration, or if the number of iterations reaches the sparsity limit \(U\), the iteration will stop.
4.2 Examples in three scenarios
In this section, we constructed three scenarios containing different jamming distributions and conducted a comparative analysis between our method and the CostasSPC method proposed in [23] to verify the effectiveness and superiority of our method. It is worth pointing out that the basic idea of CostasSPC method is to decompose the broadband filter into a set of narrowband filters, remove the filter output of the signal fragment sampled by the jammer, and accumulate and process the output of the remaining filters. This method has certain similarities with the method of this study in terms of waveform design. First, we considered a simple scenario containing a single target and a single jammer, with parameter settings as shown in Table 2. In this case, the SDR of a single jammer on the transmitted signal is 50%, and the JDR in the echo data is also 50%. As shown in Fig. 9a, on the delayfrequency plane, the jamming appears as a single peak with specific frequency modulation. However, the peak value of the target is very weak, so it is difficult to estimate the parameters of the target directly on this plane. Figure 9b, c and d shows the recovered delayslice plane and the corresponding jamming identification results, respectively. It can be seen that the ISRJ appears as a series of discontinuous envelopes with the same modulation timedelay on this plane. These envelopes have a 50% duty ratio on the block with \(1054{\upmu s}\) and similar amplitudes. Figure 9e and f shows the jamming distribution before and after cancellation, respectively. The results show that the energy of the jamming before cancellation is much greater than the target signal, but 50% of the target signal is not covered by the ISRJ. After cancellation, the jamming intensity is effectively reduced to the same magnitude as the target echo. Therefore, the real target can be detected after PC at a timedelay of \(1050{\upmu s}\).
As shown in Fig. 9g and h, although both methods can accurately detect the target, the output signal interferencetonoise ratio (SINR) of the proposed method is significantly higher than the CostasSPC method. This is because at least 50% of the transmitted signal segments are forwarded by the jammer, and the CostasSPC method can only obtain at most 50% of the sub matched filter output for accumulation. In contrast, our method achieves effective stripping of jamming by accurately reconstructing the jamming waveform, thereby achieving higher pulse compression gain. Figure 9i shows the robust sparse recovery results in the distance domain, and it can be observed that the target peak is more prominent in this profile. Compared with Fig. 9h, this further facilitates the detection of real targets.
In scenario 2, as shown in Table 3, there are two jammers with different forwarding times, which causes the JDR and synthesized SDR to further increase. As shown in Fig. 10a, three jamming peaks appear on the delayfrequency plane: two peaks with the same frequencyshift are generated by jammer 2, and the other peak is generated by jammer 1. Figure 10b, c and d shows the recovered delayslice plane and corresponding jamming identification result, respectively. It can be seen that the ISRJ generated by jammer 1 is located at the block with 1054 μs, and the duty ratio reaches 50% in this block. The ISRJ generated by jammer 2 is located on the blocks with delay of 1058 μs and 1060 μs, with a duty ratio of 33%. Since the signal slices forwarded twice are the same, the jamming pulse sequence numbers on these two blocks are also the same.
Figure 10e and f shows the jamming distribution before and after jamming cancellation, respectively, showing that the jamming energy before cancellation is much larger than the target signal, and most slices are covered by jamming. After the jamming is cancelled, the jamming intensity is reduced to a level comparable to the target echo. However, there is still a strong jamming residue near 1145 μs. This may be due to the large deviation in the estimation of the jamming slice intensity corresponding to this timedelay. Therefore, in the PC results in Fig. 10h, a small number of jamming harmonics appears near the targets. In comparison, the PC result of the CostasSPC method in Fig. 10g is not ideal. Since most signal segments are intercepted by the jammer, the number of narrowband filters available for accumulation is reduced, making target 1 and target 3 unrecognizable in the noise. Figure 10i shows the robust sparse recovery result of scenario 2, where the three targets are more clearly visible. This is because although a small number of strong jamming slices remain after cancellation, the JDR is greatly reduced and the integrity of the jamming waveform is destroyed. Therefore, the residual jamming is difficult to match the range waveform atoms and cannot accumulate output at the specified position.
In the more extreme scenario 3, as shown in Table 4, there are two jammers with the forwarding time \(K = 1\), and their sampling start times differ by one jammer sampling pulse width. As shown in Fig. 11e, in this case, the target echo is completely covered by the jamming, almost all signal segments are captured by the two jammers, and the synthesized SDR is close to 100%. As can be seen from Fig. 11a, b and c, even in this case, the parameters of the jamming can be accurately estimated, and the jamming slices can also be accurately identified in Fig. 11d. It is noteworthy that the two columns of jamming slices recovered in Fig. 11d are staggered in order, which also demonstrates that all subpulses of the transmitted signal have been intercepted and forwarded by the two jammers. As shown in Fig. 11f, h and i, even after cancellation, the jamming intensity is still within the acceptable range, and the three targets can still be detected after PC or robust sparse recovery. In contrast, the narrowband filtered output of the CostasSPC method is completely contaminated by jamming data, which is equivalent to allpass filtering of the jamming. Figure 11g shows that since the jamming echo is modulated by frequency, the ISRJ PC output under the agile frequency waveform does not appear as a false target group similar to the real target, but presents an irregular, noiselike PC output, causing the target to completely indistinguishable. This verifies the effectiveness of the proposed method in complex scenarios with multiple targets, high JDR and high synthesized SDR.
4.3 Analysis of target detection performance
To investigate the effects of SNR and jammertonoise ratio (JNR) on target detection, we conducted a series of 1000 Monte Carlo simulations for each of the three distinct jamming conditions in the three scenarios. Through these comprehensive simulations, we were able to assess the effectiveness of jamming suppression by meticulously evaluating the target detection rate \(P_{A}\). \(P_{A}\) represents the probability of successfully detecting the target on the PC profile or on the range domain recovery profile. A high detection rate indicates better jamming suppression performance. Furthermore, for the simple detector, we set a threshold that is half the square of the maximum value of the pulse compression results, which is \(3\text{dB}\) lower than the maximum value of the PC results. For the sparse recovery results in the range domain, this threshold is half the square of the maximum value of the recovery results. As shown in Fig. 12 we could see that:

(i)
(i). In the analysis of PC results, when \(\text{SNR} \ge  15\;\text{dB}\), the target detection rate \(P_{A}\) in the three scenarios stably exceeds 90%. Even under lower SNR conditions, \(P_{A}\) remains above 85%. The exceptional performance in this context can be attributed to the effective suppression of jamming, primarily dependent on the precise extraction of jamming parameters. A crucial element in ensuring this is maintaining a high JNR. In comparison to scenario 1, the augmentation in the number of jammers in scenario 2 and scenario 3 results in an increased number of jamming slices. This increase could potentially result in more robust residual jamming. Consequently, the target detection rate in scenario 2 and scenario 3 is marginally lower than that in scenario 1. Moreover, while the jamming encountered in scenario 3 is more intricate than in scenario 2, the target detection rates in both scenarios are comparable. This similarity arises from the distinct discernibility of the jamming slices when analyzed on the delayslice plane.

(ii)
In the analysis of range domain sparse recovery results, the radar’s target detection capability remains remarkably stable, largely unaffected by increases in jamming intensity or enhancements in JDR and SDR. This stability arises because, even though in certain cases, like when some jamming subpulses are not fully detected or eliminated, jamming harmonics may be generated post pulse compression, the energy of most jamming slices is effectively suppressed. The residual jamming struggles to accumulate effectively on the sparse recovery’s distance profile. Furthermore, the chosen method of sparse recovery is robust, demonstrating significant adaptability to low SNR. Therefore, target detection on the robust sparse recovery distance profile is more stable.
4.4 Analysis of parameters estimation performance
The estimation accuracy of parameters has a critical impact on the performance of the proposed method. As mentioned before, we focus on three jamming parameters: modulation delay, modulation frequency, and subpulse sequence number. Among them, although the estimation deviation of some subpulse sequence numbers may lead to inaccurate reconstruction of some subpulses in the jamming echo, this has a limited impact on the overall effect of jamming cancellation. However, errors in modulation frequency and modulation delay estimation will directly lead to a serious mismatch between the reconstructed jamming waveform and the actual waveform. This mismatch will significantly reduce the effect of jamming suppression. Therefore, we conducted a series of experiments under various JNR conditions to evaluate the estimation accuracy of these two parameters. Specifically, we conducted 1000 Monte Carlo simulations and assessed the parameter estimation accuracy by the probability of accurately recovering the modulation time delay and frequencyshift in these 1000 experiments.
As shown in Fig. 13, under the condition where \(\text{JNR < 0}\;\text{dB}\), the accuracy of parameter estimation is low, insufficient for accurate reconstruction of the jamming slices. However, when JNR reaches 0 or higher, the accuracy of estimating the jamming parameters significantly improves, exceeding 90%, and approaches nearly 100% when \(\text{JNR} \ge \text{5}\;\text{dB}\). Considering that in practical scenarios the intensity of ISRJ is usually higher than the noise level, it can be inferred that the parameter estimation process is stable and reliable. Moreover, it is observed that at all JNR levels, the accuracy of estimating timedelay is consistently higher than that of frequencyshift. This phenomenon can be explained as follows: in the sparse recovery process of delayfrequency block model, the BOMP method first locates the timedelay blocks that may contain the jamming synthetic signal, and then further confirms the jamming frequencyshift within these potential blocks. Therefore, if the jamming timedelay blocks cannot be accurately located in the initial search phase, it becomes even more difficult to determine the exact frequencyshift of jamming.
4.4.1 Analysis of jamming suppression performance
In this section, we will first discuss the impact of subpulse width on jamming suppression effectiveness. The key to the proposed method lies in accurately identifying and reconstructing those subpulses that have been intercepted and modulated by the DRFM, in order to suppress jamming through a cancellation approach. An inappropriate choice of subpulse width may lead to insufficient or excessive reconstruction of the jamming echo, thereby causing significant residual jamming. Therefore, the selection of subpulse width is directly related to the performance of jamming suppression. To quantify the extent to which jamming is suppressed, we introduce the concept of the Interference cancellation ratio (ICR), which is defined as the ratio of jamming input power to jamming output power. The simulation results are shown in Fig. 14.
It can be seen from Fig. 14 that as JNR increases, the ICR shows an upward trend. Moreover, under different JNR levels, the proposed method can cancel the jamming to a level similar to the target intensity, showing stable jamming suppression capability. In addition, as the subpulse width decreases, the characteristic difference between the reconstructed jamming and the real jamming in the subpulse dimension is reduced, and the fit to the real jamming is improved, which is reflected in a higher ICR. Especially for jammers with a sampling pulse width of \(2\;{\upmu s}\), setting the subpulse pulse width to \(2{\upmu s}\) is enough to effectively cancel most of the jamming slices. Therefore, in practical applications, the design of subpulse width should give priority to the sampling pulse width lower than that of the jammer to ensure efficient jamming suppression capabilities.
In our previous analysis, a key assumption was that the signal slices forwarded by the jammer contained one or several complete subpulses. However, in practical applications, due to potential delays in detection and sampling of radar signals by the jammer, the actual forwarded jamming slices may not match the predefined subpulses. To thoroughly investigate the impact of this mismatch on the effectiveness of jamming, we adjusted the sampling start time of the jammer and introduced sampling mismatch ratio (SMR) to quantify the degree of mismatch. Specifically, SMR is defined as the ratio of the misalignment length between the subpulse forwarded by the jammer and the original transmitted subpulse to the width of the subpulse. In Fig. 15, we analyzed the impact of different SMR on jamming suppression capability under the jamming parameters for Scenario 1. The results show that when the SMR is below 20%, the proposed method still maintains the ICR within an acceptable range. As the misalignment of the pulses increases, the mismatch between the reconstructed jamming and the real jamming intensifies, leading to an increase in residual jamming energy and a significant decline in the ICR. In such situations, using pulse compression for target identification is severely affected by the irregular peaks caused by residual jamming. As illustrated in Fig. 16, although an increase in SMR reduces the ICR and decreases the target detection rate through pulse compression, the waveform difference between residual jamming and real target remains considerable. During the sparse recovery process, this can be considered as color noise. In the range profile obtained through robust recovery using the AReSl0, the target detection rate remains relatively high. It should be noted that the impact of incomplete interception can be further mitigated by reducing the subpulse width. However, this approach may lead to an increase in the synthesized bandwidth, thereby raising the requirements for the radar’s sampling frequency.
4.5 convergence experiments
In this section, we analyzed the convergence curves of the robust sparse recovery algorithm. We considered a scenario with a single target (SNR = − 10 dB), while examining the impact of two key parameters: the final iteration value \(\sigma_{\min }\) and the iteration step size \(\mu\), on the performance of the algorithm. Herein, we selected SINR as the vertical axis metric. Here, SINR represents the ratio of target power to noise power in the sparse recovery’s range unit. Initially, we set different values of \(\sigma_{\min }\) to assess the algorithm’s convergence performance. Since \(\sigma_{\min }\) directly influences the fitting degree of the objective function to the \(l_{0}\) norm at the end of the outer loop, it is decisive for the algorithm’s ultimate convergence accuracy. Figure 17a indicates that as \(\sigma_{\min }\) decreases, the objective function can fit the \(l_{0}\) norm more precisely, leading to an upward trend in SINR, reaching as high as 35 dB. Furthermore, under different \(\sigma_{\min }\) values, the algorithm’s convergence SINR significantly surpasses that of traditional pulse compression methods. It is noteworthy that there is a lower limit to reducing \(\sigma_{\min }\), mainly for two reasons: firstly, if \(\sigma_{\min }\) is too small, it may cause the objective function to be insufficiently smooth in the initial phase of the outer loop, leading to the final result falling into local optima; secondly, in our experiments, we found that the best recovery effect occurs when \(\sigma_{\min }\) is reduced to 1 to 2 times the noise level. Further reduction would lead the algorithm to “learn” the noise values, deviating from the true solution, which aligns with the conclusion of Mohimani [35].
The choice of iteration step size \(\mu\) also affects the algorithm’s convergence behavior. Specifically, if \(\mu\) is too large, the gradient solutions obtained in the early phase of the outer loop might skip the optimal solution interval, causing fluctuations in output SINR in the early iterations, as shown in Fig. 17b. This figure also reveals that the final SINR reaches its highest level at a certain \(\mu = 2\). Moreover, we observed that the SINR of the last few iterations seems superior to that of the final iteration when \(\mu\) takes other values, suggesting that the optimal \(\sigma_{\min }\) may vary with different \(\mu\).
5 Conclusion
This article presents a novel method for the suppression of ISRJ. Through a detailed analysis of ISRJ generation, we have developed two sparse models: the delayfrequency model and the delayslice model. These models are capable of sparsely representing both targets and ISRJ. Targeting these models, we specifically designed a frequencyagile waveform that satisfies the RIP condition. Subsequently, we employed a block sparse recovery algorithm to identify ISRJ and estimate its three key parameters, thereby reconstructing the jamming slices to cancel ISRJ. Moreover, we introduced a new method based on robust sparse recovery that achieves more stable target identification compared to traditional PC. We have also optimized the method with an adaptive update mechanism for regularization parameters, enhancing its effectiveness and adaptability. Experimental results indicate that the proposed method can stably suppress ISRJ in various scenarios. Especially in scenarios with high JDR and high SDR, this method demonstrates stable antijamming capabilities and target detection abilities. However, the method currently faces limitations in addressing situations where there are changes in the frequency modulation of the jamming slices by the jammer, presenting a potential area for future research and improvement.
Availability of data and materials
Please contact author for data requests.
Abbreviations
 ISRJ:

Interruptedsampling repeater jamming
 PC:

Pulse compression
 LS:

Least square
 JDR:

Jamming duty ratio
 SDR:

Sampling duty ratio
 DRFM:

Digital radio frequency memory
 PRI:

Pulse repetition period
 LFM:

Linearfrequency modulation
 STFRFT:

Shorttime fractional Fourier transform
 CFAR:

Constant false alarm rate
 FrFT:

Fractional Fourier transform
 RIP:

Restricted Isometry Property
 MIP:

Mutual Incoherence Property
 SINR:

Interferencetonoise ratio
 JNR:

Jammertonoise Ratio
 SMR:

Sampling mismatch ratio
References
L. Yan, P. Addabbo, C. Hao, D. Orlando, A. Farina, New ECCM techniques against noiselike and/or coherent interferers. IEEE Trans. Aerosp. Electron. Syst. 56, 1172–1188 (2019). https://doi.org/10.1109/TAES.2019.2929968
D. Orlando, A novel noise jamming detection algorithm for radar applications. IEEE Signal Process. Lett. 24, 206–210 (2016).https://doi.org/10.1109/LSP.2016.2645793
D. Orlando, A novel noise jamming detection algorithm for radar applications. IEEE Signal Process. Lett. 24, 206–210 (2016). https://doi.org/10.1109/TSP.2020.3047523
T. Tian, F. Zhou, X. Bai, Z. Zhang, B. Zhao, W. Fan, A partitioned deceptive jamming method against TOPSAR. IEEE Trans. Aerosp. Electron. Syst. 56, 1538–1552 (2019). https://doi.org/10.1109/TAES.2019.2933958
C.P. Heagney, Digital radio frequency memory synthetic instrument enhancing US navy automated test equipment mission. IEEE Instrum. Meas. Mag. 21, 41–63 (2018). https://doi.org/10.1109/MIM.2018.8423745
Y. Li, X. Jia, Y. Chen, C. Yin. Frequency agility MIMOSAR imaging and antideception jamming performance. 2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS), 2014. IEEE, 1–4. doi: https://doi.org/10.1109/URSIGASS.2014.6929631
N. Levanon, Steppedfrequency pulsetrain radar signal. IEE Proc. Radar Sonar Navig. 149, 297–309 (2002). https://doi.org/10.1049/iprsn:20020432
H. Qiongdan, L. Yong, C. Wei, L. Weihua, L. Bo. A new multicarrier chaotic phase coded steppedfrequency pulse train radar signal and its characteristic analysis. In: 2015 IEEE 10th Conference on Industrial Electronics and Applications (ICIEA), 2015. IEEE, 444–448. doi: https://doi.org/10.1109/ICIEA.2015.7334154
J. Chen, W. Wu, S. Xu, Z. Chen, J. Zou, Band pass filter design against interruptedsampling repeater jamming based on timefrequency analysis. IET Radar Sonar Navig. 13, 1646–1654 (2019). https://doi.org/10.1049/ietrsn.2018.5658
W. Xiong, G. Zhang, W. Liu, Efficient filter design against interrupted sampling repeater jamming for wideband radar. EURASIP J. Adv. Signal Process. 2017, 1–12 (2017). https://doi.org/10.1186/s1363401704463
C. Zhou, Q. Liu, X. Chen, Parameter estimation and suppression for DRFMbased interrupted sampling repeater jammer. IET Radar Sonar Navig. 12, 56–63 (2018). https://doi.org/10.1049/ietrsn.2017.0114
Y. Meng, L. Yu, Y. Wei, P. Tong. A novel parameter estimation method of interrupted sampling repeater jamming. In: 2019 IEEE International Conference on Signal, Information and Data Processing (ICSIDP), 2019. IEEE, 1–5. doi: https://doi.org/10.1109/ICSIDP47821.2019.9173164
J. Chen, X. Chen, H. Zhang, K. Zhang, Q. Liu, Suppression method for mainlobe interrupted sampling repeater jamming in distributed radar. IEEE Access 8, 139255–139265 (2020). https://doi.org/10.1109/ACCESS.2020.3000278
B. Han, X. Qu, X. Yang, W. Li, Z. Zhang, DRFMbased repeater jamming reconstruction and cancellation method with accurate edge detection. Remote Sens. 15, 1759 (2023). https://doi.org/10.3390/rs15071759
H. Yuan, C.Y. Wang, X. Li, L. An, A method against interruptedsampling repeater jamming based on energy function detection and bandpass filtering. Int. J. Antennas Propag. 2017, 1–9 (2017). https://doi.org/10.1155/2017/6759169
J. Chen, S. Xu, J. Zou, Z. Chen, Interruptedsampling repeater jamming suppression based on stacked bidirectional gated recurrent unit network and infinite training. IEEE Access 7, 107428–107437 (2019). https://doi.org/10.1109/ACCESS.2019.2932793
W. Wu, J. Zou, J. Chen, S. Xu, Z. Chen, Falsetarget recognition against interruptedsampling repeater jamming based on integration decomposition. IEEE Trans. Aerosp. Electron. Syst. 57, 2979–2991 (2021). https://doi.org/10.1109/TAES.2021.3068443
R. Shen, X. Liu, J. Sui, X. Wei. Study on interruptedsampling repeater jamming performance based on intrapulse frequency coded signal. Ninth International Conference on Digital Image Processing (ICDIP 2017), 2017. SPIE, 1012–1016. doi: https://doi.org/10.1117/12.2281779
H. Dai, Y. Zhao, H. Su, Z. Wang, Q. Bao, J. Pan, Research on an intrapulse orthogonal waveform and methods resisting interruptedsampling repeater jamming within the same frequency band. Remote Sens. 15, 3673 (2023). https://doi.org/10.3390/rs15143673
C. Zhou, F. Liu, Q. Liu, An adaptive transmitting scheme for interrupted sampling repeater jamming suppression. Sensors 17, 2480 (2017). https://doi.org/10.3390/s17112480
Z. Liu, Y. Quan, S. Du, Y. Wu, M. Sha, M. Xing, A novel ECCM scheme against interruptedsampling repeater jamming using intrapulse dualparameter agile waveform. Digital Signal Process. 129, 103652 (2022)
J. Zhang, H. Mu, S. Wen, Y. Li, H. Gao, Antiintermittent sampling repeater jamming method based on LFM segmented pulse compression. J. Electron. Inf. Technol. 41, 1712–1720 (2019). https://doi.org/10.11999/JEIT180851
J. Zhang, H. Mu, S. Wen, S. Liao, M. Sha, Antiintermittent sampling jamming method based on intrapulse LFMCostas frequency stepping. Syst. Eng. Electron. 41, 2170–2177 (2019)
L. Ding, R. Li, Y. Wang, L. Dai, F. Chen, Discrimination and identification between mainlobe repeater jamming and target echo by basis pursuit. IET Radar Sonar Navig. 11, 11–20 (2017). https://doi.org/10.1049/ietrsn.2015.0301
B. Zhou, K. Duan, W. Liu, R. Li, Y. Wang, Sparse Bayesian learningbased mainlobe blanket jamming suppression algorithm. J. Eng. 2019, 7069–7073 (2019). https://doi.org/10.1049/joe.2019.0407
Y. Cheng, D. Zhu, J. Zhang, High precision sparse reconstruction scheme for multiple radar mainlobe jammings. Electronics 9, 1224 (2020). https://doi.org/10.3390/electronics9081224
L. Yan, P. Addabbo, C. Hao, D. Orlando, J. Liu. A sparse learning approach to multiple noiselike jammers detection. In: 2019 Photonics & Electromagnetics Research SymposiumFall (PIERSFall), 2019. IEEE, 155–161. https://doi.org/10.1109/PIERSFall48861.2019.9021566
Wang, Z., Li, J., Yu, W., Luo, Y. & Yu, Z. 2022. A novel interruptedsampling repeater jamming suppression method based on timefrequency analysis and target sparse reconstruction. International Journal of Antennas and Propagation, 2022. https://doi.org/10.1155/2022/2812456
R.G. Baraniuk, Compressive sensing [lecture notes]. IEEE Signal Process. Mag. 24, 118–121 (2007). https://doi.org/10.1109/MSP.2007.4286571
K. Olivier, M. Gouws. Modern wideband DRFM architecture and realtime DSP capabilities for radar test and evaluation. In: 2013 Saudi International Electronics, Communications and Photonics Conference, 2013. IEEE, 1–4. https://doi.org/10.1109/SIECPC.2013.6551019
W. Ying, S. Changyong, Z. Shengjun, H. Peilin, J. Jinzu, Array ISAR of precessional cone target generated by intermittent sampling repeater jamming in fast and slow time. J. Electron. Inf. Technol. 38, 450–454 (2016). https://doi.org/10.11999/JEIT150464
Y.C. Eldar, P. Kuppinger, H. Bolcskei, Blocksparse signals: Uncertainty relations and efficient recovery. IEEE Trans. Signal Process. 58, 3042–3054 (2010). https://doi.org/10.1109/TSP.2010.2044837
J. Chen, Y. Zhou, L. Jin, J. Li, Y. Zhu, An adaptive regularized smoothed ℓ° norm algorithm for sparse signal recovery in noisy environments. Signal Process. 135, 153–157 (2017). https://doi.org/10.1016/j.sigpro.2017.01.004
H. Bu, R. Tao, X. Bai, J. Zhao, Regularized smoothed ℓ0 norm algorithm and its application to CSbased radar imaging. Signal Process. 122, 115–122 (2016). https://doi.org/10.1016/j.sigpro.2015.11.024
G. H. Mohimani, M. BabaieZadeh, C. Jutten. Fast sparse representation based on smoothed ℓ 0 norm. Independent Component Analysis and Signal Separation: 7th International Conference, ICA 2007, London, UK, September 9–12, 2007. Proceedings 7, 2007. Springer, 389–396.
Acknowledgements
The authors would like to acknowledge the anonymous reviewers and editors of this paper for their valuable comments and suggestions.
Funding
This research did not receive any specific grant from funding agencies in the public, commercial, or notforprofit sectors.
Author information
Authors and Affiliations
Contributions
YJ contributed to the conceptualization, methodology, software, validation, formal analysis, data curation, writing—original draft preparation, writing—review and editing, visualization. SW contributed to the conceptualization, validation, investigation, writing—original draft preparation, project administration. YL contributed to the methodology, validation, resources, writing—review and editing, supervision. All authors have read and agreed to the manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no conflicts of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Ji, Y., Wei, S. & Lu, Y. Antiinterruptedsampling repeater jamming method based on frequency agility waveform and sparse recovery. EURASIP J. Adv. Signal Process. 2024, 55 (2024). https://doi.org/10.1186/s13634024011499
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s13634024011499