Remote Sensing (May 2023)

An ISAR Shape Deception Jamming Method Based on Template Multiplication and Time Delay

  • Ying-Xi Liu,
  • Qun Zhang,
  • Shi-Chao Xiong,
  • Jia-Cheng Ni,
  • Dan Wang,
  • Hao-Bo Wang

DOI
https://doi.org/10.3390/rs15112762
Journal volume & issue
Vol. 15, no. 11
p. 2762

Abstract

Read online

The deception jamming method based on Digital Radio Frequency Memory (DRFM) for Inverse Synthetic Aperture Radar (ISAR) has been a widely studied topic in recent decades. Typically, jamming signals generated using two-dimensional or three-dimensional false target models can create realistic false targets on the ISAR image. However, existing deception jamming methods cannot eliminate or revise the original echo, which can be retained by multiple anti-jamming methods once the radar judges out receiving the jamming signal. Additionally, these methods require large storage space for the models. Otherwise, the false targets cannot be generated realistically. To address these issues, this paper proposes a jamming signal generation algorithm based on two-dimensional template multiplication modulation and template time delay. The frequency shift and time delay relationship between the signals intercepted by the jammer and the real target echo is analyzed and derived in detail. With the use of these detailed derivations, it is possible to add and remove scatters by precisely locating the false scatter on the real ISAR image. The real target’s shape naturally changes as a result of the addition and removal of scatters. Furthermore, this method can adaptively change the resolution of the false target’s ISAR image with the radar pulse width and the accumulated pulse number. Meanwhile, the false target size on the ISAR image can be adjusted adaptively by altering the false template resolution. These features of the proposed method offer increased flexibility and efficiency for deception jamming. By accurately determining the position of false scatter on the ISAR image, this method offers improved performance compared with the existing techniques. Simulation results demonstrate the effectiveness of the proposed deception jamming method.

Keywords