You are on page 1of 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/254347997

Radar detection and classification of jamming signals

Article · January 2006

CITATIONS READS

4 2,396

4 authors, including:

Maria Sabrina Greco Alfonso Farina


Università di Pisa 547 PUBLICATIONS   12,763 CITATIONS   
190 PUBLICATIONS   2,996 CITATIONS   
SEE PROFILE
SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Copula-based distributed detection View project

Exploiting Spatial Diversity for Massive MIMO Radars View project

All content following this page was uploaded by Maria Sabrina Greco on 22 January 2016.

The user has requested enhancement of the downloaded file.


14th European Signal Processing Conference (EUSIPCO 2006), Florence, Italy, September 4-8, 2006, copyright by EURASIP

RADAR DETECTION AND CLASSIFICATION OF JAMMING SIGNALS *

Maria Greco1, Fulvio Gini1, Alfonso Farina2 and Valentina Ravenni3

1
Dip. di Ingegneria dell’Informazione, University of Pisa, via G. Caruso, 14 - 56122 Pisa, Italia
Tel: +39-050-2217620, Fax: +39-050-2217522, e-mail: m.greco@ing.unipi.it , f.gini@ing.unipi.it
2
SELEX Sistemi Integrati (formerly AMS SpA), via Tiburtina Km. 12.400 - 00131 Rome, Italy
Tel: +39-06-4150-2279, fax: +39-06-4150-3755, e-mail: afarina@selex-si.com
3
GEM Elettronica S.r.l., via A. Vespucci, 9 – 63039 San Benedetto del Tronto (AP), Italy
Tel +39-0735-59051, Fax +39-0735-590528, E-mail: ravenni@gemrad.com

.
˚
ABSTRACT
This paper considers the problem of detecting and classify- 2. JAMMING SIGNAL MODEL
ing a radar target against jamming signals emitted by elec- A pulse Doppler radar transmits a coherent signal that is
tronic countermeasure (ECM) systems. The detection- produced by modulating a complex sinusoid with a pulsed
classification algorithm proposed here exploits the presence waveform. For ease of treatment, we assume here that the
in the jamming spectrum of spurious terms due to phase signal is infinite in time. Using the infinite time assumption,
quantization performed by the radio frequency digital mem- the pulsed waveform can be written as
ory (DRFM) device.
+∞ +∞

1. INTRODUCTION p (t ) = ∑
n =−∞
pTi ( t − nTr ) = pTi ( t ) ⊗ ∑ δ ( t − nTr ) ,
n =−∞
(1)

Electronic countermeasure (ECM) techniques against


tracking radar are often enhanced by using radio frequency where pTi ( t ) = rect ( t Ti ) . Then, the target signal received
digital memory. The DRFM is a device in which high-speed by the radar is proportional to yP (t ) = p(t ) exp[ jφ (t )] ,
sampling digital memory is used for storage and recreation
of radio frequency signals in order to deceive hostile radar where φ (t ) = 2π F0 t and the frequency F0 takes into ac-
systems. In a DRFM system, the input RF signal is generally count the down-conversion performed by the DRFM and the
first down-shifted in frequency and then sampled with a Doppler frequency of the target.
high-speed analog-to-digital converter (ADC). The samples Generally, the information content of an intercepted ra-
are stored in memory and they can be manipulated in ampli- dar signal is mainly carried in the phase of the signal, then
tude, frequency and phase to generate a wide range of jam- the amplitude information is discarded and only the phase is
ming signals. The stored samples are later recalled, proc- quantized, using N=2M levels. M is the number of bits of the
essed by the digital-to-analog converter (DAC), up con- DRFM.The detailed mathematical derivation and analysis of
verted and transmitted back to the victim radar [1]. the jamming signal has been performed in [2]. Here we
In this paper, we approach the problem of detecting and summarize the main results.
classifying a radar target against jamming signals in pres- The jamming signal can we written as
ence of thermal noise. The model of the jamming signal
+∞
emitted by a phase-quantizer DRFM, very common in jam-  1
ming systems, is introduced in Section 2. In Section 3 we
x (t ) = e
jφˆ ( t )
= ∑ sinc  m + N  e (
m =−∞
j Nm +1)φ ( t )
(2)
define the jamming signal error angle (JSEA) as a measure
of the errors introduced by the DRFM on the false target. In The spectrum of the quantized signal, that is the Fourier
Section 4 we propose a detection/classification algorithm transform of signal x(t), is
that exploits the JSEA to distinguish between true and false
+∞
target. Finally, some results of our Monte Carlo simulations  1
are described in Section 5.
Xˆ ( f ) = ∑ sinc  m + N  δ  f − ( Nm + 1) F 
m =−∞
0 (3)

˚
*This work has been funded by SELEX Sistemi Integrati.
14th European Signal Processing Conference (EUSIPCO 2006), Florence, Italy, September 4-8, 2006, copyright by EURASIP

where δ ( f − f X ) is the Dirac delta function, centered at To measure the errors introduced by the DRFM on the
f = f X . This result demonstrates that the spectrum of the jamming signal, we introduce a new measure: the jamming
signal error angle (JSEA) µ. For its definition, we used a
jamming signal consists of the superposition of several dif-
generalized cosine:
ferent terms. The contribution for m=0 can be called the “pri-
mary image” term [3] and it is located at the frequency F0. In
xH y
addition to this primary term, there are contributions from cos(x, y ) = (6)
m ≠ 0 terms. The strength of the mth term is attenuated by x ⋅ y
the factor sinc ( m + 1 N ) . Since m is always an integer and
to define the angle between two complex vectors x and y [5,
since the value of the sinc function for integer arguments is
zero, the strength of the spurious terms decreases as the 6]. The angle µ depends on the number of quantization levels
number N of quantization levels increases. These spurious N=2M, the normalized frequency f0 and the number of sam-
ples K. Some result has been reported in Fig. 1 for M=2 and
signals occur at the frequencies f s = ( Nm + 1) F0 . For a 2-bit
K=32 as a function of f0.
quantization, as instance, the strongest spurious harmonic is In Fig. 2 we show the spectra of the true and jamming
obtained for m=-3 and its “amplitude” ratio with the primary signals for f0=0.097, M=2 and K=32. The differences be-
term is about -9.6 dB. tween the two spectra increase with decreasing number of
bits and decreasing value of f I DRFM .
3. THE JAMMING SIGNAL ERROR ANGLE Based on our results we can conclude that, when the
number of quantization bits is low, the K-dimensional direc-
The jamming signal and the true signal are received by
tions of the steering vectors of true and jamming signals dif-
the radar. Both signals are down-converted at a low fre-
fer by the angle µ . This information can be used in the radar
quency or in baseband and filtered by an anti-aliasing low-
pass filter with impulsive response h(t), centered at null fre- detector to recognize the jamming signal and avoid false de-
quency, before sampling and processing [4]. It is important to tection.
remember that the frequency F0 takes into account the
down-conversion performed by the DRFM and the Doppler
frequency of the target, that is F0 = FI DRFM + FD , where
FI DRFM is the intermediate frequency of the DRFM and FD is
the Doppler frequency of the target. After the baseband con-
version performed by the radar receiver, both jammer and
true target spectrum are centered on FD .
The true and jamming signal vectors can be obtained by
sampling at the frequency Fc the filtered signals
x(t ) = g (t ) ⊗ h(t ) and y (t ) = y (t ) ⊗ h(t ) . We assume that
the anti-aliasing filter has a bandwidth large enough to leave
the true signal unmodified and to suppress the components of
the jamming signal external to the bandwidth of the filter,
such that: − Fc 2 ≤ ( Nm + 1) F0 − FI DRFM ≤ Fc 2 . Fig. 1 – Jamming signal error angle (abs) as a function of f0
It results that

 n  M max  1  j Nm +1) 2π f0 n − j 2π f I DRFM n


x(n) = x   = ∑ sinc  m +  e ( e (4)
 Fc  m = M min  N

and

 n  j 2π f n
y ( n) = y   =e D , (5)
 Fc 

where:

f 0 = F0 Fc , f I DRFM = FI DRFM Fc , f D = FD Fc ,

 1   1 
n = 0,1,… , K − 1 , M min = −   and M max =  .
 2 Nf 0   2 Nf 0  Fig. 2 – Jamming and true signal spectra signal centered of f0
14th European Signal Processing Conference (EUSIPCO 2006), Florence, Italy, September 4-8, 2006, copyright by EURASIP

4. THE DETECTION/CLASSIFICATION SCHEME where k = 0,1, , 2 , Pr { H k z} is the a posteriori probabil-


The detection problem and the classification between true ity of H k and f z H k (z H k ) is the data probability density
target and jammer is formulated here as a multiple hypothe-
ses testing (MHT) problem on the complex measured vector function (pdf) conditioned to hypothesis H k .
z = [ z (0) z (1) z ( K − 1)]T recorded by the radar during In this work we propose a different approach that exploits
the time-on-target (ToT), where K is the number of samples the presence in the jamming spectrum of spurious terms due
collected by the radar during a single pulse. to the phase quantization. Based on the spectral shape of true
Under the null hypothesis (H0) it is assumed that the data target and jamming signal, it is clear that a filter matched to
consist of disturbance d (clutter plus thermal noise). Under the true target s1 = α p does not allow the radar system to
the alternative hypotheses it is instead assumed that the data distinguish between target and jammer, because both signals
consist of the sum of disturbance and signal backscattered by present a spectral peak at the frequency fD. The difference is
the true target (H1) or the jammer (H2) Therefore, we formu- in the spurious spectral lines centered at f s = ( Nm + 1) f 0 ,
late our MHT problem as follows [7]: with m ≠ 0 , that would be cancelled by a narrowband
matched filter centered on fD.
H0 : z = d (7) As already said, the classifier should exploit the informa-

 H k : z = d + sk , k = 1, 2. tion contained in the JSEA for classification purposes and
measure it from the observation vector. A similar operation is
Denote by Pk = Pr { H k } the a priori probability of hy- performed by the ACE (Adaptive Coherence Estimator) de-
tector [8,9]:
{Pk }k = 0
2
pothesis H k . We assume that are unknown, but
2
those pertaining to the two target classes are the same,1 i.e., p H S −1 z
P1 = P2 = (1 − P0 ) 2 , where P0 is the probability of the hy- l ACE (z ) = . (9)
pothesis H0.
(p H
S −1p )( z H S −1z )

The detection/classification scheme should detect the


It is easy to observe that, if the noise is negligible and
presence of a target and correctly classify it. In this work we
S=I, where I is the NxN identity matrix, l ACE = cos 2 µ ,
suppose the true target s1 = α p , where α is a complex
where µ is the JSEA. Then, l ACE uses the measure of the
Gaussian random variable with zero mean and variance σ α2 ,
angle between known target steering vector and observation
in short notation α ~ CN (0, σ α2 ) . The steering vector p is vector for detection purposes and originally, it was thought in
assumed a priori known, p(n) = e j 2π f D n , where fD is the Dop- the adaptive form, that is, it estimates the covariance matrix
pler frequency of the true target normalized to the pulse repe- of the disturbance using secondary vectors.
tition frequency (PRF) of the radar. The jamming signal vec- In this work we assume a priori knowledge of the distur-
tor is s 2 = β p j , where β is a complex Gaussian random bance covariance matrix, i.e., S=M (otherwise it can be esti-
mated as described in [10]), and we use l ACE as a classifier.
variable with zero mean and variance σ β2 , in short notation Then the detection/classification scheme is composed of two
β ~ CN (0, σ β2 ) . The vector p j is unknown. The distur- blocks as shown in Fig. 3.
bance d is modeled as complex Gaussian distributed random The first one is a whitening matched filter [11]. It acts as
vector with zero-mean and correlation matrix a detector, then it tests hypothesis H0 against H1+H2,
M d = E{zz } = σ d M , where ( ⋅)
H 2 H
is the conjugate- 2
p H M −1z H1 + H 2

transpose operator, σ is the power of each disturbance


2
lGLRT (z ) = > η
< (10)
d
p H M −1p H0
component, and M is the normalized covariance matrix, i.e.
[M ]i ,i = 1 for i = 1, 2, , N . We assume here that M is
If the threshold η is exceeded the target is declared pre-
full-rank. In shorthand notation d ~ CN (0, σ d2 M ) .
sent without any other information, if not, the target is de-
If P0 , P1 , P2 and p j were known we could use the clared absent. In the first case, in the second block, the sys-
maximum a posteriori (MAP) criterion and decide in favor of tem tries to classify the signal as true target or jamming [12]:
one of the three hypotheses according to the following rule:
2
p H M −1 z H
lGLRT (z ) >1
Hˆ k : k = arg max Pr { H k z} = arg max f z H k (z H k ) Pk (8) l ACE (z ) = = λ (11)
k k (p H
M −1p )( z H M −1z ) ( z H M −1z ) H<2
1
This assumption is somewhat artificial, but necessary to come up with a If the threshold λ is exceeded, that is, if the cos 2 of the
practical decision strategy. However, if some a priori information is avail- estimated JSEA µ̂ is greater than λ , the target is classified
able, it can be easily taken into account in the selection of the decision
thresholds.
14th European Signal Processing Conference (EUSIPCO 2006), Florence, Italy, September 4-8, 2006, copyright by EURASIP

as true, if not it is classified as jammer. Being l ACE = cos 2 µˆ ,


the threshold λ spans in the interval [0,1]. as the probability of label the target as true when a jamming
signal is present and

H0
PE H 2 = Pr{Hˆ 1 H 2 } = Pr{lGLRT (x) > η , l ACE (x) > λ H 2 } (17)
H1 + H 2

lGLRT (z ) >
< η
H0
as the probability of label the received signal as jamming
when a true target is present.
H1+H2

H1 5. NUMERICAL RESULTS

l ACE (z ) <
H2 In this section we report some numerical results of our
performance analysis. In Figs. 4 and 5 we report the prob-
Hˆ k , k = 1, 2 abilities of classification PC H1 and PC H 2 for M=2, K=32 and
PFA=10-4. The color relates to the value of the probability of
Fig. 3 – Detection/classification scheme classification, the x-axis represents the threshold of the ACE
detector and the y-axis represents the target signal-to-noise
power ratio SNRt = σ α2 σ d2 in Fig. 4, and the jamming-to-
To evaluate the performance of the proposed scheme, we
calculated the probability of false alarm (PFA), the probability noise power ratio SNR j = σ β2 σ d2 in Fig. 5.
of detection (PD), and the probability of correct classification In the Monte Carlo simulations the jamming steering vec-
(PC). tor p j has been normalized to have same norm as p . We set

The probability of false alarm is given by the probabil- the target Doppler frequency FD = 100 KHz , the intermedi-
ity of deciding that a target is present, belonging to any of the ate frequency of the DRFM FI DRFM = 100 MHz and the sam-
possible classes, when the null hypothesis is the correct one. pling frequency FC = 1.024 GHz .
Therefore, PFA = Pr{lGLRT (x) > η H 0 }.
In the SNRt and SNR j ranges of values we analyzed, the
The probability of correct classification is defined as detection probability PD is unitary. With high values of the
the probability of deciding for the correct hypothesis when a threshold and of the signal-to-noise ratios the probability of
target is present, that is PC = P1 PC H1 + P2 PC H 2 where we de- correct classification, conditioned to each hypothesis is al-
most unitary.
fined PC H k = Pr{Hˆ k H k } , for k=1,2, then This results is confirmed by Fig. 6, where we report the
overall PC . In this figure we set SNRt = SNR j = SNR and
PC H1 = Pr{lGLRT (x) > η , l ACE (x) > λ H1} (12) again M=2, K=32, and PFA=10-4.

and

PC H 2 = Pr{lGLRT (x) > η , l ACE (x) < λ H 2 } (13)

The probability of detection is defined as the probability


of declaring a target to be present, whichever the class the
target belongs to, so we have PD = P1 PD H1 + P2 PD H 2 where:

PD H1 = Pr{Hˆ 12 H1} = Pr{lGLRT (x) > η H1} (14)

and

PD H 2 = Pr{Hˆ 12 H 2 } = Pr{lGLRT (x) > η H 2 } (15)

It is also useful to calculate the probability of error condi-


Fig. 4 – Probability of correct classification of the true target
tioned to hypotheses H1 and H 2 . We define

PE H1 = Pr{Hˆ 2 H1} = Pr{lGLRT (x) > η , l ACE (x) < λ H1} (16)
14th European Signal Processing Conference (EUSIPCO 2006), Florence, Italy, September 4-8, 2006, copyright by EURASIP

[2] M. Greco, F. Gini, A. Farina, “Combined effect of


phase and RGPO delay quantization on jamming sig-
nal spectrum,” IEEE International Radar Conference,
May 2005, Arlington, VA, USA.
[3] J. W. Goodman, M. Silvestri, “Some Effects of Fou-
rier- Domain Phase Quantization”, IBM J. Res. De-
velop., September 1970.
[4] S. D. Berger., “Digital Radio Frequency Memory
Linear Range Gate Stealer Spectrum”, IEEE Trans.
on Aerospace and Electronic System, Vol. 29, April
2003, pp. 725-735.
[5] M. Knaak, S. Araki, S. Makino, ”Geometrically Con-
straint ICA for Convolutive Mixtures of Sound”, Pro-
ceedings of ICASSP ‘03 Conference, Vol.2, April
2003, pp. 725-8.
Fig. 5 – Probability of correct classification of the jamming signal [6] S. Ramphashad, T. W. Parks, R. Shenoy, “Signal
Modeling and Detection Using Cone Classes”, IEEE
Trans on Signal Processing, Vol. 46, No. 2 February
1996, pp. 329-338.
[7] F. Gini, A. Farina, M. Greco, “Radar Detection and
Pre-Classification Based on Multiple Hypotheses
Testing,” IEEE Trans. on Aerospace and Electronic
Systems, Vol. 40, No. 3, pp. 1046-1059, July 2004.
[8] F. Gini, M. Greco, M. Diani, and L. Verrazzani, “Per-
formance Analysis of Adaptive Radar Detectors
Against Non-Gaussian Real Sea Clutter Data,” IEEE
Trans. on Aerospace and Electronic Systems, vol. 36,
No. 4, pp. 1429-1439, October 2000.
[9] S. Kraut, L.L. Sharf, R. W. Buther, “The Adaptive
Coherence Estimator: A Uniformly most-Powerful-
Invariant Adaptive Detection Statistic,” IEEE Trans
on Signal Processing, Vol. 53, No. 2, pp. 427-438,
February 2005.
Fig. 6 – Probability of correct classification [10] F. Gini and J. H. Michels, “Performance Analysis of
Two Covariance Matrix Estimators in Compound-
Gaussian Clutter,” IEE Proceedings Part-F, vol. 146,
Based on our first encouraging results, we can conclude No. 3, pp. 133-140, June 1999.
that the proposed two-step detection/classification algorithm
is effective and easy to implement. [11] F. Gini, A. Farina, “Vector Subspace Detection in
A different approach to this multi-hypothesis detection Compound-Gaussian Clutter. Part I: Survey and New
problem could make use of the results in [13] concerning the Results,” IEEE Trans. on Aerospace and Electronic
problem of robust adaptive radar detection in the presence of Systems, Vol. 38, No. 4, pp. 1295-1311, October
steering vector mismatches. This is the subject of current 2002.
research. [12] N. B. Pulsone, C. M. Rader, “Adaptive Beamformer
Orthogonal Rejection Test, IEEE Trans on Signal
Processing, Vol. 49, No. 3, March 2001, pp. 521-
REFERENCES 529.
[1] S. J. Roome, “Digital Radio Frequency Memory”, [13] A. De Maio, “Robust adaptive radar detection in the
Electronic & Communication Engineering Journal, presence of steering vector mismatches,” IEEE Trans.
August 1990. on Aerospace and Electronic Systems, Vol. 41, No. 4,
pp. 1322 - 1337, October 2005.

View publication stats

You might also like