You are on page 1of 16

Amity Institute of Defence Technology

Minor Project (ETMN602) 


Proposed Title:
Study of Antistealth technology in Radar system .

Faculty Guide: Dr Malay Ranjan Tripathy   Student Name: Ananya, Mayank, Ajit & Vividha
Designation: Project Guide
Enroll. No.: A177158821008, A177158821011,
A177158821025 & A177158821060
Faculty Guide: Dr. Manish Chauhan 
Programme: M.Tech. Defence Technology
Designation: Project Co-Guide

1
Amity Institute of Defence Technology

Index
Followings will be covered:
 Introduction
 Literature Review
 Objectives
 Methodology
 Results and Discussion
 Conclusion
 References

2
Amity Institute of Defence Technology

Introduction

• Countering Stealth Aircraft Technology: The Race to See through “Invisibility”


• Stealth technology, also termed low observable technology (LO technology),
which is a sub-discipline of military tactics and passive and active electronic
countermeasures, which covers a range of methods used to make
personnel, aircraft, ships, submarines, missiles, satellites and ground
vehicles less visible (ideally invisible) to radar infrared, sonar and other
electromagnetic spectrum (i.e., multi-spectral camouflage).
• The concept of Antistealth is to operate or unhide while giving enemy forces no
indication as to the presence of friendly forces.

3
Amity Institute of Defence Technology

Literature review

• Looking out for various articles ,research papers and looking on internet .
• Studying the implementation method of various Stealth technologies used to hide .
• Reading more about the V/UHF radars have good chances of detecting stealth aircraft. Since
their wavelength (1-2 m) is of around the same magnitude as the prominent features on many
stealth jets, their signal is echoed by a resonant effect that is unaffected by stealth shaping or
RAM coatings .
. Analysing the possible threats scenarios where the current system can be compromised.
• Rechecking and improvising our proposed mechanism, using an iterative approach based on
objectives achieved and problems faced.
• Analysing the optimizations achievable.

4
Amity Institute of Defence Technology

Literature review
CHINESE YLC-8B RADAR ON DISPLAY

The YLC-8E UHF-band 3D surveillance radar system as


well as anti-drone radars like the YLC-48 portable
multipurpose reconnaissance radar at the Ninth World
Radar Expo in Nanjing. These radars are already
deployed by China with the YLC-8E tracking the US
stealth aircraft.

5
Amity Institute of Defence Technology

Objectives

•  To detect personnel, aircraft, ships, submarines, missiles, satellites


and ground vehicles less visible (ideally invisible) to radar infrared, sonar and
other electromagnetic spectrum (i.e., multi-spectral camouflage).
 Avoid spoofing
• To optimize the cost of manufacturing and operating
To avoid sudden attack done by enemy by using stealth technology
 To make defence sector strong and efficient in every kind of attack done by
enemy.

6
Amity Institute of Defence Technology

Methodology
Following things to be carried out:

 Studying about stealth technology and its implementation .


 Implementing theoretical approach to the V/UHF radars
 Studying about RAM coating and material used for the same.
 Studying about the China’s Antistealth radar
 Studying about network of V/UHF Active Electronically Scanned Array (AESA) radar
systems, all connected by high-speed data-link

7
Amity Institute of Defence Technology

Results & Conclusion


• Improving security
• Encrypted state transmission
• Better than PRF
• Cost optimization
• Reduced duty cycle
• Less transmitters
• Application developed
• Alert intrusion
• Monitor status

8
Amity Institute of Defence Technology

Results & Conclusion

9
Amity Institute of Defence Technology

Results & Conclusion

10
Amity Institute of Defence Technology

Results & Conclusion

11
Amity Institute of Defence Technology

Results & Conclusion

12
Amity Institute of Defence Technology

Results & Conclusion


• Steps overview:
• Transmission to be from start node, to end node via intermediary nodes.
• |Nend| <----- |Nmid| <----- |Nstart|
• Fence state calculated
• Bits represent state of current node
• Left shifted to node number
• OR with current state
• Timestamp counter incremented
• Random number generated (seed)
• H(Device key (+) Seed) calculated, gives Km (Message key)
• (Km (+)  (Timestamp | Fence state) ) | Seed, gives Data 
• Calculate (Kf (+) Data | CRC32(Data)) and transmit.
• During decryption at receiving node, same steps in reverse order.
• End node transmits fence state over network
• Application end displays state of fence.
13
Amity Institute of Defence Technology

Results & Conclusion


• Conclusions
• Reduced on time, hence power consumption & operation cost
• 10khz, diode dependent
• Approx. 500 Bytes/Second data rate taken
• Packet approx. 15 Bytes.
• Ton / Ttotal (15 * 4 packet/second)/500, approx. 12% usage, 88% saving
• Reduced number of wireless transmitters, hence reduced cost
• Total nodes – 1
• Last node transmits to server
• Security
• Beam spoofing
• PRF replaced with PSK encryption, key not known to attacker.
• Beam bending
• Intensity measured
• Replay attack
• Timestamp counter

14
Amity Institute of Defence Technology

References
• F. J. Lopez-Martinez, G. Gomez; and J. María Garrido Balsells, “Physical-Layer
Security in Free-Space Optical Communications”, IEEE Photonics Journal, vol. 7,
no. 2, pp. 1-14, 2015.
• R. Ildarabadi, and Z. Keramat, “Laser based security fence to protect military and
administrative organs”, in 12th International Conference on Technical
and Physical Problems of Electrical Engineering, 2016, p.p. 1-6.
• T. Heil et al., "ON/OFF phase shift keying for chaos-encrypted communication
using external-cavity semiconductor lasers," in IEEE Journal of Quantum
Electronics, vol. 38, no. 9, pp. 1162-1170, Sept. 2002, doi:
10.1109/JQE.2002.801950.
• Anjesh Kumar, et. al. International Journal of Engineering Research and
Applications ISSN: 2248-9622, Vol. 10, Issue 6, (Series-VIII) June 2020, pp. 56-
60 15
Amity Institute of Defence Technology

Other References
• Chunjuan Wei, Junjie Yang, Wu Zhu, Jian Lv, “A Design of Alarm System
for Substation Perimeter Based on Laser Fence and Wireless Communication”,
2010 International Conference on Computer Application
and System Modeling (ICCASM 2010)
• M. A. Khalighi and M. Uysal, "Survey on Free Space Optical Communication: A
Communication Theory Perspective," in IEEE Communications Surveys &
Tutorials, vol. 16, no. 4, pp. 2231-2258, Fourthquarter 2014, doi:
10.1109/COMST.2014.2329501.
• H. A. Aljenabi, H. J. Kbashi, Y. I. Alshomary, “Free space digital
laser communication system based on microcontroller,” Atti Della Fondazione
Giorgio Ronchi Anno LXIII, no. 4, pp. 543–548, 2008. 

16

You might also like