Networking radar anti-cheating interference method based on signal level fusion

A technology of deceptive jamming and signal level fusion, which is applied in the field of networked radar anti-spoofing jamming based on signal level fusion, can solve the problem that the anti-jamming ability cannot be fully exerted, the location of networked radar stations is not ideal, and other information is not effective issues such as the use of

Active Publication Date: 2015-10-21
XIDIAN UNIV
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since each node radar in the networked radar will be subject to deceptive interference, dense false targets will lead to a high error rate in the correlation test between the measured values ​​​​of each node radar, and the location of the networked radar station is not ideal , will also affect the ability of the networked radar to resist deceptive jamming
[0004] Existing networked radars use data-level fusion to counteract deceptive jamming. In the process of measuring targets, only the point track information or track information of the target is used, but other information is not effectively used. Therefore, , the data-level fusion anti-jamming method cannot fully exert its anti-jamming ability, and cannot make full use of the advantages of radar networking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Networking radar anti-cheating interference method based on signal level fusion
  • Networking radar anti-cheating interference method based on signal level fusion
  • Networking radar anti-cheating interference method based on signal level fusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] refer to figure 1 , which shows a flow chart of a method for anti-spoofing jamming of networked radar based on signal level fusion according to an embodiment of the present invention. This embodiment may specifically include the following steps:

[0065] Step 1, calculate the complex amplitude of the echo data of the point target after the matched filtering, and construct the slow-time random complex envelope sequence of each point target in the multiple node radars according to the complex amplitude.

[0066] In this embodiment, it is assumed that the networked radar includes n node radars, where n≥2, and it is assumed that the echo data of the point target after the matched filtering includes P point targets.

[0067] Step 1 described in this embodiment includes the following sub-steps:

[0068] 1a) Assuming that the networked radar includes n node radars, where n≥2, each node radar receives the echo data, and uses the following formula to perform matching filtering ...

Embodiment 2

[0124] refer to figure 2 , showing a flow chart of a networked radar anti-spoofing jamming method based on signal level fusion according to an embodiment of the present invention,

[0125] In this embodiment, it is assumed that the networked radar includes n node radars, where n≥2, and it is assumed that the echo data of the point target after the matched filtering includes P point targets.

[0126] This embodiment may specifically include the following steps:

[0127] Step 201, get the slow-time random complex envelope sequence of each target of the i-th node.

[0128] It should be noted that the step 201 corresponds to the step 1 in the first embodiment, and reference may be made to the related description of the step 1 in the first embodiment, which will not be repeated here in this embodiment.

[0129] Step 202, get the slow-time random complex envelope sequence of each target of the jth node.

[0130] It should be noted that the step 202 corresponds to the step 1 in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a networking radar anti-cheating interference method based on signal level fusion, and the method can achieve the effective discrimination of false targets generated by different cheating interferences. The method comprises the steps: 1, building slow-time random complex envelope sequences of each point target at a plurality of junction radars; 2, estimating the mean power of each point target at each junction radar; 3, enabling the slow-time random complex envelope sequences of the same point target at the plurality of junction radars to be combined in a paired manner to form a plurality of envelope groups, and estimating a correlation coefficient; 4, selecting the real part of the correlation coefficient of each envelope group as the correlation tolerance; 5, calculating the detection threshold of the correlation tolerance corresponding to each envelope group; 6, judging whether the correlation tolerance is greater than the detection threshold or not: judging that the envelope groups pass through false target examination if the correlation tolerance is not greater than the detection threshold, or else, marking two corresponding point targets as false targets; 7, eliminating the false targets.

Description

technical field [0001] The invention relates to the field of radar technology, in particular to a method for anti-spoofing jamming of networked radar based on signal level fusion. Background technique [0002] Electronic spoofing technology is dedicated to deceiving the victim radar in terms of information such as direction, position, and tracking starting point, or creating so many false targets around the real target echo that the real target information cannot be extracted. One effective class of spoofing techniques is deceptive spoofing techniques. The purpose of deception is to mislead the amplitude, phase and other information of the echo received by the radar through modulated transmission or forwarding. In particular, the emergence of digital radio frequency memory (Digital Radio Frequency Memory, DRFM) has made deceptive jamming technology more mature, and transponder jammers using DRFM are widely used in self-defense jamming and team jamming. Deceptive jamming wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G01S7/36
CPCG01S7/36
Inventor 刘楠李升远郭玉梅张林让周宇赵珊珊
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products