Optimizing ECM techniques against monopulse acquisition and

advertisement
Calhoun: The NPS Institutional Archive
Theses and Dissertations
Thesis and Dissertation Collection
1989-09
Optimizing ECM techniques against
monopulse acquisition and tracking radars
Kwon, Ki Hoon
Monterey, California. Naval Postgraduate School
http://hdl.handle.net/10945/26140
-
NAVAL POSTGRADUATE SCHOOL
Monterey
,
California
THESIS
K11
OPTIMIZING ECM TECHNIQUES AGAINST
ACQUISITION
MONOPULSE
AND TRACKING RADARS
by
Kvvon, Ki
I
loon
September 1989
Thesis Advisor
Approved
for public release; distribution
R.L. Partelow
is
unlimited.
A
Unclassified
ecunty classification of
this
page
REPORT DOCUMENTATION PAGE
a Report Security Classification
Security Classification Authority
la
3
Distribution Availability of Report
Approved
2b Declassification Downgrading Schedule
Performing Organization Report Number(s)
Name
6a
Naval Postgraduate School
CA
Monterey,
8a
Name
5
(if applicable)
is
unlimited.
Monitoring Organization Report Number(s)
7a
3
and ZIP code)
7b Address
(city, slate,
Monterev,
93943-5000
of Funding Sponsoring Organization
for public release; distribution
Name of Monitoring Organization
Naval Postgraduate School
6b Office Symbol
of Performing Organization
6c Address (city, state,
Markings
lb Restrictive
Unclassified
8b Office Symbol
CA
and ZIP code)
93943-5000
9 Procurement Instrument Identification
Number
(if applicable)
8c Address
ii Title
(city, state,
and ZIP code)
10 Source of Funding
Numbers
Program Element No
Project
No
Task
No
Work
Unit Accession
No
OPTIMIZING ECM TECHNIQUES AGAINST MONOPULSE ACQUISITION AND
(include security classification)
TRACKING RADARS
Personal Author(s)
Kwon. Ki Hoon
13a Type of Report
13b Time Covered
Master's Thesis
From
1<1
To
Date of Report
i
year, month, day)
15
September 1989'
Page Count
73
The views expressed in this thesis are those of the author and do not reflect the official policy or poof the Department of Defense or the U.S. Government.
Supplementary Notation
16
sition
Cosati Codes
18 Subject
Group
Field
Subgroup
Terms
I
continue on reverse
if
necessary and identify by block number)
ECM.monopulse.monopulse radar
continue on reverse if necessary and identify by block number)
techniques against monopulse radars, which are generally employed in the Surface-to-Air Missile targeting system,
ire presented and analyzed.
Particularly, these
techniques classified into five different categories, which are; denial
lamming, deception jamming, passive countermeasures, decoys, and destructive countermeasures. The techniques are fully
techniques are
discussed. It was found difficult to quantize the jamming effectiveness of individual techniques, because
nvolved with several complex parameters and they are usually entangled together. Therefore, the methodological approach
tor optimizing
techniques is based on purely conceptual analysis of the techniques.
[19
Abstract
i
ECM
ECM
ECM
ECM
Distribution Availability of Abstract
S
la
unclassified unlimited
Nan?
of
O
same
21 Abstract Security Classification
as report
DT1C
Unclassified
users
22b Telephone
Responsible Individual
D FORM
14"3.84
i
include Area
(408) 646-2726
l.L. Partelow
MAR
83
APR
edition
may
be used until exhausted
code
22c Office Symbol
62PW
security classification of this page
All other editions are obsolete
Unclassified
T245265
Approved
for public release; distribution
Optimizing
ECM
is
unlimited.
Techniques Against Monopulse
Acquisition and Tracking Radars
by
Kwon, Ki Hoon
Major, Korean Air Force
B.S.,
Korean Air Force Academy, 1980
Submitted
in partial fulfillment
of the
requirements for the degree of
MASTER OF SCIENCE
IN SYSTEMS ENGINEERING
(ELECTRONIC WARFARE)
from the
NAVAL POSTGRADUATE SCHOOL
September 1989
ABSTRACT
ECM
techniques against monopulse radars, which are generally employed in
the Surface-to-Air Missile targeting system, are presented and analyzed.
ularly, these
ECM
techniques classified into five different categories, which are;
denial jamming, deception jamming, passive countermeasures, decoys,
structive countermeasures.
difficult to
ECM
The techniques
are fully discussed.
It
and de-
was found
quantize the jamming effectiveness of individual techniques, because
techniques are involved with several complex parameters and they are
usually entangled together.
ing
Partic-
ECM
techniques
is
Therefore, the methodological approach for optimiz-
based on purely conceptual analysis of the techniques.
111
.
C.l
TABLE OF CONTENTS
INTRODUCTION
I.
A.
B.
C.
II.
1
BACKGROUND
1
COMPARISON OF SEQUENTIAL AND MONOPULSE RADARS
OVERVIEW
MONOPULSE TRACKING RADAR SYSTEMS
A.
MONOPULSE CONCEPT
B.
TWO
DISTINCTIVE CATEGORIES
1.
Amplitude-Comparison Monopulse Radar
2.
Phase-Comparison Monopulse Radar
ECM TECHNIQUES AGAINST MONOPULSE RADARS
DENTAL JAMMING
A.
III.
C.
6
7
7
7
7
11
15
15
Swept Spot Jamming
16
2.
Barrage Jamming
17
3.
Blinking
17
1
B.
3
DECEPTION JAMMING
20
1.
Range Gate Walkoff
21
2.
Velocity Gate Walkoff
22
3.
Skirt
4.
Delta
5.
Image Jamming
6.
Cross-Polarization
7.
Cross- Eye
PASSIVE
Frequency Jamming
23
Jamming
25
26
Jamming
28
Jamming
30
COUNTERMEASURES
38
1.
Chaff
38
2.
Radar Absorbing Material
40
3.
Stealth
40
IV
D.
E.
DECOYS
41
1.
Expendable Jammer
41
2.
Remotely Piloted Vehicle
42
DESTRUCTIVE COUNTERMEASURES
1.
Anti-Radiation Missile
42
2.
Wild Weasel Tactics
43
ANALYSIS OF ECM TECHNIQUES
IV.
A.
DENIAL JAMMING
C.
D.
E.
45
45
Swept Spot Jamming
46
2.
Barrage Jamming
46
3.
Blinking
47
1
B.
42
DECEPTION JAMMING
47
1.
Range Gate Walkoff
48
2.
Velocity Gate Walkoff
48
3.
Skirt
4.
Delta
5.
Image Jamming
6.
Cross-Polarization
7.
Cross- Eye
PASSIVE
Frequency Jamming
48
Jamming
49
49
Jamming
Jamming
COUNTERMEASURES
49
49
50
1.
Chaff
50
2.
Radar Absorbing Material
51
3.
Stealth
51
DECOYS
52
1
Expendable Jammer
52
2.
Remotely Piloted Vehicle
52
DESTRUCTIVE COUNTERMEASURES
52
1.
Anti-Radiation Missile
52
2.
Wild Weasel Tactics
53
V.
CONCLUSION
LIST
54
OF REFERENCES
57
INITIAL DISTRIBUTION LIST
59
VI
LIST OF FIGURES
Figure
1.
Lobe switching antenna patterns
in
one dimension,
(a)
Polar
form.(b) Rectangular form
Figure
2.
Two
categories of sequential lobing. (a)
tern in
Figure
3.
3
two dimension,
(b)
Lobe switching beam
pat-
Conical scan with 8 beams per scan.
Monopulse antenna patterns (Polar and Rectangular form) and
4.
5.
9
Block diagram of two-coordinate (azimuth and elevation)
amplitude-comparison monopulse tracking radar
Figure
6.
Antenna beam radiation patterns
in
10
phase-comparison
monopulse radar
Figure
7.
er-
Block diagram of amplitude-comparison monopulse radar (one
angular coordinate)
Figure
4
8
ror signal
Figure
.
12
Wavefront phase relationships
in
phase comparison monopulse
radar
13
Figure
S.
Swept spot jamming
16
Figure
9.
Barrage jamming
17
Figure
10.
Figure
1
Figure
12.
Block diagram of the
Figure
13.
Waveform
Figure
14.
Delta jamming block diagram
26
Figure 15.
Image jamming block diagram and waveforms
27
Figure
Block diagram of cross-polarization pulse repeater
28
Figure 17.
Components of
29
Figure
IS.
Cross-eye concept applied to a radar
Figure
19.
Sum
1.
16.
Blinking
jamming waveforms
18
Blinking, synchronized multiaircraft
skirt
19
frequency jamming
of skirt frequency
24
jamming
25
polarization
channels for monopulse receiver,
31
(a)
One
source, (b)
Two
sources
Figure 20.
33
Difference channels for monopulse receiver, (a)
Vll
One
source, (b)
Two
Figure 21.
34
sources
Patterns of the difference channel divided by
sum
channel, (a)
source, (b)
Two
Figure 22.
Warped phase
front
Figure 23.
Block diagram of basic repeater type cross-eye system
Figure 24.
Block diagram of cross-eye system using two separate repeater
One
sources
35
36
37
38
path
Figure 25.
Barrage jamming power vs bandwidth
46
Figure 26.
Block diagram of integrated deception jammer
55
Vlll
LIST OF ABBREVIATIONS
AAA
AGC
Automatic Gain Control
ALARM
Air Launched Anti-Radiation Missile
AM
ARM
DECM
Amplitude Modulation
DINA
Direct Noise Amplification
ECCM
ECM
Electronic Counter Countermeasures
EJ
Expendable Jammer
EW
Electronic
FM
Frequency Modulation
HARM
High-speed Anti-Radiation Missile
IF
Intermediate Frequency
INS
Inertial
IR
Infra
MTI
Moving Target Indicator
PRF
Pulse Repetition Frequency
P\Y
Pulse
RADAR
RAdio Detection And Ranging
RAM
Radar Absorbing Material
RAS
RCS
Radar Absorbing Structure
RF
Radio Frequency
RGWO
Range Gate Walkoff
RPV
Remotely Piloted Vehicle
RWR
SAM
Radar Warning Receiver
Anti-Aircraft Artillery
Anti-Radiation Missile
Deception (Deceptive)
ECM
Electronic Countermeasures
Warfare
Navigation System
Red
Width
Radar Cross Section
Surface-to-Air Missile
IX
SEAD
SNR
STAR
Suppression of
TWS
TWT
UK
Track-While-Scan
Traveling
US
United States
USSR
USAF
Union of Soviet
VGWO
Velocity Gate Walkoff
Enemy Air Defense
Signal-to-Noise Ratio
Supersonic Tactical Anti-Radiation
Wave Tube
United Kingdom
Socialist Republics
United States Air Force
ACKNOWLEDGEMENT
I
am
cordially thankful to
Korean Air Force
I
sincerely
God and
I
wish to express
my
appreciation to the
for providing the opportunity to study.
want
to express
my
gratitude to
my
thesis advisor, Professor R.L.
Partelow, for his patient guidance, dedicated lengthy counsel and consecutive
support during the preparation of
this thesis.
Without
his help
my
effort
would
never have been successful.
I
am
corrects
also very grateful to Professor E.B.
my
Finally,
Rockower, who carefully reads and
script.
I
thank
to
my
wife,
Nam
Kyo,
behalf.
XI
for the
many
sacrifices
made on my
INTRODUCTION
I.
A.
BACKGROUND
(EW) has been
Electronic warfare
seeking out
enemy
targets in either
principally concerned with techniques for
normal or countermeasure environments using
enemy from
such electronic systems as radio or radar or, for preventing the
tecting
friendly targets, using electronic countermeasures
counter countermeasures
tiveness of
ECM. The
interaction between
(ECCM)
development of radar and
its
Electronic
represent techniques for reducing the effec-
EW
development of these
enemy and
(ECM).
de-
techniques was caused by the
friendly electronic systems. This
countermeasures which
is
a typical
was
true of the
example of
this
interaction process.
The word radar was
acronym derived from
a code
name used by
the phrase
the
US Navy
in 1940,
RAdio Detection And Ranging
[Ref.
and
1:
is
an
p.l].
Before world war two, radar had been developed independently and simul-
taneously
in several countries.
widespread due
During world war two, the use of radar became
to the increase of air attacks
by the
allies
and the Germans.
Since the advent of radar, air strikes have not obtained as good results.
order to thwart the operation of radar systems, both sides employed
which were made of thin aluminum
extremely effective
came designated
in
jamming
as "chaff* or
foil strips.
"window"
of electronic warfare were essentially the
[Ref. 2: p.l 15
in
same
&
devices
technique was
These objects be-
p. 252].
1950. the equipment and tactics
as those of world
war two. Nev-
warfare was indispensable by the end of 1951. According to
the official united states air force
would have been
ECM
the radar systems of that time.
During the Korean war which broke out
ertheless, electronic
This kind of
ECM
In
(USAF)
triple the actual losses
without the use of electronic warfare [Ref.
history, the aircraft
during the
3].
last
and crew
losses
two years of the war,
In the
(AAA)
losses
stalled
Vietnam war, surface
to air missiles
campaign during the
greatly impacted the air
from the enemy ground threat, individual
which were
flexible
threat [Ref. 2: p.253, Ref.
In the
Yom
Israeli aircraft
3:
searching for
US
were shot down by the new Egyptian
new
of air operations,
it
SAM
systems which
essential
is
in-
countermeasure techniques or
SAM
30%
and
of the prewar
AAA
systems
systems.
responses to changing threats,
modern warfare,
had "PODS"
This war showed that old countermeasure tech-
and
familiar development pattern of radar
new
reduce the
to the ever-changing radar
Kippur war of October 1973, approximately
is
to
nullify
to destroy
its
countermeasures,
apparent.
utilize acquisition
dars are major threats for hampering air operations.
to
fighters
To
pp.2-3].
niques were inadequate against the
The now
anti-aircraft artillery
initial stages.
jamming systems, adapted
[Ref. 3: p. 3, Ref. 4: pp. 36-39].
In
(SAM) and
the
them.
and tracking
ra-
In order to achieve the goal
SAM
batteries
When we
using
proper
apply countermeasures
radar system, we need an understanding of the various types of radar systems
and
Each type makes use of
their principles of operations.
a variety of different
techniques that are vulnerable to varying degrees.
The main
pioneered
topic of this thesis
in the
US
in
related to
is
the late 1940s
monopulse radar. Monopulse radar,
and early 1950s,
tracking of targets for anti-aircraft missile systems,
the
USSR
for the
same
function.
It
is
intrinsically
earlier conical scan type radars to deceptive type
those
ECM
more
precise
being widely deployed by
much
less
vulnerable than
countermeasures, specifically
techniques which generate spurious data on aircraft position in
azimuth, elevation and range.
Due
to the several
dars, the Soviets have been using increasing
aircraft missile systems, both
The
is
to provide
advantages of monopulse
numbers of them with
ra-
their anti-
ground and ship based.
objective of this thesis
is
to
determine optimum
ECM
techniques which
apply against the monopulse acquisition and tracking radars that are used for
SAM
targeting.
COMPARISON OF SEQUENTIAL AND MONOPULSE RADARS
B.
According
categories.
(TWS)
second,
to angle tracking
They
radar.
TWS
method, tracking radars
are the continuous tracking radar
The
first
radar,
fall
into
two
distinct
and the track-while-scan
provides continuous tracking data on a single target, the
provides
near simultaneous tracking data on multiple
targets.
In continuous tracking radar, the
by
a
antenna
servomechanism actuated by an error
is
pointed at the selected target
signal. Several techniques are
used for
the detection of target angular errors.
One method
ror
is
is
of obtaining the direction and the magnitude of the angular er-
lobe switching, also called sequential switching or sequential lobing, which
done by alternatively changing the antenna beam between two
method generates two overlapping beams which have
in
one coordinate as shown
in
Figure
1
positions.
This
a small angular separation
[Ref. 5: pp. 153- 154].
Switchi ng axis
Beam
Beam
position #1
position
#2
Beam
Beam
position #1
position
#2
# Target
Angle
(a)
Figure
1.
Lobe switching antenna patterns
Rectangular form.
(b)
in
one dimension,
(a)
Polar fonn.(b)
In order for lobe switching to complete angle tracking in elevation
requires a
minimum
This
also true in
azimuth,
it
Figure 2
(a).
is
of four successive
monopulse, but
beam
it is
shown
positions as
not successive
and
in
beams but
simultaneous beams.
Rotation
Azimuth
«*,
\
c
o
>
0)
LU
^r
(b)
(a)
Figure
2.
Tmo
categories of sequential lobing. (a) Lobe switching
two dimension,
Another method
is
(b) Conical scan with 8
conical scanning.
switching technique.
The beam
around the crossover
axis, rather
discrete positions.
It
is
For example,
shown
in
if
is
logical extension of the
is
continuous
lobe
in conical scan,
when each transmitted
the scanning rate
is
pulse re-
forty times per second,
and
320 pulse per second, there are eight beam posi-
Figure 2
and conical scan, are included
scan.
than stepwise motion of the beam between four
Even though the beam motion
the pulse repetition frequency
tions per scan as
a
in
rotates continuously in a circular path, centered
the receiving target echo will be displayed only
aches the target.
beams per
beam pattern
in the
(b).
The above two methods,
lobe switching
general term, sequential lobing [Ref.
6: p. 5].
A
methods
principal source of error in these
caused by fluctuating target cross section.
is
the fluctuation of echo signal
Pulse-to-pulsc amplitude fluctuations
of the echo signal can degrade the accuracy of the tracking radars which need
many
pulses to generate the error signal.
Another disadvantage of sequential lobing
with
its
required four
minimum
is
the limitation on the data rate
successive echo pulses for the complete angle
tracking in azimuth and elevation. This can be a serious limitation in target
There
tracking of large angular accelerations.
mechanical vibration makes
it
is
the further disadvantage that
hard to maintain accurate boresight alignment
in
conical scan radars.
In order to eliminate these
developed.
Monopulse has
and conical scan techniques
Monopulse operation
is
and other problems, monopulse techniques were
several advantages
comparing with lobe switching
[Ref. 6: pp. 6-7].
similar in concept to lobe switching, but instead of
comparing the target echoes obtained from sequential beam positions,
several target echoes simultaneously
of a single pulse.
receives
and then makes the comparisons on the basis
Therefore monopulse can provide a higher data rate than the
other techniques because angle information
Theoretically,
it
monopulse radars are
is
available from every received pulse.
free of errors
due
to pulse-to-pulse fluc-
tuations in target echo intensity because the fluctuations have no effect on the
ratio of signals received simultaneously
Assuming
Ratio
both
less
(SNRj
in
from opposing lobes during each pulse.
that the other radar parameters are the same, the Signal-to-Noise
is
higher
in
monopulse
since the
sum beam
is
pointed at the target
transmission and reception. This results in better detection capability and
tracking error due to thermal noise.
Monopulse has
better stability of the boresight axis because this technique
does not use the mechanical vibration of the feed or reflector.
In sequential lobing techniques, scanning information
unfriendly observer.
which
utilize
It
makes the radar vulnerable
that information.
during tracking.
to
is
disclosed easily to an
some countermeasures
However, monopulse transmission has no scan
In conical scan, the scan rate has an effect
the
beam
direction between transmission
certain limits.
(PRF)
Monopulse
is
cost.
In addition,
matched
one another
C.
to track
monopulse
because
pulse repetition frequency
range
in
monopulse.
the other techniques are complexity
Monopulse requires multiple
need only one.
The
maximum unambiguous
The disadvantages of monopulse over
and high
is
and reception must be the same within
free of this restriction.
the only factor limiting the
is
on tracking range. This
receivers, while the other techniques
receivers
must be well designed and
gain and phase.
in
OVERVIEW
This thesis
is
composed of
five chapters.
Chapter one describes the
differ-
ences between sequential lobing and simultaneous lobing or monopulse tracking
methods.
cially
Chapter two describes the basic principles of monopulse radars, espe-
two
distinctive categories;
amplitude-comparison monopulse and phase-
comparison monopulse. Chapter three contains various
monopulse radars
nial
in
accordance with the
ECM
techniques against
five different categories.
They
are: de-
jamming, deception jamming, passive jamming, decoys, and destructive
methods.
chapter
Chapter four analyzes these
five arrives at the
techniques.
ECM
techniques conceptually.
Finally,
conclusions regarding the employment of the various
MONOPULSE TRACKING RADAR SYSTEMS
II.
A.
MONOPULSE CONCEPT
Sequential-lobing techniques, including conical scan used earlier for target
tracking, are found to be degraded in angle tracking accuracy
target scintillation.
precise direction
To
by the
effects of
eliminate this source of error, the technique for finding
by comparing the return echo on two or more antenna lobes
si-
multaneously was developed. Sequential-lobing tracking radar including conical
minimum
scan require a
of four pulses in order to extract the angle error signal.
Monopulse tracking radar, however, needs
one pulse.
just
Pulse-to-pulse amplitude fluctuations of the echo signal have no effect on
tracking accuracy
rather than
if
the angular
many. There
measurement
are several
be obtained with only a single pulse.
multaneously
in these
is
made on
the basis of one pulse
methods by which angle error data might
More than one antenna beam
used
is
si-
methods, compared with the lobe-switching or conical scan
tracker which use one antenna
beam on
a
time-shared basis.
The angle
direction
of the echo signal can be determined in a single pulse system by measuring the
relative
phase or the relative amplitude of the echo signal received
The names simultaneous lobing and monopulse
ing techniques
in
each beam.
are used to describe those track-
which extract angle error information on the basis of
a single
pulse.
B.
TWO
1.
DISTINCTIVE CATEGORIES
Amplitude-Comparison Monopulse Radar
The
basic amplitude-comparison
two overlapping antenna beams
the target displacement by
These two beams
may
by two adjacent
feeds.
monopulse
to obtain
[Ref.
5:
pp. 160- 164] utilizes
an angle error signal. The radar senses
comparing the amplitude of the received echo
signals.
be generated with a reflector or a lens antenna illuminated
The
basic amplitude-comparison
monopulse system
is
shown
in
target
is
Figure
Figure 3
3.
deviated by an angle
ceived from that side of the
(a)
shows the overlapping antenna patterns.
from the equisignal boresight
beam
difference pattern.
axis the signal re-
pattern has a greater amplitude than that from
Figure 3 (b) shows the
the other side.
If the
The sum pattern
is
sum
pattern and Figure 3
(c)
shows the
used for target amplitude detection and
as a reference signal, while the difference patterns are used for angle discrimi-
Signals received from the
nation.
sum and
the difference patterns are amplified
separately and combined in a phase detector to produce the error signal characteristic
shown
in
Figure 3
(d).
e
(b)
1
Out
of
I
{
In
.
phase
""J
(d)
(c)
Figure
3.
Monopulse antenna patterns (Polar and Rectangular form) and error
sig-
nal.
Amplitude-comparison monopulse radars may be implemented
one or both angular coordinates.
amplitude-comparison
Figure 4 shows a
monopulse radar
for a
in either
block diagram
single angular
of the
coordinate.
The
two adjacent antenna feeds are usually connected with electromagnetic
comparison
circuits
such as a hybrid junction or
The transmission
channels.
line
phase reference information.
tor.
The
The angle
For example,
minus sign
the target
error signal
is
has a only two
provides range and
generated by phase detec-
is
(up/down).
in the case of
azimuth, plus sign could
mean
and
right-side
mean up
case of the elevation, opposite signs
left-side. In
or
down.
If
located on boresight, the difference pattern produces zero magnitude
of angular error.
The
plus
out-phase, relative to the
is
sum channel
It
sign of the difference pattern points out the detected targets direction
relative to boresight (left/right),
signal
connected to the
"magic T".
a
field
sum
and minus signs actually mean in-phase and 180°
The magnitude
or reference channel.
of angle error
proportional to the angular error and the sign of angular error
is
pro-
portional to the targets direction relative to boresight. These angular error signals
control an antenna servo
mechanism
to
perform automatic target tracking
in
an-
gular coordinates.
Transmitter
Sum channel
Duplexer
S
Mixer
IF
Range
Amp
Envelope
signal
detector
magic
Angle-error
TEE
Phase
LO
Mixer
signal
detector
IF
Amp
Antenna
feed horns
Figure
4.
Difference channel
Block diagram of amplitude-comparison monopulse radar (one angular
coordinate).
Even though phase comparison
is
comparison monopulse radar, the angular error signal
comparing the echo amplitudes from simultaneous
lationship between the signals in the offset
phase detector
is
part of amplitude-
intrinsically a
beams
is
offset
is
basically derived
by
The phase
re-
beams.
not used. The purpose of the
to conveniently provide the sign of the error signal.
Transmitter
Range
AGC
LO
9a e
'
,
£T
Duplexer
channel
Elevation
difference
channel
J
F
Envelope
Mixer -e- amp
detector
Phase
IF
Mixer 4*- amp
detector
Video
amp
Range
Elevation angle
error
Azimuth
difference
Mixer
channel
Figure
5.
IF
Phase
amp
detector
Azimuth angle
error
Block diagram of two-coordinate (azimuth and elevation) amplitude-
comparison monopulse tracking radar.
Figure 5 shows a block diagram of an amplitude-comparison monopulse
The
radar with both elevation and azimuth error signals.
makes four
partially overlapping
antenna beams. The feeds might be
a parabolic reflector, Cassegrain antenna, or a lens.
by
all
four feeds.
The
difference pattern in one plane
of two adjacent feeds and subtracting this from the
feeds.
The
cluster of four feeds
The sum pattern
is
10
is
formed
formed by taking the sum
sum
difference pattern in the orthogonal plane
the differences q[ the orthogonal adjacent pairs.
utilized with
of the other two adjacent
is
obtained by combining
Four hybrid junctions generate
three channels which are the
sum
channel, elevation difference channel and
azimuth difference channel. Three separate mixers and IF amplifiers are
one for each channel. All three mixers operate from a single
installed,
local oscillator in
order to maintain the phase relationships between the three channels.
Two
phase
detectors extract the angle error information, one for azimuth, the other for elevation.
Range information
is
extracted from the output of the
sum channel
after
envelope detection.
The monopulse antenna must generate
and
a
sum
pattern with high efficiency
a difference pattern with a large value of slope at the crossover of the offset
beams. The greater the
SNR
and the steeper the slope of the error signal
in the
measurement of
angle.
vicinity of zero angular error, the
more accuracy
in the
Moreover, the sidelobes of both the sum and difference patterns must be low.
The antenna must be capable of
the desired bandwidth, and the patterns
have the desired polarization characteristics.
these properties simultaneously.
It is
must
difficult to fully achieve of all
Thus antenna design
is
an important part of
good monopulse radar operation.
Automatic gain control (AGC)
required in order to keep a stable
is
closed-loop servo system for angle tracking.
accomplished
by
employing
a
The
AGC
proportional
voltage
IF-amplifiers output in order to control the gain of
The
AGC
results in
all
in a
to
monopulse radar
the
is
sum channel
three receiver channels.
a constant angle sensitivity regardless of target size
and
range.
2.
Phase-Comparison Monopulse Radar
In this technique target angle
signals received
5:
pp. 165- 167]
is
sensed by comparing the phase of the
by two separate antennas.
is
similar in
many ways
to
Phase-comparison monopulse [Ref.
amplitude-comparison monopulse.
However, unlike the antennas of amplitude-comparison trackers, those used
phase-comparison systems are not
axis of the
antennas are
offset
parallel.
11
from the
axis.
The
in
individual boresight
Therefore,
if
the target
is
on the antenna boresight
moves
namely,
exists
phase difference which points out the angular
phase.
If the target
is
no phase
off the antenna boresight axis, there
shift,
in
axis, there
error.
l^ ^^
/**
T^""^^^
1
Distance
between
Antenna #1
/boresight axis
antennas
-
Figure
\
l^^^
\ Antenna
[N.
/boresight axis
Antenna beam radiation patterns
6.
in
#2
phase-comparison monopulse radar.
Figure 6 shows the antenna radiation pattern for a phase-comparison
monopulse radar.
Because the antennas radiate separate parallel beams, the
amplitude of the target echo signals coming from far
the
same
value, but the phases are not the
field targets are
same depending on
tances from the target to each of the respective antennas,
phase length differences. This situation
The
tion, as
tenna
1, is
the relative dis-
i.e.,
path length or
illustrated in Figure 7.
of sight to the target makes an angle 6 to the equisignal direc-
line
shown
is
very nearly
in
Figure
7.
R
]
representing the distance to the target from an-
:
*i
and the distance
to the target
R-4-smd
from antenna 2
12
is:
(2.1)
R,
The
= R + 4-smd
difference between these offsets
(2.2)
is
AR = R 2 - R =dsmd
(2.3)
{
This can be used to determine the phase difference
A<p
— = ——
=
-
A
where X
is
the wavelength, and
d
is
a
:
sin
(2.4)
A
distance between two antenna feed horns.
Target
Antenna #2
Antenna #
Figure
7.
Wavefront phase relationships
13
in
phase comparison monopulse radar.
For small angles where
two antennas
signals in the
is
sin
6^0, the phase difference between the echo
:
Atf>*-y-rf0
There
error. It
between phase difference and angular
exists a linear relationship
may
(2.5)
be used to position the antennas via a servo-control loop.
phase-comparison principle, as applied
In the
phase difference between the signals
in
two
to missile guidance, the
fixed antennas
is
measured with a
The servo loop
servo-controlled phase shifter located in one of the arms.
the phase shifter until the difference in phase between the two channels
The amount of phase
shift
measure of the angular
which has
to be
generated to
make
is
adjusts
a null.
a null signal
is
a
error.
Both the amplitude-comparison monopulse and the phase-comparison
monopulse trackers use two antenna beams
for
one coordinate tracking.
measurements carried out by the two systems are
different
from each other.
Therefore the characteristics of the antenna beams will be different,
amplitude-comparison monopulse the two beams point
The
also. In the
in slightly different di-
rections because the antenna difference patterns are offset from the antenna
boresight
line.
This type of pattern can be generated by using one reflector with
two feed horns side by
four feed horns.
Any
side.
For two coordinate tracking,
will require at least
difference in the amplitudes between the two antenna out-
puts in the amplitude-comparison system
and not phase.
it
is
amplitude
a result of differences in
phase-comparison monopulse measures
In contrast with this the
phase differences only and
is
not concerned with amplitude difference.
Even though tracking radars based on the phase-comparison monopulse
principle have been employed, this has not been widely used
angle-tracking techniques.
that the
nas.
sum
The disadvantage of phase-comparison monopulse
signal has higher sidelobes
However,
this
compared with other
due
to the separation of the
is
two anten-
problem can be reduced by overlapping the antenna
apertures.
14
III.
ECM TECHNIQUES AGAINST MONOPULSE RADARS
DENIAL JAMMING
A.
Denial jamming
ceiver so that
used to
its
effective use
denied
is
This terminology
is
also
a noiselike signal
radar receiver bandwidth.
Maximum jamming power
vices,
[Ref. 7: p. 55].
jamming, which consists of transmitting
illustrate noise
in the victim's
defined as the technique that effects a victim radar re-
is
power supply
other components,
limitation,
output depends on the ratings of available de-
power
limitations of waveguides, antenna,
For the jammer
etc.
to get the
maximum power
per unit
bandwidth, the bandwidth should be made as narrow as possible and the
quency spectrum matched
to the victim
fre-
radar receiver. In the most cases, the de-
jamming bandwidth should be greater than
nial
and
allow for frequency set-on tolerances, drift of
the victim receiver
jammer
bandwidth
or receiver, or to
jam
to
se-
veral radar receivers simultaneously.
Denial jamming
is
to
also called noise
is
jamming. The objective of noise jamming
obscure the true target echo by inserting the jammer noise signal into the
victim radar receiver. Noise
jamming
RF
and transmitting the
carrier
wave with
noise,
is
generated by
AM
or
FM
modulating an
result at the victim radar's fre-
quency. The radar receiver detects relatively weak return signals from the target,
therefore radar receivers
must have very high
the radar to be vulnerable to noise
sensitivity.
jamming because
the
This sensitivity causes
jamming
signal
of far greater amplitude than a returning echo signal from a target.
system can detect
SNR
SNR
its
target in a
back ground of ambient
must be much greater than one
is
one or
less,
due
in
from the
target.
15
usually
The radar
However, the
order to reliably detect the target.
to the effects of noise
to evaluate the skin return
noise.
is
jamming, the radar
will not
If
be able
!
1
Denial jamming
is
often classified according to the emission bandwidth of the
jammer. The following techniques can be applied
to the
monopulse acquisition
and tracking radar jamming.
Swept Spot Jamming
1.
Swept spot jamming
quency
is
is
swept across the band. Spot jamming
ming power against one particular
efficiently
quency
In order to
sweep
fre-
capable of concentrating jam-
cannot jam as
it
Nowadays, many radars use
fre-
counter against spot noise jamming.
jam radar systems with both high power density and over
wide frequency band, swept spot jamming
jamming tunes
is
fixed radar frequency, but
an entire radar frequency band.
agile techniques to
jamming where jamming
a kind of denial
the high
power jamming
is
Swept spot
nevertheless employed.
signal across a wide frequency
rates corresponding to the victim radars
if
a
band with
frequency. Thereby
all
pre-
determined victim radars over the desired frequency band including frequency
agile
radars are affected by the jamming signal, as
bandwidth of swept spot jamming thus
bandwidth. This results
in
maximum
Sweep
Figure
8.
"
little
in
The
8.
pp. 273-277].
8:
Agile radar
signal
spot
'
1
i!'r
Figure
bigger than the victim radar
noise quality [Ref.
.'II.
/'
a
shown
1±LL
.
n
Hi
End
End
points
points
Swept spot jamming.
16
'
-
f
Barrage Jamming
2.
Barrage jamming comprises the spreading of noiselike jamming energy
over a wide frequency band, such that
radar can be
jammed
many
victim radars or a single
over a whole radar band simultaneously.
Barrage jamming with wide band noiselike jamming power
many
erated in
broadband
may
be gen-
ways. For example, various types of modulated electromagnetic
waves can be used
for the
low-power sources,
For high-power source devices
rect noise amplification
like
like the traveling
(DINA)
is
semiconductor
wave tube (TWT)
RF
oscillators.
are used.
Di-
produced by passing band-limited Gaussian
noise from a low-power source through a high-power amplifier.
There are several variations of barrage jamming depending on the jam-
ming
circuitry.
Figure 9 shows basic barrage jamming.
Jamming power
density spectrum
Victim radar signals
Figure
3.
-
Barrage jamming.
9.
Blinking
Blinking
jamming
utilizes
noise
jamming whose spectrum covers
the
bandpass of the victim radar and the jamming signal alternately turns on and off
at
approximately a
are
shown
in
50%
Figure
duty cycle [Ref.
10.
17
7:
p.481].
Blinking
jamming waveforms
'
.
'
CL
=>
Spot or barrage noise
o
On-Off
<D
yyyvyvv
O
y y vvvvvvv
/vy
yyVyyv
xxxx
/yv
yvy
y vy y y v
•.
QOOO<XXX
Q.
>CxxVxx'x;
w w yv y y
VvVvVvV VvVvV
y
t v v v v v y v
vvyyvvy
cn
c
E
E
-..,
v
-.'
-
Off
ratio
= P2 / P 1
Sfe
'
>!* ">.'
VV
On
03
—>
Figure
10.
Blinking jamming waveforms.
In order to effectively
should just exceed the time
The jammer
it
jam
a track-on-jam
radar receiver, jammer on time
takes the radar to go into
off time should be just less than the time that
reacquire the target.
Good
blinking
jamming maintains
track-on-jam mode.
its
it
takes the radar to
the radar either searching
for the target or in the process of going into track-on-jam
mode. Typical blink
rates are in the low audio frequency range.
For blinking
to be
most
effective,
two or more synchronized blinking
jammers, which are angularly separated, are required.
In the case of aircraft,
they can be installed on two individual aircraft. These jammers are located within
the radar antennas
beam but
The jammers
at slightly different angles.
are alter-
nately turned on and off so that the victim radar receives the strong noise signal
from alternate angles around
radar
off,
will
attempt
to shift
its
a
mid
point.
The antenna of
tracking direction as the jammers are turned on and
provided that the noise jamming
is
of sufficient strength.
interaircraft control link, this technique can be classified
as
shown
in
Figure
1
a single target-tracking
1
18
by
Depending on the
five different classes,
)
1
Master
Jamming
ff
(
H
I
RF
'
j/lctifTJ
Jamming
&
T ITH
Iradar)
I
ass^
Slave
t
Jamming
Aircr
Aircraft
navigation
gatic
II
1 >
link.
Slave
(
'»
•
lin ks
Viclin
Iradar
Jammlni
Slave
»-
Master
(
IN
No
)
t
Jamming
-
t
Victinj
Iradarl
link
Jamming
I3^*W"I
"•""
Slave
Him
>>
IV
/<
RF
)
rime delay
Jamming
Victim
link
Iradar]
Jamming
1 1 1
1
-
Master
t
Jamming
>>
Sy
Synchronized^
V
digital
A- —
clockO^o
-*-
victim
Iradarl
Jammin
Iffllll
*-
Figure 11.
t
link
Blinking, synchronized multiaircraft.
19
t
When
blinking
jamming source
another
to
in
the control of a missile
is
more
may
turn. This
Otherwise the radar tracker
lock.
from one
cause the radar tracker to break-
have erroneous target information. Thus
will
difficult
will track
and a
missile guided
by the tracking radar
miss the target due to the inaccurate target angle position information.
will
the
working properly, the victim radar
is
maximum
rate
miss distance, the blinking rate must be considered.
too high, the tracker will attenuate the jam signal.
is
missile will be able to
home
in
B.
Hertz [Ref.
it
the blinking
too low, the
is
on one jammer by determining precisely the an-
gular position of individual aircraft.
to ten
If
If
For
Optimum
blinking rates are from one half
9: p.3d-21].
DECEPTION JAMMING
Denial jamming can deny range information, but
and elevation information
employed
radar
to a fire control
at different locations simultaneously.
if
it
may
not deny azimuth
jammers are not
several denial
Thus
a missile
may
hit a target
which has a denial jammer for own self-protection.
However, deception jamming provides a
little
different
method against
control and missile guidance radars in order to decrease the aircraft
bility
by the
missile.
The
objective of deception
jamming
is
to
kill
fire
proba-
confuse or deceive
the true target echo by inserting properly altered replicas of the true target echo
into the victim radar systems. This technique will
correct information
ception
jamming may be
not only
ming
by providing many
in
impossible to get the
in
is
on the display. De-
the accuracy of tracking information
able to degrade
and elevation
it
realistic false targets
range and velocity, but also
related to azimuth
make
azimuth and elevation.
implemented successfully,
If
angle jam-
in general,
it
can cause the victim tracking radar to break lock.
The
tion
with
is
basic
form of deception jamming
to reradiate
time delay.
repeater jamming.
Its
implementa-
modified replicas of the received victim radar signal correlating
The conspicuous
characteristics
coherently store the victim radar signal
frequency
is
memory such
as a
TWT
in the
ECM
combined with
2"
of repeater
set.
This
is
jamming
is
done by using
a delay line in a loop.
to
a
The
output
is
gated out of the loop at successively earlier or later time, simulating
range walk.
The technique employed
to
degrade the accuracy of the azimuth and
vation tracking circuits depends on the tracking technique that
radar. Therefore deceptive
victim
istics
jamming must be matched
is
ele-
used by the
to the character-
of the victim radar.
jamming can be categorized
Typically, deception
on the radar parameter to be "deceived" such
as;
in three
ways, depending
The
range, velocity and angle.
range gate walkoff technique represents range deception, velocity gate walkoff
technique represents doppler deception and several angle deception jamming
techniques are applicable to either the monopulse or sequential lobing acquisition
and tracking radars. Angle deception techniques against monopulse radars can
The
conveniently be divided into two kinds.
advantage of the weaknesses
single source
jamming, image jamming,
techniques
utilize the
example
cross-eye
ception
1.
is
category of angle jamming takes
design of certain monopulse radar systems to
Such techniques are cross-polarization,
jammers.
tort the electromagnetic
in the
first
etc.
The second one
skirt
frequency
uses multiple sources which dis-
wave's angle- of- arrival at the monopulse antenna. These
weakness basic
to all
monopulse tracking systems. Typical
jamming and cooperative repeater
jamming techniques
blinking.
The various
de-
are introduced in the following sections.
Range Gate Walkoff
(RGWO)
Range gate walkoff
is
defined as "a self screening
ECM
tech-
nique for use against automatic range tracking radars that captures the victim
radar's range gate, walks
with no signal" [Ref.
it
off in range,
7: p.l 15].
and then turns
off,
leaving the range gate
There are several other names
for this technique:
range gate capture, pulloff. grabber, grabbing, stealer, deception, dropping,
dumping,
selecting or confusion.
This technique
is
a
fundamental deception
tomatic tracking radars which employ the
target range.
The gate
width of gate
is
is
swiftly controlled
a
range servo mechanism.
varied according to the antenna modes.
21
technique against au-
gate to measure and track the
split
by
ECM
In tracking
The
mode, the
width of gate
mode, the gate
A
tion.
similar in size to the victim radar pulse width.
is
will
be increased
in length to several
corollary function of the gate
which are not within the
is
times the radar pulse dura-
to reject spurious return
The range gate
gate.
is
technique exploits the
characteristics of the range gate to produce range errors.
implemented as follows: [Ref.
(a)
minimum
The victim radar pulse
is
7:
RGWO
True target
received, amplified,
and retransmitted with
to the victim
A
radar receiver.
strong "return'" causes the victim
signal, the "skin return",
is
decreased
(b)
By then gradually
strong repeater signal.
This phase
(c)
is
called the dwell.
gradually walks off from the true target range.
it
As soon
jammer reaches
as the
When
the
and must return
The procedure
is
The walk
off rate
is
walk
the
jammer
turns
limit,
off.
to the acquisition or
it
is
turned
This
off.
the radar has no target
range search routine.
repeated continuously by the jammer thereby con-
tinually interrupting range tracking
2.
is
is
called walk.
the range gate
racy.
circuitry.
increasing the time delay, the range gate tracks the
Hence,
called off or drop.
(d)
AGC
gain and the range gate
in
captured by the strong jamming (beacon) signal. This phase
in
is
pp. 786-787].
radar to decrease the overall receiver gain by the operation of
is
jamming
time delay by the jammer. This provides a strong "return" signal, as a
beacon would,
phase
echo signals
accurately centered at the target
RGWO
return echo during normal radar operation.
typically
In acquisition
in the
and seriously degrading range tracking accu-
range of
1
s
\i
sec for
up
to 10 seconds.
Velocity Gate \\ alkoff
Velocity gate walkoff
(VGWO)
is
defined as "a self screening
ECM
technique for use against automatic velocity tracking radars, that captures the
victim radar's velocity gate, walks
velocity gate with
it
no signal" [Ref.
off in velocity,
7: p. 145].
this technique: velocity gate capture, pulloff,
tion,
and then turns
off,
leaving the
There are several other names for
grabber, grabbing, stealer, decep-
dropping, dumping, selecting or confusion.
Some
radars depend on the doppler shift of the target return echo
der to get the target velocity information.
")->
in or-
The measurement and tracking q[
accomplished by the velocity gate.
VGWO
exploits the charac-
doppler
shift
teristics
of the velocity gate, which tracks the frequency of a strong echo signal.
is
The frequency
shift
operation
serrodyne technique using a
of
TWT.
VGWO jammer can be achieved by the
VGWO jamming can be implemented as fol-
[Ref. 7: pp.937-941].
lows:
(a)
Victim radar signal
is
received, amplified coherently,
and retransmit-
ted to furnish a strong repeated signal, such as a beacon, to the victim radar re-
The strong repeated
ceiver.
signal causes the radar receiver gain to decrease
because of the activation of AGC. As a result of
signal
is
AGC action, the real target echo
suppressed and the repeater captures the velocity gate of the victim radar
receiver. This step
(b)
is
also called dwell period, as in
The doppler frequency of
RGWO.
the repeated signal
sequentially changed,
is
or walked, either in an increasing or decreasing direction. This will cause the vic-
tim radar to track the doppler frequency of the jamming signal rather than that
of the real target.
(c)
Upon
This step
is
the walk phase.
reaching the walk
cause the victim radar to breaklock.
mode and
sition
is
may
Above procedures
VGWO must
ECM
it
is
turned
This will
off.
victim radar then returns to the acquiIf
falsely lock to a spurious
the victim radar fails
low
level signal.
This
the off period.
(d)
and
The
repeater
searches for the targets frequency again.
to reacquire the real target,
step
limit, the
be done
in a
are repeated through such
VGWO
cycle.
RGWO
coordinated manner for most efficient use of these
techniques.
3.
Skirt Frequency
The
Jamming
definition of skirt
jamming
is
that "skirt frequency
jamming
refers to
jamming on
the skirts of the frequency response curve of the radar receiver.
effectiveness
depends on unbalance between the sum and difference channels,
these frequencies, where rapid phase shifts are present in each channel.
it
Its
at
Of course,
can be effectively countered by careful design and construction of the radar"
[Ref.
7: p. 843].
23
Skirt frequency
When
signal
the
ECM
the
which
ECM
is
jamming can
also be used with pulse repeater
set detects the victim
offset
radar signal,
it
will transmit a
from the victim radars frequency. This
produce a beat signal with the victim radar
set will
offset
jamming.
jamming
frequency by
local oscillator.
The
beat signal will appear on each side of the passband spectrum, or on the passband
phase control of the victim radars phase detector
skirts. Stable
attain because of the necessary bandpass.
rors translate into angle-tracking errors
will
be hard to
Consequently, the phase-tracking
er-
by the radar.
\/
7
Pulser
Detector
Direc tional
cou
Dler
i
i
\
rs
TS_
WL/
T\A/
1
Variable
attenuator
Mixer
»-
\s
<
y^
TV n>
i
U^
w
fc
L
Figure
Block diagram of the
12.
skirt
frequency jamming.
Figure 12 shows the block diagram of skirt frequency jamming.
tector provides the input signal to the pulser.
frequency,
/
,
When
A
the received victim radar
fed into the balanced mixer, the balanced mixer generates
sideband jamming signals alf
t
the victim radar
and
f
is
-f and/ + f where/
is
two
the center frequency of
the local oscillator frequency of the
24
de-
jammer.
These
jamming
Figure
signals
13.
contain
very
The victim radar
receiving
little
signal
receiver will detect
frequency where the receiver gain
frequency, as shown
jamming
in
signals at the skirt
rolls off.
Lower sideband
jamming
Upper sideband
jamming
>•
Victim radar
DC
UJ
passband spectrum
-z.
LU
hZ>
Q_
\-
D
o
.
fr-h
Figure
4.
13.
Waveform
Delta
Jamming
Delta jamming
of skirt frequency
is
2
.
radar.
spacing
of/ — f2
is
RF
ECM
signals at
technique that causes erroneous
two different frequencies, f and
x
usually equal to the IF center frequency of the victim
This frequency separation can be controlled so as to
in the victim
radar IF amplifier.
control circuits can be
There
are
+h
jamming.
a self-screening
angle tracking by transmitting two
f The
fr
>r
t
made
several
By forming
false
make
false
IF signals
IF signals, the victim radar
unstable or will have incorrect bias.
other
names
IF-jamming, two-line delta, or RF/IF
delta.
25
for
this
technique:
dual-frequency,
V
Frequency
offset
t
1_
fi
Set on
circuit
Q.
f
(/)
Pulsei
Detector
Cv5
C
Set on
circuit
CO
Frequency
() offset
Figure 14.
Delta jamming block diagram.
Figure 14 shows a delta jamming block diagram for generating two
frequencies.
Two
dars frequency.
set-on oscillators are used to lock on to the received victim ra-
Frequency
jammer frequency
quency.
offset controls of both oscillators allow the locked
5.
fre-
synchronized operation of both power amplifiers, the
In order to allow
TWT
by exact amounts from the victim radars
to be displaced
victim radar pulse detector circuit
power
RF
is
used.
Each set-on
amplifier and radiating antenna [Ref.
7:
oscillator
has
its
own
high
pp. 602-605].
Image Jamming
Image jamming
is
a self-screenig
ECM
technique for use against tracking
radars dependent on phase-sensing for angle tracking, as
monopulse radar. The
definition of
image jamming
is
in
phase-comparison
as follows:
"Image jamming
occurs at the image frequency of the radar, depending on the fact that the phase
angle at IF, between two signals (image frequency and local oscillator)
verse of that which
would appear
frequencies of the receiver.
at the IF
if
the
two signals were
is
at the
the re-
normal
Since the phase-comparison monopulse determines
the direction of the error by the direction of the phase difference between
26
two
signals,
the
image jamming causes the antenna
jamming power exceeds
V
the signal
to be driven
power"
[Ref.
away from
the target
if
7: p. 703].
LO
2 IF
t
Band Stop
Mixer
for
Filter
f.
Pulser
Detector
(a)
o
Upperside
jamming signal
Lowerside
jamming signal
en
c
"e
E
fr
-2
if
tLO
f,
/L0
fr +2
IF
(b)
Image jamming block diagram and waveforms.
Figure 15.
Figure 15 shows an image jamming block diagram and
spectrum.
is
The amplified victim radar
fed into a mixer
jammer
is
RF
TWT
The
RF
an input signal for the pulser, which turns on the
for every input
frequency
amplifier,
signal detector. Local oscillator frequency of the
equal to two times the victim radars IF frequency.
tector provides
TWT
and an
signal through the input
its
radar pulse.
It is
necessary to
best operation.
27
know
signal de-
final
pulsed
the victim radars IF for
In the case
shown
in
Figure 15
(a),
the
band stop
filter
radar frequency,/, and then passes the lower sideband frequency,/
higher sideband frequency,
/ +
21 F,
takes out the
-
21
F and
the
which are used as the image jamming
signals.
Figure 15 (b) shows the frequency spectrum which has the two image
jamming
signals
andfLO
which represent the lower and upper sidebands, where/
represents the victim radar frequency and local oscillator frequency respectively
As an
[Ref. 7: pp. 702-704].
alternative, just one sideband, either the lower or the
upper side of the image jamming
high pass or low pass
6.
is
jamming technique which causes angular
tracking radars, including monopulse.
when
Some monopulse
the received signal
receivi ng signal
is
radars provide erroneous
polarized at right angles to the
t\ /
7
180 phase
TWT
shifter
chain
Horizota lly polarized
recei ving signal
Variable/
a ttenuator
1/
4
Vertically polarized
transmitting signal
\/
71
TWT
chain
16.
simple
error in
Horizontally polarized
transmitting signal
Verticall y polarized
Figure
utilizing a
Jamming
a self-screening
angular information
can be generated by
Filter.
Cross-Polarization
This
signal,
V
A
Block diagram of cross-polarization pulse repeater.
2S
Cross-polarization
of the radar transmitter.
polarization
jamming
[Ref.
7:
pp. 579-585] takes advantage of this characteristics of those radar systems.
Figure 16 shows the repeater system employing two separated cross-
The
polarized receiving and transmitting antennas.
is
horizontally polarized signal
radiated as a vertically polarized signal, and the vertically received signal
phase shifted 180° and radiated as a horizontally polarized
is
signal.
Received
I
/
D°
victim radar signal
vertical component
>
Transmitted
jamming signal
component
/
/
vertical
Received
victim radar signal
\
\
>
Effective transmitted
jamming signal
^\
\j
o
\
^\
Received
1
X
victim radar signal
horizontal component
/
Transmitted \.
jamming signal
horizontal component
A
o
270-
,
>
90
Transmitted
18
0°
jamming signal
horizontal component
(Before reversal)
Figure
17.
Components
of polarization.
Figure 17 shows the polarization components of the signals.
polarization
components of the victim radar
signal appearing at the
The
jamming
platform are dark arrows. The horizontal polarization component of the received
victim radar signal
the
jammer which
is
is
used for producing the vertical polarization component of
then retransmitted to the victim radar antenna through the
29
TWT
amplifier chain without 180° phase shift.
component of the received victim radar
polarization
the horizontal polarization
which
the 180° phase shifter
direction change of the electric field vector.
components are transmitted back
a target
The
Figure 20
is
due
tortion
a
nulls
ECM
is
after
,
TWT
equivalent to a 180°
is
these modified polarization
cross polarized to the skin echo.
sum
each side of boresight as
on boresight, and
null
in
Figure 19
technique that generates angular errors
aircraft or other platform.
ECM
and
(b)
in
monopulse
ra-
two
to the interference
shown
ECM
in
beam
ceive only antenna
sets.
the two
The
ECM
cross eye
to use
is
two
between two jamming sources.
of describing the cross-eye concept [Ref.
7:
pp. 555-576].
is
sources which have equal amplitudes and are 180° out of phase,
Figure
victim radars
The concept of
sources producing either nulls or phase front angular dis-
One method
IS.
This figure shows the aircraft approaching normal to the
direction.
The antenna mounted on
the nose section
which provides the victim radar signal information
received signal
is
is
a re-
to the
two
divided, amplified, and phase controlled so that
sets reradiate repeater
jamming
signals that have the
tude but are 180° out of phase with each other.
make
by 180°
by radiating phase-controlled repeated pulses using separate antennas
out-of-phase
ECM
shifted
is
(b). respectively.
mounted on an
as
When
effects are very similar to cross-eye with a
This
to use
used for producing
Cross-Eye Jamming
7.
dars
is
to the victim radar antenna, they will super-
echo signal which
of difference
pair
signal
component of the jammer and
The function of
amplifier chain.
a
the other hand, the vertical
then retransmitted to the victim radar antenna through a second
it is
impose as
On
a null at the center of the victim radars
30
The two jamming
antenna aperture.
same amplisignals will
«
d/ 2
Transmit antenna
Transmit antenna
P z/180
p
J
jZ ol
e
\
|\
— Receive
4r^:
c/sinGi
\:
i
A
:
*
:
antenna
•
•
•
•
Line of
->^9V<.:
\
\
maximum
ijamming effectiveness
B
A
Radar
Figure
site
Cross-eye concept applied to a radar.
18.
The two transmitting antennas
on each wing.
Thus
are installed
the signal transmitted by the
d
left
feet apart, typically
wing antenna
dsin 6 more than that by the right wing antenna, making the
point on line
AB. Line
AB
will travel
right side null
represents the fact that the radar doesn't have to be
looking perpendicular to the
nulls will occur
first
one
jammer
The
baseline for cross-eye to be effective.
whenever dsin 8 equals
31
n).
where n
is
any integer and
'/.
is
the
radar wavelength. For finding the null positions, two equations can be derived
as follows:
n/.
5
For the
6
first null,
= d sin 6
(3.1)
= rtan0
(3.2)
Solving for 6 and
n should be one.
s,
(sin
6^
tan 6
=
when
small):
is
(33)
"-"""(-jM
iwfl
where
The
As
(3.4).
two
the
is
first null
the null distance from the centerline
r is
the distance from
moves
is
any other
is
cross-eye
jamming
steep spatial
jamming
s. r,
aircraft to victim radar.
and d can be explained from the equation
closer to the radar site
and or the distance between
increased the spacing between nulls, which
effectiveness,
When
(3.4)
angle at the aircraft
relationship between
sets
= r4
s is
the aircraft
ECM
jamming
or
B rad
null.
is
related to the
decreased.
jamming
is
operating, the victim radar receiver detects
lobes of opposite polarity on either side of the centerline,
These lobes are detectable because the jammer signal
is
stronger than the skin return and result in angular tracking errors (usually
azimuth) of
a
few degrees
The following
is
at
figures
most.
show
the relative signal voltage vs scan angle, which
useful for the understanding of cross-eye jamming.
32
c/)
O
>
-10
-20-
LLI
(a)
zz
-30"
LU
DC
-40
A
50
5
,
}
,
-10
-5
^p
Ar
5
10
15
10
15
SCAN ANGLE
if)
-10-
tj
O
>
(b)
-20-
LU
>
<
_l
LLI
DC
-30-
-40"
4-5
-505
-10
9 e
A
5
SCAN ANGLE
Figure 19.
Sum
channels for monopulse receiver, (a)
33
One
source, (b)
Two
sources.
LLI
(3
-10
<
H
-J
o -20
>
LLI
(a)
> -30
H
<
_J
LU
DC
-40
50
5
-10
-5
5
10
15
10
15
SCAN ANGLE
LU
-10
o
>
(b)
-20
LU
> -30
ZZ
<
_i
LU
DC
SCAN ANGLE
Figure 20.
Difference channels for monopulse receiver, (a)
sources.
34
One
source, (b)
Tno
3
CO
o
>
>
<
_l
s
2
r
-
1
I
LLI
(a)
LLI
Boresnght
-
/
I
-1
J
CO
-2
5
I
i
-10
-5
I
I
i
5
10
1
5
10
1
5
SCAN ANGLE
Boresight
3-i
>,
CO
A
2
\
/I
o
>
i
LLI
(b)
>
<
LLI
/
-1
J
-2
5
-10
-5
e
J
o
e
5
SCAN ANGLE
Figure 21.
Patterns of the difference channel divided by
source, (b)
Two
sources.
35
sum
channel, (a)
One
Figure 19 shows the
boresight axis for one source
boresight axis (b).
sum
(a),
channel.
There
is
no
null
point on the
but two sources (cross eye) produce a null on the
Figure 20 shows the difference channel. There
is
a null point
on the boresight axis for one source. But two sources have two null points, each
at the cross-eye angle (6 CE )
on both sides of the boresight
the difference channel divided by the
Figure 3
to
(d).
Figure 21 (b)
is
sum
channel.
Figure 21 shows
axis.
Figure 21
(a)
the result of cross-eye so that the nulls
each side of boresight. Thus the radar can track either null
and Figure 21
(b).
The angle
corresponds to
error (0 CE ) caused by cross-eye
is
in
move, one
Figure 20 (b)
never large.
Phase-front
ECM souyteXT
Pj
,
^8c£
No n-jam
Track direction
Jam
track
direction
Figure 22.
Warped phase
Another way
Under
front.
to describe the cross-eye
concept
cross-eye conditions an interferometry pattern
Figure 22.
This concept
utilizes the the
is
phase front distortion.
is
produced as shown
in
property of any radar tracking antenna
36
which
is
to be aligned with the face parallel (actually tangent) to the
The
of the signal being tracked.
wave
is
tenna
will align itself
shown
of n
The
The peaks
in
Therefore cross-eye
is
known
also
as
re-
phase
Figure 18 correspond to path length differences
and represent the phase front distortion shown
-f-
victim radar an-
with the boresight normal to the distorted phase front,
sulting in angular tracking error.
front distortion.
front
distorted phase front of the electromagnetic
interferometry pattern Figure 22.
in the
wave
a
in
plan-view
in
Figure 22.
A
180 phase
power
shifter
splitter
A
Transmit
antenna #1
Transmit
antenna #2^
A
Receive
antenna
Figure 23.
A
shown
in
Block diagram of basic repeater type cross-eye system.
block diagram of a cross-eye system, which employs a repeater,
Figure 23.
The
previous explanation.
whose output power
is
A
basic concept of the system operation
center receive-only antenna feeds a
split so as to drive
in
effects.
TWT
in
intersect the radar site so as to
Any maneuver
incurring
antenna
37
as the
amplifier
Figure 23 has a basic prob-
that the perpendicular bisector of the line joining the two
must continuously
same
two transmitting antennas with 180°
out of phase signals. However, the system shown
lem
the
is
is
yaw
ECM
antennas
maximize cross-eve jamming
will
degrade
the
jamming
effectiveness.
In order to eliminate this problem,
compensating repeater paths are used as
of the
in
Figure 24.
two transmit and receive antennas
Thus
compensations.
the
two separate, automatically
result
in
The
relative
placements
automatic path length
two signals radiated by the jammers
will
remain 180°
out of phase at the victim radar regardless of the angle of arrival of the victim
radar signal at the jammers
no yaw dependency.
i.e.,
180 phase
shifter
>
>
Traansmit
Transmit
antenna
.antenna
#2
Figure 24.
C.
Block,
diagram of cross-eye system using two separate repeater path.
PASSIVE COUNTERMEASURES
1.
Chaff
Chaff
"window"
in
the
is
one
UK.
It
of
the
is
still
earliest
a
radar
ECM
devices,
also
known
very useful technique, applicable to nearly
as
all
radars except some moving target indicator (MTI) radars.
Chaff consists of resonant dipoles. used
erate multiple echo effects
and
false targets
to reradiate
RF
on the radar display.
energy, to gen-
According
the electromagnetic theory of chaff, a piece of chaff acts like a dipole
3S
to
whose
output terminals are short circuited.
when
reradiation occurs
the
RF
incident
In
the dipole length
energy [Ref.
RF
wavelength of a specified
9:
the case of a
the greatest
approximately a half wavelength of
is
Therefore by cutting to a
p.3L-3].
frequency,
dipolc,
maximum
effect
by the chaff
half
be
will
attained.
Materials used for chaff are conducting or nonconducting fibers coated
with a conducting material
of
aluminum
like
aluminum or
silver-coated nylon thread,
foil,
ducting material. The thickness of a
foil
The general forms
zinc.
and
are ribbons
glass fiber coated with a con-
should be as thin as possible, because the
falling rate decreases the thinner the foil.
Chaff length
or wavelength
wavelength
is
falling rate.
is
is
proportional to the wavelength.
short, chaff length should be short.
long, chaff length should be long.
Chaff
band radars, rope
is
is
not used
If
If
the frequency
the frequency
Long chaff length
is
is
high
low or
increases
its
cover B,
C
combination with other jamming techniques
to
much below 1GHz
for this reason.
To
often used instead of chaff [Ref. 9: p.3L-7].
Chaff can be applied
in
upgrade the effectiveness of jamming. Various chaff missions are also possible.
Representatively, these involve chaff corridor screening, chaff confusion and saturation, chaff deception, signal attenuation,
and self-protection missions.
Chaff corridor screening missions deny
strike aircraft information inside
the corridor to the victim radars. Chaff confusion
and saturation missions over-
load the victim radar scope with false echoes returned by the chaff.
Thus
the
victim radar operator cannot discern the true targets on his radar display. Chaff
deception missions create signals
like
true targets on
the radar displays.
To
achieve this mission, chaff cloud size should be greater than the radar cross section
(RCS) of individual
targets
by an amount equal
provement factor of the victim radars.
after
MTI
In this
way
to the expected
effective returns
MTI
im-
from the chaff
processing should be similar to the returning echo signal from the
air-
craft targets. Signal attenuation missions reduce target detection ranges of the
victim radars.
To
achieve this purpose, chaff clouds must have large chaff density
per unit volume at the victim radar frequencies.
39
The
result
is
the effect of a
greatly increased propagation lose because of the intense
back scattering of the
radar forward energy. Self protection missions deploys chaff
victim radars to break lock on
will
own
when accompanied by
be increased
The
aircraft.
in
order to cause the
effectiveness of this technique
a simultaneous evasive
maneuver
[Ref.
10].
2.
Radar Absorbing Material
Radar absorbing material (RAM)
is
used to reduce the
RCS
by absorb-
ing impinging electromagnetic energy. Thus, the reduced target size will appar-
ently be decreased, along with the target detection range.
One
type of
RAM
surface of the vehicle.
is
The
made by
using a radar semitransparent layer on the
and transmitted energy (50% each) recom-
reflected
bine destructively at the surface, resulting in
good only
narrow band due
a
in
layer [Ref. 11: p. 101].
up
20dB RCS
to
reduction.
to the fixed thickness of the
(approximately
This
is
semitransparent
-H
4
Another type of
wave
electromagnetic
another type of
particles of an iron
RCS
[Ref.
7:
RAM
compound
Such paint can be applied
3.
a dissipator,
p. 405].
to
is
which attenuates the incident
This absorber can reduce the energy
is
It is
an absorbent paint, containing microscopic
Absorbent paint can give
used for absorption mostly above 10 GHz.
almost any aircraft surface but there
is still
a weight
pp.49-50],
12:
Stealth
Stealth has been a highly classified technology untill now.
RAM
re-
usually thicker.
in the ferrite family.
reductions of up to 20 dB.
penalty [Ref.
is
wider frequency band, but
flection over a
Still
RAM
It
combines
techniques with others and can be applied to any kind of weapon system
which can be detected by radar, including
RCS
is
not the only concern
aircraft.
in stealth
technology.
The design concept
of the stealth aircraft also includes avoidance of detection by infra red (IR)
scanner, optical, acoustic,
In reference to
stealth aircraft
is
smoke and
radar
ECM.
contrails [Ref. 13: p. 28].
however, the only interesting point of the
related to detection evasion
40
bv enemy radar. For that reason,
RCS
reduction plays an important role in stealth aircraft. In order for stealth
aircraft to reduce
RAM,
RCS,
RAM
and counter
as discussed above, contributes to
reflective
RCS
geometry can be employed.
reduction by absorbing or atten-
uating incident electromagnetic energy. In addition, radar absorbing structures
(RAS) and radar transparent
structures,
which are constructed of composite
materials, are used to reduce weight as well as
RCS. Two geometric methods
used to scatter the radar beam, rather than reflect
stealth aircraft.
reflection
"One
is
to
make
from the surface of the
it,
the shape flat or rectilinear, concentrating the
on one bearing, and reducing the tendency for concave surfaces
function as retro reflectors over large ranges of angles of incidence.
to scatter the
wave with
a carefully designed
flection." [Ref.
by the USAF.
and the B-2.
D.
Two
14: p. 22].
a stealth
The other
to
is
concave curve of constantly chang-
ing radius, so that each tiny part of the surface has
recently
are
its
own
tiny main-lobe re-
kinds of stealth aircraft have been introduced
F-117A, a
stealth fighter,
based on the
is
first
method,
bomber, combines both methods.
DECOYS
Decoys are
a
support
ECM
techniques that
utilize
low cost vehicles equipped
with different jamming augmentation systems. Decoys can be employed by a variety
of techniques
using different delivery vehicles employing
jammers. Typical examples
and remotely piloted
ol^
vehicles.
this tactics application are
variety of
expendable jammers
These jamming techniques are not peculiar against
monopulse radar systems, but are commonly applied
1.
a
to
any radar.
Expendable Jammer
Expendable jammer (EJ) consists of the jammer and
its
delivery package,
such as parachute, rocket, expendable drone and remotely piloted vehicle (RPV).
Most EJ
may
and cheap. Output jamming power of one unit
are small, light weight,
not be adequate to jam a given radar, therefore, several EJs
to achieve satisfactory
for reuse. This
is
radar capture by decay. By definition, EJ
quite different
The most important
tiveness.
To be
compared with
a recoverable
factor, therefore, in EJ
cost effective, the
life
may
is
be required
not recovered
RPV.
employment
is
cost effec-
cvcle cost of EJs should be less than that of
41
the platform
and alternate
EJ employment are very
ECM,
which the EJs are protecting.
flexible, lending to a variety of scenarios
package and attached jammer.
EJs are dispensed
ploy them by using forward fired rockets, free
towing.
bility,
When
delivering EJs,
if
in several
fall,
ways.
tactics of
of delivery
Aircraft de-
parachute retarded or by
the delivery package does not have flying capa-
parachutes can be used to lengthen jamming time.
Remotely Piloted Vehicle
2.
This tactic
and
The
confuse
to
utilizes a
enemy
drone
radar.
RPV
RPVs
ECM
as
support, to assist strike aircraft
can perform various missions such as jam-
ming, chaff dispensing and EJ delivery.
RPV
conflict
EW
effectiveness as a tool of
between
Israel
and Syria
in the
was demonstrated during
Bekaa Valley, even though not used
use of
RPV
is
RPVs
and
as decoys utilize small radio controlled drones.
The
very cheap compared with using
The primary advantage of
without
loss
the
RPV
is
manned
are small.
aircraft
RCS enhancement
due
14:
aircraft.
use in a high threat environment
of personnel and expensive aircraft.
and shoot down than manned
RPVs
for
p. 112]
decoy delivery but for remotely controlled reconnaissance [Ref.
aircraft simulation.
the 1982
RPVs
arc
more
difficult to detect
Even though
to the their small size.
can be used
to
confuse or deceive
enemy
radar.
E.
DESTRUCTIVE COUNTERMEASURES
I.
Anti-Radiation Missile
The
effectiveness of
get position informations.
SAM
For
systems
this reason,
is
mainly governed by the precise
most
SAM
systems are required to
have targeting radars. These radars greatly enhance the capability of
Meanwhile.
(ARM)
SAM
tar-
SAM.
systems become vulnerable targets of the anti-radiation missile
by working as active emitter.
In the case of high-speed anti-radiation missile
cently developed
ARM
in the
US. operation
is
diation signal either before or after launch.
(HARM),
by locking onto enemy radar
Onboard
RWR
or the
guidance section can detect the enemy radar signal, then the missile
4:
the most re-
is
ra-
missile
locked on
HARM
and homes on the radar.
bands from
2 to
has a wideband seeker which covers
GHz. and has an
40
HARM
width (PW), PRF).
In stand-off
can be fired on a trajectory for
range from high altitude. The highest-priority threat signal
location
HARM
memorized. Then accurate
is
flexibility
of
tactical situation [Ref. 14: p.930].
HARM
mode,
radar
extensive parameter threat library (pulse
has three launch modes which provide
employment, depending on the
all
to continue the attack
even
inertial
selected
and the
navigation system (INS) allow
the radar system
if
is
maximum
is
turned off after the
launch of missile.
In target-of-opportunity
can
in the cockpit. Pilot
select the
mode, the received threat
radar target.
and indicates immediate threats
detects, sorts,
to the aircraft.
Because of these characteristics,
SAM
(RWR)
mode, the radar warning receiver
In self-protection
signals are displayed
HARM
is
capable of coping with
many
radar threats.
2.
Wild Weasel Tactics
"Wild Weasel"
nickname
a
is
for
an aircraft which performs special
missions relating to destruction or suppression of
Their primary mission
is
of mission,
it
air
defense systems.
to provide a safe corridor for the air strike forces using
weapon systems.
integrated
enemy
In order for the
Wild Weasel
to carry out this kind
needs a sophisticated electronic equipment such as
puter system, specialized radar warning and location system and
a
launch com-
ARM
or other
destructive weapons.
Wild Weasel
aircraft
ment of technology. The
In the beginning of
have been continuously updated by the improve-
US Wild Weasel
aircraft
were F-lOOFs and F-105Gs.
Vietnam war, F-lOOFs Wild Weasel
aircraft
were equipped
with an unsophisticated radar warning system designed to intercept and
on the SA-2 radar
They had
cated the
in
signal.
to directly
site,
an effort
to
then
It
home
in
could only detect one target signal at any one time.
in
on the
SAM
radar
site until
the crew visually lo-
come back again and drop conventional bombs on
destrov the
home
SAM
the area
svstems. This tactic was extremelv dangerous
43
because the crew couldn't detect any other
pp. 20-26].
However, low
effective in devastating
with shrike
ARM
level attack of the
enemy
SAM
sites.
sites
near that the area [Ref.
Wild Weasel
In
day was very
in those
1966, Two-seat
15:
F-105G
aircraft
replaced the old Wild Weasel.
After Vietnam, F-4Gs, following F-4Cs, became the primary Weasel
aircraft.
The F-4G Wild Weasel
aircraft
For F-4G Wild Weasels, an airborne
gun
in the
F-4E. This
is
RWR
RWR can detect and
SAM
identify each threat such as
selected target
from outside
craft as future
Wild Weasels.
or
AAA
lethal range.
44
a modified version of
was
sites.
is
enemy radar
aircraft.
20mm
nose
emitters,
and
installed instead of
locate the
USAF
F-4E
Wild Weasel then attacks the
considering F-15 or F-16 air-
ANALYSIS OF ECM TECHNIQUES
IV.
DENIAL JAMMING
A.
Denial jamming or noise jamming
is
not the most efficient method to use
against tracking radars because most tracking radars are able to maintain angle
tracking by locking on to the noise
to tracking radars
may
jamming source may
The
jamming
increase the vulnerability of the
act like a
beacon signal [Ref.
principal effect of the noise type
deny the target range information.
will
A
deny range information
missile system utilizing
effect a kill
In
16:
aircraft since the
p. 138].
jamming against monopulse radar
is
to
monopulse radar systems, denial jamming
the jam-to-signal ratio
if
jamming
jamming
is
equal or greater than one.
monopulse radar guidance may or may not be able
to
without range information, depending on system performance spec-
ifications or missile
ground
source. Applying noise type
However, the operating effectiveness of the
launch range.
degraded without providing accurate range data,
missile system will be
even though modern missile guidance systems can operate with angle data only.
The main advantage of
victim radar system
is
noise
jamming
not required.
and bandwidth of the victim radar
ing, noise
nial
jamming
is
less efficient
Thus
deception jamming.
The
to
The simpler
and blinking, described
may
in
to
know
only the center frequency
perform denial jamming. Generally speak-
than deceptive jamming methods because dethe parameters between the
the circuitry for denial
effectiveness of noise
fectiveness
that precise information about the
One needs
jamming does not accurately match
the victim radar.
is
jamming
is
jammer and
simpler than that for
circuitry generally implies lower cost.
jamming techniques such
chapter three,
is
hard
as swept spot, barrage
to quantify.
The jamming
ef-
be differently evaluated depending on the tactical situation and
available information
these kinds of noise
about enemy weapon systems performance.
jamming
will at least effectively
any radar against which they are employed.
45
However,
degrade the performance of
Swept Spot Jamming
1.
The advantage of swept spot jamming
that
is
it
can concentrate the high
jamming power on each victim radar while sweeping across
band. The disadvantage
time. This
is
that the
jamming
is
wide frequency
intermittent due to the sweeping
drawback can be reduced by increasing
jamming with
a
Swept spot
the sweeping rate.
sweeping rates produces approximately continuous jamming
fast
Again, the optimum rate corresponds to the victims bandwidth, inferred
effects.
from measurements of
his pulse width.
Barrage Jamming
2.
The use of
dars can be
this
type of
jammed without
jammer
is
attractive because frequency agile ra-
readjusting the
jamming frequency,
cause a number of victim radar receivers can be
jammed
at the
as
same
w ell
r
as be-
time.
Equal areas
\
^^
i
^ c
<!>
u'tf
\
•.''.•
*f
^o
"•.'
.-.
3-T3
:<">:
mi mil
i riiiiTii
figft^B^^^I
.
Bandwidth
domain
Bandwidth
domain
:Radar power bandwidth product
[]x.x>|
Figure 25.
bandwidth product
Barrage jamming power vs bandwidth.
As shown
in
Figure 25
jamming power density
width.
Jammer power
is
the disadvantage of barrage
jamming
is
that the
diluted by being spread over a wide frequency band-
The power density of barrage jamming
46
is
inversely proportional to
its
bandwidth. The jamming effectiveness depends on jammer power density.
jamming power
power density
is
If
constant, the wider the jammer's bandwidth the lower the
[Ref. 17: pp. 52-54].
Blinking
3.
This
is
ECM
one of the most effective
ECM
techniques available to the
designer for protecting a formation of aircraft, because
it
works against any type
of tracker including the monopulse tracker.
The disadvantage of blinking jamming
optimum
is
blinking rate, even though the best rate
the tracking servo bandwidth, or in the 0.1 to 10
B.
is
Hz
undoubtedly on the order of
range [Ref.
16: p. 156].
DECEPTION JAMMING
Deception jamming
ECM
generally implemented in the form of the self-screening
is
mission in order to jam against missile guidance which utilizes tracking ra-
dars [Ref. 16:
ble
the difficulty in determining the
to
p. 138].
Self-screening or self-protection
jamming power and
the attack aircraft due to the
limitations on the
noise jamming.
This
is
the
more
applica-
physical size
less
power
to
jam
a
radar compared
because deception jamming uses a waveform
matched
to the victim radar.
mament
loading. In addition, lower
small
is
jammer.
Deception jamming requires significantly
with
jamming
Small
size is desirable to afford
power
more room
availability requires the
for ar-
jammer
to be
size.
Deception jamming techniques discussed
jamming
characteristics.
tively efficient
way
to
RGWO
in
chapter three have different
as range deception technique
is
easy and rela-
jam against monopulse radar because monopulse radars
use a conventional range gate for measuring the distance from radar to target.
VGWO
as velocity deception technique
frequency
shift.
As
a result, the victim
In general, angle deception
is
is
a useful
way
to
induce false doppler
radar can get false range rate information.
difficult to achieve against
monopulse tracking
ra-
dars compared with sequential lobing radars. Monopulse techniques are inherently strong
beams
to
against angle deception
determine
the
target
jamming because they use simultaneous
position.
47
In
order
to
enhance
jamming
effectiveness,
deception
is
it
imperative
ECM (DECM)
to
combine these three categories of
closely
techniques with one another.
Meanwhile, deception jamming systems employ complicated
match the
system
ters
jammed.
characteristics of each type of system to be
demand more
will
expenditure.
To
circuits
Complexity of
properly match the jamming parame-
between the jammer and the victim radar systems, these techniques
quire specific information about the victim radars.
available,
may
it
to
If
will re-
such information
is
not
greatly impact on the use of deception jammers.
Range Gate Walkoff
1.
False target range information in the missile guidance and tracking radar, such as
ror.
SAM
targeting
monopulse radar, can produce aiming-guidance
However, target angle information
good enough
is still
The radar can guide
target angular position.
er-
to direct against the
the semi-active missile with target
angle information only.
In
RGWO,
monopulse radar application of
followed by dropping of the
deceptive signal, the result can be a partial loss of information.
ception
is
If
angular de-
not simultaneously used, the victim radar will reacquire the skin echo
too fast.
2.
Velocity Gate Walkoff
VGWO
itself
may
technique
is
RGWO
very similar to
not be effective against
some radars which employ
measurements because those radars constantly check the
differentiating range data
and comparing
to
technique.
fects of
3.
VGWO
filtering.
If the
VGWO
very
should be combined with
target velocity data
by
jamming
RGWO
signal by
way
of
and angle deception
ef-
little.
Skirt Frequency
Jamming
The jammer used
in skirt
jamming
is
a
little
dars frequency. Well designed monopulse radars
this
by
target doppler
victim radar doesn't exploit the doppler characteristics, the
is
jamming because
RGWO
measured target doppler data.
In order for the victim radar not to reject the
doppler
But
technique.
(}o
detuned from the victim
not ha\e vulnerability to this
technique basically uses the weakness
4v
ra-
in
the design of the
monopulse tracking systems. The tracking accuracy of some monopulse systems
is
degraded
signal
the receiver
if
lies in
not properly tuned to the echo signal so that the echo
the skirts of the IF
Delta
4.
is
filter.
Jamming
Delta jamming technique needs high powered
tennas
each channel
in
bandpass
filters
in
TWT
amplifiers
and high gain an-
order to overcome the high losses by the mixers and
of the monopulse victim radars.
For
effective
jamming, the
information on the victim radars IF bandwidth and IF control frequency are
required.
Image Jamming
5.
This jamming
fective
the
if
6.
is
not a dependable jamming technique because
monopulse radar
is
equipped with an image rejection
Cross-Polarization
Jamming
One advantage
that the cross-polarization
is
ECM
filter
it is
inef-
or mixer.
technique does not
need special knowledge about the victim radar. This provides design freedom
which
important
is
in the
rapidly changing field of
enemy
missile radar control
technology.
The
critical
huge jamming
drawback of
to signal ratios
the cross-polarization
approaching 20
to
40dB
jamming
is
need for
a
This
[Ref. 16: p. 123].
is
because the wave guide components of the victim radar highly attenuate a cross
polarized signal.
sults in a
ponent
is
jamming
any deviation
in the polarization
of the
component with normal
polarization. If the
normal polarization com-
In addition,
greater than the cross-polarization due to the attenuation, the
signal will act as a
It
signal re-
jamming
good target beacon.
has thus far been impractical to employ cross-polarization as the angle
deception jamming technique against monopulse tracking radars.
7.
Cross-Eye Jamming
The magnitude of angular
phase
shift,
and amplitude
fectiveness can be obtained
ratio of
when
error
two
the
is
determined by separation distance,
ECM
jamming
49
sources.
Maximum jamming
signals of the
two
ECM
ef-
sources
are transmitted with 180° phase shift
and
at
equal amplitudes.
separation distances cause proportional angular error,
to
much
span.
effect
it
is
Even though the
difficult to
on the jamming effectiveness because of the limited
implement
aircraft
wing
Separation has an extremely small value compared with the victim radar
range.
The disadvantage of
cross-eye jamming, using one receiving antenna,
dependency on the motion of the jamming
aircraft.
is
The phenomena of warped
phase front occurs near the interferometer peaks. Aircraft movement by yawing
will shift the interferometer null pattern, therefore
Although
greatly degraded.
this fault
jamming
effectiveness can be
can be eliminated by using a cross-eye
system which employs two separate repeaters with equal path lengths,
nique
is
impractical due to cost, weight and complexity constraints.
In order for cross-eye to be effective, high jamming-to-signal
as
much
20dB
as at least
antenna aperture
[Ref. 16: p. 123]. This
relatively small
is
Another major drawback
is
C.
this tech-
is
required,
partly because the victim radar
compared with the
is
is
null spacing.
that the angle error produced by cross-eye
generally very small.
PASSIVE COUNTERMEASURES
1.
Chaff
Even though
against chaff, chaff
is
MTI
still
radar systems can provide some countermeasures
widely used
jam wide bandwidth radars by using
dispenser.
Some
proper length
in
in
military
different
jamming systems.
Chaff can
lengths of chaff in the
same
chaff dispenser systems mounted on aircraft can cut chaff to the
order to match detected victim radars frequency accomplished
through use of RYVR.
Another advantage of chaff
entail high cost to
DECM
provides a very cost effective
utilizing
to angle
monopulse
cost effectiveness.
employ compared with other
paring chaff with the
more susceptible
is
is
techniques.
When com-
techniques against monopulse tracking radar, chaff
ECM.
DECM.
more
ECM
Chaff doesn't usually
Sequential lobing tracking techniques are
However, the angle jamming of tracking radar
difficult
due
5d
to the characteristics of the
monopulse
beam
pattern.
AM
no
The
DECM
modulation
in the
beam
transmitting
Therefore the
DECM
receiver provides
jammer when
to turn
on and
jamming
18:
no information
monopulse
is
when
there
is
tracking.
for directing the
DECM
DECM may accentuate the
DECM angle deception, from a
Sometimes the
not as effective as two source jamming [Ref.
pp.398-399].
On
and the
the other hand, chaff creates a wide spread echo signal
monopulse tracking radar
action of
Monopulse trackers
by
off.
of monopulse radars
aircraft position to the victim radars.
single source, against
beam and
receiver can sense only one steady
is
similar to
will track the strongest
re-
any other tracking radars.
echo signal, which
may
be produced
Chaff can eventually defeat a monopulse tracking radar with proper
chaff.
deployments.
Radar Absorbing Material
2.
In order to use
be considered.
The
RAM
on the
thickness of
aircraft, the
RAM
weight and cost factors must
depends on the frequency. The
effect of
attenuation per unit depth in absorbing material will be increased, as frequency
is
increased. Therefore the thickness of absorber can be decreased as frequency
is
increased.
RAM
coatings are not very practical at low frequencies.
recent trends for the radar systems shows that the frequency
creases
up
to the millimeter region.
Therefore the use of
However,
band gradually
in-
RAM may become more
prominent.
It
will
probably be attended by high cost because of the newness and
complexity of the technique.
3.
Stealth
In fact, even
though sophisticated stealth techniques are employed, one
cannot completely eradicate reflections
SAM
to
a
receiving antenna.
acquisition and tracking radar can detect skin echoes to
pending on the target range and the remaining RCS.
stealth fighter against the
SAM
is
The
based on the fact that
Accordingly,
some
effectiveness of the
SAM
radars have to
acquire normal-sized targets just before the target aircraft reaches
range, and
SAM
has a
minimum range because
51
extent, de-
SAM's
lethal
the missile has a required launch
and acceleration time
fighter.
RCS
SAM
D.
In the case of the stealth
radar picks up the target at considerably shorter range due to
reduction.
range [Ref.
to properly track the target.
The attacker may
therefore be located inside the
minimum
its
firing
12: p. 66].
DECOYS
Expendable Jammer
1.
The
use of EJs against a radar missile system can confuse
operators. Frequently EJs are mistaken for airborne targets.
tempt
to shoot
down
Thus, they
may
at-
EJs with expensive missiles.
Remotely Piloted Vehicle
2.
The primary advantage of
without
loss of
the
RPV
is
personnel and expensive aircraft.
and shoot down than manned
RPVs
enemy radar
are small,
due
aircraft
RCS enhancement
use in a high threat environment
RPVs
are
more
difficult to detect
Even though
to the their small size.
to confuse or deceive
enemy
by homing on the radar radiation.
ARM
can be used
radar.
E.
DESTRUCTIVE COUNTERMEASURES
1.
Anti-Radiation Missile
ARM
directly attacks radars
missiles can be installed
against
SAM
on any type of
A trade off
radars.
aircraft for the
necessary since
is
purpose of
ARMs
utilize
self protection
weapon
stations
on the aircraft thereby reducing the loadout of other primary weapons.
Therefore
ARM
suppression of
enemy
effectiveness of
ARM
air
is
usually delivered by specific aircraft which carry out
defense
against
war and Iran Iraq war.
(SEAD)
SAM
as, for
example the Wild Weasel. The
radars was fully proved during the Vietnam
Several countries have developed and produced
For example. Shrike, high-speed anti-radiation missile
the US;
air
Armat. supersonic
tactical anti-radiation
launched anti-radiation missile
The
use o^
ARM
(ALARM)
for destroying
(HARM)
(STAR)
and sidearm by
missile
by France and
by England.
SAM
systems
will
probably increase
because oi their standoff capability and reduced threat against own
52
ARM.
aircraft.
2.
Wild Weasel Tactics
For the performance of
navigation tactics.
SAM
threat
is
Low
a successful mission,
level flight will
not only
make
Wild Weasel uses low
level
detection hard, but also the
decreased due to the higher ground clutter. This allows Wild
Weasel an increased element of surprise against
recently developed
ARM,
which provides
capability,
and Wild Weasel
pression of
enemy
SAM
tactics
SAM
a longer
sites.
The combination of
range and more flexible launch
can contribute to greatly improved sup-
activities.
53
CONCLUSION
V.
It is
jam radars with one technique
difficult to effectively
Individual
only.
techniques cannot successfully achieve monopulse radar jamming.
It
may
be
impossible to jam the radar completely even under the multiple techniques con-
Each
dition.
ECM
to provide a partial
technique
jamming
be integrated with each other
It is
is
tailored for only a specific portion of the radar
Therefore, several
effect.
ECM
thus desirable to employ the various
As
techniques should
order to completely jam the entire radar systems.
in
possible to enhance the overall
ECM
jamming
illustrated in chapter four,
techniques as simultaneously as
effect.
ECM
some
techniques against monopulse ra-
dars are very impractical. Cross-polarization jamming and cross-eye jamming are
also not
good techniques
for application to
monopulse radars due
ments of very high SNR. Image jamming
is
also not a
to the require-
dependable jamming
technique without special knowledge of the victim radar. However, the other
techniques
that
have
been
have
covered
a
good
effect
on degradation of
monopulse radar performance when combined with one another.
Five different categories of
ECM
techniques against monopulse radar; denial
jamming, deception jamming, passive countermeasures, decoys, and destructive
countermeasures: should be well integrated to give the best result
fectiveness.
Denial jamming techniques have excellent jamming
jamming can be employed by attacking
standoff jamming aircraft.
which
are; range, velocity,
repeater system,
as
very cost effective.
pensing capability.
In deception
in
effects.
In addition.
jamming
RPV
Denial
usually achieved through
and
field.
in
the one
With passive countermeasures, chaff is
Fighter aircraft
RAM
ef-
jamming, the three jamming techniques
Figure 26.
Most attack
expendable drones or
it is
jamming
and angle deception: should be integrated
shown
pact on the future radar
aircraft, but
in
have
self protection
chaff dis-
stealth techniques will certainly imIn
decoy methods, the use of cheap
will greatly increase the survivability of the future
54
When
strike aircraft.
is
considering probability of
theoretically proportional to the
ated by decoys.
number of
the survivability of aircraft
kill,
targets including false targets cre-
Destructive countermeasures can usually be performed by spe-
cially dedicated aircraft
equipped with special weapons,
and attack the position of radar radiation sources.
or Wild Weasel aircraft
a top
is
ARMs,
which can detect
The employment
of
ARMs
growth area, projected well into the next century.
Received victim
Transmitted
radar signal
jamming signal
V
TWT
—
Delay
line
Angle
Velocity
Range
deception
deception
deception
i
i
i
AM
Amplitude Frequency
modulator modulator
detector
Audio-scan
rate
amplitude
modulator
i_
Figure 26.
Time delay
modulator
Swept
oscillator
________
______
Block diagram of integrated deception jammer.
In conclusion, these techniques should be properly integrated to optimize
ECM
techniques while conserving resources against monopulse radars.
The
fol-
lowing combinations are recommended as a best approach for a strike force
package.
55
Attacking aircraft need to be equipped with both passive countermeasures
and integrated deception jammer.
Denial jamming
jamming
relatively
aircraft,
jammers such
confuse the
which require
as decoys can be carried
enemy radar operators
Finally,
performed by the standoff
on any of these
or system.
Wild Weasel type
aircraft to additionally
In relation with these
ECM
tech-
complement the jamming
aircraft
destroying forward or high threat radar systems.
56
Expendable
high output power.
niques, evasive maneuvers have to be included to
fectiveness.
is
with
ARM
take
part
ef-
by
LIST OF
1.
REFERENCES
Eaves, J.L., and Reedy, E.K., Principles of Modern Radar,
Van Nostrand
Reinhold Company,
New
2.
Price, A., Instrument
of Darkness, Peninsula Publishing, Los Altos, 1987.
3.
August, G.
Jr.,
York, 1987.
Radar Electronic Warfare, American
and Astronautics,
A
Institute of
Aeronautics
Inc., 1987.
Call from Wilderness, Air University Review, 1976.
4.
Alberts, D.J.,
5.
Skolnik, M.I., Introduction to
Radar Systems, McGraw-Hill Book Company,
1980.
6.
Sherman, S.M., Monopulse Principles and Techniques, Artech House, 1984.
7.
Van Brunt,
8.
Knorr.
L.B.. Applied
J.B.,
ECM
Vol
1,
EW
Engineering, Inc., 1987.
and Karantanas, D.T., Simulation Optimizes Noise Jammer
Design, Microwave Journal,
May,
1985.
9.
Hoisington, D.B., Electronic Warfare, Naval Postgraduate School.
10.
Wilson, L.A., Electronic Countermeasures Handout Chaff Section, Naval
Postgraduate School.
11.
Fitts, R.E.,
The Strategy of Electromagnetic Conflict, Peninsula Publishing,
Los Altos, 1980.
57
12.
Sweetman,
B.,
Wholesalers,
Stealth Aircraft,
Motorbooks International Publishers
Inc., 1986.
B-2 Bomber for the 2 1st Century, Interavia, January 1989.
13.
Sweetman,
14.
Wanstall, B.,
15.
Allsup. D., Those Wild Wild Weasel, Airman, September 1984.
16.
Schleher, D.C., Introduction to Electronic Warfare, Artech
17.
Electronic
B.,
Arms
to stop
Combat
Force, Headquarters
18.
&
SAMs,
Principle,
US
AE
Interavia,
September 1987.
Inc., 1986.
Pamphlet 51-3, Department of the Air
Air Force, Washington
Short. R.H., Chaff Conception
House
DC,
18 June 1985.
and Misconception, International Counter-
measure Handbook. 1985.
58
INITIAL DISTRIBUTION LIST
No. Copies
1.
Defense Technical Information Center
Cameron
Alexandria,
VA
22304-6145
2.
Library, Code 0142
Naval Postgraduate School
Monterey, CA 93943-5002
3.
Chairman, Code 73
Department of Electronic Warfare
Naval Postgraduate School
Monterey, CA 93943-5000
4.
2
Station
2
1
Professor R. L. Partelow, Code 62PW
Department of Electrical Engineering
1
Naval Postgraduate School
Monterey. CA 93943-5000
5.
Professor E. B. Rockower, Code 55RF
Department of Operations Research
1
Naval Postgraduate School
Monterey. CA 93943-5000
6.
Personnel Management Office
Air Force Headquarters
1
Nonsan-Gun, Chungnam-Do,
Republic of Korea
7.
Air Force Central Library
2
Chongwon-Gun. Chungbook-Do
Republic of Korea
8.
3rd Department of Air Force College
1
Chongwon-Gun, Chungbook-Do
Republic of Korea
9.
Library of Air Force
Academy
2
Chongwon-Gun. Chungbook-Do
Republic of Korea
59
10.
Kwon, Ki Hoon
10
RM407 BLDG124 SiYoung
Seoul, Republic of
11.
LTJG. Chia, Hua Kai
#9, Lane
6.
Apartment, Karak-Dong, Kangdong-Gu.
Korea
Shy Jain
ROCN
1
Li,
Chy Jin District, Kaohsiung, 80504
Taiwan, Republic of China
12.
h
Almetlaq, Issam
P.O. Box 345
Suit, Jordan
1
/*?
60
*
KAY 93
3 9 2
6
28
_
T no
1
K97
c.l
r^
»»INTCOinu
• »
-
Kwon
Optimizing ECM techniques against monopulse
acquisition and tracking
radars.
41
Download