Next Article in Journal
Combining Statistical Evidence When Evidence Is Measured by Relative Belief
Previous Article in Journal
Why Is the Universe Not Frozen by the Quantum Zeno Effect?
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Error-Constrained Entropy-Minimizing Strategies for Multi-UAV Deception Against Networked Radars

College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(6), 653; https://doi.org/10.3390/e27060653
Submission received: 25 April 2025 / Revised: 10 June 2025 / Accepted: 17 June 2025 / Published: 18 June 2025
(This article belongs to the Section Multidisciplinary Applications)

Abstract

:
In complex electromagnetic environments, spatial coupling uncertainties—position errors and timing jitter—increase false target information entropy, reducing strategy effectiveness and posing challenges for robust UAV swarm track deception. This paper proposes an error-constrained entropy-minimizing compensation framework to model radar/UAV errors and their spatial coupling. The framework establishes closed-form gate association conditions based on the principle of entropy minimization, ensuring mutual consistency of false target measurements across multiple radars. Two strategies are proposed to reduce false target information entropy: 1. Zonal track compensation forms dense “information entropy bands” around each preset false target by inserting auxiliary deception echoes, enhancing mutual information concentration in the measurement space; 2. Formation jamming compensation adaptively reshapes the UAV swarm into regular polygons, leveraging geometric symmetry to suppress spatial diffusion of position errors. Simulation results show that compared with traditional methods, the proposed approach reduces the spatial inconsistency entropy by 50%, improving false target consistency and radar deception reliability.

1. Introduction

UAV swarm has the advantages of high mobility, strong robustness, and cost-effectiveness, and the deep cooperation of multiple UAVs can realize the nonlinear growth of individual performance, which has been widely used in many fields. At the same time, advances in radar systems have significantly improved their anti-jamming capabilities, especially with the popularity of networked radar systems; a single electronic jamming platform becomes less and less capable of jamming the target radar network. Therefore, more and more scholars have begun to study the use of UAV groups to interfere with network radar, and how to use UAV groups to make network radar generate realistic phantom tracks has become a current research hot spot.
In the field of jamming technology, the concept of range deception ghost track generation proposed in 2004 initiated systematic research [1]. Scholars established the mathematical mapping relationship between flight paths and false tracks by constructing the ECAV collaborative trajectory model, laying the theoretical foundation for multi-platform cooperative deception [2,3,4,5]. As research focus shifted toward optimal control problems [6,7], Yunjun Xu proposed a method for designing real-time feasible and optimal trajectories inspired by motion camouflage, reducing problem dimensionality and improving computational efficiency [8]. This work provided critical theoretical support for subsequent technological advancements. Zhiping Ouyang developed a multi-UAV cooperative track deception optimization model, analyzing UAV positions and motion states to derive motion parameters through simulation and determining the minimum number of UAVs and optimal spacing required for effective radar network jamming [9]; N. Dhananjay addressed the generation of coherent virtual trajectories using ECAVs to deceive radar networks, providing sufficient conditions for feasible ECAV trajectories under proportional navigation missile-like scenarios. Line-of-sight guidance laws were employed to control ECAVs, and performance metrics were proposed to evaluate trajectory coherence [10]. Zhe Fan investigated deception rules for UAV swarms attacking radar networks, establishing a geometric model to minimize the number of UAVs required for false trajectory generation and offering insights into enhancing swarm electronic countermeasures [11]. In terms of application scenario expansion, Ratnoo constructed an adaptable deception formation controller for arbitrary initial positions based on the LOSG principle [12]; Zhang, Y. innovatively proposed a closed-form solution method for dual moving-source jamming against monopulse radars [13]; and Muhammad Abubakar Ali targeted the Linear Frequency Modulation (LFM) pulse Doppler radar. By intercepting the signal parameters and adding positive and negative delays, it was verified through simulation that highly similar false targets could be formed before and after the real echoes, confusing the radar discrimination [14]; and Bin Rao proposed a cooperative deception method based on noncoherent dual-source jamming for distributed radar fusion systems. By statistically controlling the amplitude ratio and time delay of jamming signals, noncoherent angle scintillation effects are induced between decoy signals and target echoes. This causes radar angle tracking to deviate from the true target, undermining the ‘common origin’ feature of targets and degrading trajectory fusion discriminability. Simulation results validate the feasibility of this method [15]. Yubing Wang analyzed the impact of radar positioning error and UAV jitter error on track spoofing in scenarios with missing prior information [16]. Pan Yu reviewed the development process of interference signal design, proposed a general formula for unified interference waveform design, pointed out the existing problems of the current interference from the signal level, and proposed improvement directions such as compound interference and the introduction of machine learning algorithms [17].
Radar anti-jamming technologies have undergone iterative upgrades, with multidimensional innovations enhancing system stability. Zhao et al. [18] exploited spatial scattering differences and multi-channel correlation tests to detect false targets under arbitrary deception. Li [19] employed Hermitian distance for true/false discrimination in distributed radars. Qiang Li [20] effectively identifies false targets in the scenario of combined distance-speed deception by utilizing the difference in the statistical distribution of velocities between real targets and false targets. Zhe Ji [21] proposes a radar networking anti-multi-range false target interference technology based on azimuth measurement correlation and nearest neighbor correlation. Hengli Yu [22] utilizes the spatial coherence difference between the target echo and the interference signal in multi-station radar and improves the target detection performance by combining noise subspace projection with generalized likelihood ratio detection (GLRT). Yang [23] addressed false data injection attacks with a confidence covariance intersection algorithm that adaptively down-weights suspect data. Zhou [24] fused bispectral features via Bayesian decision theory and kernel density estimation to distinguish true echoes, deception jamming, and noise. Zhang [25] proposed a non-coherent integration detection algorithm for joint jamming suppression and target detection. Han [26] introduced an active/passive networked radar method leveraging radar position error during initialization and sequential track correlation for false target elimination. Yang [27] fused nearest-neighbor algorithms with passive radar to improve tracking accuracy, and Zhang [28] used multi-perspective fully polarimetric observations in a multiple hypothesis testing model. Cheng Feng [29] proposed an optimization method for radar anti-jamming strategies based on key time nodes. The behavior of the interfering party was modeled through the Markov decision process to enhance the concealment of the strategy.
In recent years, the intelligent evolution of electronic warfare has accelerated. Li introduced a multi-agent deep-reinforcement-learning motion-allocation algorithm that adaptively re-positions UAV swarms, markedly enhancing cooperative jamming [30]; Yang refined MADDPG with clipped double Q-networks and delayed policy updates, curbing over-estimation and boosting pursuit efficiency [31]; Guo broke the SAR deception–template bottleneck via OTSCycGAN [32]; Haowei Zhang et al. addressed the resource allocation problem in UAV-aided joint radar and communication (JRC) networks. They proposed the JCAPASA and JPBSA strategies, taking the Cramér-Rao Lower Bound (CRLB) as the optimization metric to jointly optimize resource allocation, including power and subchannels [33,34]; Sun enhanced distributed-radar tracking with the ADJ-JRAPS joint strategy [35]; Zhang realized simultaneous gains in transmission efficiency and detection through fusion-based techniques [36]; Yongkang Wang utilized the integration of multiple networks to extract the spatiotemporal characteristics of trajectories and effectively identify active deception interference [37]; XiYu combined with SVM proposed a multi-domain feature fusion method based on time-domain envelope fluctuations and frequency-domain similarity for interference identification [38]; and Tan’s PASS-Net excelled in few-shot modulation classification [39]. Collectively, these studies herald a shift toward intelligent, collaborative, cross-domain jamming. The main contributions of this paper are:
  • Most cooperative-deception studies presuppose error-free conditions. We separately model radar prior-position, UAV-position. and time-delay errors, then integrate them into a spatially coupled comprehensive model. Using the principle of homologous testing, we derive conditions under which false targets satisfy spatial-consistency checks throughout track formation.
  • To offset real-world errors and raise deception success, we propose two compensation schemes: (1) Zonal Track Compensation, which algebraically quantifies offsets under coupled errors; and (2) UAV Formation Compensation, which geometrically suppresses horizontal UAV position errors.
  • Numerical simulations show that while individual errors displace false targets, the proposed schemes shrink the required range gate and, when combined, deliver the best performance—confirming their practicality and effectiveness.

2. Related Work

2.1. Cooperative Track Deception

Track deception jamming, a cornerstone of radar countermeasures, is broadly classified into two paradigms: repeater-based and generative. This study focuses on the mechanistic analysis of repeater-based track deception, where the core lies in precise time-frequency modulation of intercepted radar signals by digital radio frequency memory (DRFM) systems mounted on unmanned aerial vehicles (UAVs). Through a controllable delay (or pre-advancement) retransmission mechanism, range deception echoes are synthesized at the radar receiver frontend. These echoes induce the radar to interpret false signals as target position offsets (either farther or closer), culminating in the formation of deceptive track sequences [40]. In the netted radar engagement model depicted in Figure 1, three UAVs operate in a clustered formation to implement jamming. During each radar scan cycle, the jamming cluster employs mainlobe directional jamming to exploit geometric positioning relationships for constructing false track points in the radar’s observation space: each cycle’s false target is positioned along the extension of the line connecting the radar and the UAV [10]. Following “consilience criterion” verification and multi-radar data fusion, these discrete false targets are processed into spatiotemporally coherent false tracks, thereby achieving effective deception of the radar tracking system.
In this scenario, the basic assumptions for implementing track deception jamming are as follows.
  • The UAVs possess excellent stealth performance and high maneuverability.
  • A priori information such as the spatial positions of the target radars is available.
  • The jammer has the capability of high-precision signal replication.

2.2. Mathematical Model of Track Deception

Before using UAV swarm to implement track deception, we established a mathematical model with a single UAV jamming a single radar, as shown in Figure 2. Assume that the coordinates of the radar, UAV, and false target are ( x r , y r , z r ) , ( x u , y u , z u ) , and ( x j , y j , z j ) , respectively, and the distance from the UAV to the radar is R r u , the azimuth Angle is φ , the pitch Angle is θ , the distance from the false target to the radar is R r j , the velocity of the UAV is v u , and the velocity of the false target is v j .
Since mainlobe jamming requires radar, UAV, and false target to be in a straight line, the following relationship is satisfied:
x u x r x j x r = y u y r y j y r = z u z r z j z r
In general, the coordinates of the false target and the radar are known, and the flight altitude range of the UAV is known. Assuming that the altitude of the UAV is h, the position of the UAV can be obtained as follows:
x u = x r + ( h z r ) ( x j x r ) z j z r y u = y r + ( h z r ) ( x j x r ) z j z r z u = h
Assume that the azimuth angle of the false target velocity is α and the pitch angle is β , then the velocity in each direction is as follows:
x ˙ = v j cos β cos α y ˙ = v j cos β sin α z ˙ = v j sin β
The kinematic equation of the false targets is as follows:
r ˙ r θ ˙ cos φ r φ ˙ = cos φ cos θ cos φ sin θ sin φ sin θ cos θ 0 sin φ cos θ sin φ sin θ cos φ x ˙ y ˙ z ˙
Substitute Equation (3) into Equation (4).
r ˙ r θ ˙ cos φ r φ ˙ = cos φ cos θ cos φ sin θ sin φ sin θ cos θ 0 sin φ cos θ sin φ sin θ cos φ v cos α cos β v cos α sin β v sin α
Thus, the system of differential equations for the position of the target in the spherical coordinate system can be solved as follows:
r ˙ = v ( cos φ cos θ cos α cos β + cos φ sin θ cos α sin β + sin φ sin α ) φ ˙ = v r cos φ ( sin θ cos α cos β + cos θ cos α sin β ) θ ˙ = v r ( sin φ cos θ cos α cos β sin φ sin θ cos α sin β + cos φ sin α )
In summary, the equations of motion of the UAV are as follows:
v u = ( r ˙ u 2 + ( r u θ ˙ cos φ ) 2 + ( r u φ ˙ ) 2 ) 1 / 2 cos β u = r u ( θ ˙ cos φ sin φ cos θ φ ˙ sin θ ) v u sin φ

2.3. Conditions for Cooperative Deception Jamming Against Networked Radars

During practical implementation, various uncertainties cause the actual false target points to disperse [41]. As shown in Figure 3, false targets A and B do not lie within the same spatial resolution cell. Thus, it is essential to analyze errors and investigate cooperative deception strategies under error conditions.
Since mainlobe jamming requires radar, UAV, and false target to be in a straight line, the following relationship is satisfied:
Assume that at time k, the measurements of radar 1 and radar 2 are ρ k 1 and ρ k 2 , respectively. When transformed into each other’s coordinate systems, these measurements yield ρ k 12 and ρ k 21 , with correlation gate thresholds ρ T 1 and ρ T 2 , respectively.
ρ k 1 ρ k 21 ρ T 1 ρ k 2 ρ k 12 ρ T 2
If Equation (8) is satisfied, the measurements of radar 1 and radar 2 are considered associated. If measurements from different radars do not satisfy the association condition, they fail the homologous inspection and are identified as false targets to be eliminated. This situation results in missing track points on false tracks or even in the inability to generate valid tracks. All subsequent analyses in this paper are based on this principle.
In the track deception scenario for networked radars, the deception effectiveness of false targets highly depends on the degree of consistency between their spatial states and the predefined deception strategy. To precisely quantify the uncertainty exhibited by false targets during dynamic interaction processes, this paper constructs a mathematical expression framework for information entropy from the perspective of the Euclidean distance of spatial position deviations of false targets. The specific expression of information entropy for false targets is given as follows:
H = j = 1 K p j log 2 p j
where p j denotes the probability that the false target generated by the j-th UAV has a distance smaller than the threshold from the predefined false target. A higher entropy value indicates a larger Euclidean distance deviation of the generated false target from the predefined one, implying a worse jamming effect.

3. System Model

Since the scenario in this paper is premised on main lobe deception jamming, radars, UAVs, and false targets all lie along the same line. For false targets located on the line of sight between radars and UAVs, their spatial positions are jointly determined by UAV positions, radar positions, and time delay parameters. Consequently, false targets generated by different UAVs jamming different radars within the networked radar system must coincide in position; otherwise, they will be identified as false targets and eliminated by the system.
Current solutions for track deception primarily adopt a “reverse approach,” where UAV positions at each time are derived backward based on pre-defined false tracks and target radar positions [42]. Under ideal conditions, parameters of false targets detected by individual radars are coupled across domains. However, in real-world environments, various uncertainties cause false targets to be eliminated during fusion processing. Therefore, it is essential to analyze and account for these errors and their impacts.

3.1. Error Analysis of Radar A Priori Position

The radar prior position error is mainly caused by the positioning system. In the actual positioning process, complex terrains such as mountainous areas will affect the propagation of radar signals. The signal will be occluded, reflected, or refracted by the mountain, resulting in the distortion of the positioning system signal. However, in a complex electromagnetic environment, interference signals may mislead the positioning system to make misjudgments and eventually lead to positioning deviation. In addition, the technical limitations of the positioning system itself may also make the obtained radar prior position deviate from the actual position. The implementation of main lobe track deception jamming relies on the line of sight (LOS) criterion. When false tracks and UAV positions are predetermined without offsets, discrepancies between detected and actual radar positions will cause the predefined false targets to shift, leading to the splitting of false target points detected by individual radars within the networked radar system. Figure 4 illustrates that errors between Radar A Priori Position and Radar Actual Position result in False Target offset.
Assume that the radar a priori position error magnitude is Δ R r , the resulting false target offset is Δ r r , the distance from the radar a priori position to the UAV is R r u , and the distance from the UAV to the predefined false target is R u j , where the ratio of R r u to R u j is p. Through geometric approximation, the relationship between the offset and the error can be approximated as follows.
Δ r r = Δ R r ( 1 p p )
From Figure 3 and the triangle inequality theorem, the following system of inequalities can be derived.
ρ k 1 ρ k 21 = R 1 A R 1 B < A B < A C + B C = Δ r 1 + Δ r 2 ρ k 2 ρ k 12 = R 2 A R 2 B < A B < A C + B C = Δ r 1 + Δ r 2
Therefore, to satisfy measurement association, it follows from Equations (8) and (11) that the following conditions must be met.
Δ r 1 + Δ r 2 < ρ T 1 Δ r 1 + Δ r 2 < ρ T 2
Assume that the magnitude of radar a priori position error is known (if only the error range is determined, the maximum value is selected). However, since the direction of the error vector is unknown, to derive conditions that ensure measurement association, it is necessary to calculate the false target distribution to determine the maximum false target deviation.
Figure 5 illustrates the false target distribution influenced solely by radar prior position error. Assume that the UAV position is ( x u , y u , z u ) , the actual false target position is ( x j , y j , z j ) , and the deception distance is d. The distribution of actual false targets can be derived as follows:
x j x u 2 + y j y u 2 + z j z u 2 = d 2 x u x j + y u y j + z u z j x u 2 + y u 2 + z u 2
Based on the calculation of entropy in Equation (9), we need to obtain the probability that the deviation distance is less than a certain threshold. Therefore, through derivation, the distribution function of the threshold Δ r r , T under this condition can be obtained as follows:
F ( Δ r r , T ) = 0 Δ r r , T < 0 1 1 Δ r r , T 2 2 d 2 Δ R r 2 R r u 2 Δ r r , T 2 2 d 2 2 Δ r r , T 2 2 d 2 Δ R r 0 Δ r r , T Δ r r , max 1 Δ r r , T Δ r r , max
Furthermore, we can derive the maximum False Target Deviation when only radar a priori position errors exist, as follows.
Δ r r , max k i = d k i 2 2 R r u , k i ( R r u , k i ) 2 + ( Δ R r , k i ) 2
In Equation (15), at time k, the maximum distance of the false target offset caused by Radar i a priori position error is Δ r r , max k i , where the deception distance is d k i , the distance from the radar a priori position to the predefined UAV position is R r u , k i , and the radar a priori position error is Δ R r , k i .

3.2. Error Analysis of UAV Position

The position error of a UAV is mainly caused by its own characteristics and external environmental factors. Due to the small size and light weight of the UAV, it is extremely vulnerable to airflow disturbance when flying at high altitude. In addition, the positioning system on board has real-time calculation error, and the signal is also susceptible to external interference, which will cause positioning deviation. From the perspective of the external environment, the communication delay has a particularly significant impact on the position control of UAV. There is a time lag between the command issued by the ground control station and the command received and executed by the UAV. This lag will lead to the deviation between the actual position of the UAV and the expected position in the high-speed flight state and then cause the position deviation of the false target. Figure 6 illustrates that position errors between the actual and predefined UAV positions directly result in false target misalignment.
Assume that the radar a priori position error magnitude is Δ R u , and the resulting false target offset is Δ r u . Through geometric approximation, the relationship between the offset and the error can be approximated as follows.
Δ r u = Δ R u ( 1 p )
Following the same methodology as the radar a priori position error analysis, we first derive the distribution of actual false target positions, then determine the maximum false target deviation, and finally derive the measurement association conditions. Figure 7 illustrates the false target distribution influenced solely by UAV position error.
Assume that the coordinates of the predefined UAV position are ( x u , y u , z u ) , the spherical coordinates of the actual UAV position are ( ρ u , θ u , φ u ) , the angle between the predefined UAV position and the actual UAV position in the z-axis direction is φ u u , the spherical coordinates of the actual false target position are ( ρ j , θ j , φ j ) , and the deception distance is d. Define:
A = ( x u , y u , z u ) , B = ( sin φ u cos θ u , sin φ u sin θ u , cos φ u )
C = Δ r u 2 + 2 d 2 2 d Δ r u c o s φ u u + 2 d Δ r u 2 d R r u + Δ r u c o s φ u u ( R r u d ) R r u 2 + Δ r u 2 + 2 R r u Δ r u c o s φ u u
The distribution of actual false targets can be derived as follows:
ρ j = A · B ± ( A · B ) 2 ( A · A Δ R u 2 ) + d θ j = θ u φ j = φ u
Similarly, we can derive the distribution function under this condition as follows:
F ( Δ r u , T ) = 0 Δ r u , T < Δ R u 1 2 1 1 1 C Δ r u , T 2 d c o s φ u u Δ R u Δ r u , T Δ r u , max 1 Δ r r , T Δ r u , max
We can derive the maximum False Target offset when only UAV position errors exist, as follows.
Δ r u , max k i = ( Δ R u , k j ) 2 + 2 d k i 2 + 2 ( d k i ( Δ R u , k j ) 2 R r u , k i ( d k i ) 2 ) ( R r u , k i ) 2 + ( Δ R u , k j ) 2
In Equation (19), at time k, the maximum distance of the false target offset caused by the position error of UAV j to radar i implementing jamming is Δ r u , max k i , where the deception distance is d k i , the distance from the radar a priori position to the predefined UAV position is R r u , k i , and the position error of UAV j at time k is Δ R u , k i .

3.3. Error Analysis of Time Delay

The time delay parameter error in radar systems is mainly caused by the combined effect of the inherent characteristics of the system and external environmental factors. The stability of clock sources such as crystal oscillators in the signal generation circuit is insufficient, which will lead to the deviation of the time reference of the interference signal. In addition, the limitation of conversion accuracy and speed in the process of digital-to-analog conversion (DAC) will also cause systematic time delay errors. In terms of the external environment, increased operating temperature or changes in the physical state of the hardware will change the circuit characteristics and then introduce time delay offsets, which may lengthen or shorten the distance of the false target. As shown in Figure 8, time delay errors can also cause false target offset.
Based on radar detection principles, it can be derived that the following relationship exists between time delay error and false target offset:
Δ r τ , max k i = 1 2 c Δ τ max k j
In Equation (20), at time k, the maximum distance of false target offset caused by the delay error of UAV j jamming radar i is Δ r τ , max k i , the maximum delay of UAV j is Δ R u , k i .
Therefore, under the condition that only time-delay errors exist, the measurement association conditions for two radars are as follows:
1 2 c ( Δ τ max k 1 + Δ τ max k 2 ) min ρ T 1 , ρ T 2

3.4. Error Analysis of Spatial Coupling Synthesis

During the implementation of radar jamming, false targets are subject to the combined effects of multiple error sources. As previously discussed, radar a priori position errors, UAV position errors, and time delay parameter errors each contribute to spatial misalignment of false targets. However, in real-world scenarios (as shown in Figure 9), these errors often act synergistically, necessitating an investigation into whether their impacts are merely additive or involve complex interactions and accumulations that ultimately amplify false target offset.
Assume that the coordinates of the actual radar position are ( x r , y r , z r ) , and the coordinates of the predefined UAV position are ( x u , y u , z u ) , the coordinates of the actual UAV position are ( x u , y u , z u ) , the coordinates of the actual false target position are ( x j , y j , z j ) , and the deception distance is d.
x j = x u + d + Δ R τ x u x r x u x r 2 + y u y r 2 + z u z r 2 y j = y u + d + Δ R τ y u y r x u x r 2 + y u y r 2 + z u z r 2 z j = z u + d + Δ R τ z u z r x u x r 2 + y u y r 2 + z u z r 2 x r 2 + y r 2 + z r 2 = Δ R r 2 x u x u 2 + y u y u 2 + z u z u 2 = Δ R u 2
Assuming the radar priori position error vector is Δ R r = ( Δ R r , θ 1 , φ 1 ) and the UAV position error vector is Δ R u = ( Δ R u , θ 2 , φ 2 ), δ = cos ( θ 2 θ 1 ) , the probability density functions (PDFs) of the parameters can be obtained as follows:
f φ 1 ( φ 1 ) = 1 2 sin φ 1 ( φ 1 [ 0 , π ] )
f φ 2 ( φ 2 ) = 1 2 sin φ 2 ( φ 2 [ 0 , π ] )
f θ 1 ( θ 1 ) = f θ 2 ( θ 2 ) = 1 2 π ( θ 1 [ 0 , π ] , θ 2 [ 0 , π ] )
We can derive the distribution function under the condition of comprehensive error as follows:
F ( Δ r s , T ) = 1 8 π 0 π 0 π 0 2 π sin θ 1 sin θ 2 · 1 { Δ r s Δ r s , T } d φ 1 d θ 2 d θ 1
Define:
D = ( Δ R u , k j + Δ R r , k i ) 2 + R r u , k i 2 , E = d k i + Δ R τ , k i
Given the complexity of the complete probability density function, an appropriate simplification allows us to derive the maximum false target offset under the influence of spatial coupling comprehensive errors as follows.
Δ r s , max k i = Δ R u , k j + ( Δ R u , k j + Δ R r , k i ) E D 2 + R r u , k i E D d k i 2
In Equation (24), at time k, the maximum distance of false target offset caused by the spatial coupling comprehensive errors of UAV j jamming radar i is Δ r s , max k i , the deception distance is d k i , the distance from the radar a priori position to the predefined UAV position is R r u , k i , the radar a priori position error is Δ R r , k i , the position error of UAV j is Δ R u , k i , and the maximum delay of UAV j is Δ R u , k i .
The measurement association conditions for two radars under spatial coupling comprehensive errors can be analogously derived from Equation (11), the specific measurement association conditions are as follows.
Δ r s , max k 1 + Δ r s , max k 2 min ρ T 1 , ρ T 2
Focusing on the scenario with N radars, we first analyze the conditions for successfully deceiving Radar R 1 . At time k, the measurement association requirements are as follows.
Δ r s , max k 1 + Δ r s , max k 2 ρ T 1 Δ r s , max k 1 + Δ r s , max k 3 ρ T 1 Δ r s , max k 1 + Δ r s , max k N ρ T 1 Δ r s , max k 2 + Δ r s , max k 3 ρ T 1 Δ r s , max k 2 + Δ r s , max k 4 ρ T 1 Δ r s , max k 2 + Δ r s , max k N ρ T 1 Δ r s , max k N 1 + Δ r s , max k N ρ T 1
Summing all inequalities in Equation (26) yields the following inequality:
( N 1 ) ( Δ r s , max k 1 + Δ r s , max k 2 + + Δ r s , max k N ) N ( N 1 ) 2 ρ T 1
Simplifying yields the following result:
i = 1 N Δ r s , max , k i N 2 ρ T 1
Furthermore, for measurement association among N radars, the following conditions must be satisfied:
2 N i = 1 N Δ r s , max , k i min ρ T 1 , ρ T 2 ρ T N
Alternatively, suppose that at time k, the maximum false target splitting distances are reordered from smallest to largest as Δ r s , max k ( 1 ) , Δ r s , max k ( 2 ) Δ r s , max k ( N ) .
p 1 , 2 , N , q 1 , 2 , N , p q Δ r s , max k p + Δ r s , max k q ρ T i
Δ r s , max k ( N ) + Δ r s , max k ( N 1 ) 2 Δ r s , max k ( N ) ρ T i
For measurement association among N radars, the following conditions must be satisfied:
2 Δ r s , max k ( N ) min ρ T 1 , ρ T 2 ρ T N
In summary, the sufficient but not necessary conditions and necessary but not sufficient conditions for measurement association among N radars are as follows:
2 N i = 1 N Δ r s , max , k i min ρ T 1 , ρ T 2 ρ T N ( Necessary but Not Sufficient Condition ) 2 Δ r s , max , k ( N ) min { ρ T 1 , ρ T 2 , , ρ T N } ( Sufficient but Not Necessary Condition )
However, in most cases, the specific magnitude of errors cannot be accurately obtained, and they often follow certain distributions. This paper conducts further research based on the normal distribution. Assuming that the radar priori position error Δ R r , the UAV position error Δ R u , and the time delay error Δ R τ follow normal distributions, their probability distributions can be expressed as follows:
Δ R r N ( μ 1 , σ 1 2 ) Δ R u N ( μ 2 , σ 2 2 ) Δ R τ N ( μ 3 , σ 3 2 )
Through analysis, the probability density functions (PDFs) of the parameters can be obtained as follows:
f | Δ R r | ( r 1 ) = 2 π k 1 exp r 1 2 + μ 1 2 2 k 1 2 cosh r 1 μ 1 k 1 2 ( r 1 > 0 )
f | Δ R u | ( r 2 ) = 2 π k 2 exp r 2 2 + μ 2 2 2 k 2 2 cosh r 2 μ 2 k 2 2 ( r 2 > 0 )
f δ ( δ ) = 1 π 1 δ 2 ( δ ( 1 , 1 ) )
f R τ ( τ ) = 1 2 π k 3 exp ( τ μ 3 ) 2 2 k 3 2 ( R τ R )
The distribution function of the false target’s deviation distance can then be derived as follows:
F ( Δ r s , T ) = 0 0 0 π 0 π 1 1 1 { Δ r s Δ r s , T 2 } f | Δ R r | ( r 1 ) f | Δ R u | ( r 2 ) f φ 1 ( φ 1 ) f φ 2 ( φ 2 ) f δ ( δ ) f τ ( τ ) d τ d δ d φ 2 d φ 1 d r 2 d r 1
Combining with Equation (9), the information entropy of false targets can be obtained as follows:
H = j = 1 K p j log 2 p j = i = 1 N F i ( Δ r s , T ) log 2 F i ( Δ r s , T )
Therefore, with a 95% significance detection threshold, the jamming effectiveness must satisfy the following condition:
H < i = 1 N 0.95 log 2 0.95

4. Solution Techniques

Through geometric analysis and algebraic manipulation, the previous section derived sufficient but not necessary conditions for measurement association among N radars under spatial coupling errors. When these conditions are not met in practical scenarios, it is imperative to develop practical and effective error compensation schemes to ensure successful jamming implementation. For track deception, the primary research focuses on the target radar, UAV, and jamming payload. Given that the target radar is a noncooperative entity, this paper proposes two compensation schemes targeting UAVs and jamming payloads.

4.1. Zonal Track Compensation Method

The zonal track compensation method, as the name implies, this method ultimately forms a target false track by creating a zonal track. The underlying principle involves generating multiple additional false targets around the originally induced false target, thereby increasing the probability of measurement association at each time step and ensuring the production of point traces suitable for track formation. As shown in Figure 10, M and A represent the false target points generated by Radar R 1 and Radar R 2 , respectively.
Taking radar R 1 as an example, where α is a constant greater than zero, the measurement association conditions fail to hold under the following circumstances:
ρ k 1 ρ k 21 = ρ T 1 + α
At this time, two additional false targets B and C are generated at a distance β from the original false target M, where | B M | = | C M | = β . The value of β is defined as follows:
β = α + k ρ T 1 when ρ T 1 α β = ρ T 1 + k α when ρ T 1 > α .
In Equation (38), k ( 0 , 1 ) . Consequently, the following scenarios can be derived:
min ρ k 1 ± β ρ k 21 < ρ T 1
From a geometric perspective, when Δ A B C is an obtuse triangle with A M as the median to side B C , if A C B is obtuse, then | A C | < | A M | . This result can be derived as follows:
ρ k 1 ρ k 21 < A C < A M ρ k 2 ρ k 12 < A C < A M
Comparison with Equation (11) reveals that compensation reduces the Euclidean distance between false target splitting points, thereby reducing the required size of the association gate and increasing the measurement association probability.
Generalizing to the case of N radars, from an algebraic perspective, the zonal track compensation Method can be interpreted as systematically modifying time delay errors. By taking the derivative of Δ R τ , k i in Equation (24), the increasing and decreasing intervals are derived as Equation (41) and Equation (42), respectively:
Δ R τ , k i > d k i Δ R u , k j ( Δ R u , k j + Δ R r , k i ) R r u , k i d k i ( Δ R u , k j + Δ R r , k i ) 2 + R r u , k i 2
Δ R τ , k i < d k i Δ R u , k j ( Δ R u , k j + Δ R r , k i ) R r u , k i d k i ( Δ R u , k j + Δ R r , k i ) 2 + R r u , k i 2
From Equations (41) and (42), it can be derived that Δ r s , max , k i attains a minimum value, which is given by:
Δ r s , max k i min = R r u , k i Δ R u , k j + d k i ( Δ R u , k j + Δ R r , k i ) ( Δ R u , k j + Δ R r , k i ) 2 + R r u , k i 2
When a minimum is achieved, errors in arbitrary directions can be mitigated; however, the compensation effectiveness varies with error orientation. Therefore, given prior information about the deception distance d k i , the distance from the radar’s prior position to the pre-positioned UAV R r u , k i , the radar’s prior position error Δ R r , k i , the time delay error Δ R τ , k i , and the UAV position error Δ R u , k j , an appropriate β value can be determined to minimize Δ r s , max , k i , thereby reducing the impact of comprehensive errors. Additionally, empirical formulas derived from engineering practice can be developed for convenient computation.

4.2. Formation Jamming Compensation Method

The formation jamming compensation method evolves from single—UAV jamming against a single radar at an initial time step to UAV formation jamming against the same radar. As shown in Figure 11, a four—UAV formation is typically employed in an equilateral triangle configuration, where the geometric center coincides with the original single—UAV jamming position. The distance from each of the three vertex UAVs to the center is D u .
When the main lobe of the target radar illuminates the UAV at the geometric center, multiple UAVs simultaneously generate false targets along the line connecting each radar to its corresponding UAV. To rigorously analyze this from an algebraic perspective, we take the derivative of Δ R u , k i in Equation (24) and derive the increasing interval as follows.
Δ R u , k j > ( Δ R u , k j + Δ R r , k i ) ( d k i + Δ R r , k i ) ( Δ R u , k j + Δ R r , k i ) 2 + R r u , k i 2
Since the right-hand side of the inequality is always negative, Δ r s , max , k i is a monotonically increasing function of Δ R u , k i over ( 0 , + ) . Therefore, the basic compensation strategy is to reduce UAV position errors. Let the pitch and azimuth angles of the UAV position error Δ R u be φ and θ , respectively, which can be represented in vector form as Δ R u cos φ cos θ , cos φ sin θ , sin φ . From another perspective, the three newly added UAVs introduce errors with magnitude D u , pitch angle 0 , and azimuth angles 0 , 120 , and 240 relative to the original Δ R u . Due to the equilateral triangle formation, Figure 12 illustrates the simplified model leveraging geometric symmetry.
Consequently, the compensated error is derived as follows:
Δ R u x = D u + Δ R u cos φ cos θ Δ R u y = Δ R u cos φ sin θ Δ R u z = Δ R u sin φ
From the above equation, it can be obtained that this compensation method mainly compensates for the horizontal component of the UAV position error. To make the UAV position error effectively compensated, the magnitude of the compensated UAV position error Δ R u should be smaller than the original Δ R u . After simplification, the magnitude of Δ R u x can be obtained to be smaller than the original Δ R u x , as follows:
D u + Δ R u cos φ cos θ < Δ R u cos φ cos θ π 2 φ π 2 2 π 3 θ 4 π 3
Since the horizontal component compensation effectiveness degrades when φ approaches the boundary (where the value approaches zero), to ensure the compensation scheme remains effective under most conditions, we assume D u = q Δ R u ( q > 0 ) and rederive the valid range of φ using Equation (47) as follows.
arccos q 2 cos θ φ arccos q 2 cos θ
From Equation (47), it can be derived that q satisfies the following condition:
arccos q arccos q 2 cos θ arccos q 2
Therefore, the range of φ is as follows.
arccos q φ arccos q
To ensure the compensation probability exceeds 70%, the following formula is derived:
arccos q > 7 20 π
And then, we derive that q < cos 7 20 π . Specifically, when the UAV position error Δ R u is known, using an equilateral triangle formation with vertex UAVs positioned at D u ( 0 , cos 7 20 π Δ R u ) from the center achieves compensation effectiveness in over 70% of scenarios.
The previously analyzed compensation implementation using a triangular formation represents a trade-off between compensation effectiveness and jamming resource utilization. However, when prioritizing compensation performance under sufficient jamming resources, the formation jamming strategy can be generalized to a regular n-gon configuration. For a given UAV position error R and a required compensation probability exceeding m % , the following condition is derived:
D u + Δ R u cos φ cos θ < Δ R u cos φ cos θ m 200 π φ m 200 π π π n θ π + π n
Similarly, it can be derived that q must satisfy the following condition under this constraint:
arccos q 2 cos π n > m 200 π
q < 2 cos π n cos m 200 π
In summary, when using the equilateral n-sided formation jamming for compensation, a sufficient but not necessary condition for the compensation probability to reach m % is D u < 2 cos π n cos m 200 π q . Moreover, as can be seen from Equation (53), the larger the value of n, the larger the range of values for q; conversely, the larger the value of m, the smaller the range of values for q. Although this paper has established a model and derived the setting conditions for the jamming formation, in engineering practice, due to the minimum distance constraint between drones, the compensation probability can be appropriately reduced. Alternatively, the formation jamming can be scaled down to the arraying of jammer antennas to compensate for the position errors of drones.
Algorithm 1 summarizes the error-aware compensation workflow applied at each radar scan step: it evaluates the upper-bound offset induced by coupled uncertainties and conditionally applies zonal or formation compensation to maintain measurement consistency and coherent false-target tracks.
Algorithm 1: Error-Aware Compensation Workflow
Input: estimated error bounds { Δ R r , Δ R u , Δ τ } , association threshold ρ T
Output: adjusted compensation parameters { Δ R τ , D u }
1 for each radar scan step k do
2    compute upper-bound offset Δ r max using Equation (24)
3    if  Δ r max > ρ T  then
4       adjust Δ R τ heuristically per Equations (41)–(43)
5       recompute Δ r max
6    end if
7    if  Δ r max > ρ T  then
8       adjust UAV geometry: set D u = q · Δ R u with q satisfying Equation (53)
9    end if
10   record compensation parameters for step k
11 end for

5. Simulation and Results

5.1. Model Validation

Section 5.1 was designed to investigate the effects of multidirectional radar a priori position errors and UAV position errors on false target offset in a scenario where a single UAV jams a single radar. The experimental conditions are presented in Table 1. Figure 13 and Figure 14 illustrate the false target offset caused by individual error sources, while Figure 15 demonstrates the cumulative effects of interacting combined errors, and Figure 16 illustrates the distribution functions under single-error conditions and comprehensive- error conditions.
As presented in Figure 13 and Figure 14, the x-axis represents the azimuth angle of the error, the y-axis represents the elevation angle of the error, the z-axis represents the false target offset distance, and the color bar represents the magnitude of offset distance. As shown in the results, the surface represents the actual offset, while the plane denotes the estimated offset obtained from Equations (10) and (16). The estimated offset can be used to represent the actual offset in most cases. Additionally, comparing the maximum value of the actual offset with parameter Δ r s , max in Table 1 validates Equations (15) and (19).
Due to the four-dimensional nature of angular variables in combined errors, which complicates visualization, Figure 15 presents only the false target distribution under the experimental conditions. Analysis of experimental conditions and results reveals that combined errors do not merely represent linear superposition of individual error sources but instead induce false target offset through complex interactions and cumulative effects. This also validates Equation (24). Figure 16 illustrates the distribution functions of the false target’s deviation distance under three different error scenarios, which validates Equations (14), (18) and (34) derived in Section 3. Collectively, Section 5.1 confirms the correctness of the error model developed in this paper.

5.2. Compensation Evaluation

Section 5.2 was designed to validate compensation schemes for a single UAV jamming a single radar. Pre-compensation results can be found in Figure 15 of Section 5.1. Under identical error conditions, Section 5.2 focuses on comparing results across different compensation parameters and schemes. The final experimental results are presented in Figure 17 and Figure 18.
Figure 17 compares two scenarios with different time delay compensation distances. The compensation parameters in Figure 17a,b are derived from Equations (41) and (42). By comparing the maximum offset distances in Figure 17a,c and analyzing color bar differences in Figure 17b,d, it is validated that the optimal compensation parameters minimize the maximum false target offset while maintaining effectiveness across most scenarios. However, comparisons of maximum compensated distances in Figure 17b,d reveal that non-optimal parameters achieve better compensation along the line connecting the radar a priori position and the UAV’s pre-determined position.
Figure 18 compares two scenarios with different values of the formation distance-to-UAV position error ratio q. The spatial symmetry of the compensation scheme is validated through analysis of the four subfigures. The formation compensation parameters in Figure 18a,b satisfy Equation (50). Comparison of Figure 18a,c and color bar analysis reveals that compensated parameters meeting Equation (50) conditions exhibit larger average false target offsets. Conversely, Figure 18b,d comparisons show that parameters satisfying Equation (50) achieve higher compensation probability but lower compensation performance compared to non-compliant parameters. This pattern extends to equilateral n-sided formations. Therefore, practical compensation implementations require balancing compensation probability and performance and setting appropriate parameters according to specific needs.
Based on the analysis of Figure 17 and Figure 18, it is proposed to implement a combined application of the two compensation schemes, which are mutually complementary. A joint experiment was conducted under the experimental conditions of Figure 17 and Figure 18, with results presented in Figure 19.
As presented in Figure 19, the formation compensation method is used as the foundation, and the zonal trajectory compensation method is implemented simultaneously. As analyzed earlier, when either compensation scheme is applied alone, it is difficult to balance compensation performance and probability. For Figure 19a, which emphasizes compensation probability, by incorporating zonal trajectory compensation parameters that focus on compensation performance, Figure 19b is obtained. Similarly, for Figure 19c, which emphasizes compensation performance, by incorporating zonal trajectory compensation parameters that focus on compensation probability, Figure 19d is achieved. By comparing the central regions of the two figures with the same formation compensation parameters, it can be observed that the central area in the combined compensation results has a lighter color and fewer dark spots. This indicates that the combined compensation method has a favorable effect on balancing compensation performance and probability.

5.3. Multi-UAV Performance

Section 5.3 conducts simulation analysis on false target measurement association for cooperative track deception jamming of multi-UAVs against networked radars under error conditions. The simulated false trajectory is defined by Equation (54), and the basic experimental conditions are presented in Table 2 and Table 3, which validates the effectiveness of compensation schemes in practical scenarios. The experimental results are shown in Figure 20 and Figure 21. The false track effects displayed under specific scenarios and after filtering are presented in Figure 22 and Figure 23.
x ( t ) = 3000 + 150 t ; y ( t ) = 100 cos ( 0.015 π ( t + 1 ) ) + 2000 ; z ( t ) = 10 t + 6000 ;
From the experimental results, it can be observed that both compensation strategies exhibit favorable compensation effects on multi-UAV cooperative track deception jamming. Under the simulation conditions, taking 100% measurement association probability as an example, the zonal trajectory compensation method reduces the threshold requirement from 70 to a maximum of 27.5, while the formation jamming compensation method achieves a maximum reduction to 30. Additionally, under the same conditions, the compensation effect of the compensation parameters shows a phenomenon of increasing first and then decreasing as the parameters increase, which is consistent with the derivation in Section 4.
Figure 22 demonstrates the simulation results of the overall scenario where multiple UAVs conduct coordinated track deception against a networked radar under error conditions. The experimental results show that the presence of errors causes a spatially coupled false track to deviate from its predefined trajectory and split into three independent tracks. Under the experimental conditions, the measurement association criteria are satisfied only at one time instant, leading to the degradation of tracks into point traces and significantly impairing the jamming effect.
Figure 23 respectively shows the false tracks finally formed after data processing under four scenarios. As shown in the results, the compensation schemes exhibit superior compensation performance, and the tracks formed by the joint application of the two schemes are closer to the predefined tracks. To more intuitively demonstrate the effectiveness and robustness of the compensation scheme proposed in this paper, we set a = 10 m and D u = 20 m, and validate the scheme under different error conditions (where all errors follow normal distributions). The means of R r and R u are varied, with their standard deviations both set to 10 m; the mean of R τ is 10 m, and its standard deviation is 5 m. Under these experimental conditions, 10,000 Monte Carlo simulations are conducted, and the average value is taken as the deception success probability. The final experimental results are shown in Table 4, where Z denotes the strip-track compensation method and F denotes the formation jamming compensation method.
As can be seen from the experimental results, even without adaptive adjustment of compensation parameters, the scheme can still maintain good compensation performance under different error conditions. Meanwhile, under various error conditions, the combined effect of the two compensation schemes outperforms that of a single compensation scheme. Therefore, the compensation scheme proposed in this paper exhibits both robustness and effectiveness.

6. Conclusions and Future Work

This study proposed an error-aware deception framework that explicitly models radar- position, UAV-navigation, and time-delay uncertainties—and, crucially, captures their spatial coupling. By analyzing how each error source inflates false-target splitting, we derived closed-form conditions under which deceptive measurements remain mutually consistent across radars. These theoretical results were then translated into two practical compensation schemes:zonal trajectory compensation, which inserts auxiliary false targets to form a dense deception belt, and formation-based compensation, which reshapes the swarm geometry to suppress horizontal error components.
Without compensation, the correlation-gate radius had to be about 60 m to maintain even modest track coherence. This large gate was required because coupled position and timing errors substantially displaced the false targets. The proposed zonal-trajectory compensation reduced the required gate to 27.5 m and markedly improved false-target alignment across multiple radars. Likewise, the formation-based compensation lowered the gate threshold to approximately 30 m and produced stable track structures across diverse error orientations. Simulations further showed that combining both strategies provided the best trade-off between compensation effectiveness and robustness. Under representative simulation settings involving radar-position errors of 50 m and time-delay offsets of 10 m, the combined compensation method maintained measurement association across all evaluated time steps. These findings indicate that the joint compensation scheme markedly enhances the reliability and spatial coherence of multi-UAV deception under realistic uncertainties, thereby reducing the gap between theory and practice.
Despite these gains, several limitations remain. The present model omits dynamic radar-cross-section variations, Doppler-velocity coupling, and channel-specific electromagnetic distortions. Furthermore, the compensation logic is purely geometric; questions of power allocation, waveform design, and cognitive electronic-warfare adaptation are left unaddressed. Finally, all evaluations were performed in simulation, so real-time feedback constraints on UAV manoeuvring were not fully captured.
Future research will therefore move in four directions. First, we will extend the homology test to incorporate RCS variability and Doppler misregistration, enabling deception that is robust against velocity-gated fusion filters. Second, an adaptive compensation controller will be developed by embedding an online Kalman estimator that updates error bounds and tunes compensation gains during flight, thus enhancing resilience to wind-induced perturbations and clock drifts. Third, hardware-in-the-loop trials—with a software-defined-radio swarm platform—will be conducted to validate latency, power consumption, and spectral-mask compliance under dense electronic-warfare conditions. Finally, we aim to generalize the framework to cross-domain scenarios in which RF decoys are synchronized with infrared flares, allowing a coordinated attack on multi-sensor fusion radars. Collectively, these efforts will advance the proposed methodology from high-fidelity simulation toward field-deployable multi-UAV deception technology.

Author Contributions

Conceptualization, H.B. and J.P.; methodology, H.B.; software, H.B.; validation, H.B. and Z.W.; formal analysis, H.B., J.P., Z.W., R.C. and Y.M.; investigation, H.B.; writing—original draft preparation, H.B.; writing—review and editing, Y.M., Z.W. and J.P.; supervision, J.P., Z.W., R.C. and Q.J.; project administration, J.P. and Q.J.; funding acquisition, J.P. and Q.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National University of Defense Technology Autonomous Scientific Research (Grant No. 23A101) and the National Natural Science Foundation of China (Grant No. 62301578).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Data are available from the corresponding author upon request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Pachter, M.; Chandler, P.; Larson, R.; Purvis, K. Concepts for generating coherent radar phantom tracks using cooperating vehicles. In Proceedings of the AIAA Guidance, Navigation, and Control Conference and Exhibit, Providence, RI, USA, 16–19 August 2004; p. 5334. [Google Scholar]
  2. Maithripala, D.H.A.; Jayasuriya, S. Radar deception through phantom track generation. In Proceedings of the American Control Conference, Portland, OR, USA, 8–10 June 2005; IEEE: Piscataway, NJ, USA, 2005; pp. 4102–4106. [Google Scholar]
  3. Purvis, K.B.; Astrom, K.J.; Khammash, M. Estimating radar positions using cooperative unmanned air vehicle teams. In Proceedings of the American Control Conference, Portland, OR, USA, 8–10 June 2005; IEEE: Piscataway, NJ, USA, 2005; pp. 3512–3517. [Google Scholar]
  4. Purvis, K.B.; Chandler, P.R.; Pachter, M. Feasible flight paths for cooperative generation of a phantom radar track. J. Guid. Control. Dyn. 2006, 29, 653–661. [Google Scholar] [CrossRef]
  5. Purvis, K.B.; Astrom, K.J.; Khammash, M. Online control strategies for highly coupled cooperative UAVs. In Proceedings of the 2007 American Control Conference, New York, NY, USA, 9–13 July 2007; IEEE: Piscataway, NJ, USA, 2007; pp. 3961–3966. [Google Scholar]
  6. Lee, I.H.; Bang, H. Cooperative control of multiple electronic combat air vehicles for electronic attack. In Proceedings of the 2008 SICE Annual Conference, Chofu, Japan, 20–22 August 2008; IEEE: Piscataway, NJ, USA, 2008; pp. 2127–2130. [Google Scholar]
  7. Lee, I.H.; Bang, H. A cooperative line-of-sight guidance law for a three-dimensional phantom track generation using unmanned aerial vehicles. Proc. Inst. Mech. Eng. Part G J. Aerosp. Eng. 2013, 227, 897–915. [Google Scholar] [CrossRef]
  8. Xu, Y.; Basset, G. Virtual motion camouflage based phantom track generation through cooperative electronic combat air vehicles. Automatica 2010, 46, 1454–1461. [Google Scholar] [CrossRef]
  9. Ouyang, Z.; Xu, C.; Feng, J.; Wang, B. Research on Method of Phantom Track Generation Based on Cooperative Control of UAVs in Uniform Linear Motion. IOP Conf. Ser. Mater. Sci. Eng. 2019, 685, 012018. [Google Scholar] [CrossRef]
  10. Dhananjay, N.; Kuduvalli, A.; Ghose, D. Realistic coherent phantom track generation by a group of electronic combat aerial vehicles. In Proceedings of the 2013 American Control Conference, Washington, DC, USA, 17–19 June 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 4642–4647. [Google Scholar]
  11. Fan, Z.; Gao, X.; Jin, Y.; Li, F.; Cai, J.; Ni, W. Research on route planning of group UAV cooperation for deception jamming to radar network. In Proceedings of the 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chongqing, China, 12–14 June 2020; IEEE: Piscataway, NJ, USA, 2020; Volume 1, pp. 1966–1969. [Google Scholar]
  12. Ratnoo, A.; Shima, T. Formation-flying guidance for cooperative radar deception. J. Guid. Control. Dyn. 2012, 35, 1730–1739. [Google Scholar] [CrossRef]
  13. Zhang, Y.; Gao, M.; Li, Y.; Cheng, S. Phantom track generation using coherent dual moving sources for monopulse radar. In Proceedings of the 2014 9th IEEE Conference on Industrial Electronics and Applications, Hangzhou, China, 9–11 June 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 1451–1455. [Google Scholar]
  14. Ali, M.A.; Ahmed, H.; Saadia, R.; Ahmed, W.; Tahir, F. Electronic deception jamming: False target generation in radars. In Proceedings of the 2022 International Conference on Recent Advances in Electrical Engineering & Computer Sciences (RAEE & CS), Islamabad, Pakistan, 18–20 October 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1–6. [Google Scholar]
  15. Rao, B.; Gu, Z.; Nie, Y. Deception approach to track-to-track radar fusion using noncoherent dual-source jamming. IEEE Access 2020, 8, 50843–50858. [Google Scholar] [CrossRef]
  16. Wang, Y.; Wang, W.; Zhang, X.; Wu, L.; Yin, H. The joint phantom track deception and TDOA/FDOA localization using UAV swarm without prior knowledge of radars’ precise locations. Electronics 2022, 11, 1577. [Google Scholar] [CrossRef]
  17. Pan, Y.; Xie, D.; Zhao, Y.; Wang, X.; Huang, Z. Overview of Radar Jamming Waveform Design. Remote Sens. 2025, 17, 1218. [Google Scholar] [CrossRef]
  18. Zhao, S.; Zhang, L.; Zhou, Y.; Liu, N. Signal fusion-based algorithms to discriminate between radar targets and deception jamming in distributed multiple-radar architectures. IEEE Sensors J. 2015, 15, 6697–6706. [Google Scholar] [CrossRef]
  19. Li, Q.; Zhang, L.; Zhou, Y.; Zhao, S.; Liu, N.; Zhang, J. Discrimination of active false targets based on Hermitian distance for distributed multiple-radar architectures. IEEE Access 2019, 7, 71872–71883. [Google Scholar] [CrossRef]
  20. Li, Q.; Guo, Y.; Zhang, P.; Xu, H.; Zhang, L.; Chen, Z.; Huang, Y. Deception velocity-based method to discriminate physical targets and active false targets in a multistatic radar system. Remote Sens. 2024, 16, 382. [Google Scholar] [CrossRef]
  21. Ji, Z.; Wang, G.; Zhang, X.; Sun, D. Technique of anti-multi-range-false-target jamming for radar network based on double discrimination. In Proceedings of the 2016 CIE International Conference on Radar (RADAR), Guangzhou, China, 10–13 October 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–5. [Google Scholar]
  22. Yu, H.; Liu, N.; Zhang, L. An Interference Suppression Method for Multistatic Radar Based on Noise Subspace Projection. IEEE Sens. J. 2020, 20, 8797–8805. [Google Scholar] [CrossRef]
  23. Yang, C.; Feng, L.; Zhang, H.; He, S.; Shi, Z. A novel data fusion algorithm to combat false data injection attacks in networked radar systems. IEEE Trans. Signal Inf. Process. Netw. 2018, 4, 125–136. [Google Scholar] [CrossRef]
  24. Zhou, H.; Dong, C.; Wu, R.; Xu, X.; Guo, Z. Feature fusion based on Bayesian decision theory for radar deception jamming recognition. IEEE Access 2021, 9, 16296–16304. [Google Scholar] [CrossRef]
  25. Zhang, S.; Zhou, Y.; Zhang, L.; Zhang, Q.; Du, L. Target detection for multistatic radar in the presence of deception jamming. IEEE Sens. J. 2021, 21, 8130–8141. [Google Scholar] [CrossRef]
  26. Han, X.; He, H.; Zhang, Q.; Yang, L.; He, Y. Suppression of deception-false-target jamming for active/passive netted radar based on position error. IEEE Sens. J. 2022, 22, 7902–7912. [Google Scholar] [CrossRef]
  27. Yang, Y.; Da, K.; Zhu, Y.; Xiang, S.; Fu, Q. Consensus based target tracking against deception jamming in distributed radar networks. IET Radar Sonar Navig. 2023, 17, 683–700. [Google Scholar] [CrossRef]
  28. Zhang, L.; Luo, Y.; Wang, H.; Zhang, Q. Detection of False Targets in a Full-Polarization Radar Network Under Deception Jamming. IEEE Sens. J. 2023, 24, 3368–3379. [Google Scholar] [CrossRef]
  29. Feng, C.; Fu, X.; Dong, J.; Zhao, Z.; Yu, J.; Pan, T. An Optimization Method for Radar Anti-Jamming Strategy via Key Time Nodes. Remote Sens. 2023, 15, 3716. [Google Scholar] [CrossRef]
  30. Li, J.; Liu, K.; Zhang, T. Multi-agent Deep Reinforcement Learning for Dynamic Motion Control Allocation in UAV Swarm Cooperative Jamming to Netted Radar. In Proceedings of the International Conference on Autonomous Unmanned Systems, Xi’an, China, 23–25 September 2022; Springer: Berlin/Heidelberg, Germany, 2022; pp. 1204–1213. [Google Scholar]
  31. Yang, F.; Shao, C.; Shen, B.; Li, Z. A Multi-agent Deep Reinforcement Learning Method for UAVs Cooperative Pursuit Problem. In Proceedings of the International Conference on Guidance, Navigation and Control, Harbin, China, 5–7 August 2022; Springer: Berlin/Heidelberg, Germany, 2022; pp. 7243–7252. [Google Scholar]
  32. Guo, X.; Tian, T.; Tan, H.; Fan, W.; Zhou, F. A Deceptive Jamming Technology Against SAR Based on Optical-to-SAR Template Translation. IEEE Trans. Aerosp. Electron. Syst. 2024, 60, 5715–5729. [Google Scholar] [CrossRef]
  33. Zhang, H.; Liu, W.; Zhang, Q.; Liu, B. Joint customer assignment, power allocation, and subchannel allocation in a UAV-based joint radar and communication network. IEEE Internet Things J. 2024, 11, 29643–29660. [Google Scholar] [CrossRef]
  34. Zhang, H.; Liu, W.; Zhang, Q.; Zhang, L.; Liu, B.; Xu, H.X. Joint Power, Bandwidth, and Subchannel Allocation in a UAV-Assisted DFRC Network. IEEE Internet Things J. 2025, 12, 11633–11651. [Google Scholar] [CrossRef]
  35. Sun, J.; Yuan, Y.; Greco, M.S.; Gini, F.; Yang, X.; Yi, W. Anti-deception Jamming Resource Scheduling for Multi-target Tracking in Distributed Radar Networks. IEEE Trans. Aerosp. Electron. Syst. 2024, 60, 9111–9128. [Google Scholar] [CrossRef]
  36. Zhang, Z.; Zhu, J.; Liu, N.; Zhang, L.; Yang, M. Signal fusion method for networked radar motivated by data fusion. IEEE Sens. J. 2024, 25, 951–961. [Google Scholar] [CrossRef]
  37. Wang, Y.; Liu, J.; Feng, K.; Cheng, Y.; Lin, Z.; Wu, X. An Intelligent Discrimination Method for Track Deception Jamming. In Proceedings of the 2023 7th Asian Conference on Artificial Intelligence Technology (ACAIT), Jiaxing, China, 10–12 November 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 198–203. [Google Scholar]
  38. Yu, X.; Wang, W.; Wu, H.; Bo, J.; Zhang, J.; Meng, J. Multi-domain feature fusion based radar deception jamming recognition method. In Proceedings of the 2023 IEEE 7th International Symposium on Electromagnetic Compatibility (ISEMC), Hangzhou, China, 20–23 October 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1–4. [Google Scholar]
  39. Tan, H.; Zhang, Z.; Li, Y.; Shi, X.; Wang, L.; Yang, X.; Zhou, F. PASS-Net: A Pseudo Classes and Stochastic Classifiers Based Network for Few-Shot Class-Incremental Automatic Modulation Classification. IEEE Trans. Wirel. Commun. 2024, 23, 17987–18003. [Google Scholar] [CrossRef]
  40. Li, Y.; Shi, C.; Yan, M.; Zhou, J. Mission Planning and Trajectory Optimization in UAV Swarm for Track Deception against Radar Network. Remote Sens. 2024, 16, 3490. [Google Scholar] [CrossRef]
  41. Liu, X.; Li, D. The technology of deviation compensation for radar phantom tracks. In Proceedings of the 2017 IEEE 17th International Conference on Communication Technology (ICCT), Chengdu, China, 27–30 October 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 1098–1101. [Google Scholar]
  42. Bai, P.; Wang, Y.; Liang, X.; Zhang, J.; Wang, W. Review of Track Deception Techniques for Unmanned Aerial Vehicles against Radar Networks. Acta Aeronaut. Et Astronaut. Sin. 2020, 41, 23912. [Google Scholar]
Figure 1. Multi-UAV Cooperative Track Deception Against Networked Radars.
Figure 1. Multi-UAV Cooperative Track Deception Against Networked Radars.
Entropy 27 00653 g001
Figure 2. Basic Model of Track Deception.
Figure 2. Basic Model of Track Deception.
Entropy 27 00653 g002
Figure 3. Schematic Diagram of Spatial Resolution Cell.
Figure 3. Schematic Diagram of Spatial Resolution Cell.
Entropy 27 00653 g003
Figure 4. False Target offset Induced by Radar A Priori Position Errors.
Figure 4. False Target offset Induced by Radar A Priori Position Errors.
Entropy 27 00653 g004
Figure 5. False target distribution influenced by Radar A Priori Position Errors.
Figure 5. False target distribution influenced by Radar A Priori Position Errors.
Entropy 27 00653 g005
Figure 6. False Target offset Induced by UAV Position Errors.
Figure 6. False Target offset Induced by UAV Position Errors.
Entropy 27 00653 g006
Figure 7. False target distribution influenced by UAV Position Errors.
Figure 7. False target distribution influenced by UAV Position Errors.
Entropy 27 00653 g007
Figure 8. False Target Offset Induced by Time Delay Errors.
Figure 8. False Target Offset Induced by Time Delay Errors.
Entropy 27 00653 g008
Figure 9. False Target offset Induced by Spatial Coupling Comprehensive Errors.
Figure 9. False Target offset Induced by Spatial Coupling Comprehensive Errors.
Entropy 27 00653 g009
Figure 10. Schematic of the Zonal Track Compensation Method.
Figure 10. Schematic of the Zonal Track Compensation Method.
Entropy 27 00653 g010
Figure 11. Schematic of the Formation Jamming Compensation Method.
Figure 11. Schematic of the Formation Jamming Compensation Method.
Entropy 27 00653 g011
Figure 12. Simplified Horizontal Compensation Model for UAV Formations.
Figure 12. Simplified Horizontal Compensation Model for UAV Formations.
Entropy 27 00653 g012
Figure 13. False Target Offset Induced by A Priori Position Errors of Multidirectional Radars.
Figure 13. False Target Offset Induced by A Priori Position Errors of Multidirectional Radars.
Entropy 27 00653 g013
Figure 14. False Target Offset Induced by Position Errors of Multidirectional UAVs.
Figure 14. False Target Offset Induced by Position Errors of Multidirectional UAVs.
Entropy 27 00653 g014
Figure 15. False Target Offset Induced by Multidirectional Combined Errors.
Figure 15. False Target Offset Induced by Multidirectional Combined Errors.
Entropy 27 00653 g015
Figure 16. False Target Offset Euclidean Distance Distribution Curve.
Figure 16. False Target Offset Euclidean Distance Distribution Curve.
Entropy 27 00653 g016
Figure 17. Compensatory Performance of Zonal Trajectory Compensation Method for Offset Distance (a) R τ = 8.78 m, False Target Offset Distribution. (b) R τ = 8.78 m, Compensated Distance. (c) R τ = 30 m, False Target Offset Distribution. (d) R τ  = 30 m, Compensated Distance.
Figure 17. Compensatory Performance of Zonal Trajectory Compensation Method for Offset Distance (a) R τ = 8.78 m, False Target Offset Distribution. (b) R τ = 8.78 m, Compensated Distance. (c) R τ = 30 m, False Target Offset Distribution. (d) R τ  = 30 m, Compensated Distance.
Entropy 27 00653 g017
Figure 18. Compensatory Performance of Formation Jamming Compensation Method for Offset Distance (a) q = 0.3, False Target Offset Distribution. (b) q = 0.3, Compensated Distance. (c) q = 0.7, False Target Offset Distribution. (d) q = 0.7, Compensated Distance.
Figure 18. Compensatory Performance of Formation Jamming Compensation Method for Offset Distance (a) q = 0.3, False Target Offset Distribution. (b) q = 0.3, Compensated Distance. (c) q = 0.7, False Target Offset Distribution. (d) q = 0.7, Compensated Distance.
Entropy 27 00653 g018
Figure 19. Compensatory Performance of Combined Compensation Method for Offset Distance (a) q = 0.3, R τ = 20 m, False Target Offset Distribution. (b) q = 0.3, R τ = 30 m, Compensated Distance. (c) q = 0.7, R τ = 20 m, False Target Offset Distribution. (d) q = 0.7, R τ = 8.78 m, Compensated Distance.
Figure 19. Compensatory Performance of Combined Compensation Method for Offset Distance (a) q = 0.3, R τ = 20 m, False Target Offset Distribution. (b) q = 0.3, R τ = 30 m, Compensated Distance. (c) q = 0.7, R τ = 20 m, False Target Offset Distribution. (d) q = 0.7, R τ = 8.78 m, Compensated Distance.
Entropy 27 00653 g019
Figure 20. Compensation effect curve of the zonal track compensation method.
Figure 20. Compensation effect curve of the zonal track compensation method.
Entropy 27 00653 g020
Figure 21. Compensation effect curve of the formation jamming compensation method.
Figure 21. Compensation effect curve of the formation jamming compensation method.
Entropy 27 00653 g021
Figure 22. Uncompensated track deception overall scenario.
Figure 22. Uncompensated track deception overall scenario.
Entropy 27 00653 g022
Figure 23. Tracks formed after filtering under different conditions.
Figure 23. Tracks formed after filtering under different conditions.
Entropy 27 00653 g023
Table 1. False Target Offset Simulation: Experimental Condition Configuration.
Table 1. False Target Offset Simulation: Experimental Condition Configuration.
Figure R r (m) R u (m) R τ (m) Δ r s , max (m)
Figure 135000125
Figure 140500175
Figure 15505010300.15
Table 2. Radar A Priori Position and Associated Error Parameter Conditions.
Table 2. Radar A Priori Position and Associated Error Parameter Conditions.
SymbolCoordinate (km) Δ R r (m)Azimuth Angle of R r (°)Elevation Angle of R r (°)
Radar R 1 (0,0,0)503080
Radar R 2 (30,6,0)504570
Radar R 3 (70,3,0)506060
Table 3. UAV-Associated Error Parameter Conditions.
Table 3. UAV-Associated Error Parameter Conditions.
Symbol Δ R τ (m) Δ R u (m)Azimuth Angle of R u (°)Elevation Angle of R u (°)
U A V 1 10503060
U A V 2 10504520
U A V 3 10506030
Table 4. Comparison Table of Compensation Effects with Given Compensation Parameters Under Different Error Conditions.
Table 4. Comparison Table of Compensation Effects with Given Compensation Parameters Under Different Error Conditions.
Δ R r = Δ R u (m)Uncompensated Fusion Success
Rate (%)
The Fusion Success Rate of Z (%)The Fusion Success Rate of F (%)The Fusion Success Rate of Z + F (%)
404110096100
5029160100
600574190
700192973
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ban, H.; Pan, J.; Wang, Z.; Cui, R.; Ming, Y.; Jiang, Q. Error-Constrained Entropy-Minimizing Strategies for Multi-UAV Deception Against Networked Radars. Entropy 2025, 27, 653. https://doi.org/10.3390/e27060653

AMA Style

Ban H, Pan J, Wang Z, Cui R, Ming Y, Jiang Q. Error-Constrained Entropy-Minimizing Strategies for Multi-UAV Deception Against Networked Radars. Entropy. 2025; 27(6):653. https://doi.org/10.3390/e27060653

Chicago/Turabian Style

Ban, Honghui, Jifei Pan, Zheng Wang, Rui Cui, Yuting Ming, and Qiuxi Jiang. 2025. "Error-Constrained Entropy-Minimizing Strategies for Multi-UAV Deception Against Networked Radars" Entropy 27, no. 6: 653. https://doi.org/10.3390/e27060653

APA Style

Ban, H., Pan, J., Wang, Z., Cui, R., Ming, Y., & Jiang, Q. (2025). Error-Constrained Entropy-Minimizing Strategies for Multi-UAV Deception Against Networked Radars. Entropy, 27(6), 653. https://doi.org/10.3390/e27060653

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop