Next Article in Journal
A Comparative Study of Brachial–Ankle Pulse Wave Velocity and Heart–Finger Pulse Wave Velocity in Korean Adults
Next Article in Special Issue
2D-DOD and 2D-DOA Estimation for a Mixture of Circular and Strictly Noncircular Sources Based on L-Shaped MIMO Radar
Previous Article in Journal
Graphitic Carbon Nitride as an Amplification Platform on an Electrochemical Paper-Based Device for the Detection of Norovirus-Specific DNA
Previous Article in Special Issue
Efficient Two-Dimensional Direction Finding Algorithm for Rectilinear Sources Under Unknown Mutual Coupling
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

ECCM Schemes against Deception Jamming Using OFDM Radar with Low Global PAPR

1
Nanjing Marine Radar Institute, Nanjing 211153, China
2
Key Lab of Radar Imaging and Microware Photonics, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China
3
National Demonstration Center for Experimental Electrical and Electronic Education, Yangtze University, Jingzhou 434023, China
4
State Key Laboratory of Marine Resource Utilization in South China Sea, Hainan University, Haikou 570228, China
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(7), 2071; https://doi.org/10.3390/s20072071
Submission received: 17 February 2020 / Revised: 25 March 2020 / Accepted: 4 April 2020 / Published: 7 April 2020

Abstract

:
In this paper, a type of effective electronic counter-countermeasures (ECCM) technique for suppressing the high-power deception jamming using an orthogonal frequency division multiplexing (OFDM) radar is proposed. Concerning the velocity deception jamming, the initial phases of the pulses transmitted in a coherent processing interval (CPI) are designed to minimize the jamming power within a specific range, forming a notch around the jamming in the Doppler spectrum. For the purpose of suppressing the range deception jamming and the joint range-velocity deception jamming, the phase codes of the subcarriers belonging to the OFDM pulses are optimized to minimize the jamming power, distributing some specific bands in the range and the range-velocity domain, respectively. According to Parseval’s theorem, the phase encoding, acting as the coding manner of the OFDM subcarriers can ensure that the energy of each OFDM symbol stays the same. It is worth noticing that the phase codes of the OFDM subcarriers can influence the peak-to-average power ratio (PAPR). Thus, an optimization problem is formulated to optimize the phase codes of the subcarriers under the constraint of global PAPR, which can regulate the PAPRs of multiple OFDM symbols at the same time. The proposed problem is non-convex; therefore, it is a huge challenge to tackle. Then we present a method named by the phase-only alternating direction method multipliers (POADMM) to solve the aforementioned optimization problem. Some necessary simulation results are provided to demonstrate the effectiveness of the proposed radar signaling strategy

1. Introduction

The electronic countermeasures (ECM) have experienced a rapid development with the military radar over the past three decades [1,2]. The electronic countermeasures principally intend to mask useful information by creating false targets more attractive than the true ones to deceive the radar systems. Notably, the jammer based on the digital radio frequency memory (DRFM) can impose the proper scaling, delay, and Doppler frequency on the intercepted radar waveform, implementing its retransmission. As a result, the radar resources such as the abilities of detection and tracking are consumed severely and meaninglessly, which causes the conventional techniques of the radar signal processing to be invalid. In a word, a modern radar is required to detect targets in the midst of high-power jamming. It is worth noticing that, recently, the orthogonal frequency division multiplexing (OFDM) technique has been introduced to the array signal processing [3,4,5], and the joint radar and communication system [6,7]. Considering the demands of the military, the ECCM technology of the OFDM radar is investigated in this paper.
To generate a velocity deception jamming (VDJ), the repeat jammer modulates a false Doppler frequency on the radar waveform reproduced by the DRFM. The range deception jamming (RDJ), such as the range gate pull off (RGPO), and so on, usually takes the form of presenting false targets with a precalculated position to prevent the active sensors detecting the targets of interest. The self-defense repeat jammer can also generate the joint range—velocity deception jamming (JRVDJ) by modulating the time delay together with Doppler frequency and imitating the physical characteristic of the target by radar cross-section (RCS) modulation. The popular strategies of resisting the deception jamming can be divided into two categories—data processing and waveform design.
Recently, some data processing algorithms have been developed to restrain deceiving jamming. For instance, the probability density function of the output of the matched filter is investigated for target detection in the presence of deception jamming in [7]. In [8,9], the schemes based on the generalized likelihood ratio test (GLRT) are developed to distinguish between targets and the ECM signals. Additionally, in [10], a kind of adaptive detector is designed by resorting to the criteria of GLRT and Wald test in the presence of completely unknown jamming. However, with the huge development of the ECM technique, the deception jammer can produce false targets whose power is even able to overwhelm the true targets. Hence, the GLRT, which is usually based on data, might be useless in these cases. Additionally, the performance of data-based methods might depend on the degree of suppressing the jamming in both radar reception and the part of signal processing because the left jamming power is likely to be still greater than the level of target echoes. Therefore, the approaches based on data processing have some limitations.
The second category of methods resisting repeat jamming focuses on waveform design. Specifically, pulse diversity technology is one of the most significant foundations of the achievement of the waveform design, which can be employed to resist the VDJ, RDJ, and JRVDJ. Owing to the variation at the pulse repetition interval (PRI) level, the different signatures between the echo signal reflected by the true target of interest and the jamming signal might provide the possibility to discriminate among targets and jamming utilizing an appropriate signal processing. For example, in [11], the phase-perturbed linear frequency modulated (LFM) signal developing a modulated version of the chirp waveform or varying the chirp rate at each PRI is investigated to suppress the range jamming in the synthetic aperture radar (SAR). It’s essential idea of severely restricting the effectiveness of the deception jamming at the output of the matched filter mainly involves coding waveforms in such a fashion that the transmitted waveform at the current PRI is perpendicular to the jamming waveform made of the intercepted pulse at the previous PRI and retransmitted by the repeat jammer. A coupled sequential estimation algorithm to simultaneously obtain the range profiles of target and jamming is proposed in [12]. Each iteration achieves a set of linear filters for each range bin based on the minimization of the average output power. In [13], a train of multiple pulses exploiting the variations of the initial phases among the PRIs, optimized by the phase-only conjugate gradient method, is developed to count the velocity gate pull off. In addition, the optimal initial phases are designed in a multi-target scenario in [14]. The problem of resisting JRVDJ based on a single-input multiple-output (SIMO) radar system is discussed in [15]. The jamming and the true target are distinguished according to the Doppler diversity and spatial geometric correlation. In addition, a method based on the multiple-stage adaptive architecture is properly proposed to deal with the problem of target detection in the presence of noise-like and coherent interferers [16].
The orthogonal frequency division multiplexing (OFDM) technique is a vital technique that has been widely applied to the wireless communication systems since it can offer a high degree of spectrum efficiency and powerful ability to suppress the multi-path effect [17]. Not only is OFDM utilized for communication, but the OFDM signal has been paid much attention in radar applications. For instance, the combination of the OFDM technique and the SAR playing a critical role in remote sensing [18], marine, and terrestrial surveillance, together with the reconnaissance of enemy situation [19] has been investigated [20]. The multiple-input and multiple-output (MIMO) technique radar can be broadly applied to the direction-of-arrival (DOA) estimation [21,22,23,24] and wide-swath imaging [25] in a big way. Further, a newer system, so-called coprime array, becomes a key technology enabling a huge number of applications, including the DOA [26,27], and adaptive beamforming [28], and the orthogonality between the subcarriers of the OFDM signal can provide frequency diversity for the waveform of these array structures. By reason that the spectral components of an OFDM signal are orthogonal to each other, multiple packets of data can be sent simultaneously without mutual interference, each spectral component as a carrier transporting its corresponding data packet in time and frequency domains. Hence, the OFDM radar can provide the splendid characteristics of pulse-to-pulse diversity for the electronic counter-countermeasures (ECCM) [29]. Concretely, the pulsed initial phases and the modulated symbols of the OFDM subcarriers can vary rapidly at the PRI level easily. Nonetheless, the OFDM signal has a major drawback of a high peak-to-average power ratio (PAPR).
In this paper, we consider the ECCM schemes based on the OFDM radar against three types of deception jamming and the contributions of this paper are outlined as follows:
(1)
We present the signal models based on a monostatic OFDM radar with the ability of pulse diversity in the presence of the different types of deception jamming. This work is utilized to pave the way to the ECCM scheme for improving the local signal-to-interference-and-noise ratio (SINR) via designing the proper waveform.
(2)
A method of optimizing the initial phases is proposed to resist the VDJ. An optimization problem aiming at minimizing the energy near the false targets by devising the differences of the initial phases between the radar signal and the jamming signal repeated by jammer is formulated under a constant modulus constraint. Hence in order to force the components of the variable vector to be the same, we devise a method called phase-only BFGS (POBFGS) to obtain the phase vector of the optimization variable. It has some outstanding advantages over the existing methods in the performance of the algorithmic convergence.
(3)
An ECCM scheme of optimizing the OFDM waveform is proposed to suppress the RDJ and the JRVDJ. In these two cases, two optimization problems are, respectively, formulated for the first time, and both of them comply with the criterion of minimizing the jamming energy near the false targets by designing the phase codes of the subcarriers (PCSs) of the OFDM pulses. Fortunately, they boil down to the same kind of non-convex optimization model. If the PCSs are changed, the PAPR may vary. The proper PAPR could help the transmitted signal to avoid suffering from severe nonlinear distortion. Therefore, a new concept of global PAPR is defined as the PAPR with regard to all OFDM pulses to be optimized, and controlling the global PAPR works as an indispensable constraint in the constructed mathematical model. Aiming at managing to get the optimal waveform, an algorithm called the phase-only alternating direction method of multipliers (POADMM) is devised to solve the formulated optimization problem in the phase domain.
The rest of the paper is organized as follows. Section 2 presents the signal models in the presence of various deception jamming. In Section 3, the optimization problems of the proposed ECCM schemes against three types of deception jamming are formulated. The novel methods of POBFGS and POADMM are proposed in Section 4. Section 5 provides various numerical simulations to validate the proposed methods. Ultimately, the conclusion is drawn in Section 6.
Notation: We adopt the notation of using boldface lowercase and uppercase letters for vectors and matrices, respectively. The notations of N , N , and M × N are, respectively, the sets of N-dimensional vectors of real numbers, complex numbers, and M × N complex matrices. The operators ( ) * and ( ) H , respectively, denote the conjugation and the conjugate transpose. The operator floor (.) is used to calculate the maximum integer less than the input entry. For any x N , x means its Euclidian norm. In addition, arg{x} denotes the phase vector of x. | | , { } and { } are the magnitude, real part, and image part of a complex-valued input. The operators and are the Hadamard operator and Kronecker product operator, respectively. Let I, 1, and 0 denote the identity matrix, matrix of 1 and zero matrix (their size is determined from the context). The operators, Diag ( ) and diag ( ) , are, respectively, the diagonal matrices formed by the entries of the vector argument and the column vector containing the principal diagonal of the matrix argument. ▽ denotes the gradient operator and vec ( ) represents the vectorization of an input matrix.

2. Signal Model Under Deception Jamming

The velocity gate pull off (VGPO), RGPO, and the range-velocity gate pull off (RVGPO) are the classical types of deception jamming, respectively corresponding to VDJ, RDJ, and JRVDJ. A deception jammer initially produces a false target with the same parameter as the true target. However, the power of the false target is much higher than that of the true target for the purpose of enforcing the automatic radar gain to reduce its gain. Then the jammer modifies the parameters of the false target, dragging the false target from the location of the true target. At last, the jammer suddenly turns off, leaving the radar with a broken lock. Under some circumstances, there are even multiple targets produced simultaneously.
A traditional radar usually transmits a fixed signal which is easily detected and repeated by the hostile jammer based on DRFM. Hence, it often suffers from the deception jamming. In this paper, the OFDM radar with the ability of pulse diversity is supposed to enable the variation of the initial phase or the PCSs of the OFDM pulses. The reason why the encoding manner chooses the phase encoding is that the energy of each OFDM pulse can keep consistent according to the Parseval’s theorem. Thus, the level of difficulty in designing a radar transmitter can be degraded to a great extent.
Suppose that each target within the antenna beam can be regarded as a point scatter with constant RCS. The OFDM signal can be defined by
s ( t ) = 1 N rect ( t T p ) n = 0 N 1 a m ( n ) exp ( j 2 π f n t )
where N is the number of the subcarriers, f n = n Δ f , n = 0 , 1 , , N 1 . Δ f is the frequency space of the subcarriers. Let Tp be the duration of the OFDM symbol and it is equal to the reciprocal of Δ f . The vector a m = [ e j ϕ m , 0 , e j ϕ m , 2 , , e j ϕ m , N 1 ] T represents the PCSs of the m-th OFDM pulse.
The repeat jammer based on the DRFM usually requires several PRIs to perceive the information of the radar parameters in the light of the captured radar signal and emits the processed pulses to generate multiple false targets to deceive the radar system. As shown in Figure 1, there are Np pulses during a coherent processing interval (CPI) and a complete OFDM pulse consists of an OFDM symbol and a cyclic prefix (CP). Assume that the pulse emitted by the jammer lags by Δ m PRIs behind the pulse transmitted by the radar. In other words, at the n-th PRI, the jammer replicates the pulse that the radar transmitted at ( n Δ m )-th PRI. At the (Np − 2)-th PRI, because of the existence of the (Np − Δm − 2)-th pulse repeated by the jammer, an RDJ is formed. Furthermore, when the coherent processing is carried out in a CPI, the VDJ, or the JRVDJ could be generated.

2.1. Echo Signal Model in the Presence of VDJ

Assume that there are P targets and Q false targets in the presence of the VDJ. The carrier frequency is denoted by f c and the pulse repetition interval (PRI) is represented by T P R I . Let c denote the speed of light. For the VDJ, it is assumed that the different initial phases are imposed on the different OFDM pulses in a CPI. As can be seen in Figure 2 where the initial phase with regard to each pulse is marked, the timing relationship between the radar signal and the jamming signal is illustrated vividly, and the OFDM radar is capable of modulating the different initial phases on the different OFDM pulses. Then the echo signal of the m-th PRI can be expressed as
s r v ( t ) = p = 1 P σ t , p e j φ m s ( t τ t , p ) exp ( j 2 π f c τ t , p ) + q = 1 Q σ j , q e j φ m Δ m s ( t τ j , q ) exp ( j 2 π f c τ j , q )
where τ t , p and τ j , q denote the delay of the p-th target and the delay of the q-th false target, respectively. The variables σ t , p and σ j , q represent the reflection coefficients of the p-th target and the q-th false target, respectively. Assuming that the initial range and velocity of the p-th target are, respectively, denoted by R 0 , p and v t , p , the delay can be calculated by
τ t , p = 2 [ R 0 , p v t , p ( m 1 ) T P R I ] c
where τ j , q is determined by the jammer, and it would not influence the formation of the VDJ. Then s r v ( t ) can be rewritten as
s r v ( t ) = p = 1 P σ ˜ t , p e j φ m s ( t τ t , p ) exp [ j 2 π f d t , p ( m 1 ) ] + q = 1 Q σ ˜ j , q e j φ m Δ m s ( t τ j , q ) exp [ j 2 π f d j , q ( m 1 ) ]
where
σ ˜ t , p = σ t , p exp ( j 4 π R 0 , p c )
σ ˜ j , q = σ j , q exp ( j 4 π R 0 , q c )
where f d t , p and f d j , q signify the normalized Doppler frequencies of the p-th target and the q-th false target, respectively. After eliminating the initial phase of the m-th pulse emitted by the radar, expression (4) can be modified into
s r v ( t ) = p = 1 P σ ˜ t , p s ( t τ t , p ) exp [ j 2 π f d t , p ( m 1 ) ] + q = 1 Q σ ˜ j , q e j ( φ m Δ m φ m ) s ( t τ j , q ) exp [ j 2 π f d j , q ( m 1 ) ]
From expression (7), the second term related to the false targets possesses an extra phase e j ( φ m Δ m φ m ) . Hence, relying on the Doppler filter bank, the signal power of the true targets concentrates on the frequency points f d t , p , p = 1, 2, …, P, whereas the power distribution of the jamming signal has something to do with s v , Δ φ , Δ m N p × 1 which is defined by
s v , Δ φ , Δ m = [ e j ( φ 0 Δ m φ 0 ) , e j ( φ 1 Δ m φ 1 ) , , e j ( φ N p 1 Δ m φ N p 1 ) ] T
Regarding the q-th false target, the response of the Doppler filter bank at the frequency point f is
s d ( f ) = d q ( f ) T s v , Δ φ , Δ m
where
d q ( f ) = [ 1 e j 2 π ( f d j , q f ) 1 e j 2 π ( f d j , q f ) ( N p 1 ) ] T

2.2. Echo Signal Model in the Presence of RDJ

The RDJ usually forms several false targets in the fast time domain. As shown in Figure 3, the echo signal in the current PRI involves two parts: the reflected radar signal and the jamming signal, which can be expressed as
s r r ( t ) = p = 1 P s r t , p ( t ) + q = 1 Q s r j , q ( t )
where s r t , p ( t ) and s r j , q ( t ) denote the echoes of the p-th target and the q-th false target, respectively. Concretely, they are given by
s r t , p ( t ) = 1 N n = 0 N 1 σ t , p rect ( t τ t , p T p ) a m ( n ) exp [ j 2 π f n ( t τ t , p ) ] exp ( j 2 π f c τ t , p )
s r j , q ( t ) = 1 N n = 0 N 1 σ j , q rect ( t τ j , q T p ) a m Δ m ( n ) exp [ j 2 π f n ( t τ j , q ) ] exp ( j 2 π f c τ j , q )
As a result, their corresponding expression in the frequency domain is shown as follows:
s f t , p ( f ) = 1 N n = 0 N 1 σ t , p a m ( n ) exp [ j 2 π ( f n + f c ) τ t , p ] exp [ j π ( f n f ) T p ] sinc [ j π ( f n f ) T p ]
s f j , q ( f ) = 1 N n = 0 N 1 σ j , q a m Δ m ( n ) exp [ j 2 π ( f n + f c ) τ j , q ] exp [ j π ( f n f ) T p ] sinc [ j π ( f n f ) T p ]
After sampling the signal s r r ( t ) with the Nyquist frequency, the discrete versions of expressions (14) and (15) are, respectively, modified into:
s f t , p ( k ) = T p σ t , p a m ( k ) exp [ j 2 π ( k + f c Δ f ) τ t , p ] ,       k = 0 , 1 , , N 1
s f j , q ( k ) = T p σ j , q a m Δ m ( k ) exp [ j 2 π ( k + f c Δ f ) τ j , q ] ,       k = 0 , 1 , , N 1
where τ t , p and τ j , q are the normalized form of the τ t , p and τ j , q with respect to T p . Then the PCSs should be decoded and the expressions (16) and (17), respectively, turn into:
s ˜ f t , p ( k ) = T p σ t , p exp [ j 2 π ( k + f c Δ f ) τ t , p ]
s ˜ f j , q ( k ) = T p σ j e j ( ϕ m Δ m , k ϕ m , k ) exp [ j 2 π ( k + f c Δ f ) τ j ]
From the expression (19), the energy distribution of the false target is affected by the phase differences of the corresponding subcarriers possessed by the radar signal at the m-th PRI and the jamming signal. Hence, to highlight this point, the PCSs of each pulse are marked in Figure 3. At the 0-th PRI, a0 and a−Δm can influence the distribution of the jamming energy. Let the vector of the phase differences between the subcarriers of a0 and a−Δm be denoted by s r , m , Δ m = [ e j ( ϕ m Δ m , 0 ϕ m , 0 ) , e j ( ϕ m Δ m , 2 ϕ m , 2 ) , , e j ( ϕ m Δ m , N 1 ϕ m , N 1 ) ] T . To obtain the range of the target, the expression in the frequency domain is supposed to be recovered to the version in time domain. Then the radar signal and the jamming signal are respectively given by
s r t , p ( t ) = T p N σ t , p k = 0 N 1 exp [ j 2 π k ( t τ t , p ) ] exp ( j 2 π f c Δ f τ t , p )
s r j , q ( t ) = T p N σ j , q k = 0 N 1 s r , m , Δ m ( k ) exp [ j 2 π k ( t τ j , q ) ] exp ( j 2 π f c Δ f τ j , q )
The resulting expression of the complete signal can be put into
s ^ r ( t ) = p = 1 P s r t , p ( t ) + q = 1 Q s r j , q ( t ) = p = 1 P T p N σ t , p u t , p T v t + q = 1 Q T p N σ j , q ( s r , m , Δ m u j , q ) T v t
where
u t , p = e j 2 π f c Δ f τ t , p [ 1 e j 2 π τ t , p 1 e j 2 π τ t , p ( N 1 ) ] T
u j , q = e j 2 π f c Δ f τ j , q [ 1 e j 2 π τ j , q 1 e j 2 π τ j , q ( N 1 ) ] T
v t = [ 1 e j 2 π 1 t e j 2 π ( N 1 ) t ] T
Because of the existence of s r , m , Δ m , the jamming energy cannot be focused. For the q-th false target, the voltage amplitude of the jamming at the time t can be rewritten by:
s r j , q ( t ) = σ ˜ j , q g q T s r , m , Δ m
where
σ ˜ j , q = T p N σ j , q
g q = v t u j , q

2.3. Echo Signal Model in the Presence of the Joint Range-Velocity Deception Jamming

In Figure 1, it is shown that the JRVDJ is formed by accumulating the pulses in a CPI. The echo signal involving the JRVDJ can be expressed as:
s r r v ( m , t ) = p = 1 P s r v t , p ( m , t ) + q = 1 Q s r v j , q ( m , t )
where s r v t , p ( m , t ) and s r v j , q ( m , t ) denote the echo of the true target and the JRVDJ at the m-th PRI. They can be expressed by
s r t , p ( m , t ) = 1 N n = 0 N 1 σ t , p rect ( t τ t , p T p ) a m ( n ) exp [ j 2 π f n ( t τ t , p ) ] exp ( j 2 π f d t , p m )
s r j , q ( m , t ) = 1 N n = 0 N 1 σ j , q rect ( t τ j , q T p ) a m Δ m ( n ) exp [ j 2 π f n ( t τ j , q ) ] exp ( j 2 π f d j , q m )
From the expression (31), the jammer based on DRFM adds the malicious delay τ j , q and the Doppler frequency f d j , q normalized by the PRI, simultaneously. Decoding the subcarriers in the frequency domain, we convert the signal expression s r r v ( m , t ) into:
s ˜ r r v ( m , k ) = p = 1 P T p σ t , p exp ( j 2 π k τ t , p ) exp [ j 2 π f d t , p m ] + q = 1 Q T p σ j , q e j ( ϕ m Δ m , k ϕ m , k ) exp ( j 2 π k τ j , q ) exp [ j 2 π f d j , q m ]
where τ t , p is the normalized version of τ t , p with respect to Tp. In light of the expression (32), it can be observed that similar to the case of RDJ in expression (17), the phase differences of PCSs between the radar signal and the jamming signal may influence the jamming energy distribution in the Range–Doppler domain. According to Figure 3, the PCSs of a train of multiple pulses can be designed to regulate the jamming energy distribution. To obtain the Range-Doppler information of the target, the IDFT and DFT should be implemented in fast time k and the slow time m, respectively. Then, the expression (32) is transformed into:
s ^ r r v ( f d , t ) = p = 1 P [ T p σ t , p N k = 1 N 1 exp ( j 2 π k τ t , p ) exp ( j 2 π k t ) m = 0 N p 1 exp ( j 2 π f d t , p m ) exp ( j 2 π f d m ) ] + s ^ r r v j , q ( f d , t )
where
s ^ r r v j , q ( f d , t ) = q = 1 Q T p σ j , q N k = 0 N 1 m = 0 N p 1 e j ( ϕ m Δ m , k ϕ m , k ) exp [ j 2 π k ( t τ j , q ) ] exp [ j 2 π ( f d j , q f d ) m ]
For the q-th range-velocity deception jamming, the expression of the jamming signal corresponding to the second term of s ^ r r v ( f d , t ) can be converted into the matrix form as follows:
s ^ r r v j , q ( f d , t ) = T p σ j , q N [ 1 e j 2 π ( f d j , q f d ) e j 2 π ( f d j , q f d ) ( N p 1 ) ] g ( f d ) T S Δ ϕ [ 1 e j 2 π ( t τ j , q ) e j 2 π ( t τ j , q ) ( N 1 ) ] h ( t ) = T p σ j , q N h ( t ) T S Δ ϕ T g ( f d )
where S Δ ϕ N p × N is defined by
S Δ ϕ = [ a Δ m , 0 a 0 , 0 * , a Δ m + 1 , 1 a 1 , 1 * , , a N p Δ m , N 1 a N p , N 1 * ] T = [ e j ( ϕ Δ m , 0 ϕ 0 , 0 ) e j ( ϕ Δ m , 1 ϕ 0 , 1 ) e j ( ϕ Δ m , N 1 ϕ 0 , N 1 ) e j ( ϕ Δ m + 1 , 0 ϕ 1 , 0 ) e j ( ϕ Δ m + 1 , 1 ϕ 1 , 1 ) e j ( ϕ 1 Δ m , N 1 ϕ 1 , N 1 ) e j ( ϕ N p 1 Δ m , 0 ϕ N p 1 , 0 ) e j ( ϕ N p 1 Δ m , 1 ϕ N p 1 , 1 ) e j ( ϕ N p 1 Δ m , N 1 ϕ N p 1 , N 1 ) ]
Furtherly, the expression (34) can be rewritten as:
s ^ r r v j , q ( f d , t ) = T p σ j , q N [ g T ( f d ) h T ( t ) ] vec ( S Δ ϕ T )

3. Proposed ECCM Schemes

For the above three types of deception jamming, the corresponding schemes are proposed in this section. The power of the jamming usually is much higher than that of the radar. For the jamming of VGPO, RGPO, and so on, the deceptive jamming can completely control the automatic gain control (AGC) of the radar and succeed in dragging the false targets from the location of the true targets to cover the real information. Assume that the false target is dragged within a certain range centered on the corresponding true target. In addition, the location of the target can be measured, resorting to the multi-channel processing schemes [13].
On account of the above facts, the ECCM schemes are proposed in this section. The main idea of all the schemes is that the energy distribution in a designated range around the false targets is minimized to improve the local signal-to-interference-plus-noise ratio (SINR).

3.1. Scheme of Suppressing VDJ

The power at the frequency point fd can be expressed by:
p ( f ) = s v , Δ φ , Δ m H E ( f d ) s v , Δ φ , Δ m
where E ( f d ) = d * ( f d ) d T ( f d ) denotes the power density matrix. Further, the energy distributing in the q-th Doppler interval [fdl,q, fdu,q] can be computed by:
f d l , q f d u , q s v , Δ φ , Δ m H E ( f d ) s v , Δ φ , Δ m d f d = s v , Δ φ , Δ m H Γ q { f d l , q , f d u , q } s v , Δ φ , Δ m
where the energy distribution matrix of the q-th Doppler interval is defined by:
Γ q { f d l , q , f d u , q } ( x , y ) = { f d u , q f d l , q , x = y e j 2 π ( f d u , q f d j , q ) ( x y ) e j 2 π ( f d l , q f d j , q ) ( x y ) j 2 π ( x y ) , x y
According to both Figure 2 and the expression (38), the differences of the initial phases can be obtained by optimizing s v , Δ φ , Δ m to minimize the jamming energy near the false targets. The optimization problem of suppressing the VDJ can be formulated by:
min | s v , Δ ϕ , Δ m ( n ) | = 1 s v , Δ φ , Δ m H q = 1 Q w q Γ q { f d l , f d u } s v , Δ φ , Δ m
Once the initial phase of the first OFDM pulse is determined, the initial phases of pulses in the whole CPI are fixed. Moreover, the change of the initial phases would not influence the trait of the pulse PAPR. The problem (41) is a non-convex because of the existence of the constant modulus constraint, which is a challenging problem to deal with. The solution to the problem (41) is discussed in Section 4.

3.2. Scheme of Suppressing RDJ

As for the RDJ, the corresponding power at the normalized delay t’ can be calculated by:
s r j , q H ( t ) s r j , q ( t ) = σ ˜ j , q 2 s r , m , Δ m H g q * g q T s r , m , Δ m
Furtherly, the jamming energy within the time range [t1,q,t2,q] can be given by:
t 1 , q t 2 , q s r j H ( t ) s r j ( t ) d t = σ ˜ j 2 t 1 , q t 2 , q s r , m , Δ m H g q * g q T s r , m , Δ m d t = σ ˜ j 2 s r , m , Δ m H H { t 1 , q , t 2 , q } s r , m , Δ m
Where
H { t 1 , q , t 2 , q } ( u , v ) = { t 2 , q t 1 , q , u = v e j 2 π ( t 2 , q τ j , q ) ( v u ) e j 2 π ( t 1 , q τ j , q ) ( v u ) j 2 π ( v u ) , u v
For the purpose of suppressing the RDJ within some range intervals, the optimization problem of designing the phase differences between the PCSs of the current OFDM pulse and the intercepted one can be formulated by:
min s r , m , Δ m , c Δ m s r , m , Δ m H q = 1 Q w ( q ) H q { t 1 , t 2 } s r , m , Δ m s . t . | s r , Δ ϕ , Δ m ( n ) | = 1 | c Δ m ( n ) | = 1 , n = 1 , 2 , , N A r c Δ m 2 1 N p N A r c Δ m 2 2 = γ
where c Δ m ( n ) denotes the PCSs belonging to the −Δm–th OFDM pulse. The parameter γ is a preset constant for the global PAPR constraint and
A r = ( I N c M I D F T ) [ I N Diag ( s r , m , Δ m ) ]
Let M I D F T N × N be the inverse Fourier transform matrix.
In the problem (45), the first constraint is used to force the modulus of the differences of the PCSs to be a constant. And the constant modulus constraint related to the PCSs of the intercepted −Δm–th OFDM pulse is expressed by the second constraint. Since the variation of the PCSs caused the change of the pulse PAPR, the OFDM pulses are supposed to be optimized under the constraint of the global PAPR. The concept of global PAPR is defined as the PAPR calculated using all the concerned pulses. Accordingly, the third constraint in optimization problem (45) points out the global PAPR with regard to the designed pulses, resorting to the interworking of s r , m , Δ m , and c Δ m ( n ) . Using s r , m , Δ m and c Δ m ( n ) , we can get the PCSs of all the OFDM pulses.

3.3. Scheme of Suppressing JRVDJ

In order to minimize the jamming energy, we are supposed to compute the power value in the Range–Doppler domain. Through expression (37), the power at the point (t’, fd) can be calculated by:
p r r r v j , q ( t , f d ) = ( T p | σ j , q | N ) 2 s r v , Δ ϕ H ( g T ( f d ) h T ( t ) ) H , ( g T ( f d ) h T ( t ) ) s r v , Δ ϕ = ( T p | σ j , q | N ) 2 s r v , Δ ϕ H [ g * ( f d ) g T ( f d ) h * ( t ) h T ( t ) ] s r v , Δ ϕ .
With regard to the q-th JRVDJ, its energy occupying the Delay-Doppler domain t q [ t 1 , q , t 2 , q ] , f d , q [ f d l , q , f d u , q ] can be obtained by:
E { f d l , q , f d u , q } { t 1 , q , t 2 , q } = ( T p σ j , q N ) 2 s r v , Δ ϕ H U q { t 1 , q , t 2 , q , f d l , q , f d u , q } s r v , Δ ϕ = ( T p σ j , q N ) 2 s r v , Δ ϕ H ( Γ q { f d l , q , f d u , q } H q { t 1 , q , t 2 , q } ) s r v , Δ ϕ
where s r v , Δ ϕ = vec ( S Δ ϕ T ) and
U q { t 1 , q , t 2 , q , f d l , q , f d u , q } = f d l f d u g * ( f d , q ) g T ( f d , q ) d f d t 1 t 2 h * ( t q ) h T ( t q ) d t Γ q { f d l , q , f d u , q } ( u , v ) = { f d u , q f d l , q ,   u = v e j 2 π ( f d u , q f d j , q ) ( u v ) e j 2 π ( f d l , q f d j , q ) ( u v ) j 2 π ( u v ) , u v H q { t 1 , q , t 2 , q } ( u , v ) = { t 2 , q t 1 , q , u = v e j 2 π ( t 2 , q τ j , q ) ( v u ) e j 2 π ( t 1 , q τ j , q ) ( v u ) j 2 π ( v u ) , u v
For convenience, we assume N p = l Δ m and l is a proper integer. For the purpose of suppressing the JRVDJ, the problem of minimizing the jamming energy in some Range–Doppler areas around the jamming locations is formulated as:
min s r v , Δ ϕ , c s r v , Δ ϕ H ( q = 1 Q w q Λ q { t 1 , q , t 2 , q , f d l , q , f d u , q } ) s r v , Δ ϕ s . t . | s r v , Δ ϕ ( m ) | = 1 , m = 1 , 2 , , N p N | c ( n ) | = 1 , n = 1 , 2 , , Δ m N A r v c 2 1 N p N A r v c 2 2 = γ
where the vector c is formed by stacking the PCSs of the (Δm~−1)-th OFDM pulses into a column vector in sequence and
Λ q { t 1 , q , t 2 , q , f d l , q , f d u , q } = Γ q { f d l , q , f d u , q } H q { t 1 , q , t 2 , q }
A r v , z = ( I N z + 1 M I D F T ) [ I N Diag ( s r v Δ , 0 ) Diag ( s r v Δ , 1 ) Diag ( s r v Δ , N z ) ]
s r v Δ = s r v , Δ ϕ exp [ j T arg ( s r v , Δ ϕ ) ] exp [ j T 2 arg ( s r v , Δ ϕ ) ] exp [ j T N p 2 arg ( s r v , Δ ϕ ) ] exp [ j T N p 1 arg ( s r v , Δ ϕ ) ]
T = ( 0 N × Δ m 0 N × Δ m 0 N × Δ m 0 N × Δ m I N × Δ m 0 N × Δ m 0 N × Δ m 0 N × Δ m 0 N × Δ m I N × Δ m 0 N × Δ m 0 N × Δ m 0 N × Δ m 0 N × Δ m 0 N × Δ m 0 N × Δ m I N × Δ m 0 N × Δ m ) N p N × N p N
where s r v Δ can be divided into l blocks, and s r v Δ , n represents the n-th block. Additionally, because the PCSs of the ( Δ m ~ 1 )-th pulses also need to be optimized, the number of the total pulses requiring to be designed is Nc = NP + Δm. The construction of the problem (50) resembles that of problem (45).
Remark 1.
As for the scheme of suppressing the VDJ, the designed initial phases of the OFDM pulses in a CPI will not influence the global PAPR, and the initial phase of the first pulse can be selected according to the local conditions since it has nothing to do with the implementation of ECCM scheme. However, for the schemes of suppressing the RDJ and the JRVDJ, the subcarriers’ phase differences between the pulses and the coexisting jamming pulses are designed adaptively. Once the PCSs, including a Δ m , …, a Δ m + 1 in Figure 3 are fixed, the PCSs of all the pulses in a CPI can be determined, combining the subcarriers’ phase differences. It is worth noticing that the similarity between these two cases is that the signal PAPR may be influenced by the variations of the PCSs. Hence, the PCSs of the OFDM pulses intercepted initially, and the vector of the subcarriers’ phase differences should be jointly optimized to ascertain the optimal PCSs of all the OFDM pulses. For convenience, Δ m is assumed to be equal to 1. Considering that the signal PAPR determines the working point of the power amplifier in the radar transmitter, the problems of suppressing RDJ and JRVDJ can be concluded in the same way as follows:
min s , c s H Ξ s s . t . | s ( n ) | = 1 , n = 1 , 2 , , N p N | c ( m ) | = 1 , m = 1 , 2 , , N A c 2 1 N p N A c 2 2 = γ x = A c
where
A = ( I N c M I D F T ) [ I N Diag ( s Δ , 1 ) Diag ( s Δ , 2 ) Diag ( s Δ , N p ) ]
s Δ = s exp [ j T arg ( s ) ] exp [ j T 2 arg ( s ) ] exp [ j T N p 2 arg ( s ) ] exp [ j T N p 1 arg ( s ) ]
The vector s amounts to s r , Δ ϕ , Δ m or s r v , Δ ϕ and c ( n ) amounts to c Δ m . The vector s Δ can be divided into N p blocks and s Δ , n represents the n-th block.

4. Designing OFDM Waveform for ECCM

In this section, the approaches to solve the problems formulated in Section 3 are explained in detail.

4.1. Waveform Design for Suppressing the VDJ

For the purpose of suppressing the VDJ, the initial phases of OFDM pulses are optimized in expression (41). Although the optimization problem (41) is non-convex, it can be solved by some existing approaches, such as POVMM [30] and the method called phase-only conjugate gradient (POCG) [13]. Analogously, a method based on BFGS is utilized to find the phase vector of the optimal waveform vector in this paper, which is so-called the POBFGS as a matter of convenience. Assume that the phase vector with regard to s v , Δ φ , Δ m is ξ s . Based on [31], the derivative of the objective function in the optimization problem (41) with regard to ξ s is given as:
ξ s ϖ ( s v , Δ φ , Δ m ) = { d i a g ( Ξ s v , Δ φ , Δ m s v , Δ φ , Δ m H s v , Δ φ , Δ m s v , Δ φ , Δ m H Ξ ) }
Then the algorithm of POBFGS is concluded in detail in Algorithm 1.
Algorithm 1: Solving the problem (40) with POBFGS
Initialization: Initialize the iteration number l = 0. And generate ξ s , l randomly and the stopping threshold value is set to be ε. Let H0 = INp. (The letter l in the subscript denotes the number of the iteration and s v , l is the value of s v , Δ φ , Δ m at l-th iteration.)
For l = 0,1,2,3,…
  • Calculate κ ( ξ s , l ) and g v , l = Φ κ ( ξ s , l ) using the expression (56). If g l ε , perform Step 4 and stop the algorithm; otherwise, perform Step 2.
  • Find the searching step length α l along d l = H l g l and calculate the new point η s , l + 1 = η s , l + α l d l . Update s v , l + 1 , g l + 1 .
  • Calculate
    y l = g v , l + 1 g v , l ,
    v l = ( y l T H y ) 1 / 2 ( s v , l s v , l T y l H l y l y l T H l y l ) ,
    H l + 1 = H l + s v , l T s v , l s v , l T y l H l y l y l T H l y l T H l y l + v l v l .
    Continue Step 1 and l = l + 1.
  • Obtain the optimal solution by s v , Δ ϕ , Δ m o p t = exp ( j ξ s , l ) .

4.2. Waveform Design for Suppressing the RDJ and JRVDJ

From the Section 3.2 and Section 3.3, the PCSs are designed to subdue the RDJ and JRVDJ. In these cases, the PAPR of the OFDM signal might vary, even deteriorate. Therefore, the PAPR constraint must be considered. And it is worth noticing that the PCSs of two OFDM pulses are designed to resist the RDJ, whereas the PCSs of all pulses in a CPI are optimized simultaneously to minimize the jamming energy around the locations of the false targets.
Since the optimization problem is handled in the phase domain, an algorithm called POADMM is proposed to tackle the problem (55). The optimal solution is obtained iteratively. In case that the constant modulus constraint is omitted, the argument Lagrange function corresponding to the problem (55) can be formed by:
ρ ( s , c , x , λ ) = s H Ξ s + { λ H ( A c x ) } + ρ 2 A c x 2 2
where its equivalent scaled form can be expressed by [32]
s , ρ ( s , c , x , λ ) = s H Ξ s + ρ 2 A c x + λ ρ 2 2
The framework of the proposed POADMM consists of the iterations as follows:
s k + 1 = arg min s ρ ( s , c k , x k , λ k )
c k + 1 = arg min c C ρ ( s k + 1 , c , x k , λ k )
x k + 1 = arg min x D ρ ( s k + 1 , c k + 1 , x , λ k )
λ k + 1 = λ k + ρ ( A k + 1 c k + 1 x k + 1 )
where
= { s | | s ( m ) | = 1 , m = 1 , 2 , , N p N } ,   C = { c | | c ( n ) | = 1 , n = 1 , 2 , , N }
D = { x | x 2 1 N c N x = γ }
The subscripts of the primal variables s k , c k , x k and the dual variable λ k , respectively denote their iteration counters. In the following, we develop a concrete solution to the above problems (61)–(64).
(1) Updating s k + 1
The subproblem (61) of updating s is expressed as:
min s   ρ ( s , c k , x k , λ k ) subject   to   | s ( m ) | = 1 , m = 1 , 2 , , N p N
Owing to that the matrix A in (56) is related to the vector s, the expression (61) is supposed to be converted to:
ρ ( s , c , x , λ ) = s H Ξ s + { λ H ( B [ 1 N s Δ ] x ) } + ρ 2 B [ 1 N s Δ ] x 2 2
where
B = ( I N c M I D F T ) ( I N c Diag ( c ) )
and the corresponding scaled form of the expression (68) can be given by:
s , ρ ( s , c , x , λ ) = s H Ξ s + ρ 2 B [ 1 N s Δ ] x + λ ρ 2 2
Thus, the subproblem (67) is equivalent to:
min s s H Ξ s + ρ 2 B k [ 1 N s Δ ] x k + λ k ρ 2 2 subject   to   | s ( m ) | = 1 , m = 1 , 2 , , N p N
where the symbol B k corresponds to the value of the matrix B at the k-th iteration. Then the objective function in the problem (71) can be organized as:
s ( s ) = s H Ξ s + ρ 2 ( s Δ H B k , Δ H p + p H B k , Δ s Δ ) + ρ 2 ( N p + p 2 )
The detailed derivation is given in Appendix A.
Assuming that the phase vector with regard to s is denoted by η s , the gradient vector η s g ( s ) can be obtained in light of [31]. Therefore, the gradient of s ( s ) with respect to η s can be calculated by:
η s s ( s ) = η s g ( s ) + ρ 2 η s r ( s Δ )
where q is defined in Appendix A and
η s g ( s ) = { d i a g ( Ξ s s H s s H Ξ ) }
η s r ( s Δ ) = 2 ( q Δ , 1 T s ˜ Δ , 1 q Δ , 2 T s ˜ Δ , 2 q Δ , i T s ˜ Δ , i q Δ , N T s ˜ Δ , N )
s ˜ Δ , i = [ s Δ ( i ) s Δ ( i + N ) s Δ ( i + k N ) s Δ ( i + [ N p floor ( i N ) 1 ] N ) ]
q Δ , i = [ q ( i ) q ( i + N ) q ( i + k N ) q ( i + [ N p   floor   ( i N ) 1 ] N ) ]
(2) Updating c k + 1
The PCSs of the first intercepted OFDM symbol can be obtained by solving the following problem:
min c ρ ( s k + 1 , c , x k , λ k ) subject   to   | c ( n ) | = 1 , n = 1 , 2 , , N
According to expression (60), the term s H Ξ s and c are irrelevant. In consequence, the optimization problem (78) is equivalent to:
min c A k + 1 c x k + λ k ρ 2 2 subject   to   | c ( n ) | = 1 , n = 1 , 2 , , N .
Owing to the existence of the non-convex constraint, the above optimization problem is NP-hard. Like the procedure of updating s k + 1 , the approach of POBFGS can be utilized to solve the above problem.
Supposing that the objective function of the optimization problem (79) is denoted by c ( c ) , the gradient of c ( c ) with respect to η c , representing the phase vector of c can be given by:
η c c ( c ) = η c κ ( c ) + 2 { [ ( x k λ k ρ ) H A k + 1 ] T c }
where
η c κ ( c ) = { d i a g ( Λ c c H c c H Λ ) }
The detailed derivation is given in Appendix B.
(3) Updating x k + 1
The subproblem (63) with regard to x can be expressed by:
min x A k + 1 c k + 1 x + λ k ρ 2 2 subject   to   x 2 1 N c N x 2 2 = γ
Let x = t u and u 2 2 = 1 , the above problem can be rewritten by:
min t , u t 2 2 t { u H v k } subject   to   t > 0 | u n | 2 γ l N c N u 2 2 = 1
where
v k = A k + 1 c k + 1 + λ k ρ
The constraint of t > 0 ; therefore, the variables t and u can be optimized separately. To obtain u , the optimization problem can be formulated by:
max u { u H v k } subject   to   | u n | 2 γ l N c N u 2 2 = 1
The equality constraint can be relaxed as an inequality constraint. Then the new problem shown below is equivalent to (85) [33].
min u { u H v k } subject   to   | u n | 2 γ N c N u 2 2 1
The optimization problem (86) is convex. Hence, it is easy to find its solution and the Lagrange function corresponding to (86). The Lagrange function is formulated as:
( u , μ k ) = { u H v k } + μ k ( u 2 2 1 ) = n = 1 l N c N { u n * v k , n } + μ k ( n = 1 l N c N | u n | 2 2 1 )
The new optimization problem is formulated by:
min u ( u , μ k ) subject   to   | u n | 2 γ N c N
The problem (88) can be decomposed into N c N subproblems. Therefore, the n-th subproblem can be written by:
min u n , μ k ( u n * v k , n ) + μ k | u n | 2   subject   to   | u n | γ N c N
and the elements of variable u can be obtained separately by solving (89), the solution can be given by:
u n = { v k , n 2 μ k , | v k , n | 2 μ k < γ N α N e j ϕ ( v k , n ) ,   otherwise  
Additionally, the dual variable μ k can be given by using binary section searching method. On account of u n * v k , n > 0 , the variable t can be computed by:
t t + 1 = ( u H v k )
(4) Updating λ k + 1
The dual variable can be updated with
λ k + 1 = λ k + ρ ( A k + 1 c k + 1 x k + 1 )
Algorithm 2: Solving the optimization problem (53) using POADMM
Initialization: Initialize ( s , c , x , λ ) as ( s 0 , c 0 , x 0 , λ 0 ) and The iteration index is set to be k = 0. Let K is the maximum number of iterations. Initialize the thresholds ϵ 1 , ϵ 2 and ϵ 3 .
For k = 1,2,3,…K
  • Solve the subproblem (61).
    Calculate the expressions (72) and (73). Then solve the equivalent optimization problem (71) to update sk+1 using the POBFGS.
  • Solve the subproblem (62).
    Calculate the expression (80). Solve the optimization problem (79) to obtain ck+1 using the POBFGS.
  • Solve the subproblem (63).
    Calculate the expressions (90) and (91). Then compute x k + 1 = t u .
  • Solve the subproblem (64) using the expression (92) to update the dual variable.
Until some preset terminal conditions are satisfied [32].
Then let the optimal waveform be s o p t = s k + 1 .
Consequently, the optimal solution can be obtained by the iteration method of solving the expressions (61)–(64) until some stopping criterion is satisfied. For example, the conditions, including A k + 1 c k + 1 x k + 1 2 < ϵ 1 , s k + 1 H Ξ s k + 1 s k H Ξ s k 2 < ϵ 2 and λ k + 1 λ k 2 < ϵ 3 are satisfied simultaneously and the thresholds ϵ 1 , ϵ 2 , and ϵ 3 should be given initially. POADMM is illustrated in Algorithm 2. The computational complexity in each iteration is roughly O ( N s 2 ) owing to that the number of iterations of BFGS is much fewer than N s through experiencing many simulations in this paper. The symbol N s is equal to the length of the vector s in expression (55). In addition, according to reference [32], the proposed method based on the ADMM converge to a locally optimal point.

5. Numerical Simulation

This section provides various necessary numerical simulations to assess the performance of the proposed schemes. It is worth mentioning that the manners of extracting the range information using the OFDM radar and the traditional radar using chirp signals are different. Exactly, the OFDM radar uses the Fourier transform, and the inverse Fourier transform while the chirp-based radar exploits the pulse compressing technique. Then many existing methods cannot be applied to the OFDM radar. Hence, few methods can be used to compare with the proposed method in this paper because the techniques are not universal. However, some useful methods in the open literature are employed to compare with the proposed approaches. In [13], the random initial phases and POCG are used to suppress false targets. Then we compare POCG and the method based on the random phase codes with the proposed schemes. The jamming-to-signal power ratio (JSR) is set to be 40 dB in this section.

5.1. The ECCM Performance of Resisting the VDJ

For the VDJ, the simulation parameters are listed in Table 1. Not only are the false targets powerful enough to deceive the radar, but their power can almost drown the true ones, which is shown in Figure 4. The deceptive jamming succeeds in dragging false targets in the Doppler domain.
In order to highlight the effect of radar ECCM, the ECCM results using the existing POCG and the random coding method are shown in Figure 5a, and the results of both the random coding method and the proposed scheme are compared in Figure 5b. Although the jamming energy cannot be concentrated using these approaches, there are some differences among them. Exactly, in the case of encoding the initial phases of the OFDM pulses by means of the random phase, the true targets are still submerged. However, two notches are formed using POCG and POBFGS since the energy distribution in the specified Doppler intervals near the false targets is subdued. As a result, the energy peaks with regard to the true targets appear. Through statistics, the average SINRs in the two notches obtained by POCG and POBFGS are about 22.66 dB and 26.5 dB, respectively. The performance of suppressing jamming using the POBFGS is better. To assess the performance of the convergence property, we compare three methods, including POCG and the proposed POBFGS in Figure 6. By comparison, the method of POBFGS converges faster than POCG. Under the same terminal conditions, the proposed POBFGS ends first. Hence, the proposed POBFGS is better than the existing methods.

5.2. The ECCM Performance of Resisting RDJ and JRVDJ

In the case of resisting RDJ and JRVDJ, because the coded objects are the subcarriers of the relevant OFDM pulses, the coding manner has an impact on the PAPR of the OFDM signal. Then controlling the PAPR must be considered when an anti-jamming operation is implemented. To verify the effectiveness of the proposed method, we build a simulation scenario for the cases of suppressing the RDJ and JRVDJ, respectively. Then the results of the method of random encoding and the proposed schemes are shown in this subsection. Additionally, the parameter of the global PAPR is set to be γ = 2 (i.e., 3 dB) in expression (55). Since there are few investigations on the problem proposed in this paper, only the results of our proposed methods are presented.
In the case of resisting RDJ, the simulation parameters are shown in Table 2. The countermeasure effect is illustrated in Figure 7, where the true targets can hardly be detected. After optimizing the PCSs, the ECCM effect of using POBFGS without considering the constraint of PAPR is shown in Figure 8a and the result of POADMM is given in Figure 8b with the existence of the constraint of the global PAPR. It can be seen that the true targets can be easily found in the delay notches. The average signal-to-interference-plus-noise ratio (SINR) in the two notches is 24.68 dB in Figure 8a, while the average SINR is 20.81 dB in Figure 8b. The reason why the performance in Figure 8a is better than that in Figure 8b is that the degrees of freedom in the condition of ignoring the PAPR constraint is larger than that constrained by the global PAPR. For the sake of investigating the convergence property of the objective function and the variation of the global PAPR of both OFDM pulses, the relevant results are shown in Figure 9a,b, respectively. The value of the objective function decreases monotonously in light of Figure 9a. In Figure 9b, the global PAPR does not have to be monotonous, but the global PAPR approaches 2.
The simulation parameters of resisting the JRVDJ are listed in Table 3, and the expression form of the target or jamming information is denoted by (the normalized delay, the normalized Doppler frequency). For example, the information surrounded by parenthesis of the target, (0.3, 0.36), means that the normalized delay and the normalized Doppler frequency are 0.3 and 0.36, respectively. The effect of dragging the targets in the Range–Doppler domain is simulated in Figure 10. The ECM effect can disable the sensing function of the radar. To disperse the jamming energy of the peaks, the PCSs of all the OFDM pulses in a CPI can be generated randomly. As shown in Figure 11, the level of the energy base rises, which causes the targets to be overwhelmed. For the purpose of controlling the global PAPR with regard to all the OFDM pulses, the effect of our proposed approach is described in Figure 12 where the average SINR is improved to be 16.58 dB in the notches. Moreover, the convergence performance of the objective function and the variation trend of the global PAPR are respectively drawn in Figure 13a,b. According to Figure 13a, the value of the objective function reduces monotonously. Ultimately, as shown in Figure 13b, the global PAPR is approaching to 2 in the end.

6. Conclusions

In this paper, a new optimization problem with the constraint of the global PAPR is formulated for the OFDM radar for the first time to suppress the energy of RDJ and JRVDJ in certain areas in order to improve the local SINR. To solve the formulated problem, we develop two methods involving POBFGS and POADMM, which can successfully optimize the OFDM pulses. The anti-jamming effect has been validated in terms of the simulation. The performance of the POBFGS is better than the existing methods in the aspect of resisting VDJ. For the RDJ and JRVDJ, the POADMM succeeds in solving the formulated optimization problem effectively. The algorithm has taken full advantage of the pulse diversity of the OFDM signal for the purpose of ECCM. Motivated by the demands of the future battlefield, the joint of the radar and communication system is becoming one of the most popular topics. It is worth mentioning that the communication function should be considered to be added to the OFDM radar system. Our future direction is to verify the effectiveness of the proposed methods in the practical experimental platform. Another goal of our research is to develop a new method to modify or substitute the POBFGS framework to further improve the computational efficiency of obtaining the initial phase vector to resist VDJ and the solutions to POADMM to suppress RDJ together with JRVDJ.

Author Contributions

X.W. (Xinhai Wang) proposed the key idea and carried out the relevant simulations. G.Z. participated in the design of the algorithm. X.W. (Xiangmin Wang) and Q.S. helped to revise the manuscript F.W. helped to conduct the simulations. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China under Grant 61871218, 61801211, and in part by the Funding of Key Laboratory of Radar Imaging and Microwave Photonics, Ministry of Education, China.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Detailed Derivation of (73)
By splitting B k into two parts, the objective function of the optimization problem (71) can be expanded to
s ( s ) = s H Ξ s + ρ 2 [ B k , 0 B k , Δ ] [ 1 N s Δ ] x k + λ k ρ 2 2 = s H Ξ s + ρ 2 B k , Δ s Δ + p 2 2 = s H Ξ s + ρ 2 ( s Δ H B k , Δ H B k , Δ s Δ + s Δ H B k , Δ H p + p H B k , Δ s Δ + p H p )
where p = B k , 0 1 N x k + λ k / ρ .
And B k , 0 and B k , Δ are respectively formed by the first N columns and left columns of Bk. Concretely, B k , Δ can be expressed by
B k , Δ = ( I N c M I D F T ) [ 0 N × N I N c 1 Diag ( c ) ]
Because of M I D F T is a unitary matrix, M I D F T H M I D F T = 1 is obtained. Then B k , Δ H B k , Δ = 0 N c × N . We get s Δ H B k , Δ H B k , Δ s Δ = 0 .
s ( s ) = g ( s ) + ρ 2 r ( s Δ ) + ρ 2 ( N p + p 2 )
where g ( s ) = s H Ξ s , q = ( p H B k , Δ ) T and r ( s Δ ) = s Δ H B k , Δ H p + q T s Δ . The vector q is not related to s.

Appendix B

Detailed Derivation of (79)
The objective function in (80) can be expanded to
c ( c ) = c H Λ c c H A k + 1 H p ^ p ^ H A k + 1 c + p ^ 2
where Λ = A k + 1 H A k + 1 , p ^ = x k λ k / ρ . The gradient of c ( c ) with respect to η c = arg ( c ) can be given by
η c c ( c ) = η c κ ( c ) + j { c * [ A k + 1 H p ^ ] } j { [ p ^ H A k + 1 ] T c } = η c κ ( c ) + 2 { [ p ^ H A k + 1 ] T c }
where η c κ ( c ) = { d i a g ( Λ c c H c c H Λ ) } .

References

  1. Li, N.-J.; Zhang, Y.-T. A survey of radar ECM and ECCM. IEEE Trans. Aerosp. Electron. Syst. 1995, 31, 1110–1120. [Google Scholar]
  2. Anil, K.M. Electronic Warfare; Wiley: New York, NY, USA, 2018; pp. 475–554. [Google Scholar]
  3. Liu, Y.; Zhao, Y.; Zhu, J.; Wang, J.; Tang, B. A Switched-Element System Based Direction of Arrival (DOA) Estimation Method for Un-Cooperative Wideband Orthogonal Frequency Division Multi Linear Frequency Modulation (OFDM-LFM) Radar Signals. Sensors 2019, 19, 132. [Google Scholar] [CrossRef] [Green Version]
  4. Guerreiro, J.; Dinis, R.; Campos, L. On the Achievable Capacity of MIMO-OFDM Systems in the CathLab Environment. Sensors 2020, 20, 938. [Google Scholar] [CrossRef] [Green Version]
  5. Shi, Z.; Zhou, C.; Gu, Y.; Goodman, N.A.; Qu, F. Source estimation using coprime array: A sparse reconstruction perspective. IEEE Sens. 2016, 17, 755–765. [Google Scholar] [CrossRef]
  6. Shi, C.; Wang, F.; Salous, S.; Zhou, J. Optimal Power Allocation Strategy in a Joint Bistatic Radar and Communication System Based on Low Probability of Intercept. Sensors 2017, 17, 2731. [Google Scholar] [CrossRef] [Green Version]
  7. Schuerger, J.; Garmatyuk, D. Performance of random OFDM radar signals in deception jamming scenarios. In Proceedings of the 2009 IEEE Radar Conference, Pasadena, CA, USA, 4–8 May 2009; pp. 1–6. [Google Scholar]
  8. Greco, M.; Gini, F.; Farina, A. Radar Detection and Classification of Jamming Signals Belonging to a Cone Class. IEEE Trans. Signal Process. 2008, 56, 1984–1993. [Google Scholar] [CrossRef]
  9. Bandiera, F.; Farina, A.; Orlando, D.; Ricci, G. Detection Algorithms to Discriminate Between Radar Targets and ECM Signals. IEEE Trans. Signal Process. 2010, 58, 5984–5993. [Google Scholar] [CrossRef]
  10. Liu, W.; Liu, J.; Wang, L.; Duan, K.; Chen, Z.; Wang, Y. Adaptive array detection in noise and completely unknown jamming. Digit. Signal Process. 2015, 46, 41–48. [Google Scholar] [CrossRef]
  11. Soumekh, M. SAR-ECCM using phase-Perturbed LFM chirp signals and DRFM repeat jammer penalization. IEEE Trans. Aerosp. Electron. Syst. 2006, 42, 191–205. [Google Scholar] [CrossRef]
  12. Cui, G.; Yu, X.; Yuan, Y.; Kong, L. Range jamming suppression with a coupled sequential estimation algorithm. IET Radar Sonar Navig. 2018, 12, 341–347. [Google Scholar] [CrossRef]
  13. Zhang, J.; Zhu, D.; Zhang, G. New Antivelocity Deception Jamming Technique using Pulses with Adaptive Initial Phases. IEEE Trans. Aerosp. Electron. Syst. 2013, 49, 1290–1300. [Google Scholar] [CrossRef]
  14. Yang, Y.; Wu, J.; Cui, G.; Li, L.; Kong, L.; Huang, Y. Optimized phase-Coded waveform design against velocity deception. In Proceedings of the 2015 IEEE Radar Conference, Arlington, VA, USA, 10–15 May 2015; pp. 0400–0404. [Google Scholar]
  15. Huang, D.; Cui, G.; Yu, X.; Ge, M.; Kong, L. Joint range–Velocity deception jamming suppression for SIMO radar. IET Radar Sonar Navig. 2019, 13, 113–122. [Google Scholar] [CrossRef]
  16. Yan, L.; Addabbo, P.; Hao, C.; Orlando, D.; Farina, A. New ECCM Techniques Against Noise-Like and/or Coherent Interferers. IEEE Trans. Aerosp. Electron. Syst. 2019. [Google Scholar] [CrossRef] [Green Version]
  17. Bingham, J.A.C. Multicarrier modulation for data transmission: An idea whose time has come. IEEE Commun. Mag. 1990, 28, 5–14. [Google Scholar] [CrossRef]
  18. RichéV Méric, S.; Baudais, J.; Pottier, É. Investigations on OFDM Signal for Range Ambiguity Suppression in SAR Configuration. IEEE Trans. Geosci. Remote Sens. 2014, 52, 4194–4197. [Google Scholar]
  19. Zhang, T.; Xia, X.; Kong, L. IRCI Free Range Reconstruction for SAR Imaging with Arbitrary Length OFDM Pulse. IEEE Trans. Signal Process. 2014, 62, 4748–4759. [Google Scholar] [CrossRef] [Green Version]
  20. Garmatyuk, D.; Brenneman, M. Adaptive Multicarrier OFDM SAR Signal Processing. IEEE Trans. Geosci. Remote Sens. 2011, 49, 3780–3790. [Google Scholar] [CrossRef]
  21. Wen, F.; Shi, J.; Zhang, Z. Joint 2D-DOD, 2D-DOA and polarization angles estimation for bistatic EMVS-MIMO radar via PARAFAC analysis. IEEE Trans. Veh. Technol. 2019, 69, 1626–1638. [Google Scholar] [CrossRef]
  22. Wen, F.; Wang, J.; Shi, J.; Gui, G. Auxiliary Vehicle Positioning Based on Robust DOA Estimation with Unknown Mutual Coupling. IEEE Internet Things J. 2020. [Google Scholar] [CrossRef]
  23. Zhou, C.; Gu, Y.; Fan, X.; Shi, Z.; Mao, G.; Zhang, Y.D. Direction-Of-Arrival estimation for coprime array via virtual array interpolation. IEEE Trans. Signal Process. 2018, 66, 5956–5971. [Google Scholar] [CrossRef]
  24. Wen, F.; Shi, J.; Zhang, Z. Direction Finding for Bistatic MIMO Radar with Unknown Spatially Colored Noise. Circuits Syst. Signal Process. 2020. [Google Scholar] [CrossRef]
  25. Wang, W. Space–Time Coding MIMO-OFDM SAR for High-Resolution Imaging. IEEE Trans. Geosci. Remote Sens. 2011, 49, 3094–3104. [Google Scholar] [CrossRef]
  26. Zhou, C.; Gu, Y.; Shi, Z.; Zhang, Y.D. Off-Grid direction-Of-Arrival estimation using coprime array interpolation. IEEE Signal Process. Lett. 2018, 25, 1710–1714. [Google Scholar] [CrossRef]
  27. Zhou, C.; Gu, Y.; Zhang, Y.D.; Shi, Z.; Jin, T.; Wu, X. Compressive sensing-Based coprime array direction-Of-Arrival estimation. IET Commun. 2017, 11, 1719–1724. [Google Scholar] [CrossRef]
  28. Zhou, C.; Gu, Y.; He, S.; Shi, Z. A robust and efficient algorithm for coprime array adaptive beamforming. IEEE Trans. Veh. Technol. 2017, 67, 1099–1112. [Google Scholar] [CrossRef]
  29. Stralka, J.P. Applications of Orthogonal Frequency-Division Multiplexing (OFDM) to Radar. Ph.D. Dissertation, Johns Hopkins University, Baltimore, MD, USA, 2008. [Google Scholar]
  30. Guo, L.; Deng, H.; Himed, B.; Ma, T.; Geng, Z. Waveform Optimization for Transmit Beamforming with MIMO Radar Antenna Arrays. IEEE Trans. Antennas Propag. 2015, 63, 543–552. [Google Scholar] [CrossRef]
  31. Smith, S.T. Optimum phase-Only adaptive nulling. IEEE Trans. Signal Process. 1999, 47, 1835–1843. [Google Scholar] [CrossRef]
  32. Boyd, S.; Parikh, N.; Chu, E.; Peleato, B.; Eckstein, J. Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers. Found. Trends Mach. Learn. 2010, 3, 1–122. [Google Scholar] [CrossRef]
  33. Wang, Y.; Wang, Y.; Shi, Q. Optimized Signal Distortion for PAPR Reduction of OFDM Signals With IFFT/FFT Complexity Via ADMM Approaches. IEEE Trans. Signal Process. 2019, 67, 399–414. [Google Scholar] [CrossRef]
Figure 1. The mechanism of the deception jamming in a CPI with lag Δm.
Figure 1. The mechanism of the deception jamming in a CPI with lag Δm.
Sensors 20 02071 g001
Figure 2. ECCM scheme of resisting the VDJ with lag Δm.
Figure 2. ECCM scheme of resisting the VDJ with lag Δm.
Sensors 20 02071 g002
Figure 3. ECCM scheme of resisting the RDJ and JRVDJ with lag Δm.
Figure 3. ECCM scheme of resisting the RDJ and JRVDJ with lag Δm.
Sensors 20 02071 g003
Figure 4. The countermeasure effect in the presence of the VDJ.
Figure 4. The countermeasure effect in the presence of the VDJ.
Sensors 20 02071 g004
Figure 5. The results of resisting the VDJ using the different methods. (a) Comparison of random phase and POCG. (b) Comparison of random phase and POCG.
Figure 5. The results of resisting the VDJ using the different methods. (a) Comparison of random phase and POCG. (b) Comparison of random phase and POCG.
Sensors 20 02071 g005
Figure 6. The convergence performance of the methods resisting the VDJ.
Figure 6. The convergence performance of the methods resisting the VDJ.
Sensors 20 02071 g006
Figure 7. The countermeasure effect in the presence of the RDJ.
Figure 7. The countermeasure effect in the presence of the RDJ.
Sensors 20 02071 g007
Figure 8. The effect of resisting the RDJ using different methods. (a) The result of POBFGS without the constraint of global PAPR. (b) The result of POADMM with the constraint of global PAPR.
Figure 8. The effect of resisting the RDJ using different methods. (a) The result of POBFGS without the constraint of global PAPR. (b) The result of POADMM with the constraint of global PAPR.
Sensors 20 02071 g008
Figure 9. The convergence performance of POADMM and the variation of the global PAPR in the case of suppressing RDJ. (a) The convergence performance of the objective function using POADMM in the case of resisting RDJ. (b) The variation of the global PAPR in the case of resisting RDJ.
Figure 9. The convergence performance of POADMM and the variation of the global PAPR in the case of suppressing RDJ. (a) The convergence performance of the objective function using POADMM in the case of resisting RDJ. (b) The variation of the global PAPR in the case of resisting RDJ.
Sensors 20 02071 g009
Figure 10. The countermeasure effect in the presence of the JRVDJ.
Figure 10. The countermeasure effect in the presence of the JRVDJ.
Sensors 20 02071 g010
Figure 11. The result of suppressing the JRVDJ using the method of encoding the PCSs with random phase codes.
Figure 11. The result of suppressing the JRVDJ using the method of encoding the PCSs with random phase codes.
Sensors 20 02071 g011
Figure 12. The result of suppressing the JRVDJ using POADMM.
Figure 12. The result of suppressing the JRVDJ using POADMM.
Sensors 20 02071 g012
Figure 13. The convergence performance of POADMM and the variation of the global PAPR in the case of suppressing JRVDJ. (a) The convergence performance of the objective function using POADMM in the case of resisting JRVDJ. (b) The variation of the global PAPR in the case of resisting JRVDJ.
Figure 13. The convergence performance of POADMM and the variation of the global PAPR in the case of suppressing JRVDJ. (a) The convergence performance of the objective function using POADMM in the case of resisting JRVDJ. (b) The variation of the global PAPR in the case of resisting JRVDJ.
Sensors 20 02071 g013
Table 1. Simulation Parameters for Suppressing VDJ.
Table 1. Simulation Parameters for Suppressing VDJ.
Physical MeaningsQuantity
The number of the subcarriers512
The number of the pulses in a CPI512
Signal-to-noise ratio0 dB
Jamming-to-signal ratio40 dB
The normalized Doppler frequency of the targets0.4, 0.75
The normalized Doppler frequency of the VJs0.38, 0.72
The suppressed intervals of the normalized Doppler frequency [0.35, 0.45], [0.7, 0.8]
Table 2. Simulation Parameters for Suppressing RDJ.
Table 2. Simulation Parameters for Suppressing RDJ.
Physical MeaningsQuantity
The number of the subcarriers512
The number of the pulses in a CPI512
Signal-to-noise ratio0 dB
Jamming-to-signal ratio40 dB
The normalized delay of the targets0.36, 0.66
The normalized delay of the RJs0.4, 0.7
The suppressed intervals of the normalized delay [0.32, 0.42], [0.6, 0.8]
Table 3. Simulation Parameters for Suppressing JRVDJ.
Table 3. Simulation Parameters for Suppressing JRVDJ.
Physical MeaningsQuantity
The number of the targets2
The number of the subcarriers512
The number of the pulses in a CPI512
Signal-to-noise ratio0 dB
Jamming-to-signal ratio40 dB
The information of the targets(0.3,0.36), (0.75,0.65)
The information of the JRVDJ(0.28,0.4), (0.7,0.6)
The suppressed intervals of the normalized Doppler frequency[0.2, 0.4], [0.6, 0.8]
The suppressed intervals of the normalized delay[0.3, 0.5], [0.5, 0.7]

Share and Cite

MDPI and ACS Style

Wang, X.; Zhang, G.; Wang, X.; Song, Q.; Wen, F. ECCM Schemes against Deception Jamming Using OFDM Radar with Low Global PAPR. Sensors 2020, 20, 2071. https://doi.org/10.3390/s20072071

AMA Style

Wang X, Zhang G, Wang X, Song Q, Wen F. ECCM Schemes against Deception Jamming Using OFDM Radar with Low Global PAPR. Sensors. 2020; 20(7):2071. https://doi.org/10.3390/s20072071

Chicago/Turabian Style

Wang, Xinhai, Gong Zhang, Xiangmin Wang, Qingqing Song, and Fangqing Wen. 2020. "ECCM Schemes against Deception Jamming Using OFDM Radar with Low Global PAPR" Sensors 20, no. 7: 2071. https://doi.org/10.3390/s20072071

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop