Research on the Compound Jamming Method against FDA-MIMO Beamforming

: Frequency diverse array multiple-input multiple-output (FDA-MIMO) radar solves the problem of angle pointing and range pointing during beam transmission due to its unique range-angle dimension dependent, which gives it good characteristics against main lobe deceptive jamming. Moreover, the current single range dimension deceptive jamming is easy to be identiﬁed and cannot form an effective jamming effect on FDA-MIMO radar. To address this problem, this paper proposes a compound jamming method of suppression and range deceptive against FDA-MIMO beamforming. Compared with the traditional deceptive jamming method, this method can reasonably utilize the beam gain, and minimum variance distortionless response (MVDR) adaptive beamforming cannot signiﬁcantly reduce the power of the jamming, thus avoiding the jamming being weakened at the beamforming level, and the jamming may appear in different range bins, causing signiﬁcant suppression and range deceptive compound jamming effects on FDA-MIMO radar in the range dimension. The simulation veriﬁed that the compound jamming method can effectively interfere with the FDA-MIMO radar at the beam-forming level, and the jamming effect is good.


Introduction
In modern information-based high-tech warfare, the electromagnetic environment is increasingly complex, electronic jamming and electronic anti-jamming are composed of a radar countermeasures system, and the enemy and our two sides are fighting fiercely in the field of radar countermeasures to obtain control of the electromagnetic spectrum, which is also the key to gain strategic advantage and victory in electronic warfare.Frequency diverse array (FDA) was first proposed at the 2006 IEEE radar annual conference [1] due to its unique range dimension dependence.By adding a frequency offset to the array element, which is much smaller than the carrier frequency, the FDA makes the transmit beam have range-angle dimension dependence [2,3].By combining the FDA with multiple-input multiple-output (MIMO), it has more flexible range dimension freedom [4,5] and has good application potential against main lobe deceptive jamming [6][7][8][9][10][11][12][13][14][15].
With the development of new system radars such as the FDA and advanced antijamming technologies, the interfering party has to adopt more advanced technical means to counter the opponent's radar system.Therefore, how to protect one's own targets and effectively interfere with the opponent's radar system and advanced anti-jamming measures have become urgent problems in modern warfare.At present, the use of appropriate jamming strategies and advanced and flexible jamming technology is still the main technical means adopted by both sides of the confrontation.The use of a single false target deceptive jamming for countermeasures often fails to achieve the jamming effect, so it is necessary to use a combination of multiple jamming styles to improve one's own electronic jamming capability.With the development of digital radio frequency memory (DRFM), which has replaced the traditional analog jamming with digital jamming, the jamming signal has a strong correlation with the original signal, which makes jamming have the dual characteristics of suppression and deception, thus jamming the radar system with a good jamming effect.
In recent years, domestic and foreign scholars have carried out a lot of research on the radar jamming technology of the FDA.In [16], Xu deduced the expression of the FDA deceptive jamming signal and established a deceptive jamming model.A space-time adaptive method for joint-domain localization was proposed in [17].However, the authors of [16,17] ignored the time delay, so the jamming model was incomplete.Considering the time delay problem, the study in [18] re-derived the FDA deceptive jamming model.In response to the problem that the enemy's passive radar performs direction finding through the signal of the jammer, which poses a threat to the jammer, Wang proposed the FDA radar cross direction-finding positioning deceptive jamming method and the angle deceptive jamming method of amplitude comparison monopulse direction finding of adjacent antennas in [19].The research in [20,21] corrected the deceptive jamming signal flow and studied the deceptive jamming method based on FDA-MIMO.The study in [22] proposed a new deceptive jamming method that can hide real targets and generate multiple false targets at the same time.In [23], considering the FDA-MIMO robust adaptive beamforming (RAB) design and proposes an improved worst-case performance optimization (IWCPO) algorithm using the eigenspace.In [24], the weight vector was used to control the range-angle dimension-dependent transmit and receive beamforming pattern of FDA-MIMO, to suppress the main lobe jamming.To address the application of jamming technology in static scene jamming signals, the study in [25] proposed a deceptive jamming method combining static and moving targets for synthetic aperture radar (SAR).Gui analyzed the range, angle, and doppler resolution capabilities of the FDA radar signals by using ambiguity functions in [26] and applied them to SAR deceptive jamming and imaging.The study in [27] constructed a novel clutter canceller that was not affected by blind velocity by introducing FDA in SAR ground moving target indication (GMTI) to alleviate the problems of blind velocity and doppler blur.Huang proposed a scattered wave deceptive jamming method based on the FDA to interfere with SAR imaging in [28,29].The study in [30] combined FDA with scattered wave jamming and proposed a jamming method for inverse synthetic aperture radar (ISAR).A range dimension deceptive jamming identification method based on FDA-MIMO was proposed in [31].Wan proposed a robust adaptive beamforming anti-jamming method based on FDA-MIMO covariance matrix reconstruction in [32].The studies in [33] and [34] proposed deceptive jamming suppression methods based on non-uniform sample detection and sample selection, respectively.The study in [35] proposed a simulated annealing algorithm based on FDA-MIMO radar against main lobe deceptive jamming in the range dimension.The study in [36] proposed a weight design method based on the FDA to suppress the main lobe jamming by controlling the zero-notch distribution of the range dimension.However, [33][34][35][36] are susceptible to signal mismatch caused by direction error [37], signal gain [38], incoherent scattering [39], etc.The study in [40] established a very high frequency FDA-MIMO (VHF-FDA-MIMO) radar deceptive jamming signal model and proposed a robust suppression method for deceptive jamming based on Capon reconstruction.Ge proposed a non-uniformly spaced FDA adaptive cognitive anti-jamming method based on the phase center in [41].
Due to the unique range dimension freedom of FDA-MIMO, the existing range dimension deceptive jamming methods against FDA-MIMO are easily identified by radar and cannot form an effective jamming effect.Based on this, this paper studies the compound jamming method against FDA-MIMO beamforming, and the main contributions are as follows: (1) An accurate understanding of the FDA-MIMO range dimension jamming method is proposed, and its jamming model is analyzed; (2) A compound jamming method of suppression and range deceptive against FDA-MIMO beamforming is proposed.This method can reasonably utilize the beam gain and the minimum variance distortionless response (MVDR) adaptive beamforming algorithm cannot significantly reduce the power of jamming, causing a significant compound jamming effect to radar in the range dimension; (3) For the proposed compound jamming method, it is analyzed at the range bin estimation level and its signal to interference plus noise ratio (SINR) is compared and analyzed.
The results show that it can form an effective compound jamming effect.
The rest of this paper is arranged as follows: Section 2 introduces the basic principle and jamming model of FDA-MIMO.Section 3 analyzes the MVDR adaptive beamforming algorithm.In Section 4, a suppression and range deceptive compound jamming method against FDA-MIMO beamforming is proposed.Section 5 simulates and analyzes the method.Section 6 summarizes the whole paper.

Basic Principle of FDA-MIMO
Consider an FDA-MIMO scheme whose structure is shown in Figure 1.The transmitting carrier frequency is f 0 , the interval between adjacent array elements of the transmitting array is d T , and the interval between adjacent array elements of the receiving array is d R , both of which are half-wavelength λ/2.The number of elements of the transmitting array and the number of elements of the receiving array are M and N, respectively.The transmitting frequency of the m-th array element is where ∆ f m is the frequency offset increment of the m-th array element.Then the signal emitted by the m-th array element can be expressed as where φ m (t) is the complex envelope of the m-th signal and T p is the pulse duration.The function rect(x) can be defined as algorithm cannot significantly reduce the power of jamming, causing a sig compound jamming effect to radar in the range dimension; 3) For the proposed compound jamming method, it is analyzed at the range bin tion level and its signal to interference plus noise ratio (SINR) is compared a lyzed.The results show that it can form an effective compound jamming effe The rest of this paper is arranged as follows: Section 2 introduces the basic p and jamming model of FDA-MIMO.Section 3 analyzes the MVDR adaptive beamf algorithm.In Section 4, a suppression and range deceptive compound jamming against FDA-MIMO beamforming is proposed.Section 5 simulates and analy method.Section 6 summarizes the whole paper.

Basic Principle of FDA-MIMO
Consider an FDA-MIMO scheme whose structure is shown in Figure 1

Transmit array
Receive array  After the m-th transmitting array element transmits the signal, the signal received by the n-th receiving array element can be expressed as where τ m,n is the propagation delay from the m-th transmitting array element to the n-th receiving array element, which can be expressed as It should be noted that the phase difference between the n-th receiving array element and the reference array element cannot be neglected here, so Equation ( 4) can be expressed as s m,n (t) ≈ φ m (t )rect(t /T p ) e j2π f m t e f 0 (md T +nd R ) sin θ/c (6) where t = t − 2r/c is the time index within the pulse.Figure 2 shows the signal processing flow at the receiver side, where the signal is received by the receiving antenna, it is first mixed with the e j2π f 0 t signal and the e j2π∆ f m t signal in the signal processor, and then matched filtering with the φ m (t ) signal in the digital signal processing equipment.
It should be noted that the phase difference between the -th n receiving array element and the reference array element cannot be neglected here, so Equation (4) can be expressed as where is the time index within the pulse.Figure 2 shows the signal processing flow at the receiver side, where the signal is received by the receiving antenna, it is first mixed with the Then the output signal of the -th n receiving array element related to the -th m transmitting array element can be expressed as where s ξ is the complex coefficient after matched filtering.After the matched filtering process, the signal at the output end is independent of the time parameter and is only related to the range parameter, so Equation ( 7) can also be expressed as Thus, its array factor can be expressed as Its steering vector can be expressed as Then the output signal of the n-th receiving array element related to the m-th transmitting array element can be expressed as where ξ s is the complex coefficient after matched filtering.After the matched filtering process, the signal at the output end is independent of the time parameter and is only related to the range parameter, so Equation ( 7) can also be expressed as Thus, its array factor can be expressed as Its steering vector can be expressed as where ⊗ is the Kronecker operator, a(r, θ) and b(θ) represents the transmit steering vector and the receive steering vector, which can be expressed as . . .
The transmit-receive antenna pattern at the spatial target point (r 0 , θ 0 ) can be expressed as From Equation ( 13), it can be seen that by adopting the FDA-MIMO structure with multiple matched filters at the receiver side, the generated antenna pattern is range-dependent.

Jamming Model against FDA-MIMO
DRFM can realize the functions of storage, modulation, and forwarding of radio frequency signals.By modulating the received signal, it can cover the real target and even generate a large number of false target signals, forming an electronic countermeasure technology that integrates deception, suppression, and interference.The false target generated by DRFM can be expressed as where ξ j is the jamming complex coefficient, and ξ j = ξ j e −j2π f 0 2(r j +∆r) c . Figure 3 shows the signal processing flow related to the range information at the receiving side of the FDA-MIMO radar.represents the transmit steering vector and the receive steering vector, which can be expressed as The transmit-receive antenna pattern at the spatial target point 0 0 ( , ) r θ can be ex- pressed as From Equation ( 13), it can be seen that by adopting the FDA-MIMO structure with multiple matched filters at the receiver side, the generated antenna pattern is range-dependent.

Jamming Model against FDA-MIMO
DRFM can realize the functions of storage, modulation, and forwarding of radio frequency signals.By modulating the received signal, it can cover the real target and even generate a large number of false target signals, forming an electronic countermeasure technology that integrates deception, suppression, and interference.The false target generated by DRFM can be expressed as  At the estimation level of the range bin, the range parameter is jointly determined by the time delay τ and the pulse repetition period T p , that is where mod(a, b) represents the remainder of a/b and R max = T p × c is the maximum unambiguous range.The array factor of the signal at the receiving side can be expressed as Thus, its normalized antenna pattern can be expressed as When the adaptive beamforming algorithm is used for processing, the normalized gain is Without considering the time delay modulation, which is ∆r = 0, there are In Equations ( 18) and (19), the gain at the desired target is the maximum gain.The gain obtained at the side lobe position where the jamming is located is reduced, and its power will be greatly reduced, the interference performance is poor.

MVDR Adaptive Beamforming Algorithm
The MVDR adaptive beamforming algorithm adopts the sampling matrix inversion algorithm in adaptive beamforming, which minimizes the output power of the array in the desired direction by adding a weight coefficient at each array element, and it has a fast convergence speed under SINR.
The desired target signal in space is s(t), the desired target position information is (r 0 , θ 0 ), the jamming signal is i j , (j = 1, 2, • • • , J), the jamming position is (r j , θ j ), and the array element noise is n(t).Then the n-th array element signal at the receiving side is Then the matrix form of the whole array is where a(θ) is the receiving steering vector from the direction of (r, θ), which can be expressed as The array output is When J interferences are known, to maximize the power of the beamforming output signal and accurately receive the desired signal in the θ d direction, according to Equation (23), the constraint condition of the weight coefficient can be obtained as This constraint causes the zero point of each beam pattern of the receive array to point to J interfering signals.To minimize the noise when the constraints of Equation ( 24) are satisfied at the same time, the objective function is optimized as Then the MVDR weight optimization problem can be expressed as The essence of the MVDR beamformer is to solve the weight coefficient of each array element.Then the Lagrange multiplier method can be used to obtain After deriving Equation (27) and making it zero, we can obtain Solving Equation ( 28), we can obtain Expressing the constraint condition w H a(θ d ) = 1 as a(θ d ) H w = 1 and then multiplying both sides of Equation ( 29) by a H (θ d ) at the same time to obtain Finally, the optimal value of the array weight is obtained according to the MVDR criterion as where Appl.Sci.2022, 12, 9448 8 of 18

Jamming Methods and Models
The existing false target jamming methods cannot produce an effective jamming effect on FDA-MIMO radar.Therefore, this paper studies a suppression and range deceptive compound jamming method against FDA-MIMO.Firstly, the range dimension beamforming gain is analyzed in the spatial domain, and then an effective compound jamming effect is formed at the range bin estimation level for FDA-MIMO.
The spatial position of the jammer is (r j , θ j ), and the intercepted signal can be expressed as where τ j,m represents the propagation delay difference of the m-th transmitting array element relative to the reference array element, and τ j = 2r j /c represents the reference propagation delay.
After receiving the radar signal, the receiver of the jammer first amplifies its power by a low-noise amplifier, then down-converts it, and finally passes it through a band-pass filter bank (the bandwidth of the filter bank is ∆ f , and the center frequency is p∆ f ), and its signal processing flow is shown in Figure 4. Then the output signal of the p-th filter output can be expressed as where p = n ≤ N − 1, ϕ τ represents the common phase change term related to τ FTG .

Jamming Methods and Models
The existing false target jamming methods cannot produce an effective jamming effect on FDA-MIMO radar.Therefore, this paper studies a suppression and range deceptive compound jamming method against FDA-MIMO.Firstly, the range dimension beamforming gain is analyzed in the spatial domain, and then an effective compound jamming effect is formed at the range bin estimation level for FDA-MIMO.
The spatial position of the jammer is ( , ) After receiving the radar signal, the receiver of the jammer first amplifies its power by a low-noise amplifier, then down-converts it, and finally passes it through a band-pass filter bank (the bandwidth of the filter bank is f Δ , and the center frequency is p f Δ ), and its signal processing flow is shown in Figure 4. Then the output signal of the -th p filter output can be expressed as ,  , the obtained false target signal can be expressed as where A is the amplitude, ϕ represents the common phase change term, and . The false target signal is mixed with the local oscillator signal FTG f , and then upconverting it, the final signal can be expressed as The signal is filtered by the band-pass filter bank, and then modulated by the time delay τ jam = 2∆r/c and the phase ϕ j = 2π∆ f m τ j , the obtained false target signal can be expressed as where A is the amplitude, ϕ represents the common phase change term, and ϕ = ϕ τ exp −j2π f 0 τ jam .The false target signal is mixed with the local oscillator signal f FTG , and then upconverting it, the final signal can be expressed as Appl.Sci.2022, 12, 9448 9 of 18 where ϕ τ is the common term after up-conversion.The signal at the receiver side of the n-th receiver array can be expressed as where τ j,n = −d R n sin θ/c represents the propagation time delay difference between the n-th received array element and the reference array element.The Equation ( 37) can be approximately expressed as where t = t − 2r/c − 2∆r/c represents the intra-pulse time index in this case.In the signal processing process at the receiving side, the received signal is mixed with the signal e j2π f 0 t and the signal e j2πn∆ f t , and then matched filtering with the signal φ m (t ).The final signal can be expressed as y n,m = ξ j1 e −j4π f m r j /c e jπ(m sin θ j +n sin θ j ) = ξ j1 e −j4πm∆ f r j /c e jπ(m sin θ j +n sin θ j ) where ξ j1 represents the complex coefficient after signal matching filtering, and ξ j1 = ξ j1 e −j4π f 0 r j /c .Considering a self-defense jammer at the position r j = r 0 , θ j = θ 0 , the weight vector of the target can be set as So, its normalized antenna pattern can be expressed as After jamming forwarding, the resulting jamming signal weight vector can be expressed as Then its normalized beam gain can be expressed as From Equation (43), it can be seen that the jamming signal can obtain the same maximum beam gain as the desired target, and its power was not significantly reduced at the beamforming level, thus it can form an effective jamming effect against FDA-MIMO.By adjusting the time delay, the jamming signal can appear at different range bins, thus forming an effective compound jamming effect, which can affect the normal detection and positioning of the radar.

Simulation Analysis
In this section, the proposed compound jamming method is validated.The existing fake targets were named as existing fake target (EFT) and labeled as EFT1 and EFT2, and the newly generated fake targets were named as new fake target (NFT) and labeled as NFT1 and NFT2.The number of transmitting array elements was M = 10, and the number of receiving array elements was N = 10, the reference carrier frequency was f 0 = 9 GHz, the wavelength was λ = 0.03 m, and the position information of the desired target was (θ 0 , r 0 ) = (15 • , 20 km).The parameters were set as shown in Table 1.

Beamforming Gain Analysis
Figure 5 is the FDA-MIMO non-adaptive beam antenna pattern.As can be seen from Figure 5, the desired target and the false target NFT1 and NFT2 were located at the peak position of the antenna pattern, and the false target can obtain the same gain as the desired target.The false targets EFT1 and EFT2 were located at the side lobe positions, and the gain at their positions was low, so the power at the false targets EFT1 and EFT2 will be greatly weakened after passing through the radar system.At the same angle, observed from the range dimension profile, the gain at the position of the false target EFT was reduced compared to that of the desired target, but it still had a higher beam gain.At the same range, observed from the angle dimension profile, the false target and the desired target had the same large angle dimension beam gain.fake targets were named as existing fake target (EFT) and labeled as EFT1 and EFT2, and the newly generated fake targets were named as new fake target (NFT) and labeled as NFT1 and NFT2.The number of transmitting array elements was 10 M = , and the number of receiving array elements was 10 N = , the reference carrier frequency was 0 9 GHz f = , the wavelength was 0.03 m λ = , and the position information of the desired target was 0 0 ( , ) (15 , 20 km) r θ = °.The parameters were set as shown in Table 1.

Beamforming Gain Analysis
Figure 5 is the FDA-MIMO non-adaptive beam antenna pattern.As can be seen from Figure 5, the desired target and the false target NFT1 and NFT2 were located at the peak position of the antenna pattern, and the false target can obtain the same gain as the desired target.The false targets EFT1 and EFT2 were located at the side lobe positions, and the gain at their positions was low, so the power at the false targets EFT1 and EFT2 will be greatly weakened after passing through the radar system.At the same angle, observed from the range dimension profile, the gain at the position of the false target EFT was reduced compared to that of the desired target, but it still had a higher beam gain.At the same range, observed from the angle dimension profile, the false target and the desired target had the same large angle dimension beam gain.Figure 6 is the FDA-MIMO range-angle two-dimensional MVDR adaptive beam antenna pattern.As can be seen from Figure 6, the gain at the desired target was almost unchanged compared to the non-adaptive beam gain, and the false targets NFT1 and NFT2 were still at the peak position of the antenna pattern, which can obtain a higher beam gain as the desired target.The false targets EFT1 and EFT2 were located at the side lobe position of the range dimension, and their gain was significantly reduced compared to the non-adaptive beam.At the same angle, observed from the range dimension profile, the gain at the position of the false target EFT was greatly reduced compared to the gain at the desired target, and it formed a zero notch in the range dimension side lobes.At the same range, observed from the angle dimension profile, the false target also had the same angle dimension beam gain as the desired target, similar to the non-adaptive beam.Figure 6 is the FDA-MIMO range-angle two-dimensional MVDR adaptive beam antenna pattern.As can be seen from Figure 6, the gain at the desired target was almost unchanged compared to the non-adaptive beam gain, and the false targets NFT1 and NFT2 were still at the peak position of the antenna pattern, which can obtain a higher beam gain as the desired target.The false targets EFT1 and EFT2 were located at the side lobe position of the range dimension, and their gain was significantly reduced compared to the non-adaptive beam.At the same angle, observed from the range dimension profile, the gain at the position of the false target EFT was greatly reduced compared to the gain at the desired target, and it formed a zero notch in the range dimension side lobes.At the same range, observed from the angle dimension profile, the false target also had the same angle dimension beam gain as the desired target, similar to the non-adaptive beam.Table 2 shows the values of the gain for the non-adaptive beam and the range-angle two-dimensional MVDR adaptive beam.As can be seen from Table 2, the gain values at the desired target and the false targets NFT1 and NFT2 under non-adaptive beamforming Table 2 shows the values of the gain for the non-adaptive beam and the range-angle two-dimensional MVDR adaptive beam.As can be seen from Table 2, the gain values at the desired target and the false targets NFT1 and NFT2 under non-adaptive beamforming reached the maximum gain values, while the beam gain values at the false targets EFT1 and EFT2 were reduced by 20 dB.With the range-angle two-dimensional MVDR adaptive beamforming algorithm, the gain of the desired target and the false targets NFT1 and NFT2 remained almost unchanged, while the beam gains at the false targets EFT1 and EFT2 were reduced to −80 dB, and they could no longer form an effective jamming effect.

Range Bin Analysis Results
Figure 7 shows the range bin analysis results of the false targets EFT1 and EFT2 and the suppression jamming under non-adaptive beamforming.As can be seen from Figure 7, the output power of the false targets EFT1 and EFT2 was significantly lower than that of the desired target, and their jamming effect was poor and failed to form an effective jamming effect.

Range Bin Analysis Results
Figure 7 shows the range bin analysis results of the false targets EFT1 and EFT2 the suppression jamming under non-adaptive beamforming.As can be seen from F 7, the output power of the false targets EFT1 and EFT2 was significantly lower than of the desired target, and their jamming effect was poor and failed to form an effe jamming effect.Figure 8 shows the range bin analysis results of the false targets NFT1 and NFT2 the suppression jamming under non-adaptive beamforming.As can be seen from F 8, the false targets NFT1 and NFT2 had high output power as well as the desired ta and at this time the suppression jamming completely covered the desired target, w could form an effective suppression and range deceptive compound jamming effect the jamming effect was good, which could effectively interfere with the normal dete and positioning of radar.Figure 8 shows the range bin analysis results of the false targets NFT1 and NFT2 and the suppression jamming under non-adaptive beamforming.As can be seen from Figure 8, the false targets NFT1 and NFT2 had high output power as well as the desired target, and at this time the suppression jamming completely covered the desired target, which could form an effective suppression and range deceptive compound jamming effect, and the jamming effect was good, which could effectively interfere with the normal detection and positioning of radar.Figure 9 shows the range bin analysis results of the false targets EFT1 and EFT2 and the suppression jamming under range-angle two-dimensional MVDR adaptive beamforming.As can be seen from Figure 9, the output power of the false targets EFT1 and EFT2 was severely suppressed, and their power was the same as the power of noise; therefore, it could not form an effective jamming effect.Figure 10 shows the range bin analysis results of the false targets NFT1 and NFT2 and the suppression jamming under range-angle two-dimensional MVDR adaptive beamforming.As can be seen from Figure 10, the output power of the false targets NFT1 and NFT2 was high, and at this time the suppression jamming completely covered the desired target, and it was little affected by the MVDR adaptive beam, which could form an effective suppression and range deceptive compound jamming effect, and the jamming effect was good.Figure 9 shows the range bin analysis results of the false targets EFT1 and EFT2 and the suppression jamming under range-angle two-dimensional MVDR adaptive beamforming.As can be seen from Figure 9, the output power of the false targets EFT1 and EFT2 was severely suppressed, and their power was the same as the power of noise; therefore, it could not form an effective jamming effect.Figure 9 shows the range bin analysis results of the false targets EFT1 and EFT2 and the suppression jamming under range-angle two-dimensional MVDR adaptive beamforming.As can be seen from Figure 9, the output power of the false targets EFT1 and EFT2 was severely suppressed, and their power was the same as the power of noise; therefore, it could not form an effective jamming effect.Figure 10 shows the range bin analysis results of the false targets NFT1 and NFT2 and the suppression jamming under range-angle two-dimensional MVDR adaptive beamforming.As can be seen from Figure 10, the output power of the false targets NFT1 and NFT2 was high, and at this time the suppression jamming completely covered the desired target, and it was little affected by the MVDR adaptive beam, which could form an effective suppression and range deceptive compound jamming effect, and the jamming effect was good.Figure shows the range bin analysis results of the false targets NFT1 and NFT2 and the suppression jamming under range-angle two-dimensional MVDR adaptive beamforming.As can be seen from Figure 10, the output power of the false targets NFT1 and NFT2 was high, and at this time the suppression jamming completely covered the desired target, and it was little affected by the MVDR adaptive beam, which could form an effective suppression and range deceptive compound jamming effect, and the jamming effect was good.Figure 11 shows the output SINR performance comparison results of the proposed compound jamming and the existing jamming.As can be seen from Figure 11, under the non-adaptive beam, the output SINR of the existing jamming EFT varied with the input SINR.When the input SINR increased to a certain extent, the output SINR of the EFT gradually tended to be stable.Under the adaptive beam, the output SINR of the existing jamming EFT was maintained as relatively stable at a large value, and its jamming effect was weakened.Both under the non-adaptive beam and the adaptive beam, the compound jamming method proposed in this paper can keep the output SINR at a low level all the time, and thus the detection performance of the radar is reduced.The performance of the proposed compound jamming method was significantly better than the existing jamming methods.Figure 12 shows the output SINR performance comparison results of NFT under several anti-jamming technologies.As can be seen from Figure 12, under the non-adaptive beam and adaptive beam anti-jamming techniques, the output SINR of the proposed Figure 11 shows the output SINR performance comparison results of the proposed compound jamming and the existing jamming.As can be seen from Figure 11, under the non-adaptive beam, the output SINR of the existing jamming EFT varied with the input SINR.When the input SINR increased to a certain extent, the output SINR of the EFT gradually tended to be stable.Under the adaptive beam, the output SINR of the existing jamming EFT was maintained as relatively stable at a large value, and its jamming effect was weakened.Both under the non-adaptive beam and the adaptive beam, the compound jamming method proposed in this paper can keep the output SINR at a low level all the time, and thus the detection performance of the radar is reduced.The performance of the proposed compound jamming method was significantly better than the existing jamming methods.Figure 11 shows the output SINR performance comparison results of the proposed compound jamming and the existing jamming.As can be seen from Figure 11, under the non-adaptive beam, the output SINR of the existing jamming EFT varied with the input SINR.When the input SINR increased to a certain extent, the output SINR of the EFT gradually tended to be stable.Under the adaptive beam, the output SINR of the existing jamming EFT was maintained as relatively stable at a large value, and its jamming effect was weakened.Both under the non-adaptive beam and the adaptive beam, the compound jamming method proposed in this paper can keep the output SINR at a low level all the time, and thus the detection performance of the radar is reduced.The performance of the proposed compound jamming method was significantly better than the existing jamming methods.Figure 12 shows the output SINR performance comparison results of NFT under several anti-jamming technologies.As can be seen from Figure 12, under the non-adaptive beam and adaptive beam anti-jamming techniques, the output SINR of the proposed compound jamming method was lower.The output SINR of the adaptive NSD method tended to be smooth with the increase in the input SINR.The output SINR of all the antijamming methods was kept at a low level, and the proposed compound jamming method could produce significant jamming effects.
Appl.Sci.2022, 12, x FOR PEER REVIEW 16 of 18 compound jamming method was lower.The output SINR of the adaptive NSD method tended to be smooth with the increase in the input SINR.The output SINR of all the antijamming methods was kept at a low level, and the proposed compound jamming method could produce significant jamming effects.

Conclusions
This paper studied the jamming method against the FDA-MIMO beamforming level, and the main conclusions are as follows: 1) By studying the FDA-MIMO deceptive jamming model, an effective jamming method against FDA-MIMO radar was analyzed; 2) A suppression and range deceptive compound jamming method against FDA-MIMO beamforming was proposed.The beamforming gain and range bin estimation level were simulated and analyzed.Compared with the existing deceptive jamming methods, the proposed jamming method can obtain the same beam gain as the target, and it can produce a significant compound jamming effect for the range parameter estimation performance of FDA-MIMO radar; 3) The simulation results showed that the output SINR of the proposed jamming increased more slowly, and when the input SINR was 10 dB, the output SINR was also about 10dB, and the output SINR could always be kept at a low level, so the proposed jamming method can produce an effective compound jamming effect, and the jamming effect was good.
The jamming method studied in this paper for the frequency diverse array system radar also had a certain reference value for the jamming of new system radars and also provided a guiding meaning for the application and improvement of frequency diverse array system radar in complex electromagnetic environments.Future work could be carried out from the adaptive cognitive jamming technology.

Figure 2 .
Figure 2. Signal processing flow at the receiver side.

Figure 2 .
Figure 2. Signal processing flow at the receiver side.

.Figure 3 .
Figure 3.The flow of signal processing related to range information at the FDA-MIMO receiver.Figure 3. The flow of signal processing related to range information at the FDA-MIMO receiver.

Figure 3 .
Figure 3.The flow of signal processing related to range information at the FDA-MIMO receiver.Figure 3. The flow of signal processing related to range information at the FDA-MIMO receiver.
, τ ϕ represents the common phase change term related to FTG τ .

Figure 4 .
Figure 4.The signal processing flow of the jamming model.The signal is filtered by the band-pass filter bank, and then modulated by the time delay 2 jam

Figure 4 .
Figure 4.The signal processing flow of the jamming model.

Figure 7 .
Figure 7. Analysis results of existing jamming range bin under non-adaptive beamforming.

Figure 7 .
Figure 7. Analysis results of existing jamming range bin under non-adaptive beamforming.

Figure 8 .
Figure 8. Analysis results of new jamming range bin under non-adaptive beamforming.

Figure 9 .
Figure 9. Analysis results of existing jamming range bin under range-angle two-dimensional MVDR adaptive beamforming.

Figure 8 .
Figure 8. Analysis results of new jamming range bin under non-adaptive beamforming.

18 Figure 8 .
Figure 8. Analysis results of new jamming range bin under non-adaptive beamforming.

Figure 9 .
Figure 9. Analysis results of existing jamming range bin under range-angle two-dimensional MVDR adaptive beamforming.

Figure 9 .
Figure 9. Analysis results of existing jamming range bin under range-angle two-dimensional MVDR adaptive beamforming.

Figure 10 .
Figure 10.Analysis results of new jamming range bin under range-angle two-dimensional MVDR adaptive beamforming.

Figure 11 .
Figure 11.The output SINR performance comparison of jamming technology.

Figure 10 .
Figure 10.Analysis results of new jamming range bin under range-angle two-dimensional MVDR adaptive beamforming.

18 Figure 10 .
Figure 10.Analysis results of new jamming range bin under range-angle two-dimensional MVDR adaptive beamforming.

Figure 11 .
Figure 11.The output SINR performance comparison of jamming technology.

Figure 12 Figure 11 .
Figure12shows the output SINR performance comparison results of NFT under several anti-jamming technologies.As can be seen from Figure12, under the non-adaptive beam and adaptive beam anti-jamming techniques, the output SINR of the proposed

Figure 12 .
Figure 12.The output SINR performance of NFT under anti-jamming technology.

Table 1 .
Simulation parameters setting table.

Table 1 .
Simulation parameters setting table.