Kononov 2013
Kononov 2013
Kononov 2013
Abstract—An algorithm for detection of continuous-wave noise caused, e.g. by the presence of asynchronous interference, the
jamming in two-dimensional surveillance radar is proposed. The algorithm employs non-coherent integration with censoring or
algorithm is highly immune to strong interfering spikes due to censored video integration (CVI) [1, 2]. The results of CVI for
using censored video integration of range noise samples collected each antenna dwell represent azimuth samples associated with
during dwell time for each azimuth resolution cell. To detect noise the corresponding azimuth bins. To detect the presence of
jamming the algorithm applies order statistics CFAR to a se- jamming the algorithm applies order statistics (OS) CFAR
quence of azimuthal samples resulted from censored video inte- technique to a sequence of azimuthal samples. The reason for
gration in range. The detection performance of the algorithm in
using OS CFAR is that it prevents the misdetection of jam-
the absence of interference is evaluated numerically by means of
ming if some of azimuth reference samples are affected by
an integral equation and verified using statistical simulations. In
the presence of infinitely strong spikes the detection and false
strong spikes, which pass through the stage of CVI when cen-
alarm performances are estimated using statistical simulations. soring is not able to cope with excessive number of spikes.
The paper is organized as follows. In Section II, the detec-
I. INTRODUCTION tion algorithm is described in detail. An integral equation for
the detection performance is considered in Section III. In Sec-
One of the ECM techniques commonly used against sur- tion IV some results of performance analysis are reported and
veillance radars is continuous-wave noise jamming, which is discussed. Concluding remarks are presented in Section V.
intended to prevent detection of targets by raising the receiver
noise level. A so-called spot noise jammer has a relatively nar- II. ALGORITHM
row spectral band and may be effective if its band matches the Consider search radar, which looks for surface targets in az-
radar signal bandwidth. If the radar signal bandwidth is not imuth and range using fan antenna beam (Fig.1). The radar
known to the jammer or if the radar changes operating fre- antenna rotates to scan full azimuthal area around the radar
quency, the spot jammer loses its effectiveness. The jammer (360° coverage in azimuth) and receives returns from some
must then employ a wide frequency band that covers the ex- range interval for each azimuth bin, which angular extent is
pected radar frequency extent. Such a jammer, called a barrage equal to the antenna beamwidth in azimuth.
noise jammer, needs more power than a spot jammer because Radar returns received during the dwell time correspond-
only some portion of its power lies in the instantaneous band- ing to each azimuth bin are converted into digital samples,
width of the radar receiver. Thus, an effective ECCM tech-
processed in a matched filter followed by a square-law detec-
nique against noise jamming is varying radar frequency since
it forces the jammer to spread its energy over the wider band- tor and then collected into a data matrix. Hence, the radar
width that results in reducing the power density of jamming, if returns received over a one full scan in azimuth can be repre-
the mean jammer power remains constant, at the input of radar sented in the form of an N-by-M data matrix, where N is the
receiver. total number of range resolution cells (range bins) and M is
Frequency changing by the radar can be performed in a the total number of azimuth bins. Each sample in this matrix
manner of frequency agility when transmit frequency changes is associated with a particular range-azimuth bin. We assume
on a pulse-to-pulse basis for non-coherent signal processing that the jamming detection algorithm uses an Nr-by-M matrix
modes and on a dwell-to-dwell basis when radar echoes re-
ceived over dwell intervals are coherently processed. Another
technique for coherent radars is frequency hopping when radar
360° coverage
changes transmit frequency every time after detecting the pres-
ence of jamming.
To implement frequency hopping the radar must be able to Antenna
Azimuth
Beamwidth
reliably detect the presence of jamming. In this paper, we in-
troduce an algorithm for detection of continuous-wave noise
jamming in two-dimensional (range-azimuth) search radars.
The algorithm non-coherently integrates a set of range noise
Figure 1. Scan pattern for surveillance radar
samples collected during a dwell time interval (coherent proc-
essing interval) corresponding to each azimuth resolution cell
(azimuth bin). To ensure immunity to strong interfering spikes
D
os
Detection Probability P
On the contrary, if the spikes are not present in the CUT
0.7 P = 10-7
and the Nspaz ≤ Naz reference columns are affected by infi- FA
nitely strong spikes, the false alarm probability decreases be- 0.6
cause all the spiky reference samples yj are statistically higher K = 32
0.5 c
the CUT sample Y. It is also clear that when J > Nr – Kc and 30
the number of spiky reference columns Nspaz > Naz – Kos the 0.4 28
false alarm probability is zero. 0.3 26
If the strong spikes appear in the CUT and in the reference 24
0.2
columns, the analysis of the false alarm performance is too
elaborate because the false alarm probability is an intricate 0.1
function of the J, Nr, Kc, Naz, Nspaz and the PDF of the Kosth 0
ordered sample for a nonhomogeneous reference window. -2 -1 0 1 2 3 4 5 6
Jamming-to-Noise Ratio, dB
To analyze the false alarm performance we have also re-
sorted to statistical simulations. Figure 4. Effect of Kc on performance of OS CFAR with CVI
0.8 N = 32
Detection Probability PD
az 1 2
Detection Probability P
0.3
0.2 0.2
0.1
0 0
-2 -1 0 1 2 3 4 5 6 -4 -3 -2 -1 0 1 2 3 4
Jamming-to-Noise Ratio, dB Jamming-to-Noise Ratio, dB
Figure 3. Theoretical and estimated detection performances Figure 5. Estimated detection performances in the presence of infinitely
1– OS CFAR with full non coherent integration of Nr = 32 samples (this is strong spikes for different number of spiky reference columns Nspaz
equivalent to OS CFAR with CVI when Kc = 32); 2– OS CFAR with CVI for No spikes in CUT (J = 0); number of spikes per each spiky reference column
Kc = 24 J = 4; Nspaz = 6, 8, 9 and 32; FNCI and CVI stand for OS CFAR with full
noncoherent integration and CVI, respectively.
TABLE I. ESTIMATED FALSE ALARM PROBABILITY IN THE PRESENCE TABLE II. ESTIMATED FALSE ALARM PROBABILITY IN THE PRESENCE
OF STRONG INTERFERING SPIKES IN CUT OF STRONG INTERFERING SPIKES IN CUT AND REFERENCE WINDOW
Nr = 32, Kc = 24, Naz = 32, Kos = 24, nominal PFA = 10-5 Nr = 32, Kc = 24, Naz = 32, Kos = 24, nominal PFA = 10-5
Nspaz = 0 J=4
J 2 4 6 8 9 Nspaz 2 4 6 8 10
CVI 2.21×10-4 3.66×10-3 5.53×10-3 0.509 1 CVI 2.78×10-3 1.99×10-3 1.37×10-3 9.78×10-4 6.1×10-4
PFA PFA
FNCI 1 1 1 1 1 FNCI 1 1 1 1 1
JNR is about 1 dB, the OS CFAR with CVI is quite effective: reference columns (Table II). For both of these cases, the false
to ensure the jamming detection probability PD = 0.8 at PFA= alarm probability for the OS CFAR with full noncoherent inte-
10–7 the required input JNR is about 3.2 dB. gration is always equal to unity.
The effect of strong spikes on the detection performances Table I illustrates the increase of PFA for the OS CFAR
of the OS CFAR with CVI as well as with full noncoherent with CVI when the number of strong spikes J in the CUT in-
integration for the scenario when spikes are present only in the creases from 2 to 9. Table II shows the decrease of PFA when J
reference window, number of spikes in each affected reference is fixed (J = 4 for both the CUT and reference samples) and
column J = 4 (J < Nr – Kc) and Nspaz = 6, 8, 9 and 32 is shown the number of spiky reference samples Nspaz increases from 2
in Fig. 5 for PFA = 10-5. The graphs in this figure are computed to 10. Analyzing the data in Table I and II yields that the false
using Monte-Carlo simulations (104 trials). Analysing the de- alarm performance of the proposed algorithm is highly im-
tection curves in Fig. 5 yields that OS CFAR with CVI is supe- mune to the spiky interference.
rior to OS CFAR with full noncoherent integration in terms of
immunity to strong interfering spikes. As one can see, when
Nspaz increases the detection performance of the former (solid V. CONCLUSION
lines) does not degrade significantly with respect to that in the The results presented in this paper have demonstrated that
absence of spikes (solid line computed from equation (2)): for the proposed algorithm based on the combination of the order
PD = 0.8 the loss in the JNR is 0.6 dB when Nspaz = 9 and 1.8 statistics CFAR with censored video integration is a reliable
dB even when all the reference samples are spiky, i.e. Nspaz = method for detection of noise jamming.
32. At the same time the performance of the latter (dashed In the absence of interfering spikes the algorithm ensures
lines) significantly degrades with respect to that in the absence sufficiently high detection probability at a quite low false
of spikes (dashed line computed from equation (2)) and with alarm probability even when the input jamming-to-noise ratio
respect to the performance of the former. As can be seen from is on the order of 3 dB. At the same time, the algorithm has
Fig. 5 the detection performance of the OS CFAR with full also been shown, from the point of view of detection and
noncoherent integration for Nspaz = 8 is even inferior to the false alarm performances, to be highly immune to strong in-
detection performance of the OS CFAR with CVI for Nspaz = 9 terfering spikes.
and totally collapses when Nspaz = 9.
Fig. 5 clearly demonstrates the significant advantage, in
terms of detection performance in the presence of strong inter- REFERENCES
fering spikes, of the OS CFAR with CVI over the OS CFAR [1] N. Levanon, “Censored video integration in radar detection,” in Proc.
with full noncoherent integration: even when Nspaz > Naz – Kos IEEE International Radar Conference, Arlington, Virginia, May 7-10, pp.
the former remains highly robust, while the latter totally col- 511-513, 1990.
lapses. [2] N. Levanon, “Analytic comparison of four robust algorithms for post-
detection integration,” IEE Proceedings-F, vol. 139, no. 1, pp. 67-72,
B. False Alarm Performance 1992.
[3] J. A. Ritcey, “Performance analysis of the censored mean-level detectors,”
To show the effect of strong spikes on the false alarm per- IEEE Transactions on Aerospace and Electronic Systems, vol. AES-22,
formance of the proposed algorithm we present the results of no. 4, pp.443-454, 1986.
Monte-Carlo simulations (106 trials are used) for the two cases [4] M. Shor and N. Levanon, “Performances of order statistics CFAR,” IEEE
when the infinitely strong spikes occur only in the CUT col- Transactions on Aerospace and Electronic Systems, vol. AES-27, no. 2,
umn (Table I) and when they are present in both the CUT and pp. 215-224, 1991.