To detect and remove/suppress the fake targets (range decepted targets) we implemented an algorithm for reflection power tracking. This algorithm consists of a search window of 5 samples and a tracking algorithm which tracks the return of reflected power within the sliding window (read the introductory article for reflection power tracking)

As the window is sliding through the whole radar range, the tracker checks if the power within the 5 samples differs for more than 75%. As you can see in the video, once the active target starts to increase its reflection power towards radar, we see an immense power increment of the fake target, which makes the real target almost indetectable for the radar.

However, if the algorithm observes these big deviations, outside the expected power increments and in addition significant phase shifts, while the fake target remains in the same position, it detects that the reflected power cannot come from a real target. The previous video was just checking strong power increments. This composite set of algorithms also looks for strong phase shifts. The likelihood of detection is increased. It cancels out those positions and also localizes from where the deception is coming, by marking the “bad guy” target position with an orange dot in the PPI scope.

Also, the sample implementation in the video uses an additional robustness measure to prevent that major toggling in the detected signals is developed using a dynamic threshold. Within the first 100 radar updates, the dynamic threshold is estimated and later used to filter-out big power spikes above that threshold, as those do not belong to a real detected target.

Watch the video to see how it works:

Many Applications for Electronic Warfare

Follow our blogs and videos on Electronic Warfare with SkyRadar's Disturbance Filtering & Analysis solutions, the jammers and the Pulse Radar! SkyRadar is the only provider world-wide, providing manufacturer-agnostic ECM and ECCM training with simulators and real radars and jammers. Learn more about the simulator, range deception, angle deception, speed deception, radar lock on and major state of the art defense algorithms against malicious attacks.

Such defense is not only useful in a military context but also in a civil aviation setting. Increasingly speed radar jammers by trucks and cars disturb airport infrastructure. Also hybrid warfare is used to perturb critical infrastructure like airports and civil air surveillance and navigation services.

New call-to-action

New call-to-action