Abstract

In order to effectively interfere with radar networks, this paper combines the principle of distance deception jamming and the traditional track deception jamming model, a track deception jamming model based on jamming aircraft flexible route penetration was established. The relevant motion parameter solving method flow is given and simulated. The results show that the model not only can achieve track deception, but also can effectively increase the degree of freedom of the jammers’ invasion route, making the penetration route of the jammers more flexible and controllabel than the traditional.

Highlights

  • IntroductionRadar network technology has achieved rapid development. How to effectively interfere with the radar network and protect its own target has become an urgent problem to be solved

  • In recent years, radar network technology has achieved rapid development

  • Among various types of interference, track deception and interference technology has the advantages of less resources and high interference utilization

Read more

Summary

Introduction

Radar network technology has achieved rapid development. How to effectively interfere with the radar network and protect its own target has become an urgent problem to be solved. Among various types of interference, track deception and interference technology has the advantages of less resources and high interference utilization. This technology has become a research hotspot in the field of electronic interference. Track fraud is mainly achieved through distance deception jamming technology[7]. The jammers’ penetration routes are generally made parallel to the false track, which reduces the degree of freedom of the attack route from 3D to 1D[2]. This article presents a jammer flexible penetration of deception track model, the degree of freedom jammer route extended to two-dimensional, and the motion characteristics of the jammers are described by the parameter

Basic Principles
Flexible Route Defense Mathematical
Position Model
Simulation Analysis
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call