Next Article in Journal
Thompson Sampling for Stochastic Bandits with Noisy Contexts: An Information-Theoretic Regret Analysis
Previous Article in Journal
The Holographic Principle Comes from Finiteness of the Universe’s Geometry
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Modulated Radio Frequency Stealth Waveforms for Ultra-Wideband Radio Fuzes

School of Mechatronical Engineering, Beijing Institute of Technology, Beijing 100081, China
*
Author to whom correspondence should be addressed.
Entropy 2024, 26(7), 605; https://doi.org/10.3390/e26070605
Submission received: 7 May 2024 / Revised: 20 June 2024 / Accepted: 15 July 2024 / Published: 17 July 2024
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
The increasingly complex electromagnetic environment of modern warfare and the proliferation of intelligent jamming threaten to reduce the survival rate of radio fuzes on the battlefield. Radio frequency (RF) stealth technology can fundamentally improve the anti-interception and reconnaissance capabilities of radio fuzes, thereby lessening the probability of them being intercepted, recognized, and jammed by the enemy. In this paper, an RF stealth waveform based on chaotic pulse-position modulation is proposed for ultra-wideband (UWB) radio fuzes. Adding a perturbation signal based on the Tent map ensures that the chaotic sequences have sufficiently long periods despite hardware byte limitations. Measuring the approximate entropy and sequence period shows that the Tent map with the addition of perturbation signals can maintain good randomness under byte constraints, closely approximating the Tent map with ideal precision. Simulations verify that the proposed chaotic mapping used to modulate the pulse position of an ultra-wideband radio fuze signal results in superior detection, anti-interception, and anti-jamming performance.

1. Introduction

1.1. Radio Fuzes

A radio fuze is a device that utilizes environmental or target information to control the detonation of ammunition according to a predetermined strategy. The effectiveness of the radio fuze determines the effectiveness of the munition to which it is attached. To protect their positions, enemies typically deploy jammers around the perimeter, to intercept fuze signals and transmit interference signals, thereby disrupting radio fuzes. The rapid development of radio frequency hardware circuits and signal processing technology has significantly improved jammer capabilities. Various interference waveforms have been designed that seriously threaten the battlefield survivability of radio fuzes [1,2,3,4]. Suppressive interference waveforms can drown the echo signal in dense electromagnetic waves, preventing the fuze from obtaining and extracting distance information in time, which results in misfires. Targeted interference waveforms can serve as false target information. When the fuze receives an interference signal, it may misjudge it as target information and detonate prematurely. Both misfires and premature detonations result in the ammunition failing to achieve its maximum effectiveness. Therefore, improving the ability of radio fuzes to survive on the battlefield is an important priority in military research.
Figure 1 illustrates the process of radio fuze jammers interfering with radio fuzes. To implement effective jamming, the first step is to detect the radiated signals of the radio fuzes, followed by sorting the detected signals, i.e., detecting the operating frequency of the signals and analyzing their characteristics. A specific jamming method and waveform are then selected based on the signal characteristics. After the interference is executed, its effect is evaluated; if the interference fails, the process is repeated, and if the interference succeeds, the next target to be jammed is identified [5]. The jammer’s threat to radio fuzes is based on its ability to detect the radio fuze signal. The application of RF stealth technology in radio fuze design can prevent such detection, thereby stopping jammers from interfering with the fuze at its source.
RF stealth was initially proposed by David Lynch [6], who discussed various methods to minimize the RF signal characteristics of radar, communication, and weapon systems aboard aircraft. This approach aims to make it challenging for enemy electronic reconnaissance systems to detect and promptly identify the radiation source. For radio fuzes, the objective of RF stealth is to decrease the likelihood of interception, detection, identification, and subsequent jamming of radio fuze signals by enemy jammers. Therefore, in designing RF stealth radio fuzes, two primary approaches are considered. One approach involves reducing the radiation power of the radio fuze to hinder signal detection by jammers. The other approach focuses on increasing the randomness of the radio fuze’s signals. This strategy ensures that even if the jamming device detects the signals, it cannot accurately recognize them or proceed with further processing [7].
Currently, the most commonly employed RF stealth techniques include radiated power control and stealth waveform design [8]. Several studies [9,10,11,12] have concentrated on power control, which involves optimizing the emitted signal strength to evade interception and recognition by jammers, while still being robust enough to detect targets in complex electromagnetic environments. Similarly, waveform design aims to balance the signal’s resilience against interception with its localization accuracy [13], resolution capability [14], and ability to mitigate delay-Doppler blurring of potential targets [15]. One method to achieve this balance is interference-pulse anti-sorting [16,17,18], which introduces interference pulses to the signal, complicating the enemy receiver’s ability to identify it from the pulse-repetition-interval information it contains. Another approach involves randomly or chaotically modulating certain signal parameters [19,20,21,22,23], making it challenging for jammers to recognize the signal.
Current anti-jamming methods for radio fuzes mainly use multi-dimensional feature recognition and other techniques to enhance fuze resilience against jamming [24,25]. However, digital radio frequency memory (DRFM) jammers differ significantly from traditional targeting [26] and sweeping jammers [27,28]. DRFM jammers intercept and store fuze transmission signals, then retransmit them after delay with amplification [29]. The interference waveform produced by DRFM jammers is nearly indistinguishable from the radio fuze echo signal, even with multi-dimensional feature recognition techniques. Thus, designing waveforms with RF stealth capabilities is crucial to prevent jammer interception of fuze signals. UWB signals exhibit minimal interception vulnerability in the frequency domain [30], and appear as periodic, extremely narrow pulse signals in the time domain. Modulation techniques using pseudo-random codes like M-sequences are constrained by their inherent periodicity. However, chaotic codes characterized by sensitivity to initial values, non-periodicity, and randomness, represent an emerging pseudo-code. Utilizing chaotic codes for UWB radio fuze pulse position modulation increases waveform parameter complexity and enhances anti-interception capabilities.

1.2. Ultra-Wideband Radio Fuzes

This study focuses specifically on UWB radio fuzes. These fuzes detect ground targets by transmitting and receiving narrow pulse signals. They possess strong anti-jamming capabilities, superior distance-truncation characteristics, and robust anti-interception capabilities [31]. Their simple structure, wide spectral range, and low power-spectral density make interception by the enemy challenging [32].
Figure 2 depicts the principal block diagram of the radio fuze, consisting mainly of the transmitting unit, receiving unit, signal processing unit, control and output unit, and antenna. The transmitting unit includes a pulse-timing control circuit, which triggers the narrow pulse generator circuit to produce nanosecond-wide pulses transmitted via the antenna. Simultaneously, it serves as a distance control gate, triggering the sampling pulse generator circuit to generate sampling pulses after a predetermined delay. The receiving unit comprises a sampling pulse circuit and a weak signal detection circuit. When the distance between the munition and the ground target matches the fuze’s preset detonation height, the sampling pulse circuit controls the weak signal detection circuit to sample the received echo signal from the antenna. The output signal from the receiving circuit undergoes processing in the signal processing unit, with the processed signal forwarded to the control and output unit. The control and output unit initiates the fuze by outputting the start signal.
In this study, the transmitter signal w(t) is defined as the second derivative of the Gaussian function as follows:
w ( t ) = 1 2 π t 2 Δ T 2 exp π ( t Δ T ) 2 ,
where ΔT is the pulse width parameter.
With the inclusion of pulse-position modulation, the mathematical expression of the transmitted signal becomes the following:
s ( t ) = i = + w ( t i T c i T 0 ) ,
where T is the pulse period, c i is a random sequence, T 0 is the modulation range, and c i T 0 is a uniformly distributed random variable in [ 0 , T 0 ] .

1.3. Chaos Theory

Chaos is a phenomenon that introduces irregular and stochastic behavior into deterministic systems. Its initial value sensitivity and intrinsic randomness make it very suitable for designing random signals. Even with deterministic chaotic mapping, distinct initial values lead to entirely different chaotic trajectories over time. Unlike purely random noisy signals, deterministic chaotic sequences can be reconstructed from known parameters and initial values and synchronized for simplified signal processing. Unlike pseudo-random signals, they are non-periodic, generate numerous distinct sequences, and can extend infinitely in length. Utilizing chaotic sequences to modulate pulse positions in UWB fuzes enhances the signal’s resistance to interception and complicates decipherment by adversaries [33].
Chaotic signals can be generated by continuous-time dynamic analog systems like Chua’s circuit, but these analog systems tend to be bulky and susceptible to environmental factors. However, radio fuzes must adhere to strict volume constraints of projectiles, necessitating compact design and high reliability. Thus, digital devices are preferred for timing control circuit design. However, byte limitations in digital devices lead to short-period phenomena when generating chaotic signals. Consequently, the resulting signal becomes periodic and only chaotic. For practical applications, chaotic sequences should ideally have extended periods to maximize decipherment difficulty and waveform interception resistance.
Owing to operational and memory constraints in practical engineering, one-dimensional chaotic mappings are typically favored. Equation (3) is the classical Tent map.
x n + 1 = x n α x n 0 , α 1 x n 1 α x n α , 1 α 0,1 ,
and Equation (4) is the classical Logistic map.
x n + 1 = μ x n 1 x n μ 0,4 .
Under byte-constrained conditions, a chaotic sequence degenerates into a periodic one. For instance, as depicted in Figure 3 for the Tent map, retaining six bits after the decimal point and using different initial values results in the Tent map degenerating into a periodic sequence during iteration, where the red dashed line indicates the starting position of degeneration into a periodic sequence. This periodicity makes it easier for adversaries to decipher because of its regularity in signal modulation.

2. Method

2.1. Perturbation Parameter

In this paper, we introduce a perturbation parameter r connecting the logistic map to the Tent map as follows:
x n + 1 = x n a + r y n x n 0 , a 1 x n 1 a + r y n x n a , 1 ,
y n + 1 = μ y n 1 y n μ 0,4 ,
r = 0.0001 mod ( n , P ) = 0 , P = 100 0 .
Chaotic sequences are highly sensitive to initial values, where even slight differences can lead to entirely divergent trajectories over iterations. The addition of the periodicity perturbation parameter can disrupt the closed state set of the original chaotic system, thereby eliminating short-cycle phenomena. To minimize interference with the original chaotic sequence, the signal-to-noise ratio between the original signal and the perturbation signal should significantly exceed unity [34]. Therefore, we chose a perturbation parameter as small as possible within the limits of accuracy to prevent excessive perturbation and ensure the chaotic sequence remains within its intended range. For this study, we chose 1 × 10−4 as the value of r .
The approximation to chaos used in this study produces the map in Figure 4 when six bits are retained after the decimal point. Figure 4a illustrates the chaotic scatter plot after 3000 iterations, showing no observable periodic phenomena. Even with an increased iteration count of 10,000, as shown in Figure 4b, it still maintains good chaotic characteristics.

2.2. Approximate Entropy as a Measure of Complexity

In this study, the approximate entropy is used to measure the complexity of chaotic sequences [35]. This metric reflects the likelihood of generating a new sequence within an existing one: a higher approximate entropy value indicates greater complexity. When dealing with a known sequence x i , the algorithm for calculating the approximate entropy is as follows:
(1) Convert the sequence x i into an m-dimensional vector α i :
α i = x i , x i + 1 , x i + m 1 .
(2) Define   d α i , α j as the maximum difference between the corresponding elements of α i and α j :
d α i , α j = m a x k = 1,2 , , m x i + k 1 x j + k 1 .
(3) Let s denote the similarity tolerance. Then, for every value of i (including i = j ) 1 i N m + 1 , count the number of vectors that satisfy d α i , α j s . Let C i m s denote the ratio of this number to the total number of α-vectors:
C i m s = 1 N m 1 n u m d α i , α j s .
(4) Calculate the Napierian logarithm of C i m s and its mean value Φ m s :
Φ m s = 1 N m 1 i 1 N m 1 ln ( C i m ( s ) ) .
(5) Finally, define the approximate entropy of the sequence as follows:
E ( m , s , N ) = Φ m ( s ) Φ m + 1 ( s ) , m 2 .

3. Results and Discussion

3.1. Comparison of Complexity

We calculated the approximate entropy in two dimensions for the Tent chaotic output sequence at ideal precision and compared it to those at finite precision (p = 6), both with and without the added perturbation parameter. Figure 5 illustrates the approximate entropy of these output sequences of the three chaotic systems, evaluated across 100 randomly selected sets of initial values. As depicted, the approximate entropy of the Tent-chaotic sequence remained nearly unchanged with the addition of the perturbation parameter under finite accuracy, closely resembling the entropy of the ideal accuracy scenario without perturbation. By contrast, without the perturbation parameter, the sequence’s approximate entropy exhibited instability and significantly lower complexity in certain initial value cases.

3.2. Comparison of Period Length

For precision p = 6, we calculated and compared the period length of 100 groups of chaotic maps with different initial values (Figure 6). It can be seen that the periods of the Tent chaotic sequences with the perturbation parameter are much larger than those of sequences without it.

3.3. Fuze Performance Analysis

3.3.1. Detection Performance

The ambiguity function (AF), initially proposed by P.M. Woodward to describe radar-modulation waveform characteristics, serves to depict not only the resolution of radar signals and the ambiguity levels but also measurement accuracy and clutter suppression [36]. Radio fuzes operate similarly to radar systems, allowing the AF to describe their detection performance. The AF evaluates a signal’s ability to distinguish between two targets at varying distances and velocities. In this study, we utilized the mean square error criterion to derive the ambiguity function for UWB signals.
For an ideal point target 1 with a time delay x and Doppler shift y , by ignoring antenna effects on the waveform of the transmitted signal, the echo signal is expressed as follows:
u r 1 t = i = 0 N 1 w t x i T y .
For another ideal point target 2, with additional time delay τ and Doppler shift T d relative to reference target 1, the expression for the echo signal becomes the following:
u r 2 t = i = 0 N 1 w t x + τ i T y T d .
The mean square deviation of the two echoes is as follows:
ε 2 =   i = 0 N 1   w [ t x i ( T y ) ] i = 0 N 1   w [ t ( x + τ ) i ( T y T d ) ] 2 d t =   i = 0 N 1   w [ t x i ( T y ) ] 2 d t +   i = 0 N 1   w [ t ( x + τ ) i ( T y T d ) ] 2 d t 2   i = 0 N 1   w t x i T y i = 0 N 1   w t x + τ i T y T d d t .
The echo energies for ideal targets 1 and 2 are denoted as E1 and E2, respectively:
E 1 = i = 0 N 1 w [ t x i ( T y ) ] 2 d t ,
E 2 = j = 0 N 1 w [ t ( x + τ ) j ( T y T d ) ] 2 d t .
By ignoring propagation losses, we assume E 1 = E 2 = E . If t ( x + τ ) = t , Equation (15) simplifies to the following:
ε 2 = 2 E 2 i = 0 N 1 w t + τ i T y i = 0 N 1 w t i T y T d d t .
By setting y = 0 (i.e., there is no Doppler shift for target 1), the AF of an unmodulated UWB pulse train is defined as follows:
χ τ , T d = i = 0 N 1 w t + τ i T i = 0 N 1 w t i T T d d t .
Equation (19) shows that using the AF of an unmodulated UWB pulse train transforms the problem of discriminating targets based on different distances and velocities into that of discriminating the time delay and Doppler shift of the echo signals.
Similarly, for chaotic pulse position modulation, for the ideal point target 1, the echo signal with time delay x is given by the following equation:
u r 1 t = i = 0 N 1 w [ t x i T C i T 0 + j = 1 i 2 T j v 1 c ) ] = i = 0 N 1 w [ t x i T C i T 0 + 2 ( i T + C i T 0 X 0 ) v 1 c ) ] .
For an ideal point target 2, with time delay τ and approach speed v 2 relative to reference target 1, the echo signal is given by the following:
u r 2 t = i = 0 N 1 w t x + τ i T C i T 0 + 2 i T + C i T 0 X 0 v 1 + v 2 c .
The mean square deviation of the two echo signals is as follows:
ε 2 =   i = 0 N 1   w [ t x i T C i T 0 + 2 i T + C i T 0 X 0 v 1 c ] i = 0 N 1   w [ t ( x + τ ) i T C i T 0 + 2 i T + C i T 0 X 0 ( v 1 + v 2 ) c ] 2 d t =   i = 0 N 1   w [ t x i T C i T 0 + 2 i T + C i T 0 X 0 v 1 c ] 2 d t +   i = 0 N 1   w [ t ( x + τ ) i T C i T 0 + 2 i T + C i T 0 X 0 ( v 1 + v 2 ) c ] 2 d t 2   i = 0 N 1   w t x i T C i T 0 + 2 i T + C i T 0 X 0 v 1 c i = 0 N 1   w t ( x + τ ) i T C i T 0 + 2 i T + C i T 0 X 0 ( v 1 + v 2 ) c d t .
Expressing this in terms of variable t’, where t x + τ = t :
ε 2 = 2 E 2 i = 0 N 1 w [ t + τ i T C i T 0 + 2 ( i T + C i T 0 X 0 ) v 1 c ) ] i = 0 N 1 w [ t i T C i T 0 + 2 ( i T + C i T 0 X 0 ) ( v 1 + v 2 ) c ] d t .
To simplify the discussion, let v 1 = 0 and v 2 = v . The AF of a chaotic pulse-position-modulated UWB train can then be expressed as follows:
χ τ , v = i = 0 N 1 w t + τ i T C i T 0 i = 0 N 1 w t i T C i T 0 + 2 i T + C i T 0 X 0 v c d t .
From the above analysis, it can be seen that, for the chaotic pulse-position-modulated UWB pulse train, the Doppler time shift varies among pulse-repetition cycles. Thus, the pulse train’s AF is not a function of delay and Doppler time shift but of delay and velocity.
Based on the above theoretical derivation, the normalized AF diagrams of the unmodulated (Figure 7) and chaotic pulse-position-modulated (Figure 8) UWB train can be obtained, in which different colors are used to indicate the magnitude of the AF values.
As can be seen in Figure 7 and Figure 8, the AF of the chaotic pulse-position-modulated UWB pulse train approximates a thumbtack function, meaning that it has higher range accuracy and greater resistance to clutter interference than that of the unmodulated UWB pulse train.

3.3.2. Anti-Interception Performance

The power spectrum S ( f ) of the signal s ( t ) of a UWB system consists of two parts, the discrete spectrum S d ( f ) and the continuous spectrum S c ( f ) :
S d f = 1 T 2 l = + W l T 2 E { exp ( j 2 π l T C i T 0 ) } 2 δ f l T ,
S c ( f ) = 1 T W f 2 l = + E { [ β n ( f ) E { β n ( f ) } ] [ β n + 1 ( f ) E { β n + 1 ( f ) } ] } exp ( 2 j π f l T ) ,
where β n ( f ) = exp ( j 2 π f C i T 0 ) . Assuming x n is a chaotic sequence with 0 < x n < 1 , the probability density function of c n T 0 is uniform: ρ ( C i T 0 ) = 1 T 0 .
Consequently,
E { exp ( j 2 π f C i T 0 ) } = 0 T 0 1 T 0 exp ( j 2 π f x ) d x = sin ( π f T 0 ) π f T 0 exp ( j π f T 0 ) .
The continuous spectrum of the chaotic pulse-position-modulated UWB signal is derived as follows:
S c ( f ) = 1 T W f 2 l = + { E [ β n ( f ) β n + 1 ( f ) ] E [ β n ( f ) ] E [ β n + 1 ( f ) ] } exp ( j 2 π f l T ) = 1 T W ( f ) 2 { 1 sin ( π f T 0 ) π f T 0 2 } .
The discrete spectrum is then expressed as follows:
S d f = 1 T 2 l = + W l T 2 sin ( π l T T 0 ) π l T T 0 2 δ f l T .
The introduction of chaotic sequences changes the power distribution of the system; the power that was only represented in the form of discrete spectral lines is partially transferred to the continuous spectrum. The calculated power-spectral densities of the unmodulated and chaotic pulse-position-modulated UWB signals are shown in Figure 9.
Following chaotic modulation, the peak power spectral density (PSD) of the UWB signal decreased by approximately 50%, significantly increasing the difficulty for reconnaissance and interference equipment to detect the fuze signal. Moreover, the modulated UWB fuze signal exhibited a more random frequency distribution. Figure 9a clearly shows a distinct spectral peak, facilitating targeted interference by interference equipment. By contrast, the chaotically modulated UWB signal lacked a prominent spectral peak, making it impractical for interference equipment to target specific frequencies.

3.3.3. Anti-Jamming Performance

In this study, the anti-jamming performance of radio fuzes was evaluated using targeted sinusoidal jamming, which was applied to the fuze according to an established method after accurately obtaining the frequency of the fuze’s signals. The interference signal is expressed as follows:
j ( t ) = a cos ( 2 π f J t + φ ) ,
The target echo signal with sinusoidal interference is correlated with the local reference signal in a modulation period, and the output signal of the correlator can be obtained as follows:
u R ( t ) = T r [ r ( t ) + j ( t ) ] u ( t ) d t = T r r ( t ) u ( t ) d t + T r j ( t ) u ( t ) d t .
The average power of the interference signal at the output of the correlator is as follows:
P j ( t ) = J ( f ) H ( f ) 2 d f = a 2 4 δ ( f f J ) + a 2 4 δ ( f + f J ) | H ( f ) | 2 d f = a 2 2 | H f J | 2 .
According to the literature [37], the gain in signal-to-interference ratio in UWB fuze correlation detection with sinusoidal interference is as follows:
G = S I R o u t S I R i n = N T r A 2 E H ( f J ) 2 N T D A 2 E H f J 2   ,
where N is the number of pulses; E is the energy of a single pulse; A is the local reference-signal amplitude; T D is the pulse-repetition period; T r is the modulation period, H ( f ) is the spectrum of the echo signal; and f J is the frequency of the interference signal.
According to Equation (33), when the jamming frequency corresponds to the spectral peak of the delayed signal in the local correlator of the UWB fuze, H ( f J ) reaches its maximum, i.e., the correlation-detection processing gain G is a minimum. At this point, f J is referred to as the optimal jamming frequency.
The parameters of the UWB fuze simulation model in this study were as follows: a pulse repetition frequency of 10   M H z ; a pulse width of 0.5   n s ; the accumulation period of fuze-related processing set to 1   μ s ; the simulated rendezvous distance of the projectile at 10   m ; and a predetermined explosion height of 3   m . Figure 10 and Figure 11 show the correlation-detection output waveforms under optimal and non-optimal interference frequencies.
Without modulation, when the interference-signal frequency was optimal, the interference effect was pronounced, causing the output correlation peaks to be submerged in the interference signal. Away from the optimal frequency, the interference effect decreased significantly, allowing the correlation peaks to be output normally. With M-sequence modulation, the anti-interference effect showed a slight improvement compared to no modulation. However, at the optimal interference frequency, the output correlation peaks were still submerged in the interference signal. By contrast, in the chaotic pulse-position-modulated case, an optimal interference frequency does not exist, and the output correlation peaks can be output normally even when there is an interfering signal present. Thus, the chaotic-pulse-position-modulated UWB fuze demonstrates strong resistance to sinusoidal interference: effective interference is difficult for jammers to achieve, even if they can identify the frequency of the fuze signal.

4. Conclusions

This study investigated the RF stealth waveforms of a UWB radio fuze employing chaotic pulse-position modulation. A perturbation signal based on Tent-chaotic mapping was introduced to extend the periods of chaotic sequences without increasing complexity. Through calculations of the approximate entropy and sequence period analysis, and numerical simulations, we confirmed that the performance of the perturbed Tent-chaotic sequence under byte constraints closely matched that of the unperturbed Tent-chaotic sequence under ideal conditions. The chaotic pulse-position-modulated UWB radio fuze significantly outperformed its unmodulated counterpart in terms of detection capability, interception avoidance, and anti-jamming ability. This research offers theoretical insights to enhance the battlefield survivability of radio fuzes through RF stealth technology. The limitation lies in the fact that the study in this paper is based on the comparison of various aspects of the performance of chaotic modulated UWB fuzes with unmodulated UWB fuzes, and in future work, quantitative evaluation will continue to be investigated in order to evaluate the RF stealth performance of radio fuze by means of standardized quantitative criteria.

Author Contributions

Conceptualization, Z.H.; methodology, K.W.; validation, S.H. and B.Y.; formal analysis, K.W.; resources, Z.H.; data curation, B.Y.; writing—original draft preparation, K.W.; writing—review and editing, Y.L.; visualization, S.H.; supervision, Z.H.; funding acquisition, Z.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Sun, Y.; Gong, S.; Mao, Y.; Dong, Y.Y.; Dong, C.X. Online unsupervised generative learning framework based radar jamming waveform design. IET Radar Sonar Navig. 2023, 17, 1441–1455. [Google Scholar] [CrossRef]
  2. Gao, J.; Wu, R.; Zhang, J. An adaptive multi-target jamming waveform design based on power minimization. Entropy 2020, 22, 508. [Google Scholar] [CrossRef] [PubMed]
  3. Yang, Z.; Zhang, B.; Zhang, K.; Shi, J.; Li, Z.; Huang, C.; Zhou, Q. Efficient waveform design with jamming characteristics for precision electronic warfare. Signal Process 2023, 212, 109162. [Google Scholar] [CrossRef]
  4. Yu, H.; Yan, X.; Hao, X.; Wang, K. Cognition-Based Multi-system Radio Fuze Interference Decision. In Advances in Intelligent Automation and Soft Computing; Springer: Cham, Switzerland, 2022. [Google Scholar] [CrossRef]
  5. Du, H. Principle of Radio Fuze Anti-Jamming. Weapons Industry; Ordnance Industry Press Co., Ltd.: Beijing, China, 1988. [Google Scholar]
  6. Lynch, D.D. Introduction to RF Stealth; Scitech Publishing Inc.: Raleigh, NC, USA, 2004. [Google Scholar]
  7. Chang, W.; Tao, H.; Liu, Y.; Sun, G. Design of synthetic aperture radar low-intercept radio frequency stealth. J. Syst. Eng. Electron. 2020, 31, 64–72. [Google Scholar] [CrossRef]
  8. Shi, C.; Wang, F.; Zhou, J.; Chen, J. Adaptive radar jamming waveform design based on low probability of intercept. In Proceedings of the China Summit and International Conference on Signal and Information Processing (ChinaSIP), Chengdu, China, 12–15 July 2015; pp. 1017–1021. [Google Scholar]
  9. Wu, J.; Shi, C.; Zhang, W.; Zhou, J. Power Control Game Between a Distributed Radar Network and a Smart Jammer. IEEE Syst. J. 2023, 18, 61–72. [Google Scholar] [CrossRef]
  10. Hoseinzade, M.; Andargoli, S.M. Power control and beamforming of phased-MIMO radars to achieve a low probability interception. Digit. Signal Process. 2022, 130, 103645. [Google Scholar] [CrossRef]
  11. Rad, M.K.; Andargoli, S.M. Power control and beamforming in passive phased array radars for low probability of interception. Digital Signal Processing 2021, 117, 103165. [Google Scholar]
  12. Dai, X.; Shi, C.; Wang, Z.; Zhou, J. Coalition Game Theoretic Power Allocation Strategy for Multi-Target Detection in Distributed Radar Networks. Remote Sens. 2023, 15, 3804. [Google Scholar] [CrossRef]
  13. Bekkerman, I.; Tabrikian, J. Target detection and localization using MIMO radars and sonars. IEEE Trans. Signal Process. 2006, 54, 3873–3883. [Google Scholar] [CrossRef]
  14. Li, J.; Stoica, P.; Zheng, X. Signal synthesis and receiver design for MIMO radar imaging. IEEE Trans. Signal Process. 2008, 56, 3959–3968. [Google Scholar] [CrossRef]
  15. Li, Y.; Vorobyov, S.A.; Koivunen, V. Ambiguity function of the transmit beamspace-based MIMO radar. IEEE Trans. Signal Process. 2015, 63, 4445–4457. [Google Scholar] [CrossRef]
  16. Yu, Q.; Bi, D.P.; Chen, L. Jamming technology of research based on pri parameter separation of signal to ELINT system. Fire Control. Command. Control 2016, 41, 143–147. [Google Scholar]
  17. Dai, S.B.; Lei, W.H.; Cheng, Y.Z. Electronic anti-reconnaissance based on TOA analysis. Electron. Inf. Warf. Technol 2014, 29, 45–48. [Google Scholar]
  18. Zhang, B.Q.; Wang, W.S. Anti-clustering analysis of anti-reconnaissance based on full pulse information extraction. Electron. Inf. Warf. Technol 2017, 32, 19–25. [Google Scholar]
  19. Sun, H.; Lu, Y.; Liu, G. Ultra-wideband technology and random signal radar: An ideal combination. IEEE Aerosp. Electron. Syst. Mag. 2003, 18, 3–7. [Google Scholar]
  20. Jia, J.; Han, Z.; Liang, Y.Y.; Liu, L.; Wang, X. Design of Multi-Parameter Compound Modulated RF Stealth Anti-Sorting Signals Based on Hyperchaotic Interleaving Feedback. Entropy 2022, 24, 1283. [Google Scholar] [CrossRef] [PubMed]
  21. Jia, J.; Liu, L.; Liang, Y.Y.; Han, Z.; Wang, X. Chaotic Mapping-Based Anti-Sorting Radio Frequency Stealth Signals and Compressed Sensing-Based Echo Signal Processing Technology. Entropy 2022, 24, 1559. [Google Scholar] [CrossRef] [PubMed]
  22. Dao, X.; Gao, M.; Zhang, Z.; Li, C.; Wang, Y. Design of multi-parameter composite modulated signal for anti-deceptive jamming. AEU Arch. Elektron. Ubertragungstechnik Electron. Commun. 2021, 132, 153646. [Google Scholar] [CrossRef]
  23. Guo, T.; Zhan, H.; Su, X.; Wang, T. Anti-interrupted sampling repeater jamming method for random pulse repetition interval and intra-pulse frequency agile radar. IET Radar Sonar Navig. 2023, 17, 1796–1811. [Google Scholar] [CrossRef]
  24. Li, Z.; Li, P.; Hao, X.H.; Yan, X.P.; Wang, J.T. Anti-active noise jamming performance of pulse Doppler fuze. Acta Armamentarii 2015, 36, 1001–1008. [Google Scholar]
  25. Liu, S.K.; Yan, X.P.; Li, P.; Yu, H. Anti-periodic jamming performance of pulse Doppler fuze. J. Beijing Univ. Aeronaut. Astronaut. 2018, 44, 1018–1025. [Google Scholar]
  26. Dai, J.; Yan, Q.; Yan, X.P.; Li, P.; Li, Z. Recognition of Jamming and Target Signal for Pulse Doppler Fuze Based on FCM Algorithm with Incremental Update. Acta Armamentarii 2018, 39, 1711. [Google Scholar]
  27. Dai, J.; Li, Z.; Hao, X.; Li, P. Anti-jamming method for pulse Doppler fuze based on joint feature extraction of target signal. Acta Armamentarii 2019, 40, 225. [Google Scholar]
  28. Yu, H.; Yan, X.; Jia, R.; Li, Z.; Wang, J. Research on anti-jamming performance of M-sequence pseudo-random code phase modulation pulse doppler fuze. Acta Armamentarii 2020, 41, 417. [Google Scholar]
  29. Dave, A. DRFMs–Part 4. J. Electron. Def. 2014, 37, 34–36. [Google Scholar]
  30. Li, J.Y.; Wang J., G.; Yang, J.Y.; Tang, B.; Ye, R.Q. LPI Analysis of UWB Radar. Radar Sci. Technol. 2005, 5, 13–17. [Google Scholar]
  31. Li, M.; Huang, Z.H. Research on Relation between Sampling Pulse Width and Output Signal Amplitude for Ultra-wideband Radio Fuze. Acta Armamentarii 2016, 37, 1989. [Google Scholar]
  32. Yan, Y.; Cui, Z.Z. Anti-jamming performance of ultra wideband radio fuze. Acta Armamentarii 2010, 31, 13. [Google Scholar]
  33. Ma, L.; Wang, T. Performance analysis of UWB-IR anti-intercepting communication based on chaotic mapping. J. China Inst. Commun. 2005, 26, 138. [Google Scholar]
  34. Tao, S.; Wang, R.; Yan, Y. Perturbance-based algorithm to expand cycle length of chaotic key stream. Electron. Lett. 1998, 34, 873–874. [Google Scholar]
  35. Pincus, S.M. Approximate entropy as a measure of system complexity. Proc. Natl. Acad. Sci. USA 1991, 88, 2297–2301. [Google Scholar] [CrossRef] [PubMed]
  36. Woodward, P.M. Probability and Information Theory, with Applications to Radar; Pergamon Press Ltd.: Oxford, UK, 1953. [Google Scholar]
  37. Dong, E.; Hao, X.; Yan, X.; Yu, H. Research on interference mechanism of swept-frequency jamming to UWB radio fuze. Acta Armamentarii 2023, 44, 1006. [Google Scholar]
Figure 1. Interference process.
Figure 1. Interference process.
Entropy 26 00605 g001
Figure 2. Operation of UWB radio fuze.
Figure 2. Operation of UWB radio fuze.
Entropy 26 00605 g002
Figure 3. Tent mapping with different initial values (p = 6) showing the emergence of regularity after a small number of iterations. (a) initial value x 0 = 0.35 ; (b) initial value x 0 = 0.33 ; (c) initial value x 0 = 0.68 ; (d) initial value x 0 = 0.85 .
Figure 3. Tent mapping with different initial values (p = 6) showing the emergence of regularity after a small number of iterations. (a) initial value x 0 = 0.35 ; (b) initial value x 0 = 0.33 ; (c) initial value x 0 = 0.68 ; (d) initial value x 0 = 0.85 .
Entropy 26 00605 g003
Figure 4. Tent mapping with perturbation parameter added (p = 6). Note the absence of regularity even after 10,000 iterations: (a) Tent mapping after 3000 iterations; (b) Tent mapping after 10,000 iterations.
Figure 4. Tent mapping with perturbation parameter added (p = 6). Note the absence of regularity even after 10,000 iterations: (a) Tent mapping after 3000 iterations; (b) Tent mapping after 10,000 iterations.
Entropy 26 00605 g004
Figure 5. Comparison of the approximate entropies of three Tent-chaotic sequences.
Figure 5. Comparison of the approximate entropies of three Tent-chaotic sequences.
Entropy 26 00605 g005
Figure 6. Period lengths of Tent-chaotic sequences with and without added perturbation parameter.
Figure 6. Period lengths of Tent-chaotic sequences with and without added perturbation parameter.
Entropy 26 00605 g006
Figure 7. Ambiguity function of unmodulated UWB pulse train.
Figure 7. Ambiguity function of unmodulated UWB pulse train.
Entropy 26 00605 g007
Figure 8. Ambiguity function of chaotic pulse-position-modulated UWB pulse train.
Figure 8. Ambiguity function of chaotic pulse-position-modulated UWB pulse train.
Entropy 26 00605 g008
Figure 9. Power spectral density: (a) unmodulated; (b) chaotic pulse-position modulation.
Figure 9. Power spectral density: (a) unmodulated; (b) chaotic pulse-position modulation.
Entropy 26 00605 g009aEntropy 26 00605 g009b
Figure 10. Output waveform of fuze when jamming frequency is optimal: (a) chaotic pulse-position modulation; (b) M-sequence modulated; (c) unmodulated.
Figure 10. Output waveform of fuze when jamming frequency is optimal: (a) chaotic pulse-position modulation; (b) M-sequence modulated; (c) unmodulated.
Entropy 26 00605 g010
Figure 11. Output waveform of fuze when jamming frequency deviates from optimal value: (a) chaotic pulse-position modulation; (b) M-sequence modulated; (c) unmodulated.
Figure 11. Output waveform of fuze when jamming frequency deviates from optimal value: (a) chaotic pulse-position modulation; (b) M-sequence modulated; (c) unmodulated.
Entropy 26 00605 g011
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wu, K.; Yang, B.; Hao, S.; Liang, Y.; Huang, Z. Modulated Radio Frequency Stealth Waveforms for Ultra-Wideband Radio Fuzes. Entropy 2024, 26, 605. https://doi.org/10.3390/e26070605

AMA Style

Wu K, Yang B, Hao S, Liang Y, Huang Z. Modulated Radio Frequency Stealth Waveforms for Ultra-Wideband Radio Fuzes. Entropy. 2024; 26(7):605. https://doi.org/10.3390/e26070605

Chicago/Turabian Style

Wu, Kaiwei, Bing Yang, Shijun Hao, Yanbin Liang, and Zhonghua Huang. 2024. "Modulated Radio Frequency Stealth Waveforms for Ultra-Wideband Radio Fuzes" Entropy 26, no. 7: 605. https://doi.org/10.3390/e26070605

APA Style

Wu, K., Yang, B., Hao, S., Liang, Y., & Huang, Z. (2024). Modulated Radio Frequency Stealth Waveforms for Ultra-Wideband Radio Fuzes. Entropy, 26(7), 605. https://doi.org/10.3390/e26070605

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop