1. Introduction
Under the background of electronic warfare (EW), the working environment of the radar system may be maliciously affected by electronic jammers, thus weakening its combat capability [
1]. Generally speaking, when the self-defense jammer interferes with the main lobe of a single-station radar, its anti-interference ability is very limited due to the finite observation angle and single information source [
2]. Owing to the “defocused transmit focused receive” (DTFR) working mode, the distributed multiple-input multiple-output (D-MIMO) radar is capable of transmitting wide beams to illuminate the surveillance area and synthesize the focused beams at the receiving end [
3], which enhances spatial resolution and brings higher degrees of freedom [
4]. Thus, the D-MIMO radar can combine the observation information of multiple channels to expand detection coverage and enhance parameter estimation capability, which shows great potential in the electronic counter-countermeasure (ECCM) [
5,
6]. However, when the D-MIMO radar performs the MTT task that the tracked targets carry with the self-defense jammer, due to its limited communication capability, the data processing speed of the fusion center, and the total transmit power budget [
7,
8], anti-jamming performance still needs to be guaranteed by an effective resource scheduling strategy.
In general, aiming at the target tracking scenario, the resource scheduling studies in the D-MIMO radar system consist of two categories, i.e., transmit parameter allocation [
9,
10,
11,
12,
13,
14] and array architecture configuration [
15,
16,
17,
18,
19,
20,
21]. As for the transmit parameter allocation problem, ref. [
9] studies the single target tracking (STT) scenario in the D-MIMO radar system and constructs the power allocation problem as a cooperative game model. Focusing on the multi-target tracking (MTT) scenario, by introducing the posterior Cramer–Rao lower bound (PCRLB) as an error estimate criterion, ref. [
10] proposes a dynamic receive beam allocation algorithm. According to the principle of the low probability of intercept (LPI), in order to achieve the expected estimate accuracy and take into account the communication requirements at the same time, ref. [
11] develops a power allocation model by reducing the radar power and the wireless communication power. Since the optimal variables of sensor subset selection, transmit power, and effective bandwidth are coupled in the objective function, ref. [
12] designs the sequential parametric convex approximation (SPCA) method to solve the multidimensional joint resource allocation problem. Considering tracking multiple targets in the presence of a hostile interceptor, ref. [
13] studies the LPI-based collaborative resource allocation model by reducing the transmit power and effective bandwidth of the transmitted signals under the premise of meeting the given tracking task requirements. In order to enhance tracking performance and maintain anti-interception ability, ref. [
14] expands upon the joint transmit beampattern optimization and resource allocation scheme, where the maneuvering target assignment integrated with beampattern optimization and bandwidth allocation are tackled simultaneously.
As for the array architecture configuration problem in the D-MIMO radar system, ref. [
15] formulates the joint antenna deployment and power allocation model for enhancing detection performance and proposes a water-filling method to solve the optimization model. Ref. [
16] derives the Cramer–Rao lower bound (CRLB) for velocity estimation and proposes an antenna placement algorithm to improve velocity tracking accuracy. By incorporating the transmit antenna position, the receive antenna position, and the allocated transmit power into the Neyman–Pearson (NP) detector, ref. [
17] develops collaborative transmit-receive antenna deployment integrated with a transmit power allocation strategy. An efficient node selection and power allocation algorithm in a radar network is proposed by [
18], which can enhance the worst-case tracking accuracy in the MTT task. Aiming at the MTT scenario in the clutter environment using the large-scale D-MIMO radar network, ref. [
19] proposes the subarray selection and power allocation algorithm with the optimization direction of improving the overall tracking accuracy. The authors of ref. [
20] realize the online antenna scheduling of radar networks by dwell time allocation and establish a general framework with respect to self-adaptive radar resource allocation. In order to further improve the LPI capability of the D-MIMO radar system, by minimizing the interception probability of transmit signals when meeting tracking accuracy requirements, ref. [
21] constructs an optimization model based on transmit node selection and the transmit power allocation.
Although the existing research on radar resource scheduling provides some useful guidance for solving the MTT problem under non-ideal detection conditions, the electronic interference scenario is rarely involved. In modern EW, jamming equipment can actively transmit or retransmit electromagnetic waves, seriously affecting radar detection, tracking, and recognition, which is called active jamming. According to the different effects, radar active jamming can be divided into active blanket jamming and active deception jamming. Active blanket jamming reduces the signal-to-noise ratio (SNR) of echoes by transmitting high-energy noise or noise-like signals [
22], thus reducing detection probability and estimation accuracy. Active deception jamming means that the jammer generates false target information by intercepting, modulating, and forwarding radar signals to cover the real target [
23]. In summary, the existing radar anti-jamming methods can be roughly divided into three categories: (1) Reducing the interception probability. By controlling transmit power and developing parameter agility to reduce the interception probability of the radar system [
24,
25], the estimation of radar parameters by reconnaissance equipment can be affected. (2) Avoiding jamming signal processing. By using sidelobe cancellation, sidelobe blanking, and waveform diversity methods [
26,
27], the jamming signals are suppressed at the radar receiving end to prevent them from entering the signal processing equipment. (3) Suppressing the mainlobe jamming signal by signal processing. When the jamming signals enter the signal processing equipment through the mainlobe, mainlobe jamming is suppressed by signal processing methods, e.g., multi-domain filtering, subspace separation, and jamming reconstruction cancellation [
28,
29]. It can be seen that the research on existing anti-jamming technology focuses on different periods, i.e., before, during, and after the entry of jamming signals, but most of the research focuses on the suppression of active blanket jamming and the discussion of countering active deception jamming is not sufficient. Moreover, many existing anti-jamming technologies based on signal processing often cause the loss of the real target signal while suppressing interference.
Many studies in the literature have proved that using radar resource management technology to suppress blanket jamming from the perspective of data processing has obvious effects and broad application prospects [
1,
3,
9,
13,
14,
21,
22,
24]. In this case, it is also of great research value to use the spatial diversity gain of the D-MIMO radar to counter range deception jamming by reasonably scheduling radar system resources. However, due to the lack of studies on radar resource scheduling in the context of deception jamming, when faced with a complex electromagnetic environment and diversified task scenarios, the previous radar resource scheduling strategies are unlikely to work effectively and are likely to cause task scheduling failures. For instance, if an enemy target carries a self-defense jamming pod or is covered by an electronic jammer escort, more flexible scheduling schemes are needed to improve the signal-to-noise and jamming ratio (SNJR) or implement false target identification. However, as far as our information goes, radar resource scheduling under deception jamming for MTT applications has not been effectively developed before. Due to the possibility that range deception jamming can be identified by the multi-station radar system on the spatial resolution cell, in order to apply this property to the multi-target tracking scenario, this paper pertinently studies the dynamic selection problem of the transmit antenna and receive antenna based on the distributed MIMO radar. In this case, if the optimal tracking channels can be dynamically selected according to the characteristics of range deception jamming and the relative position relationship between the target and the radar antenna, the capability of radar with respect to identifying false targets can be theoretically increased. In addition, there is a coupling relationship between transmit power allocation and transmit antenna scheduling in the D-MIMO radar system, and the joint optimization of the two resources can further improve resource utilization. Therefore, this paper focuses on the MTT task by utilizing the D-MIMO radar and examines the joint antenna scheduling and power allocation (JASPA) scheme under range deception jamming (RDJ). The primary works and contributions are outlined as follows.
(1) The discriminating algorithm for false targets based on the CRLB is developed and the parallel modified particle filter (MPF) is built to judge false targets in real-time and pertinently perform tracking tasks. By deriving the CRLB of the range spoofing parameter and combining the statistical principle, the false target discriminator is established as a hypothesis test on the chi-square distribution. In order to reduce the influence of RDJ on the filtering algorithm, the particle filter (PF) is modified according to the characteristics of the RDJ scenario, and the discrimination probability of false targets is coupled with the MPF to ensure that reliable parameter estimation results can be obtained steadily.
(2) A collaborative resource management approach is suggested for MTT based on the D-MIMO radar while dealing with the RDJ implemented by the self-defense jammer. For a precise description of tracking accuracy, the predicted conditional CRLB (PC-CRLB) of the time delay and the Doppler frequency are jointly calculated and applied to formulate an objective function. Due to the fact that false targets can waste considerable radar resources in practice, an effective JASPA scheme is proposed to address this issue. According to the computed discrimination probability of false targets, the JASPA model is formulated by enhancing the sum of tracking utility values corresponding to the identified true target under the predetermined system resource. In this case, the D-MIMO radar can improve the identification ability of false targets while maintaining the quality of service (QoS) for performing tracking tasks, and finally enhance radar anti-interference capability.
(3) In order to efficiently obtain the suboptimal solutions of the formulated non-convex and NP-hard problem, a four-step optimization cycle (FSOC)-based algorithm is developed. As the Boolean variables of transmit–receive antenna scheduling, the continuous power allocation variable, and the indicator value are coupled in an objective function and constraints, the JASPA model is a discontinuous non-convex and NP-hard problem. To improve solving efficiency and ensure solution accuracy, the step-by-step approach and the smoothing technique are adopted to relax the original problem, and the proximal alternating direction method of multipliers (P-ADMM) algorithm is repeatedly applied to solve the relaxed models. Finally, in order to reduce the system error introduced by relaxation operation, the cyclic minimization technique is adopted to control the solution accuracy.
The subsequent sections of this paper are structured as follows.
Section 2 presents the system model, and
Section 3 provides the tracking filter in detail and derives the PC-CRLB of the time delay and the Doppler frequency.
Section 4 formulates the JASPA model and develops an iterative four-step solution technique to solve the proposed optimization model.
Section 5 illustrates the detailed numerical simulation results to verify the effectiveness of the proposed JASPA scheme. Lastly, conclusions are summarized in
Section 6.
2. System Model
Consider a D-MIMO radar with M transmitters and N receivers that are dispersedly deployed in the two-dimensional space, where the set of transmitters and the set of receivers are denoted as and , respectively. Moreover, suppose transmitter m and receiver n are separately situated at distinct locations and , where and . For briefness, we give the following assumptions:
(a) The D-MIMO radar system operates in the DTFR mode and continuously undertakes target tracking tasks in the region of interest (ROI).
(b) The ROI consists of Q point-like targets, and all targets are widely separated and maintain the cruising state. For the D-MIMO radar system, the number of moving targets in the ROI is known as a priori information before tracking them in the RDJ environment.
(c) In order to protect real targets from being attacked, the airborne self-defense jammers implement deception jamming by continuously delaying and retransmitting transmit signals from all air defense radars.
(d) Although the deception jammer is able to generate different false targets in theory, herein, we assume that each jammer only generates one false target for each tracking radar at the same time.
The MTT process in the RDJ environment can be intuitively demonstrated, as shown in
Figure 1.
2.1. Signal Model
Assume that all the transmitted signals are narrowband and orthogonal. In this case, we can normalize the transmitted signal from the
mth transmitter as
Moreover, the bandwidth and the time width of transmitted signal
can be given by
where
denotes the equivalent form of
after the Fourier transformation.
In the
path, the baseband signal reflected by target
q at sample interval
k is
where
represents the attenuation of signal strength due to the bistatic path loss effect, satisfying [
15]
where
denotes the transmit power from transmitter
m,
represents the distance between transmitter
m and target
q, and
indicates the distance between receiver
n and target
q, given by
where
represents the location of the
qth target. Herein,
is the radar cross-section (RCS) of the
qth target, which is modeled as a complex parameter and satisfies
. The term of
represents the combination of the time delay from the real target and active deception jamming, which can be calculated as
where
denotes the spoofing distance parameter imposed by the airborne jamming system carried by target
q, and
c represents the speed of light. In theory, the real radial distance is obtained when
, and the false target can be generated when
. In this case, the spatial resolution cells (SRCs) of jamming signals and real echoes may become spatially intertwined for a given target, which can be intuitively shown as in
Figure 2. Herein,
represents the Doppler frequency which is expressed as [
16]
where
denotes the signal wavelength,
represents the azimuth angle of target
q to transmitter
m, and
indicates the azimuth angle of target
q to receiver
n, respectively.
where
represents the four-quadrant inverse tangent operation. Herein, the term of
denotes the complex Gaussian noise.
2.2. Motion Model
For simplicity, consider that all the moving targets satisfy the nearly constant velocity (NCV) model [
30]
where
is the moving state of target
q at sample interval
k, and
F is the state transition matrix, given by
where
denotes the sample interval,
represents the second-order identity matrix, and the term of
denotes the Kronecker productor. Herein,
represents the process noise, and the covariance matrix
is computed by
where
denotes the noise intensity during the state transition process [
31].
2.3. Measurement Model
Using the maximum likelihood (ML) estimation algorithm [
32] allows for extracting valuable information from the received signal as outlined in (4), such as the time delay and the Doppler frequency, while the relevant process is shown in
Appendix A. We define two binary vectors for selecting transmitters and receivers at the
kth sample interval
where
,
, for
and
. With the combination of the binary antenna selection variables, the relevant measurement model can be denoted by
Herein,
denotes the nonlinear transform function with
. According to (7), it is essential to state that the measured data are derived from the real target when
, otherwise, they are from false targets.
represents the zero-mean Gaussian noise, and the corresponding covariance matrix
. Herein,
is the CRLB in terms of the time delay and Doppler frequency, which are derived in the next subsection. For future use, we defined the measured dataset of target
q from different channels as
2.4. Identification Model
In practice, the range spoofing parameter
serves as a valuable tool for distinguishing between real targets and false targets in the RDJ scenario [
5]. Mathematically, due to the presence of estimation error, the estimated outcome of variable
can be considered as a stochastic process, which satisfies
. Herein, the term of
denotes the CRLB on the range spoofing parameter, which is given in
Appendix B.
Based on the NP detection theory [
33], we utilize
as the statistical discriminator, and two hypotheses are given by
where
represents that
, thus the
qth target is discriminated as genuine. Conversely,
denotes that
, so the identification of a false target is declared. The term of
represents the chi-square distribution with one degree of freedom, while
denotes the noncentral chi-square distribution with one degree of freedom. Given the expected probability for recognizing the real target, denoted as
, the identification threshold of the statistical discriminator is given by
where
represents the inverse cumulative distribution function of
. Therefore, the theoretical discrimination probability of a false target is
where
is the theoretical discrimination probability of
.
5. Simulation Results
In order to elucidate the efficacy of the formulated JASPA strategy, numerical simulation results are presented in this section. The distributed MIMO radar system with
transmit antennas and
receive antennas is selected for analysis, where the remaining relevant system parameters are presented in
Table 1. Assume that there are
targets moving in the ROI, whose initial state is shown in
Table 2. In each Monte Carlo trial, 20 frames of data are used for tracking, and the total number of Monte Carlo trials is set as
. Moreover, in order to be closer to a real air defense combat environment, it is postulated that a critical defense target is situated at point
, and the task of the air defense combat system is to protect the defense target from being attacked. In this case, as for the radar system, the closer the moving target is to the defense target, the lower the expected tracking error should be set. Herein, the task area is divided into three parts by a piecewise function, given by
where
denotes the operation of radial distance.
Furthermore, in order to enhance the clarity of parameter estimation performance for each moving target, the normalized PC-CRLB of target
q is defined as
where
denotes the state estimation result of target
q in the
jth trial.
Based on the above simulation condition assumptions, the spatial arrangement of the D-MIMO radar system in relation to the moving targets is illustrated in
Figure 4. Specifically, all the transmit antennas and the receive antennas are interspersed, and the formed radar baseline is semicircular. Herein, the red rectangle represents the transmit antenna, and the yellow diamond represents the receiving antenna. In addition, each target moves towards the radar baseline at the same speed, and the distance between adjacent targets is always equal. In order to clearly show the battlefield situation, the geometric relationship of the defense target, the moving targets, and the surveillance areas is intuitively demonstrated in
Figure 5. Herein, the pentagram denotes the critical defense target. Based on Equation (47), the surveillance region is divided into three areas displayed by the red dotted line according to the radial distance difference. Apparently, target 5 is always moving in surveillance area 3, while other targets have completed a one-time crossing of the surveillance area. In this case, the radar system has a lower requirement for the tracking accuracy of target 5, and higher requirements for targets that later enter the areas with higher priority, e.g., target 1, target 2, and target 3. It should be emphasized that such a division satisfies the principle of air defense operations, i.e., giving priority to attacking targets with greater threat.
Since the established expected tracking error model is independent of the target RCS, the impact of the RCS on the results of radar resource scheduling should be avoided, so as to better study the RDJ problem. Hence, we assume that the RCSs of all the moving targets are always maintained at 1 m
2 for briefness. In order to explore the influence of the spoofing distance parameter on tracking performance and resource scheduling, a constant model and a time-varying model are designed for simulation research, which is demonstrated in
Figure 6. It can be seen from
Figure 6a that the spoofing distance parameters corresponding to all targets in the constant model are constant with time, and target 1 has the largest setting value of the spoofing distance parameter. Meanwhile,
Figure 6b demonstrates that the values of the spoofing distance parameters of target 1, target 2, and target 3 change linearly with time, and the setting values of target 3 increase with time while the setting values of target 1 and target 2 decrease dynamically. It is worth noting that target 4 and target 5 are not supposed to implement jamming in both models, so as to build control experiments with respect to whether to implement the RDJ.
5.1. Case 1: Constant Spoofing Distance Model
In this case, since the spoofing distance parameters introduced by each target are constant to the D-MIMO radar system, the RDJ strategy carried out by the self-defense jammer does not change with time. The computing results of the discrimination probability for each target in case 1 are given in
Figure 7. Due to the implementation of self-defense RDJ, the discrimination probability of target 1, target 2, and target 3 is significantly higher than that of target 4 and target 5. Since target 4 and target 5 do not retransmit radar signals, the calculated discrimination probability from the MIMO radar system is kept at a low level, and gradually decreases with time until it trends to zero. Specifically, after resource optimization scheduling, the discrimination probability of target 1 is always greater than the preset discrimination threshold, so target 1 is identified as a false target throughout the whole tracking process. Meanwhile, although the initial discrimination probability of target 2 is less than the threshold, it starts exceeding the discrimination threshold after the seventh frame. Due to the small spoofing distance parameter of target 3 and the limited resources that the D-MIMO radar system can schedule, the discrimination probability of target 3 increases with time, but it still fails to reach the preset threshold. The discrimination probability of target 4 and target 5 without the RDJ decreases with the increase in tracking accuracy. Moreover, it can be seen from the numerical range of the discrimination probability of each target that the higher the spoofing range parameter setting, the greater the corresponding discrimination probability, which proves the correctness of the formulated discriminator.
In actual combat, military radar usually does not know the RDJ strategy of the enemy in advance, which may lead to the introduction of biased estimations. Since the PC-CRLB can only provide the lower bound for the unbiased estimation, it is not reliable to judge the tracking performance by analyzing the PC-CRLB of each target without the discrimination results of false targets. In this case, the PC-CRLB and the feasible accuracy threshold of each target are further illustrated in the supplementary data of
Figure 7 and
Figure 8. It can be seen from
Figure 8 that after the identification and screening of false targets, the D-MIMO radar system can achieve a tracking accuracy for real targets that is close to the initial expected tracking accuracy and abandon the strict control of the tracking accuracy of false targets, which leads to stronger adaptive ability.
To be specific, combined with
Figure 7 and
Figure 8, it can be seen that since the D-MIMO radar determines that target 3, target 4, and target 5 are always real targets, the PC-CRLBs of these targets are lower than the thresholds of estimation error after resource scheduling. In addition, due to target 1 being judged as a false target during the whole tracking process, the radar system does not take the tracking performance of target 1 into account, so its PC-CRLB is higher than the corresponding threshold of estimation error. Similarly, target 2 is judged as a false target at the beginning of frame 7, which also causes its PC-CRLB to be higher than the threshold of estimation error after frame 7. On the whole, due to the strong adaptability of the adopted filtering algorithm, the tracking accuracy of each target can be maintained at a relatively low level and always converges, which also reflects the correctness of the established model.
Figure 9 and
Figure 10 demonstrate the results of antenna scheduling and power allocation in one simulation trial, respectively. In
Figure 9, the yellow circles indicate that the antennas with the corresponding index are active and assigned to perform tracking tasks at the current frame. According to the analysis of
Figure 9a, transmit antenna 1, transmit antenna 2, and transmit antenna 9 are scheduled most frequently. The emergence of this phenomenon can be explained by the fact that the three transmit antennas are closer to moving targets and possess better observation positions. In addition, it can be seen from
Figure 9b that receive antenna 1, receive antenna 2, receive antenna 8, and receive antenna 9 are scheduled most frequently due to their location advantages. The results shown in
Figure 9 demonstrate that although the D-MIMO radar has multiple independent antennas with large distances, the radar system tends to schedule the antennas in dominant positions to participate in the tracking task, so as to maximize the radar performance boundary and improve resource utilization.
In
Figure 10, the different color in each rectangular box denotes the corresponding transmit power ratio. Herein, the dark blue rectangular box indicates that the transmit power allocation ratio is zero, and the crimson rectangular box represents the highest ratio of transmit power allocation. The results in
Figure 10 are consistent with the conclusions in
Figure 9a, i.e., transmit antenna 1, transmit antenna 2, and transmit antenna 9 consume most of the transmit power resources in case 1. It can be seen that by jointly optimizing antenna scheduling and transmit power allocation, transmit power resources can be more concentrated to parts of the transmit antennas, and the power quota can be dynamically adjusted according to situational changes.
5.2. Case 2: Time-Varying Spoofing Distance Model
This case investigates the impact of changes in the spoofing distance parameter on tracking performance and resource scheduling over time. As shown in
Figure 6b, the spoofing distance parameters of target 1 and target 2 decrease with time, and the initial value of the spoofing distance parameter of target 3 is high and increases rapidly with time. Without loss of generality, the spoofing distance model in case 2 still ensures that the spoofing distance parameters of target 4 and target 5 are consistent with case 1, i.e., always equal to zero.
Figure 11 demonstrates the calculation results of the discrimination probability with respect to each target in case 2. It can be seen from
Figure 11 that the variation trend of the discrimination probability for target 1 corresponds roughly to the trend in its spoofing distance parameters, and the results of discrimination probability are always below the preset threshold, suggesting that the radar resource budget is not enough to accurately identify all false targets. In addition, although the spoofing distance parameter of target 2 is always in a decreasing state, due to its large initial value, target 2 is always judged as a false target by the radar system after resource optimal scheduling. The discrimination probability of target 3 increases with the increase of its spoofing distance parameter and exceeds the discrimination threshold after the 11th frame. Similar to case 1, the results of the discrimination probability of target 4 and target 5 always remain at a low level and show a decreasing trend over time, which shows that the discrimination probability for the real target can be reduced with the improvement of its tracking accuracy at the same time. In summary, the calculation results of discrimination probability shown in
Figure 11 conform to the change rule of the preset time-varying model of the spoofing distance parameter, which demonstrates the effectiveness and robustness of the formulated discriminator.
The results of estimation error for each target in case 2 are demonstrated in
Figure 12. Firstly, combined with
Figure 11, it can be seen that since the discrimination probability of target 1, target 4, and target 5 is always lower than the preset discrimination threshold, the radar system regards these three targets as true targets and tracks them according to the expected tracking accuracy. Therefore, the lower bounds of estimation error in terms of target 1, target 4, and target 5 are less than the expected tracking error and can be dynamically adjusted with the target passing through the task area, reflecting higher target tracking accuracy and adaptive ability. In addition, since the discrimination probability of target 2 is higher than its discrimination threshold, target 2 is judged as a false target, so that its PC-CRLB is always unaffected by the expected tracking accuracy. Finally, the discrimination probability of target 3 is always lower than the threshold in the first 10 frames, so its PC-CRLB meets the expected tracking accuracy requirements. However, after the 11th frame, due to the abandonment of the radar system to optimize the tracking performance of target 3, its PC-CRLB shows a significant increase.
Figure 13 and
Figure 14 give the results of antenna scheduling and power allocation in case 2, respectively. According to
Figure 13, we can see that the results of antenna scheduling right now are similar to those in case 1, i.e., the radar system tends to assign the antennas closer to moving targets to perform tracking tasks. However, since the intensity of RDJ applied by target 1 is lower than that in case 1, it is difficult for the radar system to accurately identify target 1 as a false target with the finite system resources. In this case, transmit antenna 3 is scheduled more frequently to track target 1, and transmit antenna 9 is less selected for target tracking. It can be seen from
Figure 13b that the D-MIMO radar system tends to assign as many receive antennas as possible to measure transmitted signals under the limited number of activable antennas, so as to make full use of the spatial diversity gain to identify false targets.
The results of transmit power allocation shown in
Figure 14 are highly consistent with the results of transmit antenna scheduling in
Figure 13a, i.e., most transmit resources are allocated to transmit antenna 1, transmit antenna 2, and transmit antenna 3. Specifically, due to the high expected tracking accuracy of target 1, the scheduling frequency and the transmit power of transmit antenna 9 are significantly reduced to meet the tracking performance requirement, while the scheduling frequency and the allocated transmit power of transmit antenna 3 are increased in case 2. In addition, we note that when transmit antenna 3 is assigned to perform tracking tasks, the corresponding ratio of transmit power is usually higher than the ratio in terms of other active transmit antennas, because transmit antenna 3 undertakes the heavy task of effectively improving the tracking accuracy of target 1 to the expected tracking accuracy. In general, from the perspective of resource scheduling results, the proposed algorithm shows good adaptability in dealing with changes in spoofing distance conditions.