2018
DOI: 10.3390/s18072265
|View full text |Cite
|
Sign up to set email alerts
|

Deceptive Jamming Detection for SAR Based on Cross-Track Interferometry

Abstract: Deceptive jamming against synthetic aperture radar (SAR) can create false targets or deceptive scenes in the image effectively. Based on the difference in interferometric phase between the target and deceptive jamming signals, a novel method for detecting deceptive jamming using cross-track interferometry is proposed, where the echoes with deceptive jamming are received by two SAR antennas simultaneously and the false targets are identified through SAR interferometry. Since the derived false phase is close to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 29 publications
0
8
0
Order By: Relevance
“…(3) where is the PD responsivity. The photocurrent at the frequency translated microwave signal frequency f RF -f s , the unwanted carrier frequency f RF and the unwanted sideband frequency f RF + f s can be obtained from (3). They are given by…”
Section: Analysis and Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…(3) where is the PD responsivity. The photocurrent at the frequency translated microwave signal frequency f RF -f s , the unwanted carrier frequency f RF and the unwanted sideband frequency f RF + f s can be obtained from (3). They are given by…”
Section: Analysis and Simulation Resultsmentioning
confidence: 99%
“…The phase of a radar signal also contains target information. For examples moving-target indication (MTI) radars use the returned radar signal phase to determine whether the target is a moving or stationary object [2] and synthetic-aperture radars use the returned radar signal phase for imaging [3]. Therefore, it is important to modify both the frequency and phase of a radar signal to provide false target information to the hostile radar for electronic countermeasures.…”
Section: Introductionmentioning
confidence: 99%
“…The initiation of the BitTransfer scheme is tied to the strategy to detect an ongoing jamming attack on the communication link between two neighboring devices. Jamming detection involves a few effective strategies, already discussed in the literature and outside the scope of the proposed protocol (see, for instance, [36], [37], and [38]). All these techniques are perfectly suitable for integration with BitTransfer.…”
Section: ) Jamming Detectionmentioning
confidence: 99%
“…Mitigating the presence of a jammer in WSNs is a well-known topic. While some recent contributions focused on detecting a reactive jammer [ 4 , 5 , 6 ], only a few of them proposed solutions to still allow communications in such a scenario.…”
Section: Related Workmentioning
confidence: 99%