CN102983932B - A kind of electronic jamming method to iff interrogator - Google Patents

A kind of electronic jamming method to iff interrogator Download PDF

Info

Publication number
CN102983932B
CN102983932B CN201210503046.6A CN201210503046A CN102983932B CN 102983932 B CN102983932 B CN 102983932B CN 201210503046 A CN201210503046 A CN 201210503046A CN 102983932 B CN102983932 B CN 102983932B
Authority
CN
China
Prior art keywords
mod
int
interval
working method
relevant peaks
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210503046.6A
Other languages
Chinese (zh)
Other versions
CN102983932A (en
Inventor
张晗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Jiuzhou ATC Technology Co Ltd
Original Assignee
Sichuan Jiuzhou ATC Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Jiuzhou ATC Technology Co Ltd filed Critical Sichuan Jiuzhou ATC Technology Co Ltd
Priority to CN201210503046.6A priority Critical patent/CN102983932B/en
Publication of CN102983932A publication Critical patent/CN102983932A/en
Application granted granted Critical
Publication of CN102983932B publication Critical patent/CN102983932B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of electronic jamming method to iff interrogator, relate to the electronic countermeasures field of secondary radar system, comprise the following steps: (1) calculates the interval of relevant peaks P1, P2, P3, P4 under 3 kinds of working methods, make interval table; (2) determine the working method of the national security schema answer signal received in this period according to the interval table of relevant peaks, and it is complete and meet the national security schema answer signal of interval table to filter out relevant peaks; (3) answer signal complete for relevant peaks is weaved into one group, and obtain relevant peaks interval average.The invention has the beneficial effects as follows: according to the signal received before, the shake pointer value of current time, working method and relevant peaks interval can be decoded out fast, produce rapidly corresponding Gao Zhongying pulse and disturb the novel iff interrogator in west.

Description

A kind of electronic jamming method to iff interrogator
Technical field
The present invention relates to the electronic countermeasures field of secondary radar system, especially a kind of electronic jamming method to iff interrogator.
Background technology
The novel enemy and we in west identify that secondary radar system starts research and development 20 end of the centurys, within 1998, the U.S., Britain, France, Germany and Italy have set up national security schema technical work group, to 2004, working group completed Uniting and the principle prototype research of being with the novel enemy and we in west of national security schema to identify secondary radar system.At present, work group member state has all combined world-famous radar manufacturer and has produced the novel enemy and we in west and identify secondary radar system.These companies to 2011 year have supplied more than 16000 cover enemy and we identification equipments to more than 60, whole world country.
The novel enemy and we in west identify that secondary radar system adds national security schema on the original basis---the novel enemy and we in west identify the core of secondary radar system.The novel enemy and we in west with national security schema identify that secondary radar system is still made up of inquisitor and answering machine, but larger change has been done to original technology, as adopted MSK modulation technique, spread spectrum, data link transmission technology, computer modern encryption technology etc., improve the anti-interference of identification of friend or foe and deception, anti-detect receipts ability, and Cooperative Engagement Capability.
The present invention, by the interference to the novel iff interrogator in west, realizes the object that the antagonism novel enemy and we in west identify secondary radar system.
The novel enemy and we in west identify that secondary radar system is the up-to-date identification of friend or foe of American-European military active service, there is no proprietary countermeasures set targetedly at present, adopt the present invention, can realize the electronic countermeasures of the novel iff interrogator with west.
Summary of the invention
The object of this invention is to provide a kind of electronic jamming method to iff interrogator, realize the object that the antagonism novel enemy and we in west identify secondary radar system.
To achieve these goals, the technical scheme taked is: a kind of electronic jamming method to iff interrogator, and a kind of electronic jamming method to iff interrogator, comprises the following steps:
(1) calculate the interval of relevant peaks P1, P2, P3, P4 under 3 kinds of working methods, make interval table;
(2) determine the working method of the national security schema answer signal received in this period according to the interval table of relevant peaks, and it is complete and meet the national security schema answer signal of interval table to filter out relevant peaks;
(3) answer signal complete for relevant peaks is weaved into one group, and obtain relevant peaks interval average;
(4) according to the corresponding formula of working mode selection, average is substituted into formula and obtain shake pointer parameter x in this period;
(5) the shake pointer parameter x that different time sections is obtained is analyzed, decode out the rule that it converts in time;
(6) according to working method sometime, the rule that it converts in time is decoded out;
(7) according to shake pointer parameter x (t), the working method of current time, relevant peaks P1, P2, P3, P4 is obtained at the spacing value of current time;
(8) according to the relevant peaks P1 obtained, P2, P3, P4 at the spacing value of current time, produce corresponding jamming of high PRF iff interrogator.
Preferred steps: step (1) can be analyzed to 3 step by step: 101,102 and 103; The interval formula at step 101, reckoning signal correction peak; Step 102, calculate relevant peaks P1 under different operating mode, the span of jitter value S1, S2 and the S3 at interval between P2, P3 and P4: step 103, calculate the span at answer signal relevant peaks interval according to the interval formula of relevant peaks and the span of S1, S2 and S3.
Preferred steps: 3 kinds of working methods are respectively working method 0, working method 1 and working method 2, and wherein the formula of working method 0 correspondence is:
x = 16* (int(8*A0 +0.5)―213)+4*(int( 8*B0+0.5)―154)
+( int( 8*C0+0.5)―48)
x = 16* (int(8*A0+0.5 ) ) + 4*(int( 8*B0+0.5))
+ int( 8*C0+0.5) ― 4072。
Preferred steps: the formula of working method 1 correspondence is:
x = 16* (int(8*A0 +0.5) ) + 4*(int( 8*B0+0.5))
+ int( 8*C0+0.5) ― 4260。
Preferred steps: the formula of working method 2 correspondence is:
x = 16* (int(8*A0 +0.5) )+ 4*(int( 8*B0+0.5))
+ int( 8*C0+0.5) ― 4336。
Preferred steps: as long as receive one group of correctly complete answer signal within certain time period, the formula corresponding according to different operating mode, just can calculate shake pointer parameter x (t) of current time;
First Continuous plus goes out the x value of abundant different time sections, forms set { x0, x1, x2 sequentially ...;
If data acquisition system meets equation below
{ xmy, xmy+1, x my+2 ... xmy+y-1}={x0, x1, x2 ... xy-1} (m, y ∈ natural number)
The period of this set is then had to be y;
Because each time period is 8 seconds, therefore the cycle period of x is 8y second;
Using at the beginning of 8 second cycle that x value is x0 as 0 second timing point, in following certain moment t second, x value counts x(t), then have x value and x(t in " the t mod 8y " moment) identical, that is:
x(t)= x(t mod 8y) ((t mod 8y)≥ 0,(t mod 8y)< 8y)
Because x value in every 8 seconds is constant, therefore first obtain (t mod 8y) have how many whole 8 seconds:
due to
Therefore conclusion can be obtained:
The shake pointer parameter x(t in certain moment following), be { x0, x1, x2 ... (int(t/8) mod y of x y-1}) individual element.
Preferred steps: 0 second timing point described in employing, in following certain moment t second, the value of working method counts m(t);
Because each time period is 8 seconds, then the number of cycles number having following certain moment t is int(t/8);
Working method 0,1,2 circulates in turn, and period is 3, therefore can obtain following result:
If be working method 0, then m(t at 0 second timing point)=int(t/8) mod 3;
If be working method 1, then m(t at 0 second timing point)=int(t/8+1) mod 3;
If be working method 2, then m(t at 0 second timing point)=int(t/8+2) mod 3.
Preferred steps: the shake pointer parameter x(t of current time by obtaining), working method m(t) substitute into the computing formula table of relevant peaks jitter value S1, S1 and S3, calculate jitter value S1, S2 and S3.
Preferred steps: relevant peaks interval formula table jitter value S1, S2 and S3 of obtaining being substituted into national security schema answer signal, calculates relevant peaks P1, P2, P3, P4 at the spacing value of current time.
Preferred steps: according to relevant peaks P1, P2, P3, P4 at the spacing value of current time, data bit D1 to D33 fills random number, and generation carrier frequency is 1090 ± 4(MHZ) MSK radiofrequency signal, iff interrogator fixed point Gao Zhongying is launched.
In sum, owing to have employed technique scheme, the invention has the beneficial effects as follows: can according to the signal received before, quick decode out current time shake pointer value, working method and relevant peaks interval, produce rapidly corresponding Gao Zhongying pulse and disturb the novel iff interrogator in west.
Accompanying drawing explanation
Examples of the present invention will be described by way of reference to the accompanying drawings, wherein:
Fig. 1 is schematic flow sheet of the present invention;
Fig. 2 is the oscillogram of national security schema answer signal of the present invention;
Fig. 3 is the span post figure at the relevant peaks interval of national security schema answer signal of the present invention;
Fig. 4 is the relevant peaks interval formula table of national security schema answer signal of the present invention;
Fig. 5 is the computing formula table of relevant peaks jitter value S1, S1 and S3 of the present invention;
Fig. 6 is the span table of expression formula of the present invention;
Fig. 7 is the span table of relevant peaks jitter value S1, S1 and S3 of the present invention;
Fig. 8 is the relevant peaks interval span table of national security schema answer signal of the present invention.
Embodiment
All features disclosed in this specification, or the step in disclosed all methods or process, except mutually exclusive feature and/or step, all can combine by any way.
Arbitrary feature disclosed in this specification (comprising any accessory claim, summary and accompanying drawing), unless specifically stated otherwise, all can be replaced by other equivalences or the alternative features with similar object.That is, unless specifically stated otherwise, each feature is an example in a series of equivalence or similar characteristics.
Technical scheme of the present invention comprises the following steps:
Step 1, calculate the interval of answer signal relevant peaks P1, P2, P3, P4 under 3 kinds of working methods, make interval table, this step can be analyzed to 3 step by step: 101,102 and 103;
Step 2, when receiving the answer signal of national security schema, working method in this period (working method remained unchanged within 8 second time period) is determined according to the interval table at signal correction peak, and it is complete and meet the multiple national security schema answer signal of interval table to filter out relevant peaks, this step can be analyzed to do not exist side by side 4 step by step: 201,202,203 and 204;
Step 3, answer signal complete for these relevant peaks is weaved into one group, and obtain the relevant peaks interval average of answer signal, this step can be analyzed to do not exist side by side 3 step by step: 301,302 and 303;
Step 4, according to the corresponding formula of working mode selection, average is substituted into polynomial equation and obtain shake pointer parameter in this period, this step can be analyzed to do not exist side by side 3 step by step: 401,402 and 403;
Step 5, multiple shake pointer parameters that different time sections is obtained to be analyzed, decode out the rule that it converts in time;
Step 6, the working method that different time sections is obtained to be analyzed, decode out the rule that it converts in time;
Step 7, according to the shake pointer parameter of current time and working method, obtain the relevant peaks interval of current time;
Step 8, relevant peaks interval according to current time, produce corresponding Gao Zhongying pulse, finally realize the electronic jamming to the novel iff interrogator in west.
Below each step is described in detail:
the interval formula at step 101, signal correction peak
The waveform of country's security schema answer signal as shown in Figure 2.This signal is made up of 4 relevant peaks (P1, P2, P3, P4) and 33 data pulses (D1 ~ D33), and S1, S2, S3 be respectively relevant peaks P1, the jitter value at interval between P2, P3 and P4.
Extrapolated the relevant peaks interval formula of answer signal by Fig. 2, specifically see Fig. 4.
the calculating of step 102, S1, S2 and S3 scope
The computing formula of relevant peaks jitter value S1, S1 and S3 is shown in Fig. 5.Working method remains unchanged within a certain period of time, and any time can only select a kind of mode.X is binary number, and scope is: x ∈ [0000000,1111111].
Although when mode 0, mode 1, mode 2 S1, S1 and S3 computing formula different, but expression formula wherein " (int (x/16)) mod 8 ", " (int (x/4)) mod 4 " and " x mod 4 " are identical, and expression formula span and calculating process are shown in Fig. 6.
By Fig. 5 and Fig. 6 can calculate when mode 0, mode 1, mode 2 S1, S1 and S3 span, specifically see Fig. 7.
the calculating of the interval of step 103, answer signal relevant peaks
By Fig. 4 with Fig. 7 can calculate when 3 kinds of modes relevant peak-to-peak every span, specifically see Fig. 8.
First each scope of Fig. 8 is carried out ascending order arrangement according to the size of lower limit, then white bar is used to represent the lower limit of certain interval, then use the black cylindricality of next-door neighbour to represent the upper limit of same interval, finally obtain the span post figure at the relevant peaks interval of answer signal as shown in Figure 6.
The feature at the relevant peaks interval of answer signal can be seen intuitively by column diagram: the upper limit of certain scope is less than the lower limit of the right adjacent ranges all the time, between all interval that this demonstrate that Fig. 8, there is not numerical value overlap.
step 201/301/401 working method 0
When cracking enemy's answer signal, not knowing signal working method and signal correction peak jitter pointer value, needing firmly to decode.
In section at the same time, if the interval of most of answer signal relevant peaks that inquisitor receives continuously, meet the span of Fig. 8 secondary series, then can judge that this this time period of answering machine is operated in mode 0 time.
From answer signal, filter out the individual complete answer signal of n that relevant peaks interval meets the span of Fig. 8 secondary series, weave into one group.{ LP1P4, LP2P4, LP3P4} are { a0, b0, c0}, { a1, b1, c1} to suppose to receive the relevant peaks interval of signal ... { an-1, b n-1, c n-1}.
Calculate A0, B0, C0 value:
Because this n signal is mode 0, can obtain according to Fig. 4 and Fig. 5:
A0 ≈ 26.625 +0.125*((int(x/16))mod 8) (1)
B0 ≈ 17.25 + 0.125*((int(x/4))mod 4+16) (2)
C0 ≈ 5.0 + 0.125* (x mod 4+8) (3)
About equation (1) calculates further and can obtain:
8*(A0 ― 26.625) ≈ (int(x/16))mod 8 (4)
Because (int (x/16)) mod 8 ∈ [0,7], int (x/16) ∈ [0,7] (see table 3) so:
int(x/16) = int(8*A0+0.5) ― 213 (5)
About equation (2) calculates further and can obtain equation:
(int(x/4))mod 4 = int ( 8*B0+0.5)― 154 (6)
About equation (3) calculates further and can obtain equation:
x mod 4 = int ( 8*C0+0.5) ― 48 (7)
Due to (int (x/4)) mod 4 ∈ [0,3], x mod 4 ∈ [0,3] (see table 3), therefore convolution (5) (6) (7) can obtain again:
x = 16* (int(8*A0 +0.5)―213)+4*(int( 8*B0+0.5)―154)
+( int( 8*C0+0.5)―48)
x = 16* (int(8*A0+0.5 ) ) + 4*(int( 8*B0+0.5))
+ int( 8*C0+0.5) ― 4072 (8)
step 202/302/402 working method 1
In section at the same time, if the interval of most of answer signal relevant peaks that inquisitor receives continuously, meet the tertial span of Fig. 8, then can judge that this this time period of answering machine is operated in mode 1 time.
From answer signal, filter out the individual complete answer signal of n that relevant peaks interval meets the tertial span of Fig. 8, weave into one group.
Adopt the computational methods same with step 201/301/401, can obtain respectively accordingly about the expression formula when working method 1 of A0, B0, C0 according to Fig. 4 and Fig. 5.
x = 16* (int(8*A0 +0.5) ) + 4*(int( 8*B0+0.5))
+ int( 8*C0+0.5) ― 4260 (9)
step 202/302/402 working method 2
In section at the same time, if the interval of most of answer signal relevant peaks that inquisitor receives continuously, meet the span that Fig. 8 the 4th arranges, then can judge that this this time period of answering machine is operated in mode 2 times.
From answer signal, filter out the individual complete answer signal of n that relevant peaks interval meets the span that Fig. 8 the 4th arranges, weave into one group.
Adopt the computational methods same with step 201/301/401, can obtain respectively accordingly about the expression formula when working method 2 of A0, B0, C0 according to Fig. 4 and Fig. 5.
x = 16* (int(8*A0 +0.5) )+ 4*(int( 8*B0+0.5))
+ int( 8*C0+0.5) ― 4336 (10)
step 5
As long as receive one group of correctly complete answer signal within certain time period, by Fig. 8 and expression formula (8) (9) (10), shake pointer parameter x now just can be calculated.
First Continuous plus goes out the x value of abundant different time sections, forms set { x0, x1, x2 sequentially ....
If data acquisition system meets equation below
{ xmy, xmy+1, x my+2 ... xmy+y-1}={x0, x1, x2 ... xy-1} (m, y ∈ natural number)
The period of this set is then had to be y.
Because each time period is 8 seconds, therefore the cycle period of x is 8y second.
Using at the beginning of 8 second cycle that x value is x0 as 0 second timing point, in following certain moment t second, x value counts x(t), then have x value and x(t in " the t mod 8y " moment) identical, that is:
x(t)= x(t mod 8y) ((t mod 8y)≥ 0,(t mod 8y)< 8y)
Because x value in every 8 seconds is constant, therefore first obtain (t mod 8y) have how many whole 8 seconds:
due to
Therefore conclusion can be obtained:
The shake pointer value x(t in certain moment following), be { x0, x1, x2 ... (int(t/8) mod y of x y-1}) individual element.
step 6
Adopt the 0 second timing point same with step 5, in following certain moment t second, the value of working method counts m(t).
Because each time period is 8 seconds, then the number of cycles number of following certain moment t is had to be
int(t/8)。
Because working method 0,1,2 circulates in turn, period is 3, therefore can obtain following result:
If be working method 0, then m(t at 0 second timing point)=int(t/8) mod 3;
If be working method 1, then m(t at 0 second timing point)=int(t/8+1) mod 3;
If be working method 2, then m(t at 0 second timing point)=int(t/8+2) mod 3.
step 701
The shake pointer value x(t of the current time that step 5,6 is obtained), working method m(t) substitute into Fig. 5, calculate jitter value S1, S2 and S3.
step 702
Jitter value S1, S2 and S3 of step 701 being obtained substitute into Fig. 4, calculate relevant peaks P1, P2, P3, P4 at the interval of current time.
step 8
Relevant peaks interval adopts the calculated value of step 702, and data bit D1 ~ D33 fills random number, and producing carrier frequency according to the signal format of Fig. 2 is 1090 ± 4(MHZ) MSK radiofrequency signal, to west novel iff interrogator fixed point Gao Zhongying transmitting.
Inquisitor constantly receives interference signal, repeatedly carries out data acquisition, judgement to D1 ~ D33 data bit; Actual response signal is submerged, blocks; Final realization is to the electronic jamming of the novel iff interrogator in west.
The present invention is not limited to aforesaid embodiment.The present invention expands to any new feature of disclosing in this manual or any combination newly, and the step of the arbitrary new method disclosed or process or any combination newly.

Claims (6)

1., to an electronic jamming method for iff interrogator, it is characterized in that: comprise the following steps:
(1) calculate the interval of relevant peaks P1, P2, P3, P4 under 3 kinds of working methods, make interval table;
Step (1) can be analyzed to 3 step by step: 101,102 and 103; The interval formula at step 101, reckoning signal correction peak; Step 102, calculate relevant peaks P1 under different operating mode, the span of jitter value S1, S2 and the S3 at interval between P2, P3 and P4: step 103, calculate the span at answer signal relevant peaks interval according to the interval formula of relevant peaks and the span of S1, S2 and S3;
The interval formula at step 101, reckoning signal correction peak, specific as follows:
The waveform signal of country's security schema answer signal is made up of 4 relevant peaks P1, P2, P3, P4 and 33 data pulsed D 1 ~ D33, and S1, S2, S3 be respectively relevant peaks P1, the jitter value at interval between P2, P3 and P4; Interval, P1P4, P2P4, P3P4 interval formula is showed as follows:
The interval of P1P4: L p1P4=26.625+S1;
The interval of P2P4: L p2P4=17.25+S2;
The interval of P3P4: L p3P4=5.0+S3;
Interval, P1P2, P1P3, P2P3 interval formula is showed as follows:
The interval of P1P2: L p1P2=L p1P4-L p2P4=9.375+S1-S2;
The interval of P1P3: L p1P3=L p1P4-L p3P4=21.625+S1-S3;
The interval of P2P3: L p2P3=L p1P3-L p1P2=12.25+S2-S3;
Step 102, calculate relevant peaks P1 under different operating mode, the span of jitter value S1, S2 and the S3 at interval between P2, P3 and P4;
3 kinds of working methods are working method 0, working method 1, working method 2; Under 3 kinds of working methods, the formula of jitter value S1, S2, S3 is different, specific as follows:
When working method 0: S1 is 0.125* ((int (x/16)) mod 8); S2 is 0.125* ((int (x/4)) mod 4+16); S3 is 0.125* (x mod 4+8);
When working method 1: S1 is 0.125* ((int (x/16)) mod 8+8); S2 is 0.125* ((int (x/4)) mod 4); S3 is 0.125* (x mod 4+4);
When working method 2: S1 is 0.125* ((int (x/16)) mod 8+16); S2 is 0.125* ((int (x/4)) mod 4+20); S3 is 0.125* (x mod 4);
Change the scope of shake pointer parameter x into the decimal system [0,127], although when working method 0, working method 1, working method 2 S1, S2 and S3 computing formula different, but expression formula wherein " (int (x/16)) mod 8 ", " (int (x/4)) mod 4 " and " x mod 4 " are identical, and each expression formula span is as follows:
x∈[0,127];
int(x/16)∈[0,7];
(int(x/16))mod 8∈[0,7];
(int(x/16))mod 8+8∈[8,15];
(int(x/16))mod 8+16∈[16,23];
int(x/4)∈[0,31];
(int(x/4))mod 4∈[0,3];
(int(x/4))mod 4+16∈[16,19];
(int(x/4))mod 4+20∈[20,23];
x mod 4∈[0,3];
(x mod 4)+8∈[8,11];
(x mod 4)+4∈[4,7];
Each expression formula span is substituted into the formula of jitter value S1, S2, S3 under 3 kinds of working methods, obtains the span of relevant peaks jitter value S1, S2 and S3:
When working method 0:
S1=0.125*((int(x/16))mod 8)∈[0,0.875];
S2=0.125*((int(x/4))mod 4+16)∈[2,2.375];
S3=0.125*(x mod 4+8)∈[1,1.375];
When working method 1:
S1=0.125*((int(x/16))mod 8+8)∈[1,1.875];
S2=0.125*((int(x/4))mod 4)∈[0,0.375];
S3=0.125*(x mod 4+4)∈[0.5,0.875];
When working method 2:
S1=0.125*((int(x/16))mod 8+16)∈[2,2.875];
S2=0.125*((int(x/4))mod 4+20)∈[2.5,2.875];
S3=0.125*(x mod 4)∈[0,0.375];
Step 103, calculate the span at answer signal relevant peaks interval according to the interval formula of relevant peaks and the span of S1, S2 and S3;
S1, S2, S3 span when working method 0, working method 1, working method 2 is substituted in the interval formula of P1P4, P2P4, P3P4, P1P2, P1P3, P2P3, obtain when working method 0, working method 1, working method 2, the span of P1P4, P2P4, P3P4, P1P2, P1P3, P2P3, combined 18 spans, weave into relevant peaks interval span table, be specially:
The span of jitter value S1, S2 and S3 during working method 0 is substituted into the interval formula of P1P4, P2P4, P3P4, P1P2, P1P3, P2P3:
The interval of P1P4: L p1P4=26.625+S1 ∈ [26.625,27.5];
The interval of P2P4: L p2P4=17.25+S2 ∈ [19.25,19.625];
The interval of P3P4: L p3P4=5.0+S3 ∈ [6,6.375];
The interval of P1P2: L p1P2=9.375+S1-S2 ∈ [7,8.25];
The interval of P1P3: L p1P3=21.625+S1-S3 ∈ [20.25,21.5];
The interval of P2P3: L p2P3=12.25+S2-S3 ∈ [12.875,13.625];
The span of jitter value S1, S2 and S3 during working method 1 is substituted into the interval formula of P1P4, P2P4, P3P4, P1P2, P1P3, P2P3:
The interval of P1P4: L p1P4=26.625+S1 ∈ [27.625,28.5];
The interval of P2P4: L p2P4=17.25+S2 ∈ [17.25,17.625];
The interval of P3P4: L p3P4=5.0+S3 ∈ [5.5,5.875];
The interval of P1P2: L p1P2=9.375+S1-S2 ∈ [10,11.25];
The interval of P1P3: L p1P3=21.625+S1-S3 ∈ [21.75,23];
The interval of P2P3: L p2P3=12.25+S2-S3 ∈ [11.375,12.125];
The span of jitter value S1, S2 and S3 during working method 2 is substituted into the interval formula of P1P4, P2P4, P3P4, P1P2, P1P3, P2P3:
The interval of P1P4: L p1P4=26.625+S1 ∈ [28.625,29.5];
The interval of P2P4: L p2P4=17.25+S2 ∈ [20.25,20.625];
The interval of P3P4: L p3P4=5.0+S3 ∈ [5,5.375];
The interval of P1P2: L p1P2=9.375+S1-S2 ∈ [8.5,9.75];
The interval of P1P3: L p1P3=21.625+S1-S3 ∈ [23.25,24.5];
The interval of P2P3: L p2P3=12.25+S2-S3 ∈ [14.375,15.125];
Wherein there is not numerical value overlap between all interval;
(2) determine the working method of the national security schema answer signal received in this period according to the interval table of relevant peaks, and it is complete and meet the national security schema answer signal of interval table to filter out relevant peaks;
(3) answer signal complete for relevant peaks is weaved into one group, and obtain relevant peaks interval average;
(4) according to the corresponding formula of working mode selection, average is substituted into formula and obtain shake pointer parameter x in this period;
If this time period is working method 0, then have:
x=16*(int(8*A 0+0.5))+4*(int(8*B 0+0.5))+int(8*C 0+0.5)―4072;
If this time period is working method 1, then have:
x=16*(int(8*A 0+0.5))+4*(int(8*B 0+0.5))+int(8*C 0+0.5)―4260;
If this time period is working method 2, then have:
x=16*(int(8*A 0+0.5))+4*(int(8*B 0+0.5))+int(8*C 0+0.5)―4336;
Wherein receive the relevant peaks interval { L of signal p1P4, L p2P4, L p3P4be { a 0, b 0, c 0, { a 1, b 1, c 1... { a n-1, b n-1, c n- 1, C 0 = &Sigma; N = 0 N = n - 1 c N 2 n , B 0 = &Sigma; N = 0 N = n - 1 b N 2 n , A 0 = &Sigma; N = 0 N = n - 1 a N 2 n ;
(5) analyze the shake pointer parameter x that different time sections is obtained, decode out the rule that it converts in time, x value counts x (t);
(6) according to working method sometime, the rule that it converts in time is decoded out;
(7) according to shake pointer parameter x (t), the working method of current time, obtain relevant peaks P1, P2, P3, P4 at the spacing value of current time, it specifically comprises the following steps:
A, judge the working method of current time according to step (6);
B, judge shake pointer parameter x (t) of current time according to step (5);
If this time period of C is working method 0, then has and shake pointer parameter x (t) substituted into:
L P1P4=26.625+S1=26.625+0.125*((int(x/16))mod 8);
L P2P4=17.25+S1=17.25+0.125*((int(x/4))mod 4+16);
L P3P4=5.0+S1=5.0+0.125*(x mod 4+8);
Calculate when working method 0 relevant peaks P1, P2, P3, P4 at the spacing value of current time;
If this time period of D is working method 1, then has and shake pointer parameter x (t) substituted into:
L P1P4=26.625+S1=26.625+0.125*((int(x/16))mod 8+8));
L P2P4=17.25+S1=17.25+0.125*((int(x/4))mod 4);
L P3P4=5.0+S1=5.0+0.125*(x mod 4+4);
Calculate when working method 1 relevant peaks P1, P2, P3, P4 at the spacing value of current time;
If this time period of E is working method 2, then has and shake pointer parameter x (t) substituted into:
L P1P4=26.625+S1=26.625+0.125*((int(x/16))mod 8+16));
L P2P4=17.25+S1=17.25+0.125*((int(x/4))mod 4+20);
L P3P4=5.0+S1=5.0+0.125*(x mod 4);
Calculate when working method 2 relevant peaks P1, P2, P3, P4 at the spacing value of current time;
(8) according to the relevant peaks P1 obtained, P2, P3, P4 at the spacing value of current time, produce corresponding jamming of high PRF iff interrogator.
2. a kind of electronic jamming method to iff interrogator according to claim 1, it is characterized in that: as long as receive one group of correctly complete answer signal within certain time period, the formula corresponding according to different operating mode, just calculates shake pointer parameter x (t) of current time;
First Continuous plus goes out the x value of abundant different time sections, forms set { x sequentially 0, x 1, x 2;
If data acquisition system meets equation below
{ x my, x my+1, x my+2x my+ (y-1)}={ x 0, x 1, x 2x y-1, wherein m, y ∈ natural number,
The period of this set is then had to be y;
Because each time period is 8 seconds, therefore the cycle period of x is 8y second;
Using at the beginning of 8 second cycle that x value is x0 as 0 second timing point, in following certain moment t second, x value counts x (t), then have in the x value in " t mod 8y " moment identical with x (t), that is:
x(t)=x(t mod 8y),(mod 8y)≥0,(t mod 8y)<8y,
Because x value in every 8 seconds is constant, therefore first obtain (t mod 8y) have how many whole 8 seconds:
int ( t mod 8 y 8 ) &le; t mod 8 y 8 < int ( t mod 8 y 8 ) + 1
int ( t mod 8 y 8 ) = int ( t 8 ) mod y
Therefore conclusion is obtained:
Shake pointer parameter x (t) in certain moment following, is { x 0, x 1, x 2x y-1(int (t/8) mod y) individual element.
3. a kind of electronic jamming method to iff interrogator according to claim 2, is characterized in that: 0 second timing point described in employing, and in following certain moment t second, the value of working method counts m (t);
Because each time period is 8 seconds, then the number of cycles number having following certain moment t is int (t/8);
Because working method 0,1,2 circulates in turn, period is 3, therefore obtains following result:
If be working method 0 at 0 second timing point, then m (t)=int (t/8) mod 3;
If be working method 1 at 0 second timing point, then m (t)=int (t/8+1) mod 3;
If be working method 2 at 0 second timing point, then m (t)=int (t/8+2) mod 3.
4. a kind of electronic jamming method to iff interrogator according to claim 3, it is characterized in that: by shake pointer parameter x (t) of current time obtained, working method m (t) substitutes into the computing formula table of relevant peaks jitter value S1, S1 and S3, calculates jitter value S1, S2 and S3; Be specially:
If m (t)=0, by x (t)=x (int (t/8) mod y)the formula of jitter value S1, S2 and S3 when substituting into working method 0 in claim 1 step 102:
S1=0.125*((int(x (int(t/8)mod y)/16))mod 8);
S2=0.125*((int(x (int(t/8)mod y)/4))mod 4+16);
S3=0.125*(x (int(t/8)mod y)mod 4+8);
If m (t)=1, by x (t)=x (int (t/8) mod y)the formula of jitter value S1, S2 and S3 when substituting into working method 1 in claim 1 step 102:
S1=0.125*((int(x (int(t/8)mod y)/16))mod 8+8);
S2=0.125*((int(x (int(t/8)mod y)/4))mod 4);
S3=0.125*(x (int(t/8)mod y)mod 4+4);
If m (t)=2, by x (t)=x (int (t/8) mod y)the formula of jitter value S1, S2 and S3 when substituting into working method 2 in claim 1 step 102:
S1=0.125*((int(x (int(t/8)mod y)/16))mod 8+16);
S2=0.125*((int(x (int(t/8)mod y)/4))mod 4+20);
S3=0.125*(x (int(t/8)mod y)mod 4)。
5. a kind of electronic jamming method to iff interrogator according to claim 4, it is characterized in that: relevant peaks interval formula table jitter value S1, S2 and S3 of obtaining being substituted into national security schema answer signal, calculate relevant peaks P1, P2, P3, P4 at the spacing value of current time;
By the value of jitter value S1, S2 and S3 obtained, substitute into the interval formula at signal correction peak;
If m (t)=0, P1, being spaced apart between P2, P3 and P4:
The interval of P1P4: L p1P4=26.625+S1=26.625+0.125* ((int (x (int (t/8) mod y)/ 16)) mod 8);
The interval of P2P4: L p2P4=17.25+S2=17.25+0.125* ((int (x (int (t/8) mod y)/ 4)) mod 4+16);
The interval of P3P4: L p3P4=5.0+S3=5.0+0.125* (x (int (t/8) mod y)mod 4+8);
If m (t)=1, P1, being spaced apart between P2, P3 and P4:
The interval of P1P4: L p1P4=26.625+S1=26.625+0.125* ((int (x (int (t/8) mod y)/ 16)) mod 8+8);
The interval of P2P4: L p2P4=17.25+S2=17.25+0.125* ((int (x (int (t/8) mod y)/ 4)) mod 4);
The interval of P3P4: L p3P4=5.0+S3=5.0+0.125* (x (int (t/8) mod y)mod 4+4);
If m (t)=2, P1, being spaced apart between P2, P3 and P4:
The interval of P1P4: L p1P4=26.625+S1=26.625+0.125* ((int (x (int (t/8) mod y)/ 16)) mod 8+16);
The interval of P2P4: L p2P4=17.25+S2=17.25+0.125* ((int (x (int (t/8) mod y)/ 4)) mod 4+20);
The interval of P3P4: L p3P4=5.0+S3=5.0+0.125* (x (int (t/8) mod y)mod 4).
6. a kind of electronic jamming method to iff interrogator according to claim 5, it is characterized in that: according to relevant peaks P1, P2, P3, P4 at the spacing value of current time, data bit D1 to D33 fills random number, produce the MSK radiofrequency signal that carrier frequency is 1090 ± 4MHZ, iff interrogator fixed point Gao Zhongying is launched.
CN201210503046.6A 2012-11-30 2012-11-30 A kind of electronic jamming method to iff interrogator Active CN102983932B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210503046.6A CN102983932B (en) 2012-11-30 2012-11-30 A kind of electronic jamming method to iff interrogator

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210503046.6A CN102983932B (en) 2012-11-30 2012-11-30 A kind of electronic jamming method to iff interrogator

Publications (2)

Publication Number Publication Date
CN102983932A CN102983932A (en) 2013-03-20
CN102983932B true CN102983932B (en) 2015-09-09

Family

ID=47857706

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210503046.6A Active CN102983932B (en) 2012-11-30 2012-11-30 A kind of electronic jamming method to iff interrogator

Country Status (1)

Country Link
CN (1) CN102983932B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104020468B (en) * 2014-06-20 2016-05-04 南京恩瑞特实业有限公司 The computational methods of a kind of close-in target update cycle based on secondary radar
CN104485925B (en) * 2014-12-10 2017-03-29 中国电子科技集团公司第二十研究所 The random filler pulse production method of tacan beacon
CN107783146A (en) * 2017-09-07 2018-03-09 四川九洲电器集团有限责任公司 It is a kind of to utilize microwave signal and the target identification method and device of optical signalling
CN109152087B (en) * 2018-07-26 2022-02-11 同方电子科技有限公司 Radio station-based extension method for friend or foe identification function
CN110456339B (en) * 2019-08-12 2021-09-14 四川九洲电器集团有限责任公司 Inquiring and responding method and device, computer storage medium and electronic equipment
CN111739242A (en) * 2020-06-04 2020-10-02 成都凌亚科技有限公司 Friend or foe identification system and identification method
CN112350797B (en) * 2020-10-29 2022-08-16 四川九洲空管科技有限责任公司 Anti-cheating inquiry method applied to friend or foe identification system
CN113037427B (en) * 2021-03-03 2022-08-16 四川九洲空管科技有限责任公司 Anti-cheating response method applied to friend or foe identification system
CN113127807B (en) * 2021-04-19 2023-02-24 深圳华创电科技术有限公司 Mode5 leading pulse jitter value calculation method based on constrained least square algorithm

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009031176A1 (en) * 2007-09-03 2009-03-12 Selex Sistemi Integrati S.P.A. Reply detection in a secondary surveillance radar
CN101609146A (en) * 2009-07-23 2009-12-23 电子科技大学 A kind of anti-aliasing disposal route based on navigation management secondary radar test system
CN102062856A (en) * 2010-11-22 2011-05-18 四川九洲电器集团有限责任公司 System for detecting dead time parameters of ATC (air traffic control) transponder
CN102761349A (en) * 2012-07-10 2012-10-31 四川九洲空管科技有限责任公司 Method and system for judging effective relevant peak pulse sequence

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2860882B1 (en) * 2003-10-10 2006-02-03 Thales Sa METHOD FOR PRE-DETECTING RESPONSES IN SECONDARY RADAR AND APPLICATION TO DETECTION OF S MODE RESPONSES

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009031176A1 (en) * 2007-09-03 2009-03-12 Selex Sistemi Integrati S.P.A. Reply detection in a secondary surveillance radar
CN101889215A (en) * 2007-09-03 2010-11-17 塞莱斯系统集成公司 Reply detection in a secondary surveillance radar
CN101609146A (en) * 2009-07-23 2009-12-23 电子科技大学 A kind of anti-aliasing disposal route based on navigation management secondary radar test system
CN102062856A (en) * 2010-11-22 2011-05-18 四川九洲电器集团有限责任公司 System for detecting dead time parameters of ATC (air traffic control) transponder
CN102761349A (en) * 2012-07-10 2012-10-31 四川九洲空管科技有限责任公司 Method and system for judging effective relevant peak pulse sequence

Also Published As

Publication number Publication date
CN102983932A (en) 2013-03-20

Similar Documents

Publication Publication Date Title
CN102983932B (en) A kind of electronic jamming method to iff interrogator
CN109743173A (en) Go out block node in block chain and determines method, block verification method and block catenary system
CN103944606B (en) A kind of production method of AFH pattern
CN106100696A (en) A kind of non-linear frequency hopping pattern based on TOD temporal information generates system
CN101336003A (en) Method for generating preamble sequence and method for determining step length of cyclic shift
CN105245320A (en) Method of generating q-order ZC (Zadoff-Chu) sequence for LTE (Long Term Evolution) uplink reference signals and device
CN103560803B (en) Code-hopping direct spread communication method and system based on OVSF codes
CN104022796A (en) Method and structure for generating frequency hopping sequence based on discontinuous frequency bands
CN107995133A (en) One kind produces channel frequency method, apparatus and channel evaluation circuit
CN105743541A (en) Cognitive frequency-hopping communication anti-interference tolerance determination method
CN103269323B (en) A kind of multi-user&#39;s transform domain communication system and method
CN104158538B (en) Baud rate generation method, Baud rate generator and communication equipment
CN104506271B (en) A kind of production method and device of ZC sequences
CN110267225A (en) A kind of wireless sensor data collection method based on ElGamal algorithm
CN104200093A (en) Method for inhibiting local mean decomposition end effect through integral continuation
CN101505173B (en) Stochastic access detection method and communication apparatus
CN101127575B (en) An equably distributed random number generator and its generation method
CN104301100B (en) A kind of radio channel characteristic integrated information fusion method
CN1630211B (en) Method for demodulating UWB pulse sequences encoded according to an on-off keying modulation scheme
CN103122984B (en) Based on conjugate gears pair and the design method thereof of Rack
CN103826218B (en) The pseudo random sequence generation method of wireless sensor network node and application process thereof
CN102201912A (en) Blind recognition method for self-synchronization scrambling code generation polynomial
CN103475438B (en) A kind of low relevant range sequences Design method that is applicable to cognitive radio environment
CN105103458B (en) Information method of sending and receiving and corresponding intrument
CN103152814B (en) The confirmation method of synchronous code and device thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant