Analysis of Electronic Attack Techniques against Monopulse Radars

The making of modern radar systems using advanced radar techniques and the simultaneous implementation of modern and effective electronic protection capabilities is a serious threat to the electronic attack systems. The most effective used tracking technique is the monopulse tracking technique that...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:x0312;Ulūm va funūn-i niẓāmī. (Online) 2019-05, Vol.15 (47), p.103-124
Hauptverfasser: Jafar Khalilpur, bijan saedi, yaser ghafari lashkanari
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The making of modern radar systems using advanced radar techniques and the simultaneous implementation of modern and effective electronic protection capabilities is a serious threat to the electronic attack systems. The most effective used tracking technique is the monopulse tracking technique that most radar systems, including S-300, S-400, Patriot and etc. are currently using this method. The inherent properties of this kind of tracking technique, along with electronic protection techniques such as ARGPO, phase array, frequency agility, etc., have made it a major challenge for electronic attack systems. This has led to a number of electronic warfare articles and articles that cover various types of electronic attack techniques affecting monopulse radar and various analyzes. Each of these electronic attack techniques is based on structural radar weaknesses or by inspiration from physical phenomena such as glint and multi-paths. In this paper, a variety of tracking techniques are introduced first and then the monopulse tracking technique is investigated. Further, with regard to the strengths and weaknesses of the monopulse radar detector, various types of electronic attack techniques that can affect the performance of the monopulse radar are expressed. First, the technique of cross-polarization jamming, and then expandable and towed decoys are introduced and, at the end of the cross-eye jamming technique, is introduced. In each section, after the electronic attack technique is described, advantages and disadvantages are also presented. It should be noted that the implementation and application of the exact and appropriate technique will affect the outcome very much.
ISSN:2008-191X
2676-4520
DOI:10.22034/qjmst.2019.36042