22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 1: Concepts <strong>and</strong> Solutions for <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> Systems<br />

75<br />

A coarse model for jamming effective range, that should be workable in any<br />

situation for the most of the world, is presented in [6]. Maximum effective range<br />

is given by<br />

where necessary jamming power P J is<br />

(2)<br />

P t – effective power output by the enemy transmitter;<br />

H J – elevation of jamming antenna above sea level;<br />

H t – elevation of enemy transmitter antenna above sea level;<br />

D J – jammer to receiver link distance in km;<br />

D t – enemy transmitter to receiver link distance in km;<br />

K – jammer tuning accuracy: 2 (for FM in VHF), 3 (for CW or AM in VHF);<br />

n – terrain <strong>and</strong> ground conductivity factor:<br />

5 – very rough terrain, poor conductivity;<br />

4 – moderately rough terrain, fair to good conductivity;<br />

3 – rolling hills, good conductivity;<br />

2 – level terrain, good conductivity.<br />

IV. Aspects of effective RCIED jamming<br />

As it was already mentioned, the trigger for RCIED can be both a mobile phone<br />

<strong>and</strong> modified remote control device for a child’s toy or other easily <strong>and</strong> cheaply<br />

available electronic gadget (fig. 1). All of those transmission systems can be jammed<br />

by suitable transmitters that can provide some protection around a vehicle or a patrol.<br />

The size of the protection zone depends on the JSR – relation of the jammer’s<br />

power to transmitted power of the device used to trigger the IED (1).<br />

Radio jamming not only prevents the remote detonation of RCIEDs but also<br />

obstructs the communication channels of terrorist or riot organizers. Unfortunately<br />

it can have influence on our own radio communications.<br />

Therefore it is important to design jammers which can leave ‘windows’ to<br />

enable friendly communications. Such intelligent, working in a reactive mode, jamming<br />

sets deployed on mobile platforms have already a few implementations, e.g.<br />

the Crew Duke [10] used by the U.S. Army.<br />

RCIED jamming is different from typical electronic warfare involving actions<br />

taken to impair the effectiveness of hostile electronic devices, equipment or systems.<br />

In military receiving equipment, in contrast to RCIEDs, are implemented ECCM<br />

(3)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!