Military Communications and Information Technology: A Trusted ...
Military Communications and Information Technology: A Trusted ... Military Communications and Information Technology: A Trusted ...
80 Military Communications and Information Technology... User interface of the jammer enables to program frequency bands for jamming and friendly communication. Controller of the counter RCIED jamming system is responsible for programming a jammer block in a reactive jamming mode. Jamming decision is taken based on data from tuners. Expected emission identification parameters: • emission detection range – several km (depending on the radiated power of trigger transmitter); • scan time of frequency range 26 MHz ÷2,6 GHz below 50 ms; • frequency resolution: better than 25 kHz for VHF and 100 kHz for UHF; • maximum reaction delay between detected incoming signal and jamming transmission beginning should be below 100 ms. VI. Summary In this paper some aspects which influence on detection and jamming parts of RCIED countermeasure system was discussed. A conception of a model RCIED jamming system was proposed to overcome some of the pointed difficulties. Results from counter RCIED project would be taken into account in newly developed applications and EW systems created in MCI. Limitations which arise from specific IED operation and profile of mobile jamming sets result in a lot of restrictions that have influenced on construction of C-RCIED devices, detection and jamming methods. Compact size and restricted power source cause that the device provides a limited area of protection. Mobility of a vehicle and diversity of possible signals sources cause inability of exploitation more sophisticated methods for emission detection and identification in order to provide faster response to possible threat. Placing the receiver near the transmitter impairs the effectiveness of detection of hostile transmissions. To improve detection and jamming performance, it is planned creation a cooperative network of several receivers and jammers placed apart. Such system allows to mitigate an effect of hiding small signals in interference phenomenon and noise background and could combat effect of fading, caused by ground reflections. Transmitters working in a network can attack the same emissions (extend coverage) or react to different frequencies simultaneously combating multi-frequency triggering. Receivers which scan in a network can achieve higher probability of detection (cooperative detection) or faster scanning rate in case of independent scanning adjacent frequency ranges. Physical separation of receivers from transmitters (one vehicle perform scanning other jamming) lead to better sensitivity and extend range of detection. For data transmission between network elements, nonstandard wireless connections or infrared technology should be used.
Chapter 1: Concepts and Solutions for Communications and Information Systems 81 REFERENCES [1] K. Wilgucki, R. Urban, G. Baranowski, P. Grądzki, P. Skarżyński, „Automated protection system against RCIED”, MCC2011. [2] https://www.jieddo.dod.mil/content/docs/JIEDDO_2010_Annual_Report_U.pdf [3] Improvised Explosive Device Defeat FMI 3-34.119/MCIP 3-17.01. [4] R.A. Poisel, “Modern Communications Jamming Principles and Techniques”, Second Edition, Artech House, Inc., 2011. [5] D.L. Adamy, “Tactical Battlefield Communications Electronic Warfare”, Artech House, Inc., 2009 pp. 251-306. [6] A. Graham, “Communications, Radar and Electronic Warfare”, John Willey & Sons, Inc., 2011, pp. 137-144, 357-363. [7] M. Dapper, J.S.Wells, T. Schwaillie, L. Huon, “RF propagation in short range sensor communications”. [8] B. Piette, “VHF/UHF Filters and Multicouplers”, John Willey & Sons, Inc., 2010. [9] G. Baranowski, R. Urban, K. Wilgucki, „Detekcja emisji FH na podstawie analizy czasowo-częstotliwościowej widma”, Przegląd Telekomunikacyjny, 8-9/2011. [10] http://srcinc.com/uploadedFiles/src/what-we-do/CREW_Duke.pdf
- Page 29 and 30: Chapter 1: Concepts and Solutions f
- Page 31 and 32: Chapter 1: Concepts and Solutions f
- Page 33 and 34: Chapter 1: Concepts and Solutions f
- Page 35 and 36: Chapter 1: Concepts and Solutions f
- Page 37 and 38: Openness in Military Systems Jessic
- Page 39 and 40: Chapter 1: Concepts and Solutions f
- Page 41 and 42: Chapter 1: Concepts and Solutions f
- Page 43 and 44: Chapter 1: Concepts and Solutions f
- Page 45 and 46: Chapter 1: Concepts and Solutions f
- Page 47 and 48: Chapter 1: Concepts and Solutions f
- Page 49 and 50: The Concept of Integration Tool for
- Page 51 and 52: Chapter 1: Concepts and Solutions f
- Page 53 and 54: Chapter 1: Concepts and Solutions f
- Page 55 and 56: Chapter 1: Concepts and Solutions f
- Page 57 and 58: Chapter 1: Concepts and Solutions f
- Page 59 and 60: Chapter 1: Concepts and Solutions f
- Page 61 and 62: CFBLNet: A Coalition Capability Ena
- Page 63 and 64: Chapter 1: Concepts and Solutions f
- Page 65 and 66: Chapter 1: Concepts and Solutions f
- Page 67 and 68: Chapter 1: Concepts and Solutions f
- Page 69 and 70: Chapter 1: Concepts and Solutions f
- Page 71 and 72: Selected Aspects of Effective RCIED
- Page 73 and 74: Chapter 1: Concepts and Solutions f
- Page 75 and 76: Chapter 1: Concepts and Solutions f
- Page 77 and 78: Chapter 1: Concepts and Solutions f
- Page 79: Chapter 1: Concepts and Solutions f
- Page 84 and 85: 84 Military Communications and Info
- Page 86 and 87: 86 Military Communications and Info
- Page 88 and 89: 88 Military Communications and Info
- Page 90 and 91: 90 Military Communications and Info
- Page 92 and 93: 92 Military Communications and Info
- Page 94 and 95: 94 Military Communications and Info
- Page 96 and 97: 96 Military Communications and Info
- Page 98 and 99: 98 Military Communications and Info
- Page 100 and 101: 100 Military Communications and Inf
- Page 103: Chapter 2 Communications and Inform
- Page 106 and 107: 106 Military Communications and Inf
- Page 108 and 109: 108 Military Communications and Inf
- Page 110 and 111: 110 Military Communications and Inf
- Page 112 and 113: 112 Military Communications and Inf
- Page 114 and 115: 114 Military Communications and Inf
- Page 116 and 117: 116 Military Communications and Inf
- Page 118 and 119: 118 Military Communications and Inf
- Page 120 and 121: 120 Military Communications and Inf
- Page 122 and 123: 122 Military Communications and Inf
- Page 124 and 125: 124 Military Communications and Inf
- Page 126 and 127: 126 Military Communications and Inf
- Page 128 and 129: 128 Military Communications and Inf
80 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
User interface of the jammer enables to program frequency b<strong>and</strong>s for jamming<br />
<strong>and</strong> friendly communication. Controller of the counter RCIED jamming<br />
system is responsible for programming a jammer block in a reactive jamming<br />
mode. Jamming decision is taken based on data from tuners. Expected emission<br />
identification parameters:<br />
• emission detection range – several km (depending on the radiated power<br />
of trigger transmitter);<br />
• scan time of frequency range 26 MHz ÷2,6 GHz below 50 ms;<br />
• frequency resolution: better than 25 kHz for VHF <strong>and</strong> 100 kHz for UHF;<br />
• maximum reaction delay between detected incoming signal <strong>and</strong> jamming<br />
transmission beginning should be below 100 ms.<br />
VI. Summary<br />
In this paper some aspects which influence on detection <strong>and</strong> jamming parts<br />
of RCIED countermeasure system was discussed. A conception of a model RCIED<br />
jamming system was proposed to overcome some of the pointed difficulties. Results<br />
from counter RCIED project would be taken into account in newly developed applications<br />
<strong>and</strong> EW systems created in MCI.<br />
Limitations which arise from specific IED operation <strong>and</strong> profile of mobile<br />
jamming sets result in a lot of restrictions that have influenced on construction<br />
of C-RCIED devices, detection <strong>and</strong> jamming methods. Compact size <strong>and</strong> restricted<br />
power source cause that the device provides a limited area of protection. Mobility<br />
of a vehicle <strong>and</strong> diversity of possible signals sources cause inability of exploitation<br />
more sophisticated methods for emission detection <strong>and</strong> identification in order to<br />
provide faster response to possible threat. Placing the receiver near the transmitter<br />
impairs the effectiveness of detection of hostile transmissions.<br />
To improve detection <strong>and</strong> jamming performance, it is planned creation<br />
a cooperative network of several receivers <strong>and</strong> jammers placed apart. Such system<br />
allows to mitigate an effect of hiding small signals in interference phenomenon <strong>and</strong><br />
noise background <strong>and</strong> could combat effect of fading, caused by ground reflections.<br />
Transmitters working in a network can attack the same emissions (extend coverage)<br />
or react to different frequencies simultaneously combating multi-frequency triggering.<br />
Receivers which scan in a network can achieve higher probability of detection<br />
(cooperative detection) or faster scanning rate in case of independent scanning<br />
adjacent frequency ranges. Physical separation of receivers from transmitters (one<br />
vehicle perform scanning other jamming) lead to better sensitivity <strong>and</strong> extend<br />
range of detection. For data transmission between network elements, nonst<strong>and</strong>ard<br />
wireless connections or infrared technology should be used.