{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:24:25Z","timestamp":1766298265540,"version":"3.41.2"},"reference-count":38,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"vor","delay-in-days":96,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Deceptive jamming is a popular electronic countermeasure (ECM) technique that generates false targets to confuse opponent surveillance radars. This work presents a novel approach for hiding the actual target while producing multiple false targets at the same time against frequency diverse array (FDA) radar. For this purpose, the modified FDA radar is assumed to be mounted on the actual aircraft. It intercepts the opponent\u2019s radar signals and transmits back to place nulls in the radiation pattern at the desired range and direction to exploit FDA radar\u2019s range\u2010dependent pattern nulling capability. The proposed deceptive jammer produces delayed versions of the intercepted signals to create false targets with multiple ranges to confuse the opponent\u2019s radar system. The novel mathematical model is proposed whose effectiveness is verified through several simulation results for different numbers of ranges, directions, and antenna elements.<\/jats:p>","DOI":"10.1155\/2021\/8844630","type":"journal-article","created":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T23:39:49Z","timestamp":1617838789000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Novel Deceptive Jamming Approach for Hiding Actual Target and Generating False Targets"],"prefix":"10.1155","volume":"2021","author":[{"given":"Shahid","family":"Mehmood","sequence":"first","affiliation":[]},{"given":"Aqdas Naveed","family":"Malik","sequence":"additional","affiliation":[]},{"given":"Ijaz Manssor","family":"Qureshi","sequence":"additional","affiliation":[]},{"given":"Muhammad Zafar Ullah","family":"Khan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1604-7842","authenticated-orcid":false,"given":"Fawad","family":"Zaman","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,4,7]]},"reference":[{"key":"e_1_2_14_1_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-40619-6_2"},{"key":"e_1_2_14_2_2","doi-asserted-by":"crossref","unstructured":"Yan-JuanY. FengZ. Xiao-FengA. Xiao-BinL. andXuZ.-F. A study on effectiveness modeling of multi-false-target jamming 2016 CIE International Conference on Radar (RADAR) 2016 Guangzhou China 1\u20135 https:\/\/doi.org\/10.1109\/radar.2016.8059369 2-s2.0-85034653797.","DOI":"10.1109\/RADAR.2016.8059369"},{"key":"e_1_2_14_3_2","unstructured":"FarinaA.andSkolnikM. Electronic counter-countermeasures Radar handbook 2 2008 McGraw-Hill Education."},{"key":"e_1_2_14_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/7.395232"},{"key":"e_1_2_14_5_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13634-016-0403-6"},{"key":"e_1_2_14_6_2","doi-asserted-by":"publisher","DOI":"10.2528\/PIERL19121005"},{"key":"e_1_2_14_7_2","first-page":"53","article-title":"The study of barrage-type jamming for SAR","volume":"16","author":"Zhao F. H.","year":"2007","journal-title":"Wireless Communication Technology"},{"key":"e_1_2_14_8_2","doi-asserted-by":"crossref","unstructured":"SchuergerJ.andGarmatyukD. Deception jamming modeling in radar sensor networks MILCOM 2008 - 2008 IEEE Military Communications Conference 2008 San Diego CA USA 1\u20137 https:\/\/doi.org\/10.1109\/milcom.2008.4753118 2-s2.0-78650420977.","DOI":"10.1109\/MILCOM.2008.4753118"},{"key":"e_1_2_14_9_2","doi-asserted-by":"crossref","unstructured":"LiY. GaohuanL. andHuilianC. The study of multi-false targets deception against stepped-frequency waveform inverse synthetic aperture radar 2008 9th International Conference on Signal Processing 2008 Beijing China 2481\u20132484 https:\/\/doi.org\/10.1109\/icosp.2008.4697652 2-s2.0-67249105771.","DOI":"10.1109\/ICOSP.2008.4697652"},{"key":"e_1_2_14_10_2","unstructured":"LeeY. J. ParkJ. R. ShinW. H. LeeK. I. andKangH. C. A study on jamming performance evaluation of noise and deception jammer against SAR satellite 2011 3rd International Asia-Pacific Conference on Synthetic Aperture Radar (APSAR) 2011 Seoul Korea (South) 1\u20133."},{"key":"e_1_2_14_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2980010"},{"key":"e_1_2_14_12_2","article-title":"The analysis of moving targets deceptive jamming model to SAR","volume":"1","author":"ZHU S.","year":"2012","journal-title":"Electronic Information Warfare Technology"},{"key":"e_1_2_14_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2013.2259178"},{"key":"e_1_2_14_14_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-rsn.2013.0341"},{"key":"e_1_2_14_15_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-rsn.2013.0222"},{"key":"e_1_2_14_16_2","doi-asserted-by":"crossref","unstructured":"YanX. LiY. LiP. andWangJ. Multiple time-delay smart deception jamming to pseudo-random code phase modulation fuze 2012 International Conference on Computer Distributed Control and Intelligent Environmental Monitoring 2012 Zhangjiajie China 428\u2013432 https:\/\/doi.org\/10.1109\/cdciem.2012.108 2-s2.0-84860522922.","DOI":"10.1109\/CDCIEM.2012.108"},{"key":"e_1_2_14_17_2","doi-asserted-by":"crossref","unstructured":"Shi-ruiP. Yong-chunL. XinL. andDongW.-f. Study on target pose and deception jamming to ISAR 2009 2nd Asian-Pacific Conference on Synthetic Aperture Radar 2009 Xi\u2032an China 526\u2013530 https:\/\/doi.org\/10.1109\/apsar.2009.5374230 2-s2.0-77949632795.","DOI":"10.1109\/APSAR.2009.5374230"},{"key":"e_1_2_14_18_2","doi-asserted-by":"crossref","unstructured":"ZongZ. HuangL. WangH. HuangL. andShuZ. Micro-motion deception jamming on Sar using frequency diverse array IGARSS 2019 - 2019 IEEE International Geoscience and Remote Sensing Symposium 2019 Yokohama Japan 2391\u20132394 https:\/\/doi.org\/10.1109\/igarss.2019.8898721.","DOI":"10.1109\/IGARSS.2019.8898721"},{"key":"e_1_2_14_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/jsen.2014.2368985"},{"key":"e_1_2_14_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2014.2323978"},{"key":"e_1_2_14_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/jsen.2015.2503419"},{"key":"e_1_2_14_22_2","first-page":"2501","article-title":"ISAR decoy generation by utilizing coherent multiplication modulated jamming","volume":"42","author":"Feng L. X. D.","year":"2014","journal-title":"Acta Electronica Sinica"},{"key":"e_1_2_14_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2017.2670958"},{"key":"e_1_2_14_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2792477"},{"key":"e_1_2_14_25_2","doi-asserted-by":"crossref","unstructured":"AntonikP. WicksM. C. GriffithsH. D. andBakerC. J. Frequency diverse array radars 2006 IEEE Conference on Radar 2006 Verona NY USA https:\/\/doi.org\/10.1109\/radar.2006.1631800 2-s2.0-71849095586.","DOI":"10.1109\/RADAR.2006.1631800"},{"key":"e_1_2_14_26_2","doi-asserted-by":"crossref","unstructured":"AntonikP. WicksM. C. GriffithsH. D. andBakerC. J. Multi-mission multi-mode waveform diversity 2006 IEEE Conference on Radar 2006 Verona NY USA https:\/\/doi.org\/10.1109\/radar.2006.1631858 2-s2.0-71849116317.","DOI":"10.1109\/RADAR.2006.1631858"},{"key":"e_1_2_14_27_2","unstructured":"AntonikP.andWicksM. C. Method and apparatus for simultaneous synthetic aperture radar and moving target indication US Patent 8 803 732 2014."},{"key":"e_1_2_14_28_2","doi-asserted-by":"crossref","unstructured":"AntonikP. WicksM. C. GriffithsH. D. andBakerC. J. Range-dependent beamforming using element level waveform diversity 2006 International Waveform Diversity & Design Conference 2006 Lihue HI USA 1\u20136 https:\/\/doi.org\/10.1109\/wdd.2006.8321488 2-s2.0-85050952666.","DOI":"10.1109\/WDD.2006.8321488"},{"key":"e_1_2_14_29_2","doi-asserted-by":"crossref","unstructured":"SecmenM. DemirS. HizalA. andEkerT. Frequency diverse array antenna with periodic time modulated pattern in range and angle 2007 IEEE Radar Conference 2007 Waltham MA USA 427\u2013430 https:\/\/doi.org\/10.1109\/RADAR.2007.374254 2-s2.0-34548830701.","DOI":"10.1109\/RADAR.2007.374254"},{"key":"e_1_2_14_30_2","doi-asserted-by":"crossref","unstructured":"SammartinoP. F. BakerC. J. andGriffithsH. D. Frequency diverse MIMO techniques for radar IEEE Transactions on Aerospace and Electronic Systems2013 49 no. 1 201\u2013222 https:\/\/doi.org\/10.1109\/TAES.2013.6404099 2-s2.0-84872294029.","DOI":"10.1109\/TAES.2013.6404099"},{"key":"e_1_2_14_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2013.2260515"},{"key":"e_1_2_14_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/MAP.2015.2414692"},{"key":"e_1_2_14_33_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-rsn.2015.0464"},{"key":"e_1_2_14_34_2","doi-asserted-by":"crossref","unstructured":"ZhuY. WangH. ZhangS. ZhengZ. andWangW. Deceptive jamming on space-borne SAR using frequency diverse array IGARSS 2018 - 2018 IEEE International Geoscience and Remote Sensing Symposium 2018 Valencia Spain 605\u2013608 https:\/\/doi.org\/10.1109\/IGARSS.2018.8518451 2-s2.0-85063162015.","DOI":"10.1109\/IGARSS.2018.8518451"},{"key":"e_1_2_14_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/lgrs.2019.2950454"},{"key":"e_1_2_14_36_2","doi-asserted-by":"crossref","unstructured":"MaoW. WangH. ZhangS. andLiuX. A novel deceptive jamming method via frequency diverse array IGARSS 2019 - 2019 IEEE International Geoscience and Remote Sensing Symposium 2019 Yokohama Japan 2369\u20132372 https:\/\/doi.org\/10.1109\/IGARSS.2019.8897840.","DOI":"10.1109\/IGARSS.2019.8897840"},{"key":"e_1_2_14_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2963042"},{"key":"e_1_2_14_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2979942"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/8844630.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/8844630.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/8844630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T11:16:57Z","timestamp":1723029417000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/8844630"}},"subtitle":[],"editor":[{"given":"Cong","family":"Pu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/8844630"],"URL":"https:\/\/doi.org\/10.1155\/2021\/8844630","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2020-08-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-03-24","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8844630"}}