METHOD AND APPARATUS FOR DETECTING AND JAMMING TRANSMITTERS AND RECEIVERS
20210281354 · 2021-09-09
Assignee
Inventors
Cpc classification
H04K3/45
ELECTRICITY
H04K3/42
ELECTRICITY
H04K3/44
ELECTRICITY
H04K3/90
ELECTRICITY
International classification
Abstract
A method to detect and jars an electromagnetic transmission includes detecting electromagnetic radiation from an electromagnetic radiating source, determining the type of the received electromagnetic radiation by comparing the signature of the received signal with signatures from a database, selecting the waveform and frequency to disturb the determined type, and transmitting a waveform with a frequency to jam the electromagnetic transmission. A system to jam an electromagnetic transmission is also provided.
Claims
1. A method to automatic detect and jam an electromagnetic transmission comprising the following steps; detecting electromagnetic radiation from an electromagnetic radiating source, determining the type of the received electromagnetic radiation by comparing the signature of the received signal with signatures from a database, selecting the waveform and frequency to disturb the determined type, transmit a waveform with a frequency to jam the electromagnetic transmission.
2. A method to detect and jam an electromagnetic transmission according to claim 1, wherein the waveform and frequency to disturb the electromagnetic transmission are selected from a database.
3. A method to detect and jam an electromagnetic transmission according to claim 1, wherein the waveform and frequency to disturb the electromagnetic transmission are selected so that the frequency is identical to the detected frequency and that the waveform is white noise.
4. A method to detect and jam an electromagnetic transmission according to claim 1, wherein the waveform and frequency to disturb the electromagnetic transmission are selected so that the frequency is identical to the detected frequency and that the waveform is Gaussian noise.
5. A method to detect and jam an electromagnetic transmission according to claim 1, wherein the geographic location of the wireless device is determined.
6. A method to detect and jam an electromagnetic transmission according to claim 5, wherein the geographic location of the wireless device is determined by measuring the highest received signal power of the electromagnetic transmission.
7. A method to detect and jam an electromagnetic transmission according to claim 1, wherein information about the target wireless device is presented in a man-machine-interface display.
8. A method to detect and jam an electromagnetic transmission according to claim 1, wherein it is determined how to battle an unknown target by using the detected information of the target to deduce type of transmission protocol and type of device and decide appropriate jamming technique depending upon the type of transmission protocol and type of device.
9. A system for detecting and jamming an electromagnetic transmission wherein means are arranged to detect electromagnetic radiation from an electromagnetic radiating source, and where the type of the received electromagnetic radiation is determined in the system by comparing the signature of the received signal with signatures from a database, and where the waveform and frequency to disturb the determined type of the received electromagnetic radiation is selected, and a waveform is transmitted with a frequency to jam the electromagnetic transmission.
10. A system for detecting and jamming an electromagnetic transmission according to claim 9, wherein the means to detect electromagnetic radiation is at least one antenna.
11. A system for detecting and jamming an electromagnetic transmission according to claim 9, wherein the means to detect electromagnetic radiation is at least one D-dot sensor.
12. A system for detecting and jamming an electromagnetic transmission according to claim 9, wherein the means to detect electromagnetic radiation is at least one B-dot sensor.
13. A system for detecting and jamming an electromagnetic transmission according to claim 10, wherein system to detect and jam an electromagnetic transmission comprises at least two antennas and that the main lobes of each of the antennas are arranged to not coincide.
14. A system to detect and jam an electromagnetic transmission according to claim 13, wherein system to detect and jam an electromagnetic transmission comprises three antennas and that the main lobes of each of the three antennas are arranged to be perpendicular to each other.
15. A method to automatic detect and jam an electromagnetic transmission comprising the following steps; detecting electromagnetic radiation from an electromagnetic radiating source, receiving the detected electromagnetic radiation, storing the received electromagnetic radiation signal, transferring the stored electromagnetic radiation signal to a machine learning function, classifying and/or identifying the detected electromagnetic radiation signal with a machine learning function, selecting a waveform and frequency to be used to disturb the electromagnet radiation source, transmitting a waveform with at least one frequency as selected to jam the electromagnetic transmission.
Description
BRIEF DESCRIPTION OF FIGURES
[0052] The invention is described in more detail below with reference to the attached figures, in which:
[0053]
[0054]
[0055]
[0056]
[0057]
[0058]
DETAILED DESCRIPTION
[0059] The present invention, hereafter named the detection and transmission system 10, relates to a man-portable or platform carried device in principle depicted in
[0060] Step 1—detection 1. The detection and transmission system receives electromagnetic radiation from a transmitter. The frequency, polarization, modulation type etc. of the received radiation is stored to be used later in the sequence.
[0061] Step 2—location 2. The detection and transmission system determine the geographic location 2 of the wireless device. This can be attained in different ways, but to make the explanation simple, assuming a sample embodiment with one antenna. The detection and transmission system will, in this simplified explanation, measure signal strength towards the transmitter at the same time the direction of the transmission and detection system is changing. For an antenna with directivity, the direction along the main lobe of the antenna with highest received signal power will also be the direction towards the transmitter. Other embodiments, with more than one antenna might also use location techniques described in prior art.
[0062] Step 3—compare with database 3. The information gathered in Step 1 is used to find a match between collected information in Step 1 and á priori information about known signalling systems contained in the transmission and reception system's database. What is described as one database above essentially consists of or comprises several layers of information. The system is configured as shown in
[0063] A generally applicable solution to determine the characteristics of the detected wireless communication system is to use Machine Learning technologies, like Deep Learning. This approach can even avoid the need for a conventional threat database and rely on training of one or more neuronal nets for identification and classification of the wireless communication system. The neuronal nets can in one embodiment be directed towards frequency intervals to be analysed by conventional spectrum power density scanning, or similar techniques. Machine Learning techniques is also applied to determine the measures to take against the target by the transmission and reception system. This approach is applicable against all types of wireless communication systems, not just the ones where a priori information is available, but also for wireless communications systems with unknown characteristics, possible to incorporate in e.g. SDR radio.
[0064] In order to suppress as much unwanted communication as possible, an automatic procedure to apply disturbing measures without the delay of man-in-the-loop is needed for the transmission and reception system. The transmission and reception system will thus rely on pre-determined rules of engagement from the operator and post-engagement information to the operator.
[0065] Step 4—select 4. When one or more match occurs, the full information record about the assumed detected target system(s) are retrieved from the database by selection or classification. If only one system is detected, then it is a match. If the detected emission is ambiguous, the database information of the now shortlisted systems contributes with information of what to specifically search for in the detection phase in order to finally determine the type of detected target. In this step, also other type of information about the target is collected, e.g. the identity of a specific cellular phone. If no match occurs, the target is assumed to be an unknown wireless system and a new record in the database is added and the detected information about the target wireless device is fed into the record.
[0066] Step 5—how to battle target 5. In case no record exists, for a new unknown target wireless device, the detection and transmission system will have to make a best guess. In this case, the transmission and detection system will use the detected information of the target to deduce type of transmission protocol etc. and device an appropriate jamming technique out of this.
[0067] Step 6—present information 6. The information about the target wireless device is presented, more or less extensively dependent on user settings, to the user, through the man-machine-interface display 104. The user might also through the hand grip and control device 104 command the transmission and detection system to take measures against the target wireless device.
[0068] Step 7—jam connection 7. If allowed to do so, by user command, the transmission and detection system will jam the target wireless device by transmitting an electromagnetic jamming signal from the transmission and detection system. The procedure and measures to battle the target is also retrieved from the database record for this particular target wireless device. In some cases, it is not the location where the transmitter is positioned which is to be jammed, but another object which is radio controlled by the transmitter, e.g. remotely controlled drone.
[0069] In this conception of jamming, also deceptive signalling, intended to send false information to one or more of the detected wireless devices is included. Deceptive signalling can for example be used to deceive a satellite navigation system. A typical example is when trying to stop a sophisticated aerial drone. If the remote-control link to the drone is jammed, in some cases the drone will still be flying according to its pre-programmed flight path. The invented system will thus mimic the satellite navigation signal, for instance by repeating the original satellite signal with a delay at a higher power level than the legitimate signal to the aerial drone. The result will be that the satellite receiver in the drone will be offset from its real geographical position and will hence fly in a different direction or altitude than the pre-programmed one.
[0070] The detection and transmission system will radio-wise operate in two functional modes. A first mode, a listening only mode, and a second mode, an alternating listening and jamming mode. The latter mode, the second mode, makes it possible to jam frequency hopping wireless devices or other devices with varying frequency, amplitude etc. A third jamming mode is also possible when the detection and transmission system transmit a jamming signal.
[0071] The system uses SDR both for reception and transmission. At least one antenna is incorporated in the platform. In different embodiments of the invention the antennas could be used in any combination for transmission and reception.
[0072] The information collection is undertaken by several built-in electromagnetic sensors, such as antennas. One or more broadband antennas connected to one or more SDR collect information from the electromagnetic spectrum where the SDR operate (AOA or similar for direction. Range from RSS or similar). A satellite navigation (satnav) (e.g. GPS, GLONASS or GALILEO) receiver together with inertial navigation system (INS) supply full 6 degrees of freedom (6-DOF) position and orientation data of the system. A man-machine interface (MMI) supply user input and system output, either directly or through a data link from another MMI. The detection and transmission system might in one embodiment advice the user how to move (direct) the detection and transmission system in order to improve system performance.
[0073] An INS system in this text is a navigation “black box” with motion sensors (accelerometers), rotation sensors (gyroscopes) and a computing capacity to continuously calculate, through dead reckoning or other means, the position, orientation, and velocity (direction and speed of movement) without the need for external references.
[0074] The 6-DOF in this text refer to the freedom of movement of a rigid body in three-dimensional space, as the body is free to change position as forward/backward, up/down; left/right translation in three perpendicular axes, combined with changes in orientation through rotation about three perpendicular axes, often termed pitch, yaw, and roll.
[0075] An MMI in this text is a hardware and/or software which allows the operator to control and monitor the machine functions, e.g. a touch screen display.
[0076] Computing of information is undertaken at several levels of abstraction. This is shown in
[0077]
[0078] A higher level of abstraction of information computing occurs when merging data from the radio sensors with the 6-DOF navigational data from the satnav-INS sensors. Calculated at an adjustable pace, this information at each sample time gives the estimated relative position of the detection and transmission system and the targeted wireless device. As the detection and transmission system is moved, the radio sensors will supply different information of angle and/or range to the target. This information is collected and when the information is fusioned, or in another way aggregates, it will provide an improved position solution.
[0079] To the information fusion described above is also geographical information in 2 dimensions and/or 3 dimensions added in order to supply an absolute geographic position of the target wireless device.
[0080] In one embodiment, the detection and transmission system also contains a database over possible types of radio transmitters and information of their characteristics (e.g. used frequency, waveform, known users etc.) as shown in
[0081] If no prior knowledge exists for a detected wireless device the collected information is a) stored in a database for later data processing/transfer and b) the detection and transmission system uses the collected information together with pre-stored information in the database to make a best guess about the wireless device and how to jam it.
[0082] The information can be presented, on/in the MMI, in a number of ways, e.g. as circular coloured uncertain zones centred on each targeted wireless device, showing the estimated position and its position uncertainty superimposed on a map (illustrated in
[0083] The collected data might be combined with á priori data in order to give information about one or more wireless devices. E.g. a specific cellular phone can be marked, followed and jammed. Another example is when a certain type of wireless device is known to belong to a special military unit, and that information will thus be presented to the user if such a wireless device is detected.
[0084] The level of detail presented through the MMI is user adjustable and span from very detailed information to an automatic target engagement mode. In this mode, all wireless devices determined as hostile by the system, will be blocked, jammed or interfered
[0085] An example of the usage of the automatic mode is when the detection and transmission system detects and classifies the transmission of an incoming artillery proximity fuse used by artillery shells to achieve airburst. It is then of uttermost importance to instantly start jamming the fuse in order to prevent the shell from detonating in the air, without delay of man-in-the-loop procedures.
[0086] The detection and transmission system will rely on sophisticated jamming, rather than the simple single carrier frequency jammer. It will utilize the ability of the SDR to produce an arbitrary waveform and be adaptive to the type of communication to interrupt or deceive the communication. The specific jamming to employ against a certain wireless device is either to find in a look-up database where known communication systems and a pre-determined way to jam the communication systems is stored, or calculated/decided by the detection and transmission system in an intelligent manner against unknown types of communication. The capability to calculate and/or decide the way to jam the communication system are being increasingly likely to be used in the future, as SDR, with the ability to rapidly switch radio communication parameters drastically is growing, especially for military applications.
[0087] Noteworthy is that in one embodiment of the invention the detection and transmission system will have the ability to “hijack” the original transmission to the wireless device, by overwhelming the original external signal with an almost similar transmission, but with higher radiated power at the wireless device than the original external signal, and substitute the original message with other information to be determined by the detection and transmission system user.
[0088] One major hurdle to overcome for a wideband transmitter is the ability to efficiently transfer electrical power to radiated power on all frequencies, due to mismatch at the antenna feed. This is caused by widely different impedances of the feed and the antenna at some frequencies. Reconfigurable or smart antennas can be used in some embodiment of the invention, offering it better electrical to radiated power ratio over the whole working frequency range, as compared with an un-configurable antenna.
[0089] Reconfigurable antenna is an antenna type capable of dynamically modifying its frequency and radiation properties in a controlled and reversible manner. Reconfigurable antennas integrate an inner mechanism (e.g. varactors, RF switches, mechanical actuators etc.) which allow adjustment of the RF currents over the antenna surface and generate reversible modifications of its properties. Reconfigurable antennas differ from smart antennas since the reconfiguration mechanism is placed within the antenna rather than in an external beamforming network.
[0090] In one embodiment of the invention the one or more antennas have intentionally been given a small voltage standing wave ratio (WSWR) in one or a few picked or selected frequencies, thus being considered to be resonant frequencies. Hence enabling good reception and transmission ability for those specific frequencies. Other frequencies will not be considered resonant, even if they might still be usable, however with lower electrical to radiated power ratio.
[0091] It is often beneficial, especially in the military context, to be non-radiating. The detection and transmission system is thus for its basic operation not relying on being wirelessly linked to one or more network nodes. In one embodiment of the invention the ability to communicate with other detection and transmission systems and/or a communication network is however added, thus giving the detection and transmission system the ability to transmit and receive information in real-time. This might be, but is not restricted to, target bearings, software updates and collaboration tactics between two or more detection and transmission systems.
[0092] In another embodiment of the detection and transmission system it can also be used as a radar system. By using the ability to transmit and receive in a short timeframe the system is able to detect objects on water, land and in the air. Moving targets can be detected through doppler measurement. These abilities are achieved through software in the detection and transmission system. Examples on usage is detecting and predicting where inbound artillery shells will hit and target location of sea vessels from land in darkness.
[0093] In a typical scenario, the detection and transmission system is first activated in a listening mode. It will then monitor all frequencies within its operational frequency range. When a transmission from a wireless device is detected the system will gather all information about the wireless device the detection and transmission system is capable of retrieving. What parameters to collect is dependent upon embodiment of the invention. Frequency (or frequencies) used is mandatory. Other parameters to be measured, dependent upon embodiment, are wave forms, polarization, modulation, bit rates etc.
[0094] The detection and transmission system determine the geographic location of the transmitter. In order to make the explanation simple, assuming a sample embodiment with one antenna. The detection and transmission system measure signal strength towards the transmitter at the same time the direction of the transmission and detection system is changed. For an antenna with directivity, the direction along the main lobe of the antenna with highest received signal power will also be the direction towards the transmitter. Other embodiments, with more than one antenna might also use location techniques described in prior art.
[0095] The information gathered in listening mode is used to find a match between collected information and á priori information about known signalling systems contained in the transmission and reception system's database. When one or more match occurs, the full information record about the assumed detected target system is retrieved from the database. If only one system is detected, then it is a match. If the detected emission is ambiguous, the database information of the now shortlisted systems contributes with information of what to specifically search for in the detection phase in order to finally determine the type of detected target. Other type of information about the target is also collected, e.g. the identity of a specific cellular phone, as shown in
[0096] For an unknown target wireless device, the system will have to make a best estimate. In this case, the transmission and detection system will use the detected information of the target to deduce type of transmission protocol etc. and calculate an appropriate jamming technique out of this. Machine learning techniques, like Deep Learning, where a trained neuronal net is fed with the input signal, e.g. I and Q channels, and feed directives to the SDR how to jam the target wireless device.
[0097] The information about the target wireless device is presented, more or less extensively dependent on user settings, to the user, through the man-machine-interface 102. The user might also through the control device 104 order the transmission and detection system to jam the target wireless device.
[0098] The procedure and measures to jam the target is also retrieved from the database record for a particular target wireless device. In some cases however, it is not the location where the transmitter is positioned at which the jamming effort is directed, but another object which is radio controlled by the transmitter, e.g. a remotely controlled drone.
[0099] The invention is not limited to the particular embodiments shown but can be varied in different ways within the scope of the patent claims. For example the number of antennas, used frequency etc. could be varied. The invention is neither limited to radio communications but could be used for other electromagnetic or other communication such as optical, audio etc., audio etc.