Evaluation method of penetrating jamming effectiveness for cognitive communication protection

In order to support the implementation of “multidimensional orthogonal configured communication protection between communication modules as well as parameters and interference” in cognitive communication countermeasures scenarios, jamming effectiveness requires module level responsiveness.A penetrat...

Full description

Saved in:
Bibliographic Details
Main Authors: Zhiguo SUN, Shuo XIAO, Yijie WU, Shiming LI, Zhenduo WANG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2023-11-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023195/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841540078941241344
author Zhiguo SUN
Shuo XIAO
Yijie WU
Shiming LI
Zhenduo WANG
author_facet Zhiguo SUN
Shuo XIAO
Yijie WU
Shiming LI
Zhenduo WANG
author_sort Zhiguo SUN
collection DOAJ
description In order to support the implementation of “multidimensional orthogonal configured communication protection between communication modules as well as parameters and interference” in cognitive communication countermeasures scenarios, jamming effectiveness requires module level responsiveness.A penetrating jamming effectiveness evaluation method was proposed.Firstly, the core parameters of each signal processing module were selected as evaluation parameters.Secondly, analytic hierarchy process (AHP) and entropy weight method (EWM) were used to determine the weight of indicators.The coordination problem in AHP was solved through expert weight allocation, and the weight allocation problem in EWM was solved through non-uniform mapping.Finally, the subjective and objective weights were weighed through game theory, and the jamming effectiveness was judged by the technique for order preference by similarity to ideal solution (TOPSIS).By conducting evaluation experiments on the jamming performance of the Link16 data link, taking into account multiple aspects such as jamming types, number of jamming frequencies, jamming duration, and system types.Experiment results demonstrate that the penetration-based jamming performance evaluation method not only provides a more intuitive representation of the relationship between evaluation results and metric parameters, but also possesses excellent jamming discrimination capability.
format Article
id doaj-art-dfc3e92cc65e4a27879430f9f0550355
institution Kabale University
issn 1000-436X
language zho
publishDate 2023-11-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-dfc3e92cc65e4a27879430f9f05503552025-01-14T06:28:16ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2023-11-014416117259389698Evaluation method of penetrating jamming effectiveness for cognitive communication protectionZhiguo SUNShuo XIAOYijie WUShiming LIZhenduo WANGIn order to support the implementation of “multidimensional orthogonal configured communication protection between communication modules as well as parameters and interference” in cognitive communication countermeasures scenarios, jamming effectiveness requires module level responsiveness.A penetrating jamming effectiveness evaluation method was proposed.Firstly, the core parameters of each signal processing module were selected as evaluation parameters.Secondly, analytic hierarchy process (AHP) and entropy weight method (EWM) were used to determine the weight of indicators.The coordination problem in AHP was solved through expert weight allocation, and the weight allocation problem in EWM was solved through non-uniform mapping.Finally, the subjective and objective weights were weighed through game theory, and the jamming effectiveness was judged by the technique for order preference by similarity to ideal solution (TOPSIS).By conducting evaluation experiments on the jamming performance of the Link16 data link, taking into account multiple aspects such as jamming types, number of jamming frequencies, jamming duration, and system types.Experiment results demonstrate that the penetration-based jamming performance evaluation method not only provides a more intuitive representation of the relationship between evaluation results and metric parameters, but also possesses excellent jamming discrimination capability.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023195/penetrating effectiveness evaluationcombination weightinggame theoryTOPSIS, jamming effectiveness evaluation
spellingShingle Zhiguo SUN
Shuo XIAO
Yijie WU
Shiming LI
Zhenduo WANG
Evaluation method of penetrating jamming effectiveness for cognitive communication protection
Tongxin xuebao
penetrating effectiveness evaluation
combination weighting
game theory
TOPSIS, jamming effectiveness evaluation
title Evaluation method of penetrating jamming effectiveness for cognitive communication protection
title_full Evaluation method of penetrating jamming effectiveness for cognitive communication protection
title_fullStr Evaluation method of penetrating jamming effectiveness for cognitive communication protection
title_full_unstemmed Evaluation method of penetrating jamming effectiveness for cognitive communication protection
title_short Evaluation method of penetrating jamming effectiveness for cognitive communication protection
title_sort evaluation method of penetrating jamming effectiveness for cognitive communication protection
topic penetrating effectiveness evaluation
combination weighting
game theory
TOPSIS, jamming effectiveness evaluation
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023195/
work_keys_str_mv AT zhiguosun evaluationmethodofpenetratingjammingeffectivenessforcognitivecommunicationprotection
AT shuoxiao evaluationmethodofpenetratingjammingeffectivenessforcognitivecommunicationprotection
AT yijiewu evaluationmethodofpenetratingjammingeffectivenessforcognitivecommunicationprotection
AT shimingli evaluationmethodofpenetratingjammingeffectivenessforcognitivecommunicationprotection
AT zhenduowang evaluationmethodofpenetratingjammingeffectivenessforcognitivecommunicationprotection