A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric...
Transcript of A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric...
![Page 1: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/1.jpg)
A Methodology for Network-CentricElectronic Attack Evaluation
Paul Wang, Myron Greenbaum, Mitchell SparrowITT Industries, Avionics Division
Clifton, NJ 07450
Ken McKenzie, Ami PatelModern Technology Solutions, Inc
Alexandria, VA
NDIA T&E Summit24-27 February, 2003Victoria, BC, Canada
Modern Technology Solutions, Inc.
![Page 2: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/2.jpg)
Agenda
• Background
• Network Centric (NC) EA Evaluation Methodology
– ITT Network-Centric EA Model
– Extended Air Defense Simulation (EADSIM) Model
• Applications of NC-EA and EADSim Models
– Assessment of Jamming Effectiveness
– Re-alignment of Jamming Assets
– Trade Study of Radar Cross Sections
• Summary
Modern Technology Solutions, Inc.
![Page 3: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/3.jpg)
Network-Centric Electronic Warfare
• Network Centric Architecture:
– An operational architecture that closely couples the capabilitiesof sensors, command and control, and shooters to maximize theeffects of geographically dispersed resources in electronicwarfare
• Network Centric Electronic Attack:
– Optimum control and utilization of a network of dispersedelectronic attack (EA) assets to provide a wide area suppressionof enemy integrated air defenses (IADS) in a dynamic manner
Modern Technology Solutions, Inc.
![Page 4: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/4.jpg)
Network-Centric Electronic Attack Evaluation
• Evolution from Platform-Centric to Network-Centric (NC) EARequires New Methodology to Develop and Evaluate Systems:
– Uses NC-EA Simulator and EADSim Model
• ITT Interactive NC-EA Simulator
– Implements radar jamming equation
– Generates jamming effectiveness contour map in area of interest
– Allows selection of optimum EA for Stand-off, Stand-in, Escortand Close-in systems based on J/S contours and “protectedarea”
• Extended Air Defense Simulation (EADSim) Model
– Includes all IADS radars (3-D patterns) and detailed C2
– Uses NC-EA Simulator results to quantify jamming effectivenessin aircraft protection (reduction in number of missiles launched)
Modern Technology Solutions, Inc.
![Page 5: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/5.jpg)
NC-EA Elements (Notional)
Escort
Close-In
Close-In
Target
Missile
Fire ControlAquisition Stand-Off
Attack
Attack
Stand-Off
Modern Technology Solutions, Inc.
Stand-In
![Page 6: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/6.jpg)
ITT Interactive NC-EA Simulator
- Inputs:• IADS Laydown (Radar Locations)• Threat Radar Characteristics (ERP’s, Antenna Patterns,..)• Jamming Platform Locations• Jammer Characteristics (ERP’s, Allocations,…)• Attack Aircraft Flight Path• Attack Aircraft RCS
- Outputs:• Jam/Signal Ratio Contour Plots
- One-on-One: One jammer vs one radar - Composite: “N” jammers vs “M” radars
• Percentage of “Blue Zone” in Area of Interest
• 1 NM x 1 NM Cell Resolution illustrating Mainbeam Effect in Support Jamming
Modern Technology Solutions, Inc.
![Page 7: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/7.jpg)
Extended Air Defense Simulation (EADSim) Model
• Extended Air Defense Simulation - U.S. Army Space and MissileDefense Command Model
• A DoD standard mission-level stochastic model
• Focuses primarily on
– Events occurring within an Integrated Air Defense System(IADS) including:
• C2 decision logic• SAM and AI operations• Intelligence, Surveillance and Reconnaissance• Electronic Attack and Suppression of Enemy Air Defense
(SEAD)
– Ballistic and Cruise missile employment & defense
Modern Technology Solutions, Inc.
![Page 8: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/8.jpg)
EADSim Electronic Attack Modeling Capability
• Ability to model EA systems to a high level of fidelity
– Platforms (Stand-off, Stand-in, Close-in, Self Protection)– Techniques (Deception, Noise, Decoys)
• Calibrated to match NC-EA model
– Radar coverage defined by detailed antenna pattern diagram– Calibrated J/S and burn-through range with NC-EA jammers
• Graphical Outputs
– Vertical coverage plots displaying radar antenna pattern with and w/ojamming
– Intervisibility plots displaying detection area with and w/o jamming
• Analytical Outputs
– Denied/delayed detection by EW/Acquisition/Fire Control radars– Reduced number of SAM shots due to EA
Modern Technology Solutions, Inc.
![Page 9: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/9.jpg)
Modeling Scenario
Modern Technology Solutions, Inc.
- Stand-In Jammer
![Page 10: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/10.jpg)
COMPETITION SENSITIVE
Jamming EffectivenessAssessment
Modern Technology Solutions, Inc.
![Page 11: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/11.jpg)
Interactive Simulation Model
Table 1: IADS Example
Cross Range, NM Down Range, NM Target 0 0
R1, SAM 1, Tracking Radar 0 -8 R2, SAM 1, Acqu Radar 0 -8 R3, SAM 2, Tracking Radar 16 16 R4, SAM 2, Acqu Radar 16 16 R5, Early Warning Radar -36 0
Table 2: NC-EA Assets Example
Cross Rng (NM)
Down Rng (NM)
Jamming vs R1
Jamming vs R2
Jamming vs R3
Jamming vs R4
Jamming vs R5
Stand-off 40 80 50 KW 25 KW 50 KW 25 KW 1 KW Stand -In 10 20 10 KW 2.5 KW 10 KW 2.5 KW Close-In 1 7 -7 100 W Close-In 2 7 -7 100 W Close-In 3 9 9 100 W Close-In 4 9 9 100 W Close-In 5 -37 7 50 W
Modern Technology Solutions, Inc.
![Page 12: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/12.jpg)
NC-EA Model CalibrationJamming Effects on Individual Threats (A/C RCS = A dBsm)
Target SAM (Acq / Track) Early Warning
Attack A/C Standoff Jammer Stand-In Jammer Close-In Jammer
Jamming on R1 Jamming on R2 Jamming on R3
Jamming on R4 Jamming on R5
Modern Technology Solutions, Inc.
![Page 13: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/13.jpg)
NC-EA Model Results(Attack Aircraft RCS = A dBsm)
Target SAM (Acq / Track) Early Warning
Attack A/C Standoff Jammer Stand-in Jammer Close-In Jammer
“Blue” = 60.4%“Blue” = 75%
Modern Technology Solutions, Inc.
A/C Flight Path
![Page 14: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/14.jpg)
EADSim Scenario and Laydown Description
• Threats (consistant with NC-EAmodel)– One Early Warning Radar– Two SAMs (Acquisition &
Target Track Radar)
• Blue Systems– Four Attack Aircraft
• Speed = 350 Knots• Altitude = ~ 27K ft.• Flight path: South to North• Two – 2 ship flights
– Seven Jammer Aircraft• Altitude = ~ 27K ft.• Flying short orbit legs
SAM 1
SAM 2
Early Warning
JammerAircraft Orbit
AttackAircraft
Target
Penetration Flight Path
Modern Technology Solutions, Inc.
![Page 15: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/15.jpg)
EADSim ResultsElevation Coverage Plot for Acquisition Radar
• Modeling Radar in EADSim
– Basic parameters (frequency,beam dimensions, scanparameters, power, losses,etc.)
– Ability to input complexantenna pattern to define radarcoverage in detail
16 4932 65 9781 130113 146 1620
Alti
tude
(Kft
)
Slant Range (nm)
0
10
20
30
39
49
59
98
69
89
79
No Jamming: A dBsmDetection Range ~ 38 nm
Jamming: A dBsmDetection Range ~ 15 nm
Target Altitude
Modern Technology Solutions, Inc.
![Page 16: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/16.jpg)
EADSim Results(Intervisibility Plot Coverage for Attack A/C RCS = A dBsm)
No Jamming
Jamming
Electronic Attack opens corridors for ingress by limiting detection capability of SAM acquisition radars
Penetration Flight Path
Concentric rings appear due toradar lobing structure
Target
Modern Technology Solutions, Inc.
Detectability Region
![Page 17: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/17.jpg)
EADSim ResultsImpact of Assets on Attack Aircraft
Modern Technology Solutions, Inc.
Radar Cross Section
Ave
rage
Num
ber
of V
alid
Sho
ts p
er A
ircra
ft
A dBsm0
10
20
30
40
Jamming
No Jamming
Modern Technology Solutions, Inc.
![Page 18: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/18.jpg)
COMPETITION SENSITIVE
Re-Alignment ofNC-EA Assets
Modern Technology Solutions, Inc.
![Page 19: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/19.jpg)
Target SAM (Acq / Track) Early Warning
Attack A/C Standoff Jammer Stand-in Jammer Close-In Jammer
“Blue” = 76.2%
Re-assigninglocations of Stand-off, Stand-In and close-in jammers
Modern Technology Solutions, Inc.
A/C Flight Path
NC-EA Model Results(Attack Aircraft RCS = A dBsm)
![Page 20: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/20.jpg)
No Jamming
Jamming
Re-aligning assets results in complete overflight of SAM acquisition radars
Penetration Flight Path
Target
EADSim Results(Intervisibility Plot for Attack A/C RCS = A dBsm)
Detectability Region
![Page 21: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/21.jpg)
COMPETITION SENSITIVE
Trade Study ofRadar Cross Sections
Modern Technology Solutions, Inc.
![Page 22: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/22.jpg)
Target SAM (Acq / Track) Early Warning
Attack A/C Standoff Jammer Stand-in Jammer Close-In Jammer
“Blue” = 60.4%
Assessing jamming effectivenessen-route to attack
“Blue” = 75%“Blue” = 90%
Modern Technology Solutions, Inc.
A/C Flight Path
NC-EA Model Results(Attack Aircraft RCS = B dBsm)
![Page 23: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/23.jpg)
EADSim Results(Intervisibility Plot Coverage for Attack A/C RCS = B dBsm)
No Jamming
Jamming
Reduced ingressor RCS combined with EA assets ensure complete overflight of IADS threats
Penetration Flight Path
Target
Modern Technology Solutions, Inc.
Detectability Region
![Page 24: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/24.jpg)
EADSim ResultsImpact of Realigned Assets and Lower RCS on Attack Aircraft
Ave
rage
Num
ber
of V
alid
Sho
ts p
er A
ircra
ft
0
5
10
15
20
25
30
35
40
Radar Cross Section
A dBsm B dBsm
No ShotsNo Shots
With Jamming
No JammingNo Jamming
No Jamming
With JammingWith Jamming
Modern Technology Solutions, Inc.
![Page 25: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,](https://reader033.fdocuments.net/reader033/viewer/2022043009/5f9a14e7646dc667c81e0ebc/html5/thumbnails/25.jpg)
Summary
• NC-EA Evaluation Methodology Can Support:– Development of system requirements for EA system development– Pre-mission planning– Real-Time jammer assets tradeoff, re-alignment and reaction
• Lessons Learned from NC-EA and EADSim Modeling:– Close-In Jammers Can Be a Significant Factor but Need Dynamic
and Accurate Control– Stand-in Jammers Need to Be Accurately Located or Use High
ERP for Network Centric Electronic Attack (NC-EA) Operation
Modern Technology Solutions, Inc.