A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric...

25
A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries, Avionics Division Clifton, NJ 07450 Ken McKenzie, Ami Patel Modern Technology Solutions, Inc Alexandria, VA NDIA T&E Summit 24-27 February, 2003 Victoria, BC, Canada Modern Technology Solutions, Inc.

Transcript of A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric...

Page 1: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

A Methodology for Network-CentricElectronic Attack Evaluation

Paul Wang, Myron Greenbaum, Mitchell SparrowITT Industries, Avionics Division

Clifton, NJ 07450

Ken McKenzie, Ami PatelModern Technology Solutions, Inc

Alexandria, VA

NDIA T&E Summit24-27 February, 2003Victoria, BC, Canada

Modern Technology Solutions, Inc.

Page 2: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

Agenda

• Background

• Network Centric (NC) EA Evaluation Methodology

– ITT Network-Centric EA Model

– Extended Air Defense Simulation (EADSIM) Model

• Applications of NC-EA and EADSim Models

– Assessment of Jamming Effectiveness

– Re-alignment of Jamming Assets

– Trade Study of Radar Cross Sections

• Summary

Modern Technology Solutions, Inc.

Page 3: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

Network-Centric Electronic Warfare

• Network Centric Architecture:

– An operational architecture that closely couples the capabilitiesof sensors, command and control, and shooters to maximize theeffects of geographically dispersed resources in electronicwarfare

• Network Centric Electronic Attack:

– Optimum control and utilization of a network of dispersedelectronic attack (EA) assets to provide a wide area suppressionof enemy integrated air defenses (IADS) in a dynamic manner

Modern Technology Solutions, Inc.

Page 4: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

Network-Centric Electronic Attack Evaluation

• Evolution from Platform-Centric to Network-Centric (NC) EARequires New Methodology to Develop and Evaluate Systems:

– Uses NC-EA Simulator and EADSim Model

• ITT Interactive NC-EA Simulator

– Implements radar jamming equation

– Generates jamming effectiveness contour map in area of interest

– Allows selection of optimum EA for Stand-off, Stand-in, Escortand Close-in systems based on J/S contours and “protectedarea”

• Extended Air Defense Simulation (EADSim) Model

– Includes all IADS radars (3-D patterns) and detailed C2

– Uses NC-EA Simulator results to quantify jamming effectivenessin aircraft protection (reduction in number of missiles launched)

Modern Technology Solutions, Inc.

Page 5: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

NC-EA Elements (Notional)

Escort

Close-In

Close-In

Target

Missile

Fire ControlAquisition Stand-Off

Attack

Attack

Stand-Off

Modern Technology Solutions, Inc.

Stand-In

Page 6: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

ITT Interactive NC-EA Simulator

- Inputs:• IADS Laydown (Radar Locations)• Threat Radar Characteristics (ERP’s, Antenna Patterns,..)• Jamming Platform Locations• Jammer Characteristics (ERP’s, Allocations,…)• Attack Aircraft Flight Path• Attack Aircraft RCS

- Outputs:• Jam/Signal Ratio Contour Plots

- One-on-One: One jammer vs one radar - Composite: “N” jammers vs “M” radars

• Percentage of “Blue Zone” in Area of Interest

• 1 NM x 1 NM Cell Resolution illustrating Mainbeam Effect in Support Jamming

Modern Technology Solutions, Inc.

Page 7: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

Extended Air Defense Simulation (EADSim) Model

• Extended Air Defense Simulation - U.S. Army Space and MissileDefense Command Model

• A DoD standard mission-level stochastic model

• Focuses primarily on

– Events occurring within an Integrated Air Defense System(IADS) including:

• C2 decision logic• SAM and AI operations• Intelligence, Surveillance and Reconnaissance• Electronic Attack and Suppression of Enemy Air Defense

(SEAD)

– Ballistic and Cruise missile employment & defense

Modern Technology Solutions, Inc.

Page 8: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

EADSim Electronic Attack Modeling Capability

• Ability to model EA systems to a high level of fidelity

– Platforms (Stand-off, Stand-in, Close-in, Self Protection)– Techniques (Deception, Noise, Decoys)

• Calibrated to match NC-EA model

– Radar coverage defined by detailed antenna pattern diagram– Calibrated J/S and burn-through range with NC-EA jammers

• Graphical Outputs

– Vertical coverage plots displaying radar antenna pattern with and w/ojamming

– Intervisibility plots displaying detection area with and w/o jamming

• Analytical Outputs

– Denied/delayed detection by EW/Acquisition/Fire Control radars– Reduced number of SAM shots due to EA

Modern Technology Solutions, Inc.

Page 9: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

Modeling Scenario

Modern Technology Solutions, Inc.

- Stand-In Jammer

Page 10: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

COMPETITION SENSITIVE

Jamming EffectivenessAssessment

Modern Technology Solutions, Inc.

Page 11: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

Interactive Simulation Model

Table 1: IADS Example

Cross Range, NM Down Range, NM Target 0 0

R1, SAM 1, Tracking Radar 0 -8 R2, SAM 1, Acqu Radar 0 -8 R3, SAM 2, Tracking Radar 16 16 R4, SAM 2, Acqu Radar 16 16 R5, Early Warning Radar -36 0

Table 2: NC-EA Assets Example

Cross Rng (NM)

Down Rng (NM)

Jamming vs R1

Jamming vs R2

Jamming vs R3

Jamming vs R4

Jamming vs R5

Stand-off 40 80 50 KW 25 KW 50 KW 25 KW 1 KW Stand -In 10 20 10 KW 2.5 KW 10 KW 2.5 KW Close-In 1 7 -7 100 W Close-In 2 7 -7 100 W Close-In 3 9 9 100 W Close-In 4 9 9 100 W Close-In 5 -37 7 50 W

Modern Technology Solutions, Inc.

Page 12: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

NC-EA Model CalibrationJamming Effects on Individual Threats (A/C RCS = A dBsm)

Target SAM (Acq / Track) Early Warning

Attack A/C Standoff Jammer Stand-In Jammer Close-In Jammer

Jamming on R1 Jamming on R2 Jamming on R3

Jamming on R4 Jamming on R5

Modern Technology Solutions, Inc.

Page 13: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

NC-EA Model Results(Attack Aircraft RCS = A dBsm)

Target SAM (Acq / Track) Early Warning

Attack A/C Standoff Jammer Stand-in Jammer Close-In Jammer

“Blue” = 60.4%“Blue” = 75%

Modern Technology Solutions, Inc.

A/C Flight Path

Page 14: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

EADSim Scenario and Laydown Description

• Threats (consistant with NC-EAmodel)– One Early Warning Radar– Two SAMs (Acquisition &

Target Track Radar)

• Blue Systems– Four Attack Aircraft

• Speed = 350 Knots• Altitude = ~ 27K ft.• Flight path: South to North• Two – 2 ship flights

– Seven Jammer Aircraft• Altitude = ~ 27K ft.• Flying short orbit legs

SAM 1

SAM 2

Early Warning

JammerAircraft Orbit

AttackAircraft

Target

Penetration Flight Path

Modern Technology Solutions, Inc.

Page 15: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

EADSim ResultsElevation Coverage Plot for Acquisition Radar

• Modeling Radar in EADSim

– Basic parameters (frequency,beam dimensions, scanparameters, power, losses,etc.)

– Ability to input complexantenna pattern to define radarcoverage in detail

16 4932 65 9781 130113 146 1620

Alti

tude

(Kft

)

Slant Range (nm)

0

10

20

30

39

49

59

98

69

89

79

No Jamming: A dBsmDetection Range ~ 38 nm

Jamming: A dBsmDetection Range ~ 15 nm

Target Altitude

Modern Technology Solutions, Inc.

Page 16: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

EADSim Results(Intervisibility Plot Coverage for Attack A/C RCS = A dBsm)

No Jamming

Jamming

Electronic Attack opens corridors for ingress by limiting detection capability of SAM acquisition radars

Penetration Flight Path

Concentric rings appear due toradar lobing structure

Target

Modern Technology Solutions, Inc.

Detectability Region

Page 17: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

EADSim ResultsImpact of Assets on Attack Aircraft

Modern Technology Solutions, Inc.

Radar Cross Section

Ave

rage

Num

ber

of V

alid

Sho

ts p

er A

ircra

ft

A dBsm0

10

20

30

40

Jamming

No Jamming

Modern Technology Solutions, Inc.

Page 18: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

COMPETITION SENSITIVE

Re-Alignment ofNC-EA Assets

Modern Technology Solutions, Inc.

Page 19: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

Target SAM (Acq / Track) Early Warning

Attack A/C Standoff Jammer Stand-in Jammer Close-In Jammer

“Blue” = 76.2%

Re-assigninglocations of Stand-off, Stand-In and close-in jammers

Modern Technology Solutions, Inc.

A/C Flight Path

NC-EA Model Results(Attack Aircraft RCS = A dBsm)

Page 20: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

No Jamming

Jamming

Re-aligning assets results in complete overflight of SAM acquisition radars

Penetration Flight Path

Target

EADSim Results(Intervisibility Plot for Attack A/C RCS = A dBsm)

Detectability Region

Page 21: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

COMPETITION SENSITIVE

Trade Study ofRadar Cross Sections

Modern Technology Solutions, Inc.

Page 22: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

Target SAM (Acq / Track) Early Warning

Attack A/C Standoff Jammer Stand-in Jammer Close-In Jammer

“Blue” = 60.4%

Assessing jamming effectivenessen-route to attack

“Blue” = 75%“Blue” = 90%

Modern Technology Solutions, Inc.

A/C Flight Path

NC-EA Model Results(Attack Aircraft RCS = B dBsm)

Page 23: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

EADSim Results(Intervisibility Plot Coverage for Attack A/C RCS = B dBsm)

No Jamming

Jamming

Reduced ingressor RCS combined with EA assets ensure complete overflight of IADS threats

Penetration Flight Path

Target

Modern Technology Solutions, Inc.

Detectability Region

Page 24: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

EADSim ResultsImpact of Realigned Assets and Lower RCS on Attack Aircraft

Ave

rage

Num

ber

of V

alid

Sho

ts p

er A

ircra

ft

0

5

10

15

20

25

30

35

40

Radar Cross Section

A dBsm B dBsm

No ShotsNo Shots

With Jamming

No JammingNo Jamming

No Jamming

With JammingWith Jamming

Modern Technology Solutions, Inc.

Page 25: A Methodology for Network-Centric Electronic Attack Evaluation · A Methodology for Network-Centric Electronic Attack Evaluation Paul Wang, Myron Greenbaum, Mitchell Sparrow ITT Industries,

Summary

• NC-EA Evaluation Methodology Can Support:– Development of system requirements for EA system development– Pre-mission planning– Real-Time jammer assets tradeoff, re-alignment and reaction

• Lessons Learned from NC-EA and EADSim Modeling:– Close-In Jammers Can Be a Significant Factor but Need Dynamic

and Accurate Control– Stand-in Jammers Need to Be Accurately Located or Use High

ERP for Network Centric Electronic Attack (NC-EA) Operation

Modern Technology Solutions, Inc.