• Title/Summary/Keyword: 군사드론

Search Result 116, Processing Time 0.024 seconds

How to Operate UAM in Megacities Using Korean Positioning System (한국형 위성항법 시스템(KPS)을 활용한 메가시티 UAM 운용방안)

  • Cho, Sang Keun;Cha, Do wan;Lee, Don Goo;Lee, Dong Min;Sim, Jun Hak;Park, Sang Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.259-263
    • /
    • 2022
  • As urbanization progresses in Korea, megacities are being formed around the metropolitan area, the central area, and the southeast area. In addition, it is accelerating the development of urban air mobility (UAM) that can be operated by Mega City as a new growth engine industry in the future. At the same time, in order to become a space powerhouse, Korea plans to establish its own Korean positioning system (KPS) by 2035. Therefore, if urban air mobility and location information services provided by the Korean positioning system are used in combination, urban air mobility can be stably operated in future megacities.

A study on the security threat and security requirements for multi unmanned aerial vehicles (무인기 군집 비행 보안위협 및 보안요구사항 연구)

  • Kim, Mansik;Kang, Jungho;Jun, Moon-seog
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.195-202
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAV) have mostly been used for military purposes but with the progress in ICT and reduced manufacturing costs, they are increasingly used for various private services. UAVs are expected to carry out autonomous flying in the future. In order to carry out complex tasks, swarm flights are essential. Although the swarm flights has been researched a lot due to its different network and infrastructure from the existing UAV system, There are still not enough study on security threats and requirements for the secure swarm flights. In this paper, to solve these problems, UAV autonomous flight technology is defined based on US Army Corps of Engineers (USACE) and Air Force Research Laboratory (AFRL), and swarm flights and security threat about it are classified. And then we defined and compared security requirements according to security threats of each swarm flights so as to contribute to the development of secure UAC swarm flights in the future.

Design and Performance Analysis of Common data link digital modem for surveillance UAVs (정찰용 무인기를 위한 공용데이터링크 모뎀 설계 및 성능 분석)

  • Jung, Sungjin;Kim, Younggil;Lee, Daehong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.162-168
    • /
    • 2018
  • The UAV(Unmanned Aerial Vehicle) system, including the drone of a variety of fields, which has become an issue and utilized in various fields, has begun to develop in military fields and is actively developed in the commercial field. In various types of UAV systems, which have been developed recently, the communication system that is responsible for the connection between the ground control unit and the UAVs is called the data link. Especially, common data link used in military UAVs is required stability of communication to transmit surveillance and reconnaissance intelligence information and UAV's status. In this paper, the requirement for a modem was defined to secure the communication stability of the common data link used in surveillance UAVs. And, the design of the data link modem to satisfy applicable specifications was proposed. The proposed modem design was verified through the performance measurement of the implemented systems.

An unmanned boat capable of real-time video streaming (실시간 영상 스트리밍 무인 보트)

  • Lee, Dong-Hee;Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.537-539
    • /
    • 2016
  • Recently, unmanned technologies interest increased. An unmanned boat is not directly on people and radio can be controlled by boat. Used for military unmanned boat was first developed in the United States Navy. In recent years, for hobby, for pesticide application, for water activities, expanding exploration in various ways, including for use. The role of a variety of unmanned boat above, In the case of a variety of unmanned probe of the role of unmanned boat on the boat people who don't be able to come to the vision of the advantage can not be exploring places like blind spot. In this paper, The Blind Spot are explorations of places such as streaming real-time as possible, an unmanned boat using Raspberry Pi that support implementation. Receiver input signals of an unmanned boat to the transmitter under the manipulation of, using smartphones hotspot feature Raspberry Pi and smartphones, network connection. Via Raspberry Pi motion of using real-time streaming using unmanned boat.

  • PDF

A Study on the Assessment of Critical Assets Considering the Dependence of Defense Mission (국방 임무 종속성을 고려한 핵심 자산 도출 방안 연구)

  • Kim Joon Seok;Euom Ieck Chae
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.189-200
    • /
    • 2024
  • In recent years, the development of defense technology has become digital with the introduction of advanced assets such as drones equipped with artificial intelligence. These assets are integrated with modern information technologies such as industrial IoT, artificial intelligence, and cloud computing to promote innovation in the defense domain. However, the convergence of the technology is increasing the possibility of transfer of cyber threats, which is emerging as a problem of increasing the vulnerability of defense assets. While the current cybersecurity methodologies focus on the vulnerability of a single asset, interworking of various military assets is necessary to perform the mission. Therefore, this paper recognizes these problems and presents a mission-based asset management and evaluation methodology. It aims to strengthen cyber security in the defense sector by identifying assets that are important for mission execution and analyzing vulnerabilities in terms of cyber security. In this paper, we propose a method of classifying mission dependencies through linkage analysis between functions and assets to perform a mission, and identifying and classifying assets that affect the mission. In addition, a case study of identifying key assets was conducted through an attack scenario.

A Study on the Analysis of R&D Trends and the Development Plan of Electronic Attack System (전자공격체계 연구개발 동향 분석과 발전방안에 대한 연구)

  • Sim, Jaeseong;Park, Byoung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.469-476
    • /
    • 2021
  • An electronic attack (EA) system is an essential weapon system for performing electronic warfare missions that contain signal tracking and jamming against multiple threats using electromagnetic waves, such as air defense radars, wireless command and communication networks, and guided missiles. The combat effectiveness can be maximized, and the survivability of militarily protecting combat power can be enhanced through EA mission operations, such as disabling the functions of multiple threats. The EA system can be used as a radio frequency jamming system to respond to drone attacks on the core infrastructure, such as airports, power plants, and communication broadcasting systems, in the civilian field. This study examined the criteria for classification according to the electronic attack missions of foreign EA systems based on an aviation platform. The foreign R&D trends by those criteria were investigated. Moreover, by analyzing the R&D trends of domestic EA systems and future battlefields in the domestic security environments, this paper proposes technological development plans of EA systems suitable for the future battlefield environments compared to the foreign R&D trends.