• Title/Summary/Keyword: 네트워크 기반 무기

Search Result 54, Processing Time 0.02 seconds

Location Based Reliable Routing Protocol for Tactical Mobile Ad-Hoc Networks (전술 모바일 애드 혹 네트워크를 위한 위치 기반의 신뢰성 제공을 위한 라우팅 방법)

  • Youn, Myungjune;Kang, Tae Hun;Jeon, HahnEarl;Lee, Jaiyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1148-1161
    • /
    • 2012
  • Recently, developments in the field of communication and network technologies induced new paradigm in the defense weapon system. As a consequence, military authorities develop the Tactical Information Communication Network(TICN) system to adapt to the changing paradigm. One of the most important functions of TICN is real-time communication. As a result, TICN system needs to receive real-time information from the battlefield, and the key technology to support these features is MANET(Mobile Ad-Hoc Network) routing protocol. In this paper, we analyze problems of the shortest path scheme in tactical Ad-Hoc networks, which is widely used in common Ad-Hoc networks. We propose efficient routing protocol for tactical MANET by considering the environment of small combat units, such as node position, speed and data size. The proposed algorithm shows reliable data transfer and low latency in battlefield.

Design and Implementation of Fault-tolerant Communication Middleware for a High-reliable Launch Control System (고신뢰성 발사통제시스템을 위한 고장허용 통신 미들웨어 설계 및 구현)

  • Song, Dae-Ki;Jang, Bu-Cheol;Lee, Cheol-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.8
    • /
    • pp.37-46
    • /
    • 2008
  • Launch control system controls the sequence for launching missile in weapon systems. This system have to generate the engagement plan, input information and launch the missile in timeliness requirement. Such a system may fail to operate correctly either due to errors in hardware and software or due to violation of timing constraints. We presented fault-tolerant ethernet for embedded real-time system like launch control system. This approach is designed to handle network faults using dual commercial-off-the-shelf(COTS) network devices. To support fault-tolerant ethernet each node is composed dual channel ethernet and designed the communication middleware for network fault detect and recovery. Especially for time-critical system, the middleware is being developed to achieve that no point of network failure shall take down or cause loss of communication to network nodes.

Trends and Acquisition Strategies on Defense Unmanned Robot Core Technology (국방 무인·로봇 핵심 기술동향 및 획득전략)

  • Kye, J.E.
    • Electronics and Telecommunications Trends
    • /
    • v.29 no.3
    • /
    • pp.118-130
    • /
    • 2014
  • 전문 서비스로봇인 국방 무인 로봇은 무기체계 개발 시, 소요군의 운용개념 미확정, 국내 로봇 기술수준(TRL) 및 기술성숙도 미흡 등으로 무인체계의 소요기획 및 전력화 소요 반영이 되지 않고 장기적인 획득 대안으로 생각하고 있으나, 미국의 미래 전투체계(Future Combat System)에서 보듯이 네트워크 중심전(NCW)으로의 전장 환경변화 등 무인전투체계의 통신 및 소프트웨어(복합체계 공통운용환경(SOSCOE: System of Systems Common Operating Environment))의 중요성은 더욱 커지고 있다. 국가적으로는 국방 무인 로봇을 시장확산분야로 인식하고 있으며, 그동안 해외 도입 위주의 국방 무인 로봇 시장에 대한 중요성이 부각되고 있어, 우리나라 창조경제 발전의 견인차 역할로 무인체계 시장의 선점 및 새로운 고용시장을 창출할 수 있는 기반으로 투자를 확대하고 있다. 따라서, 본 논고를 통하여 무인체계에 대한 체계개발 활성화 방안에 기여하기 위한 선제적인 방법으로 연구개발 방향을 설정하고, 기술개발 방향 및 획득 우선순위 등 개발전략을 수립하고 그 대안을 제시하고자 한다.

  • PDF

Trends and Strategies on Defense Information Technology based IT Convergence Technology (IT 융합기술 기반 국방정보 기술동향 및 발전전략)

  • Kye, J.E.;Lee, J.H.;Lim, D.S.
    • Electronics and Telecommunications Trends
    • /
    • v.28 no.2
    • /
    • pp.132-144
    • /
    • 2013
  • 국방과학기술은 중장기 기획문서체계에 의해 체계적인 기술기획이 수립되고 있다. 또한 합동참모본부의 전략문서와 연계하여 국방과학기술의 중장기 전략을 수립한다. 무기체계는 지휘통제, 감시정찰 및 정밀타격체계로 구성되고, 핵심기술은 정보통신, 센서, 플랫폼 등 8대 기술 분야로 구성된다. 국방정보 기술은 국방에 관한 정보를 생산, 유통 또는 활용하여 국방 분야의 제반 활동을 가능하게 하거나, 미래 전장운용 개념 구현 및 국방경영 효율화를 지원하여 국방비전 및 국방개혁을 달성하는 핵심 기능 역할을 수행하는 것을 의미한다. 국방정보 기술 개발의 목적은 한반도 전 구역에서 실시간 및 근실시간으로 요구 수준 및 정확성을 확보하기 위해 전장가시화, 네트워크화된 지휘통제, 효과 중심 정밀타격, 전쟁지속을 위한 인사, 군수, 동원 등 통합지원체계를 구축하여 미래전 양상과 국방정보화의 특성을 고려한 실시간 정보공유 및 관리 가능한 정보화 환경을 구축하는 데 있다. 본고는 국방정보 기술 체계 및 요소기술에 대한 특성과 적용기술 및 발전 방향을 살펴본다.

  • PDF

정보보호를 위한 3D프린터 위험관리 및 평가기법 제안

  • Shin, Su-Min;Lee, Chang-Jun;Park, Jun Yong
    • Review of KIISC
    • /
    • v.25 no.3
    • /
    • pp.52-65
    • /
    • 2015
  • 제조 분야의 미래유망기술로써 각광받고 있는 3D프린터 기술은 다양한 방식으로 활용되고 있다. 시제품의 제작비용과 시간을 절감시키고 1인 맞춤형 제품 생산이 가능하게 하였으며, 의료 및 산업분야 전반에 걸쳐 그 시장과 규모는 나날이 증대되고 있다. 하지만 이에 반하여 환경오염, 무기제작, 지적재산권, 의료 윤리 및 규제, 국가 보안 위험 등과 같은 문제점 또한 적지 않게 제기되고 있다. 본 고에서는 정보보호 관점에서 네트워크와 연결된 3D프린터가 가진 잠재적인 취약점에 대해 알아보고, 조직에서 이를 예방하기 위한 관리적 방법에 대해 NIST IR 8023의 생명주기에 기반 한 단계별 위험관리 및 위험평가에 대한 가이드를 제공하고자 한다.

Analysis of Information Distribution Capability of the Army TIGER Corps Multilayer Integrated Communication Network (Army TIGER 군단 다계층 통합 전술통신망의 정보유통량 분석)

  • Junseob Kim;Sangjun Park;Yiju You;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.175-180
    • /
    • 2024
  • Future warfare is evolving with advanced science and technology, introducing a variety of unmanned and manned combat systems. These systems generate and exchange massive amounts of information, challenging current tactical communication systems as a foundation for future communication infrastructure. To analyze the information distribution capability of the Army TIGER corps, this paper examines four scenarios: standalone ground network operation, integrated network operation, load distribution, and error recovery. Utilizing M&S results, we highlight the potential of a multilayer integrated command and control network, incorporating ground, air, and space networks, to enhance the reliability and stability of the overall communication network.

Air Threat Evaluation System using Fuzzy-Bayesian Network based on Information Fusion (정보 융합 기반 퍼지-베이지안 네트워크 공중 위협평가 방법)

  • Yun, Jongmin;Choi, Bomin;Han, Myung-Mook;Kim, Su-Hyun
    • Journal of Internet Computing and Services
    • /
    • v.13 no.5
    • /
    • pp.21-31
    • /
    • 2012
  • Threat Evaluation(TE) which has air intelligence attained by identifying friend or foe evaluates the target's threat degree, so it provides information to Weapon Assignment(WA) step. Most of TE data are passed by sensor measured values, but existing techniques(fuzzy, bayesian network, and so on) have many weaknesses that erroneous linkages and missing data may fall into confusion in decision making. Therefore we need to efficient Threat Evaluation system that can refine various sensor data's linkages and calculate reliable threat values under unpredictable war situations. In this paper, we suggest new threat evaluation system based on information fusion JDL model, and it is principle that combine fuzzy which is favorable to refine ambiguous relationships with bayesian network useful to inference battled situation having insufficient evidence and to use learning algorithm. Finally, the system's performance by getting threat evaluation on an air defense scenario is presented.

An Optimal Investment Planning Model for Improving the Reliability of Layered Air Defense System based on a Network Model (다층 대공방어 체계의 신뢰도 향상을 위한 네트워크 모델 기반의 최적 투자 계획 모델)

  • Lee, Jinho;Chung, Suk-Moon
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.3
    • /
    • pp.105-113
    • /
    • 2017
  • This study considers an optimal investment planning for improving survivability from an air threat in the layered air defense system. To establish an optimization model, we first represent the layered air defense system as a network model, and then, present two optimization models minimizing the failure probability of counteracting an air threat subject to budget limitation, in which one deals with whether to invest and the other enables continuous investment on the subset of nodes. Nonlinear objective functions are linearized using log function, and we suggest dynamic programming algorithm and linear programing for solving the proposed models. After designing a layered air defense system based on a virtual scenario, we solve the two optimization problems and analyze the corresponding optimal solutions. This provides necessity and an approach for an effective investment planning of the layered air defense system.

Detection Model of Malicious Nodes of Tactical Network for Korean-NCW Environment (한국형 NCW를 위한 전술네트워크에서의 악의적인 노드 검출 모델)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.71-77
    • /
    • 2011
  • NCW(Network Centric- Warfare) encompasses the concept to use computer data processing and network linkage communications techniques, share information and furthermore, enhance the effectiveness of computer-operating systems. As IT(Information & Technology) have become developed in the recent years, the existing warfare system-centered conventional protocol is not use any longer. Instead, network-based NCW is being widely-available, today. Under this changing computer environment, it becomes important to establish algorithm and build the stable communication systems. Tools to identify malign node factors through Wireless Ad-hoc network cause a tremendous error to analyze and use paths of even benign node factors misreported to prove false without testing or indentifying such factors to an adequate level. These things can become an obstacle in the process of creating the optimum network distribution environment. In this regard, this thesis is designed to test and identify paths of benign node factors and then, present techniques to transmit data through the most significant open short path, with the tool of MP-SAR Protocol, security path search provider, in Ad-hoc NCW environment. Such techniques functions to identify and test unnecessary paths of node factors, and thus, such technique users can give an easy access to benign paths of node factors.

Lightweight Key Escrow Scheme for Internet of Battlefield Things Environment (사물인터넷 환경을 위한 경량화 키 위탁 기법)

  • Tuan, Vu Quoc;Lee, Minwoo;Lim, Jaesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.12
    • /
    • pp.1863-1871
    • /
    • 2022
  • In the era of Fourth Industrial Revolution, secure networking technology is playing an essential role in the defense weapon systems. Encryption technology is used for information security. The safety of cryptographic technology, according to Kerchoff's principles, is based on secure key management of cryptographic technology, not on cryptographic algorithms. However, traditional centralized key management is one of the problematic issues in battlefield environments since the frequent movement of the forces and the time-varying quality of tactical networks. Alternatively, the system resources of each node used in the IoBT(Internet of Battlefield Things) environment are limited in size, capacity, and performance, so a lightweight key management system with less computation and complexity is needed than a conventional key management algorithm. This paper proposes a novel key escrow scheme in a lightweight manner for the IoBT environment. The safety and performance of the proposed technique are verified through numerical analysis and simulations.