• Title/Summary/Keyword: 네트워크 중심전쟁

Search Result 59, Processing Time 0.02 seconds

Development of Korean Joint Tactical Data Link System Based on CLIP (CLIP 기반의 한국형 합동전술데이터링크 체계 개발)

  • Kim, Seung-Chun;Lee, Hyung-Keun
    • Journal of IKEEE
    • /
    • v.15 no.1
    • /
    • pp.15-22
    • /
    • 2011
  • In order to performing the joint operation of Korean army efficiently, informations about surveillance, reconnaissance, and situation awareness need to be possessed jointly. In the first development phase (basis type) of the Korean joint tactical data link system (JTDLS-K), essential tactical information and recognized situation are owned among platforms in common by using existing wireless terminals. In the second development phase (completion type) of the JTDLS-K, a JTDLS which can perform network centric warfare (NCW) will be developed in due consideration of technology development of the basis type and common technology maturity degree. This is a joint battlefield system that can show fighting power simultaneous and polysynthetically through providing command and control messages effectively to each platform, which is participating in the joint and combined operations. In this paper, the development of JTDLS-K with a common data processor based on common link integration processing (CLIP) is described. From the test results of the system presented in this paper, it is demonstrated that quadrature phase shift keying (QPSK) signals can be applied to the system.

Design of the homomorphic encryption system for secure data management in the future battlefield environment (미래 전장환경에서 안전한 데이터 관리를 위한 준동형 시스템 설계)

  • Cha, HyunJong;Kim, JinMook;Ryou, HwangBin
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.51-56
    • /
    • 2014
  • Be expressed in network-centric warfare, mainly battlefield environment of the future. The purpose of the system for the war of the future, is to recognize the enemy before the enemy, and rapid decision-making, to hit accurately. For this reason, it is during the construction of the integrated system of C4ISR+PGM. In such an integrated system, it is necessary to further enhance the security aspects of the information. In particular, strengthening of security leads to a decrease of efficiency. Therefore, security and efficiency should be considered together. In this study, we provide a homomorphic encryption system that can be safely managed information environment on the battlefield of the future. The proposed method uses encryption technology of homomorphic that can be the arithmetic operations on encrypted state. It has changed from the state of the encryption. Therefore, the attacker can not know a decent information.

A Study on the Preparation of National Cyber Warfare (국가 사이버전 대비방안 연구)

  • J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.141-151
    • /
    • 2006
  • The destructive power of cyber threat arrived to until the phase which it threatens to direct and seriously in national security undergoes an important national institutuin hacking event of 2004 and Internet paralysis accidents of 2003. 1. 25. So Cyber terror and Cyber warfare is not the hypothetical enemy situation. It is more actual security situation and identify as magnification of warfare concept of incapacitation national important ability include military command system of the adversary, communication, energy, finance and transportation system. consequently, with the progress of cyber threat, it is necessary that looking at a number of general plan to make up for the weak points in cyber warfare operation system. Thus, the focus of this study is to examine new ways of developing a comprehensive cyber security management system.

  • PDF

A Study on Acceptance Factors for MND-MDM (국방 MDM 수용요인에 관한 연구)

  • Lee, In-Seog;Lee, Choon-Yeul
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.355-368
    • /
    • 2011
  • For an effective warfare under the condition of NCW, the sharing of data between systems must be essential. Thus, the standardization and the integration of data which is considered as the MND-EA improvement and the Megacenter is important. The purpose of this research is to investigate the factors that affected the BI(Behavioral Intention to USE) by using the TAM(Technology Acceptance Model), That is to introduce the MDM into the national defense field which is an issue in every agency sector for data sharing. Also, based on the implementation architecture of Gartner which applies depending on the business enterprise type, the preferred architecture should be selected considering the national defense environment and the characteristics, and suggest an effective MND-MDM plan by analysing the effects on the BI. The survey was done through 19th September till the 7th of October 2011, by investigating the people in charge of the development and maintenance of the national defense information systems and the SI company's national defense team people who have experienced the development of the national defense information systems.

A Design of Risk-Based Security Threat Assessment Process for Fighter-Aircraft Airworthiness Security Certification (전투기 감항 보안 인증을 위한 위험기반 보안위협 평가 프로세스 설계)

  • Kim, Hyunju;Kang, Dongsu
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.6
    • /
    • pp.223-234
    • /
    • 2019
  • Cyber attacks are an important factor that determines the victory and defeat of Network-centric wars in which advanced weapon systems are highly interlinked. In addition the increasing dependability on software as its develop as the latest fighter is demanding enhanced security measures for fighter software to Cyber attacks. In this paper, we apply the DO-326A, which is an airworthiness security certification standard, to design a risk-based security threat assessment process by reflecting characteristics and operational environment of fighter aircraft. To do this, we add the following steps in security threat assessment stage of DO-326A's airworthiness security certification process. First, we derive security threats of fighter. And then, we scored the security threat in terms of possibility and impact on the fighter. Finally, we determine the security risk severity.

A Plan for Strengthening Cyber Security Capability toward North Korea: focusing on the Preparation of Cyber Warfare (대북 사이버 안보역량 강화를 위한 방안: 사이버전 대비를 중심으로)

  • Kim, Ho Jung;Kim, Jong-ha
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.123-132
    • /
    • 2018
  • North Korea's cyber warfare capability is becoming a serious security threat to Korea because most of the operational systems of social infrastructure and advanced weapons system are all networked. Therefore, the purpose of this article is to examine what the Korean government should do to strengthen cyber security capabilities toward North Korea. For this purpose, this article analyzed North Korea's cyber attack cases against Korea by categorizing according to threat type and purpose. The research findings are as follows. It is necessary first, to have aggressive cyber protection and attack capabilities; second, to establish an integrated cyber security control tower that can be overseen by the national government; third, to need to legislate domestic cyber- related laws; fourth, to build a multilateral & regional cyber cooperation system. The implication of these findings are that it needs to be strengthened the cyber security capability from the cyber threats of North Korea by minimizing the damage during the peacetime period and for the complete warfare in case of emergency.

  • PDF

The Relationship between Power and Place of the Jeonju Shrine in the Period of Japanese Imperialism (일제강점기(日帝强占期) 조선신사(朝鮮神社)의 장소(場所)와 권력(權力): 전주신사(全州神社)를 사례(事例)로)

  • Choi, Jin-Seong
    • Journal of the Korean association of regional geographers
    • /
    • v.12 no.1
    • /
    • pp.44-58
    • /
    • 2006
  • This study of Shintoism is to inquire the relationships between social-political ideology and place of Shinto shrine(神社). In Korea, the Shinto shrine was a place of the center of Japanese colonial policy that symbolized the goal of Japanese Imperialism. This was one of the strategies of "Japan and Korea Are One". Before the China and Japan War in 1937, the number of shrines amounted to 51 sites, 12 of them were closely related to open ports, and the others were located at inland major cities. They also were associated with railroad transportation systems that tied coast and inland major cities. This spatial distribution of shrines was so called "Shrine Network" that was essential in tracing Japanese invasion into Korea. It was an imperial place where Japanese residence and colonial landscape were combined together to show the strength of Japanese Imperialism. Most of shrines were located at a hill with a view on the slope of a mountain and honored Goddess Amaterasu and the Meiji Emperor. I presume from these facts that Shinto Shrine was a supervisionary organization for strategic purpose. The Jeonju Shrine was located on a small hill, Dagasan(65m) where commanded a splendid view of Jeonju city and honored Goddess Amaterasu and the Meiji Emperor. It was a place which was adjacent to Japanese residence and colonial landscape. The Dagasan was changed as a symbolic site for Japanese Imperialism. But, after liberation in 1945, the social-political symbol of the hill was changed. By the strong will of civil, there was a monument to the loyal dead and the national poet, Yi Byeng-gi placed for national identity at the site of the demolished Jeonju Shrine. Dagasan as a place of national identity, shows the symbolic decolonization and the changing ideology. After all, this shows that political ideology is represented in a place with landscape.

  • PDF

A Study on the Method of Constructive Simulation Operation Analysis for Warfighting Experiment Supplied with the Validation Evaluation (타당성 평가가 보완된 모델 운용상의 전투실험 모의분석 절차 연구)

  • Park, Jin-Woo;Kim, Nung-Jin;Kang, Sung-Jin;Soo, Hyuk
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.77-87
    • /
    • 2010
  • Currently, our society has been changed from the industrial society to the information society. As the war progresses to Information Warfare, Network-Centric Warfare, Long-Range Precision Engagement and Robot Warfare, the military should advance to High-tech Scientific force. For this creation of the war potential, it is regarded as the warfighting experiment is a critical method. Surely it is rational that LVC(Live Virtual Constructive simulation) is desirable to make the warfighting experiment. But because it is limited by the cost, the time, the place and the resource, the constructive simulation(M&S : Modeling&Simulation) is a good tool to solve those problems. There are some studies about the evaluation process for developing the model, but it is unsatisfying in the process of the constructive simulations' operation. This study focuses on the way of constructive simulation operation, which is supplied with the evaluation process(VV&A : Verification Validation & Accreditation). We introduce the example of the rear area operation simulation for "appropriateness evaluation to the organization of logistic corps" by the AWAM(Army Weapon Analysis Model). This study presents the effective methods of the constructive simulations, which is based on the reliable evaluation process, so it will contribute to the warfighting experiments.

The History of the Development of Meteorological Related Organizations with the 60th Anniversary of the Korean Meteorological Society - Universities, Korea Meteorological Administration, ROK Air Force Weather Group, and Korea Meteorological Industry Association - (60주년 (사)한국기상학회와 함께한 유관기관의 발전사 - 대학, 기상청, 공군기상단, 한국기상산업협회 -)

  • Jae-Cheol Nam;Myoung-Seok Suh;Eun-Jeong Lee;Jae-Don Hwang;Jun-Young Kwak;Seong-Hyen Ryu;Seung Jun Oh
    • Atmosphere
    • /
    • v.33 no.2
    • /
    • pp.275-295
    • /
    • 2023
  • In Korea, there are four institutions related to atmospheric science: the university's atmospheric science-related department, the Korea Meteorological Administration (KMA), the ROK Air Force Weather Group, and the Meteorological Industry Association. These four institutions have developed while maintaining a deep cooperative relationship with the Korea Meteorological Society (KMS) for the past 60 years. At the university, 6,986 bachelors, 1,595 masters, and 505 doctors, who are experts in meteorology and climate, have been accredited by 2022 at 7 universities related to atmospheric science. The KMA is carrying out national meteorological tasks to protect people's lives and property and foster the meteorological industry. The ROK Air Force Weather Group is in charge of military meteorological work, and is building an artificial intelligence and space weather support system through cooperation with universities, the KMA, and the KMS. Although the Meteorological Industry Association has a short history, its members, sales, and the number of employees are steadily increasing. The KMS greatly contributed to raising the national meteorological service to the level of advanced countries by supporting the development of universities, the KMA, the Air Force Meteorological Agency, and the Meteorological Industry Association.