• Title/Summary/Keyword: 네트워크 중심전

Search Result 344, Processing Time 0.028 seconds

CCN 이동성 지원에 관한 연구

  • Lee, Ju-Yong;Lee, Ji-Hoon
    • Review of KIISC
    • /
    • v.26 no.6
    • /
    • pp.24-29
    • /
    • 2016
  • 모바일 기기의 폭발적인 증가로 인하여 다양한 종류의 많은 콘텐츠들이 시간과 장소에 관계없이 만들어지고 공유된다. 하지만, 현재 인터넷 구조는 모바일 기기의 이동성 지원을 위해 추가적인 동작이 필요하다. 따라서 비효율적인 현재의 인터넷 구조를 개선하기 위하여 새로운 네트워크 구조가 필요성이 대두되었으며 정보중심의 네트워크와 같은 새로운 구조가 등장하게 되었다. 정보 중심 네트워크 구조에서 콘텐츠 요청자의 이동성 지원은 단순히 콘텐츠를 재전송하면 되기 때문에 효율적으로 동작한다. 하지만, 콘텐츠 소유자의 이동성 지원은 소유자의 위치를 인지하기 전까지 효율적으로 대응하지 못한다는 문제점이 존재한다. 따라서, 본 논문에서는 정보중심의 네트워크 구조에서의 콘텐츠 소유자의 효율적인 이동성 지원을 위한 연구들을 분석한다.

A Study on the Information Security Plan for Network Centric Warfare : Development of Information Security Governance Assessment Index (네트워크 중심전(NCW)하의 정보보호체계 구축방안 연구 : 정보보호체계 평가지표 개발을 중심으로)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.83-91
    • /
    • 2007
  • Information security is a critical issue for network centric warfare(NCW). This paper provides a information security governance index for NCW, which is a result of the research through a group decision making process. The purpose of the research is to intended to help military organization's planners determine the degree to which they have implemented an information systems governance framework at the strategic and tactical level within their organization.

  • PDF

A Study on the Improvement of Transmission Speed of Data Link Processor (전술데이터링크 처리기의 전송 속도 개선에 대한 연구)

  • Lee, Kang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1069-1076
    • /
    • 2019
  • With the development of information and communication technology, the military's battle environment is changing greatly to network centric warfare in where weapon system is connected in a network and carries out mission by exchanging the real-time data. The core of the network centric warfare is Tactical Data Link(TDL) system, and subscribers of TDL exchange tactical information in real time through wireline, wireless and satellite network to share the battlefield situation. The amount of data sent and received through TDL inevitably increase as military's weapon systems equipped with TDL systems increase over time and the performance of communications equipment improves. This study proposes ways to improve the transmission speed and processing capacity of the TDL system by improving the Data Link Processor.

Mutual Authenticate Protocol among Sensor for Network Centric Warfare (네트워크 중심전을 위한 센서간의 상호인증기법)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwnag-Bin
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.25-30
    • /
    • 2012
  • As the network composed of numerous sensor nodes, sensor network conducts the function of sensing the surrounding information by sensor and of the sensed information. Our military has also developed ICT(Information and Communication Technology) along with the methods for effective war by sharing smooth information of battlefield resources through network with each object. In this paper, a sensor network is clustered in advance and a cluster header (CH) is elected for clusters. Before deployment, a certificate is provided between the BS and the sensor nodes, and after clustering, authentication is done between the BS and the sensor nodes. Moreover, inter-CH authentication technique is used to allow active response to destruction or replacement of sensor nodes. Also, because authentication is done twice, higher level of security can be provided.

Design of the Agent-based Network-Centric Warfare Modeling System (에이전트 기반의 NCW 전투모델링 시스템 설계)

  • Park, Se-Youn;Shin, Ha-Yong;Lee, Tae-Sik;Choi, Bong-Wan
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.271-280
    • /
    • 2010
  • While the future warfare is expected to be appeared as network-centric, effect-based, and coordinated cooperative, most current M&S systems reflect only the unit behaviors and interactions of each weapon system. There are limitations to analyze the behaviors of managing weapons cooperatively and sharing the situational awareness over the networks of distributed sensors, C2, and shooters using them. Therefore, we introduce the new design of the networkcentric warfare modeling system using the agent-based modeling and simulation approach. We have developed a system for engagement-level warfare models and tested with multi-platform battleship warfare. In this paper, we propose the method to design battle agents, environments, and networks for network centric warfare modeling.

Influence Factors of Effectively Executing NCW by User's Point of View (사용자 관점에서 본 효과적인 NCW 수행을 위한 영향요인)

  • Ou, Won-Suk;Chae, Myung-Sin;Yeum, Dae-Sung
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.109-127
    • /
    • 2010
  • The Network Centric Warfare(NCW) is based on the linkage of forces by network to employ them as they are centralized, even though they are scattered. Also it can be used to overcome spatiotemporal obstacles. Under the concept of NCW, cognitive and social areas are getting more weight than information technology and physical ones. In this study we tried to investigate the affecting factors to execute NCW effectively by user's point of view to place the focus on cognitive and social aspects. We obtained some affirmative results that affect to conduct NCW in Korea. The advanced western NCW can be applicable in theoretically in Korea, however to employ NCW more effectively we need Korean style NCW which portrays the Korean realities and circumstances.

한국형 합동전술데이터링크 구축을 위한 Link-16 PHY/MAC 기술 분석

  • Park, Hyeong-Won;No, Hong-Jun;Im, Jae-Seong
    • Information and Communications Magazine
    • /
    • v.26 no.3
    • /
    • pp.60-68
    • /
    • 2009
  • 미래의 전쟁은 적 보다 더 나은 상황인식(SA: Situation Awareness)을 통한 정보우위를 기반으로 전쟁을 수행하는 네트워크 중심전(NCW: Network Centric Warfare)으로 작전 수행 개념이 빠르게 변하고 있다. 이에 따라 네트워크 중심전을 실현하기 위한 핵심 기술인 전술데이터 링크의 중요성이 크게 부각되고 있으며, 한국군은 자주 국방을 이루기 위한 한국형 전술데이터 링크를 개발 및 구축하기 위한 계획을 진행하고 있다. 본 원고에서는 한국형 합동전술데이터링크 구축을 위해 현재 미군에서 운용하고 있는 최신 전술데이터링크 기술인 Link-16 시스템의 핵심 요소기술인 PHY계층과 MAC계층에 관하여 살펴본다. 먼저 PHY 계층의 송 수신기 구조를 분석하여 전술웨이브폼의 성능을 알아본다. 다음으로는 MAC 계층에서의 자원할당방식을 알아보고, 최근 해군에서 개발중인 Link-22 시스템의 특징을 살펴봄으로써 Link-16 MAC 계층 기술의 발전방향에 대해 살펴본다. 마지막으로 이러한 기술 분석과 함께, Link-16의 PHY 및 MAC 계층 기술들의 성능을 시뮬레이션을 통해 분석함으로써 한국형 전술데이터 링크 구축을 위해 필요한 기술요소들의 실질적인 성능에 대해 알아본다.

Detection Model of Malicious Nodes of Tactical Network for Korean-NCW Environment (한국형 NCW를 위한 전술네트워크에서의 악의적인 노드 검출 모델)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.71-77
    • /
    • 2011
  • NCW(Network Centric- Warfare) encompasses the concept to use computer data processing and network linkage communications techniques, share information and furthermore, enhance the effectiveness of computer-operating systems. As IT(Information & Technology) have become developed in the recent years, the existing warfare system-centered conventional protocol is not use any longer. Instead, network-based NCW is being widely-available, today. Under this changing computer environment, it becomes important to establish algorithm and build the stable communication systems. Tools to identify malign node factors through Wireless Ad-hoc network cause a tremendous error to analyze and use paths of even benign node factors misreported to prove false without testing or indentifying such factors to an adequate level. These things can become an obstacle in the process of creating the optimum network distribution environment. In this regard, this thesis is designed to test and identify paths of benign node factors and then, present techniques to transmit data through the most significant open short path, with the tool of MP-SAR Protocol, security path search provider, in Ad-hoc NCW environment. Such techniques functions to identify and test unnecessary paths of node factors, and thus, such technique users can give an easy access to benign paths of node factors.