• Title/Summary/Keyword: 무인기 네트워크

Search Result 54, Processing Time 0.041 seconds

A Hierarchical Underwater Acoustic Sensor Network Architecture Utilizing AUVs' Optimal Trajectory Movements (수중 무인기의 최적 궤도 이동을 활용하는 계층적 수중 음향 센서 네트워크 구조)

  • Nguyen, Thi Tham;Yoon, Seokhoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.12
    • /
    • pp.1328-1336
    • /
    • 2012
  • Compared to terrestrial RF communications, underwater acoustic communications have several limitations such as limited bandwidth, high level of fading effects, and a large underwater propagation delay. In this paper, in order to tackle those limitations of underwater communications and to make it possible to form a large underwater monitoring systems, we propose a hierarchical underwater network architecture, which consists of underwater sensors, clusterheads, underwater/surface sink nodes, autonomous underwater vehicles (AUVs). In the proposed architecture, for the maximization of packet delivery ratio and the minimization of underwater sensor's energy consumption, a hybrid routing protocol is used. More specifically, cluster members use Tree based routing to transmit sensing data to clusterheads. AUVs on optimal trajectory movements collect the aggregated data from clusterhead and finally forward the data to the sink node. Also, in order to minimize the maximum travel distance of AUVs, an Integer Linear Programming based algorithm is employed. Performance analysis through simulations shows that the proposed architecture can achieve a higher data delivery ratio and lower energy consumption than existing routing schemes such as gradient based routing and geographical forwarding. Start after striking space key 2 times.

UAV based Wireless Ad hoc Network Performance Analysis (공중무인기 기반의 무선애드혹 네트워크 성능 분석)

  • Chun, Jeong-myong;Ha, Dong-hun;Park, Jae-seong;Yoon, Seok-hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.123-125
    • /
    • 2015
  • Wireless ad hoc network which is comprised of wireless nodes that have the limited communication range is utilized to monitoring disaster area, tracing object, and tactical system. But in the case of wireless node on the ground, a network performance decrease because wireless channel is affected from obstacle or the node deployment is restricted. In this paper, we consider wireless network based on UAV(Unmanned Aerial Vehicle) which has little spatial constraint and quickly deploy a position. We implement test-bed included ground nodes and UAV, and measure throughput and PDR(Packet Delivery Ratio) according to the usage of UAV. We show that network performance is improved by relaying data on UAV.

  • PDF

Random Waypoint Mobility Model for UAV Group Reconnaissance based on Regional Arrival Count (영역별 탐색수를 고려한 그룹 무인기 정찰용 Random Waypoint 이동성 모델)

  • Jo, Yong-Il;Jung, Yong-Min;Ha, Ok-Kyoon;Kim, Kyong Hoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.07a
    • /
    • pp.7-8
    • /
    • 2016
  • Ad-hoc 네트워크 기술이 발달함에 따라 FANET(Flying Ad-Hoc Notworks)을 이용한 그룹 무인기 정찰이 요구되고 있다. 본 논문에서는 자율비행을 위한 효율적인 그룹 무인기 정찰을 위하여 새로운 이동성 모델을 제안한다. 제안하는 모델은 Random Waypoint에 기반 하는 모델로써 정찰되지 않은 구역의 선택 확률을 높여 균형적 탐색을 유도한다. 시뮬레이션을 이용하여 제안하는 모델이 기존의 Random Waypoint 에 비해 80% 정찰비율 시간 향상 면에서 우수함을 보인다.

  • PDF

A Study on the Operation of Multi-Beam Antenna for Airborne Relay UAV considering the Characteristics of Aircraft (비행체의 특징을 고려한 공중중계 무인기 다중빔 안테나 운용 방안)

  • Park, Sangjun;Lee, Wonwoo;Kim, Yongchul;Kim, Junseob;Jo, Ohyun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.4
    • /
    • pp.26-34
    • /
    • 2021
  • In the era of the Fourth Industrial Revolution, the future battlefield will carry out multi-area operations with hyper-connected, high-speed and mobile systems. In order to prepare for changes in the future, the Korean military intends to develop various weapons systems and form a multi-layer tactical network to support On The Move communication. However, current tactical networks are limited in support of On The Move communications. In other words, the operation of multi-beam antennas is necessary to efficiently construct a multi-layer tactical network in future warfare. Therefore, in this paper, we look at the need for multi-beam antennas through the operational scenario of a multi-layer tactical network. In addition, based on development consideration factors, features of rotary-wing and fixed-wing aircraft, we present the location and operation of airborne relay drone installations of multi-beam antennas.

Net-Drone: 드론 편대를 통한 네트워크 인프라 구축

  • Park, Seong-Jun;Lee, Ji-Yeon;Kim, Hwang-Nam
    • Information and Communications Magazine
    • /
    • v.33 no.2
    • /
    • pp.107-116
    • /
    • 2016
  • 최초에 군용으로 개발되었던 무인기(Unmanned Air Vehichle, 이하 드론)가, 최근 많은 연구를 통해 다양한 분야에 활용되고 있다. 본고에서는 다수의 드론을 통해 드론 편대를 구성하고, 이를 활용하여 무선 통신 네트워크 인프라를 구축하며, 재난 지역과 같은 무선 네트워크 접속이 불가능한 지역에 있는 사용자가 인터넷을 연결할 수 있게 해주는 Net-Drone을 제안한다. Net-Drone은 무인기간 유기적인 비행 정보 교환을 통해 드론 편대에 기반한 네트워크망 구축에 있어서의 안정성을 증강시키고, 드론 편대의 위치 정보를 중앙에서 관리하는 체계를 통해 최적의 라우팅 경로를 파악하여 지상의 네트워크 트래픽에 기반한 최상의 드론 배치를 설정한다. 본고에서는 Net-Drone의 물리적인 구현에서부터 사용자에게 네트워크를 공급하게 되는 전체 과정을 소개함으로써, 재난 지역 등의 네트워크가 연결되지 않은 지역에서의 무선 네트워크 인프라 구축에 대한 새로운 가능성을 제시한다.

A Security Vulnerability Analysis for Printer Kiosks (무인 복합 출력기 솔루션의 취약성 분석)

  • Ji, Woojoong;Kim, Hyoungshick
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.165-174
    • /
    • 2019
  • They are frequently used today in public places such as street, subway, school or library. Since users can sometimes print documents that contain confidential data using Printer Kiosks, the devices should store and manage the documents securely. In this paper, we identify potential security threats in Printer Kiosks and suggest practical attack scenarios that can take place. To show the feasibility of suggested attack, we analyzed network traffic that were generated by the real Printer Kiosk device. As a result of our analysis, we have found that attackers can access other users' scanned files and access other users' documents from Printer Kiosk's home page. We confirmed that using our attack, we could retrieve other users' personal data.

Accuracy Assessment of Aerial Triangulation of Network RTK UAV (네트워크 RTK 무인기의 항공삼각측량 정확도 평가)

  • Han, Soohee;Hong, Chang-Ki
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.38 no.6
    • /
    • pp.663-670
    • /
    • 2020
  • In the present study, we assessed the accuracy of aerial triangulation using a UAV (Unmanned Aerial Vehicle) capable of network RTK (Real-Time Kinematic) survey in a disaster situation that may occur in a semi-urban area mixed with buildings. For a reliable survey of check points, they were installed on the roofs of buildings, and static GNSS (Global Navigation Satellite System) survey was conducted for more than four hours. For objective accuracy assessment, coded aerial targets were installed on the check points to be automatically recognized by software. At the instance of image acquisition, the 3D coordinates of the UAV camera were measured using VRS (Virtual Reference Station) method, as a kind of network RTK survey, and the 3-axial angles were achieved using IMU (Inertial Measurement Unit) and gimbal rotation measurement. As a result of estimation and update of the interior and exterior orientation parameters using Agisoft Metashape, the 3D RMSE (Root Mean Square Error) of aerial triangulation ranged from 0.153 m to 0.102 m according to the combination of the image overlap and the angle of the image acquisition. To get higher aerial triangulation accuracy, it was proved to be effective to incorporate oblique images, though it is common to increase the overlap of vertical images. Therefore, to conduct a UAV mapping in an urgent disaster site, it is necessary to acquire oblique images together rather than improving image overlap.

Relay Network using UAV: Survey of Physical Layer and Performance Enhancement Issue (무인항공기를 이용한 중계네트워크: 물리계층 동향분석 및 성능향상 이슈)

  • Cho, Woong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.5
    • /
    • pp.901-906
    • /
    • 2019
  • UAV (Unmanned Aerial Vehicle) is widely used in various areas such as civil and military applications including entertainment industries. Among them, UAV based communication system is also one of the important application areas. Relays have been received much attention in communication system due to its benefits of performance enhancement and coverage extension. In this paper, we investigate UAVs as relays especially focusing on physical layer. First, we introduce the research on UAV application for the relays, then the basic performance of relay networks in dual-hop communication system is analyzed by adopting decode-and-forward (DF) relaying protocol. The performance is represented using symbol error rate (SER) and UAV channels are applied by assuming asymmetric environments. Based on the performance analysis, we discuss performance enhancement issues by considering physical layer.

Lightweight Authentication Scheme for Secure Data Transmission in Terrestrial CNPC Links (지상 CNPC 링크에서 안전한 데이터 전송을 위한 경량화된 인증기법)

  • Kim, Man Sik;Jun, Moon-Seog;Kang, Jung Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.9
    • /
    • pp.429-436
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAV) that are piloted without human pilots can be commanded remotely via frequencies or perform pre-inputted missions. UAVs have been mainly used for military purposes, but due to the development of ICT technology, they are now widely used in the private sector. Teal Group's 2014 World UAV Forecast predicts that the UAV market will grow by 10% annually over the next decade, reaching $ 12.5 billion by 2023. However, because UAVs are primarily remotely controlled, if a malicious user accesses a remotely controlled UAV, it could seriously infringe privacy and cause financial loss or even loss of life. To solve this problem, a secure channel must be established through mutual authentication between the UAV and the control center. However, existing security techniques require a lot of computing resources and power, and because communication distances, infrastructure, and data flow are different from UAV networks, it is unsuitable for application in UAV environments. To resolve this problem, the study presents a lightweight UAV authentication method based on Physical Unclonable Functions (PUFs) that requires less computing resources in the ground Control and Non-Payload Communication (CNPC) environment, where recently, technology standardization is actively under progress.

Analysis of UGV Effectiveness Based on ABM(Agent Based Modeling) and Communication Network Environments (에이전트 기반 모델링 및 네트워크 통신 환경을 고려한 UGV 효과분석)

  • Lee, Jaeyeong;Shin, Sunwoo;Kim, Chongman
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.3
    • /
    • pp.89-97
    • /
    • 2018
  • In future warfare, most part of resources and their platforms would be replaced by unmanned system like UGV(Unmanned Ground Vehicle). They are also connected each other with communication network and it is called NCW(Network Centric Warfare) environment. Hence how to measure the effectiveness of UGV operated in NCW circumstance become an important issue. However, there are few research paper to deal with this kind of UGV effectiveness issue coupled with communication failure. In this paper, we proposed a new ABM process to measure the UGV effectiveness combined with communication success ratio based on terrain condition of the ground engagement. Additionally, we also provide the effectiveness analysis result when communication repeater is applied in case of communication failure.