• Title/Summary/Keyword: 전술 네트워크

Search Result 174, Processing Time 0.021 seconds

Dynamic Slot Allocation Scheme in Tactical Multi-hop Networks for Future Soldier Systems (개인전투체계 다중홉 네트워크를 위한 동적 시간슬롯 할당 기법)

  • Lee, Jongkwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.1
    • /
    • pp.115-122
    • /
    • 2021
  • In this paper, we propose a dynamic slot allocation scheme to improve the slot utilization rate in tactical multi-hop networks in which the channel condition varies due to node movements. The proposed scheme takes advantage of the fact that nodes that are more than three hops apart can use the same slot simultaneously. The frame is divided into two parts: the control period and the data period. To know the available slot information within two-hop distance, the node exchanges a slot allocation information with one-hop neighbors during the control period. The node can get the information on idle slots that are not used within two-hop distance but assigned already to other nodes that are more than three-hop away. The identified idle slot can be used by the node, which increases the slot utilization rate. The performance analysis results of the proposed scheme show that it increases the slot utilization rate sufficiently despite the overhead of the control period in the multi-hop networks of the future soldier system.

Vulnerability Mitigation System Construction Method Based on ATT&CK in M ilitary Internal Network Environment (국방 네트워크 환경에서 ATT&CK 기반 취약점 완화 체계 구축 방안)

  • Ahn, Gwang Hyun;Lee, Hanhee;Park, Won Hyung;Kang, Ji Won
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.135-141
    • /
    • 2020
  • The Ministry of National Defense is strengthening the power and capacity of cyber operations as cyber protection training is conducted. However, considering the level of enemy cyber attack capability, the level of cyber defense capability of the ministry of national defense is significantly low and the protection measures and response system for responding to cyber threats to military networks are not clearly designed, falling short of the level of cyber security capabilities of the public and private sectors. Therefore, this paper is to investigate and verify the establishment of a military internal network vulnerability mitigation system that applies the intention of attackers, tactics, techniques and procedures information (ATT&CK Framework), identified military internal network main threat information, and military information system security requirements with military specificity as factors that can establish a defense network vulnerability mitigation system by referring to the domestic and foreign cyber security framework It has the advantage of having.

Reliable Multicast MAC Protocol with Low Probability of Detection for Survivability in Tactical Ad-hoc Networks (생존성 향상을 위해 신뢰성 및 저피탐을 보장하는 멀티캐스팅 MAC 프로토콜 기법)

  • Kim, Jeong-Hun;Jung, Jun-Woo;Kim, Jung-Bin;Lim, Jae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11B
    • /
    • pp.1685-1695
    • /
    • 2010
  • In this paper, we propose a new reliable multicast MAC protocol over the IEEE 802.11-based tactical ad hoc networks. The major contribution compared to the previous reliable multicast schemes using consecutive CTSs/ACKs is that the proposed scheme can send multiple CTS/ACK messages concurrently assisted by MC-DS/CDMA mechanisms. When multiple receivers receive the RTS/DATA message from a sender, they respond with the CTS/ACK message spread with pre-assigned code in the same time interval. The proposed scheme can reduce the overhead of multiple CTSs/ACKs. It is also possible to alleviate the received signal strength at the enemy detector and thus it improves low probability of detection performance. Through simulations and analysis, the proposed scheme outperforms that of the multiple CTSs/ACks in terms of the throughput, transmission delay and low probability of detection.

The Push Framework for UMPC Tactical Data Link(TDL) Based on The Legacy Radio (레거시 라디오 기반의 UMPC 전술 데이터 링크 Push 프레임워크)

  • Sim, Dong-Sub;Shin, Ung-Hee;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.3
    • /
    • pp.397-404
    • /
    • 2010
  • Recently, there is on-going research about tactical data link system based on the legacy radio. Tactical data link based on legacy radio is operated mostly in narrow bandwidth under 25khz. Communicating traffics in nodes participated at network need to be minimized for distributing tactical data in narrow bandwidth. In addition, the data distributing structure is necessary for distributing tactical informations such as a situation awareness and so on to war fighters. However, conventional server-client system wastes a lot of time to obtain information for war fighters as user uses pull system to gather necessary information by seeking it one by one. Especially, the fighter pilot is supposed to dedicate into a situation awareness and fight mission in every seconds but seeking information of a user terminal while aircraft maneuvering affects as obstacle to concentrate engaging hostiles. therefore, push technology, the tactical data distributing system, is necessary for war fighters to receive fixed tactical data automatically without putting attention to it. This paper propose the UMPC tactical data link push framework. the UMPC tactical data link is a tactical data link system based on the legacy radio. Proposed push framework is verified by composing experiment environment and testing.

An Enhanced DAP-NAD Scheme for Multi-Hop Transmission in Combat Net Radio Networks (전투 무선망에서 다중 홉 전송을 위한 향상된 DAP-NAD 기법)

  • Jung, Jong-Kwan;Kim, Jong-Yon;Roh, Byeong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.977-985
    • /
    • 2012
  • Recently, many countries have been developing new protocols to improve the performance of tactical ad hoc networks for implementing NCW (Network Centric Warfare). Combat net radio (CNR) networks are the most important communication infra for the ground forces such as infantry of Army. U.S. Army had developed MIL-STD-188-220D that is the Interoperability Standard for DMTDs (Digital Messages Transfer Device Subsystems) for voice and data communication in CNR. MIL-STD-188-220D is a candidate for MAC protocol of TMMR which is next radio and has a few constraints to used in TMMR. NAD (Network Access Delay) defined in MIL-STD-188-220D needs time synchronization to avoid collision. However, it is difficult for time synchronization to fit in multi-hop environment. We suggest the enhanced DAP (Deterministic Adaptable Priority)-NAD to prevent conflicts and decrease delays in multi-hop CNR. Simulation results show that the proposed scheme improves the performance in multi-hop CNR networks.

Priority Based Medium Access Control and Load Balancing Scheme for Shared Situational Awareness in Airborne Tactical Data Link (공중 전술 데이터링크에서 상황인식 공유를 위한 우선순위 기반 매체접속제어와 부하분산 기법)

  • Yang, Kyeongseok;Baek, Hoki;Park, Kyungmi;Lim, Jaesung;Park, Ji Hyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1210-1220
    • /
    • 2016
  • As modern warfare has changed into network centered, the ability to share situational awareness among allies become a core competency for performing operational missions. In an airborne environment, it uses a tactical data link such as Link-16 for shared situational awareness. There exist problems when it shares situational awareness over the existing data link that can not allocate slots dynamically or that can not change the number of a slot to be allocated. In addition, there was a problem that can not share this failure so that failed to improves situation awareness because of finite time slot resources. In this paper, we accommodate dynamic slot allocation and changes of slot allocation with mixed structure of TDMA (time division multiple access) and random access. We propose a technique that can be used when available slots are exhausted, and a load balancing method to prevent slot allocation delay when slot requesting or message sending is concentrated on a single subframe.

An Efficient Key Management Scheme in Tactical Ad-Hoc Network (전술 Ad-hoc 네트워크에서의 효율적인 키 관리 기법)

  • Kim, Eun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.3
    • /
    • pp.317-324
    • /
    • 2009
  • Tactical Information Communication Network(TICN) uses both a wireless and wired network. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. However, Ad-hoc network is faced to many security threats due to its intrinsic characteristics. Therefore, to apply the Ad-hoc networking technology to battlefield environments and TICN, an intensive study on security countermeasure must go side by side with the development of enabling technology. In this paper, we suggest an efficient key management scheme for TICN of which the Ad-hoc networking technology is applied.

A Performance Study of Tactical Data Link Transceiver in TDMA Networks (TDMA 네트워크 전술데이터링크 송수신기 구현 및 성능고찰)

  • Nam, Jeong-Ho;Seo, Nan-Sol;Jang, Dhong-Woon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.3
    • /
    • pp.388-396
    • /
    • 2010
  • Generally, flight information is transmitted by voice signal over legacy UHF radio in ground to air communication system. In this paper, we have implemented the transceiver of TDL(tactical data link) which transmits tactical information, such as flight information, using digital signal. For transmitting digital information over radio path, we have designed data modem that is processing CPFSK modulation, and TDMA(Time Division Multiple Access) network for Synchronization among multi user(platform). By simulating aeronautical propagation modeling with the environment of Korea terrain, it is predicted the maximum performance of communication range of the transceiver. As result of the transceiver's aviational boarding test, it is proved that the transceiver of TDL over legacy UHF radio transmits and receives the tactical information in TDMA network within communication range of 160km.

Efficiently Development Plan from the User's Need Analysis of the Army Tactical C4I(ATCIS) System (지상전술 C4I(ATCIS)체계 운용자 요구분석을 통한 효율적 발전 방안)

  • Park, Chang-Woon;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.5
    • /
    • pp.246-259
    • /
    • 2008
  • This study was to minimize the trial and error in the primary step of the C4I system(ATCIS) of the each army corps on the front line, and test the economy and efficiency was tested by reviewing related papers and the system characteristics of other countries. The relationship was researched by analyzing the collected survey data and survey data related to the user's requirement level such as the army standards, that is, commonality, timeliness, simplification, automaticity, field availability and viability, multi-stage security and interoperability, unification. The result showed that the C4I system was efficiently operated through the system reliability for the specification of the system and operation manual, maneuverability and security, adaptability of the war field and system support and management, and good education and training about system operation, and less system maintenance and supplementary element. As a result, the development plan confirmed that the continuous operator education and the construction of the maintenance, and the upgrade digitalization(C4ISR+D) with the korean characteristics based on IT of network systems, and system development of the measurement model of the operator performance must be continuously supplemented in the near future.

Detection Model of Malicious Nodes of Tactical Network for Korean-NCW Environment (한국형 NCW를 위한 전술네트워크에서의 악의적인 노드 검출 모델)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.71-77
    • /
    • 2011
  • NCW(Network Centric- Warfare) encompasses the concept to use computer data processing and network linkage communications techniques, share information and furthermore, enhance the effectiveness of computer-operating systems. As IT(Information & Technology) have become developed in the recent years, the existing warfare system-centered conventional protocol is not use any longer. Instead, network-based NCW is being widely-available, today. Under this changing computer environment, it becomes important to establish algorithm and build the stable communication systems. Tools to identify malign node factors through Wireless Ad-hoc network cause a tremendous error to analyze and use paths of even benign node factors misreported to prove false without testing or indentifying such factors to an adequate level. These things can become an obstacle in the process of creating the optimum network distribution environment. In this regard, this thesis is designed to test and identify paths of benign node factors and then, present techniques to transmit data through the most significant open short path, with the tool of MP-SAR Protocol, security path search provider, in Ad-hoc NCW environment. Such techniques functions to identify and test unnecessary paths of node factors, and thus, such technique users can give an easy access to benign paths of node factors.