• Title/Summary/Keyword: 전술 네트워크

Search Result 174, Processing Time 0.026 seconds

IEEE 802.11 MAC based Multi-hop Reservation and Backoff Scheme in MIMC Tactical Ad Hoc Networks (전술 애드 혹 네트워크에서 다중 홉 전송을 위한 자원 예약 및 백오프 기법)

  • Cho, Youn-Chul;Yoon, Sun-Joong;Ko, Young-Bae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.1
    • /
    • pp.16-27
    • /
    • 2012
  • In multi-interface multi-channel(MIMC) based tactical ad hoc networks, QoS support for required operational capacity is one of the main challenging issues for multi-hop transmissions. To support QoS in such a harsh environment, we propose a novel MAC scheme to minimize multi-hop as well as per-hop delay. The current IEEE 802.11 MAC protocols should contend to reserve the channel resource at every hop by each sender. The every-hop channel contention results in a degradation of end-to-end delay for multi-hop transmissions. The basic idea of our scheme is to make a "multi-hop reservation" at the MAC layer by using the modified RTS frame. It contains additional information such as destination information, packet priority, and hop count, etc. In addition, we differentiate the contention window area according to the packet priority and the number of hops to deliver packets in the predefined allowed latency. Our scheme can minimize the multi-hop delay and support the QoS of the critical data in real time(i.e., VoIP, sensing video data, Video conference between commanders). Our simulation study and numerical analysis show that the proposed scheme outperforms the IEEE 802.11 MAC.

A Study on the Estimation of Required Communication Capacity for Link-16 Based Tactical Networks (Link-16 기반 전술 네트워크를 위한 요구통신용량 산출에 관한 연구)

  • Kim, Young-Beom
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.1
    • /
    • pp.105-111
    • /
    • 2012
  • In this paper, we investigate the most commonly adopted networking technology for Network Centric Warfar (NCW), namely Link-16 in the perspectives of physical, data link, and network layers (specifically, strategic message exchanges) and derive its merits with some constraints therein. Furthermore, we perform a quantitative evaluation on its communication capacity, focusing on whether Link-16 can indeed meet the capacity requirements for major operations, based on the time slot structure, NPG, and multi-netting concepts.

Centralized Group Key Management Scheme for Tactical Swarming Drone Networks (전술 군집 드론 네트워크를 위한 중앙집권식 그룹키 관리 기법)

  • Lee, Jong-Kwan;Shin, Kyuyong;Kim, Kyung-Min
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.6
    • /
    • pp.817-825
    • /
    • 2018
  • Recently, drones have been used in various field to overcome time and space limitations. However, single drone still has a lot of restriction on transportation wight and travel time. Therefore many studies have been conducted to increase the utilization by swarm of drones. Many things should be additionally considered in order to operate swarming drones securely. Especially the group key management is a challenging research topic in tactical domain due to existence of adversary that has anti-drone skill. In this paper, we proposed an efficient group key management scheme for tactical swarming drone networks where an adversary equipped with anti-drone skills exists. The group key can be updated with a small number of message exchange compared to other convenience schemes. The numerical and simulation results demonstrate that the proposed scheme manages the group key efficiently and securely.

Simulation-based Worm Damage Assessment on ATCIS (시뮬레이션 기반 육군전술지휘정보체계에 대한 웜 피해평가)

  • Kim, Gi-Hwan;Kim, Wan-Joo;Lee, Soo-Jin
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.2
    • /
    • pp.115-127
    • /
    • 2007
  • The army developed the ATCIS(Army Tactical Command Information System) for the battlefield information system with share the command control information through the realtime. The using the public key and the encryption equipment in the ATCIS is enough to the confidentiality, integrity. but, it is vulnerable about the availability with the zero day attack. In this paper, we implement the worm propagation simulation on the ATCIS infrastructure through the modelling on the ATCIS operation environment. We propose the countermeasures based on the results from the simulation.

An Efficient Link-K Message Aggregation and Transmission Method for IP-based Tactical Networks (IP 기반 전술네트워크를 위한 효율적인 Link-K 메시지 통합 및 전송기법)

  • Yoon, Sun-Joong;Sung, Yun-Kyung;Cho, Youn-Chul;Ko, Young-Bae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.6
    • /
    • pp.1064-1070
    • /
    • 2010
  • Korea Department of Defense has been developing Link-K, Korean Joint Tactical Datalink, to support their independent joint operations and trying to enlarge the scope of Link-K tactical message delivery to nodes in IP based tactical networks for sharing situation awareness more broadly. A Link-K tactical message size is too small to fit into an IP packet, inefficiently wasting most of the IP packet space of the low bandwidth IP-based tactical networks. This paper proposes a new Link-K tactical message aggregation and delivery method when tactical messages need to be sent to some nodes located at IP-based tactical networks. With numerical analysis and OPNET simulation studies, we prove the effectiveness and efficiency of the proposed method.

Implementation of Automatic Control Function of Tactical Communication Equipment to Wireless Communication Network Survivability Improvement (무선통신망 생존성 향상을 위한 전술 통신 장비 자동 제어 기능 구현 방안)

  • Park, Chang-Soo;Kim, Jong-Hyoun;Park, Chun-Seon;Nam, Duk-Hee;Kim, Jung-Eun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.467-469
    • /
    • 2018
  • Tactical wireless communications often suffer from communication problems such as channel interference and communication disconnection due to the variability of the network topology and poor communication environment. Therefore, it is very important to overcome the problem of communication failure of the wireless communication network caused by the poor tactical environment and to improve the survivability. This paper describes the automatic control methodology of wireless communication equipment to identify and distinguish the situation of communication failure without user intervention and to implement more effective solution.

  • PDF

Analysis of Information Distribution Capability of the Army TIGER Corps Multilayer Integrated Communication Network (Army TIGER 군단 다계층 통합 전술통신망의 정보유통량 분석)

  • Junseob Kim;Sangjun Park;Yiju You;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.175-180
    • /
    • 2024
  • Future warfare is evolving with advanced science and technology, introducing a variety of unmanned and manned combat systems. These systems generate and exchange massive amounts of information, challenging current tactical communication systems as a foundation for future communication infrastructure. To analyze the information distribution capability of the Army TIGER corps, this paper examines four scenarios: standalone ground network operation, integrated network operation, load distribution, and error recovery. Utilizing M&S results, we highlight the potential of a multilayer integrated command and control network, incorporating ground, air, and space networks, to enhance the reliability and stability of the overall communication network.

A Proposal on Cryptographic Synchronization for T4 Link Encryption (T4급 링크 암호에 적합한 암호 동기방식 제안)

  • Lee, HoonJae;Kim, KiHwan;Kang, YongJin;Lee, Sang-Gon;Ryu, Young-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.202-210
    • /
    • 2018
  • The modern battlefield is being developed as a network-centric warfare where priority is given to rapid status grasp and power deployment through scientification and modernization. Therefore, tactical data link has been continuously improving the network speed, and recently, security technology is required for wireless communication with the UAV and various devices for reconnaissance. In addition, the future information warfare will utilize advanced IT technology positively. Efforts are needed to integrate various systems and networks. However, these efforts are meaningful only when they can assume sufficient security in a newly changing information and communication environment. In this paper, we propose a new cryptographic synchronization for link encryption suitable for tactical data links. The proposed cryptographic synchronization is useful for T4 UAV link encryption, and it is also adaptable for lower BER, then we analyze the performances analysis of that.

Rapid Self-Configuration and Optimization of Mobile Communication Network Base Station using Artificial Intelligent and SON Technology (인공지능과 자율운용 기술을 이용한 긴급형 이동통신 기지국 자율설정 및 최적화)

  • Kim, Jaejeong;Lee, Heejun;Ji, Seunghwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.9
    • /
    • pp.1357-1366
    • /
    • 2022
  • It is important to quickly and accurately build a disaster network or tactical mobile communication network adapting to the field. In configuring the traditional wireless communication systems, the parameters of the base station are set through cell planning. However, for cell planning, information on the environment must be established in advance. If parameters which are not appropriate for the field are used, because they are not reflected in cell planning, additional optimization must be carried out to solve problems and improve performance after network construction. In this paper, we present a rapid mobile communication network construction and optimization method using artificial intelligence and SON technologies in mobile communication base stations. After automatically setting the base station parameters using the CNN model that classifies the terrain with path loss prediction through the DNN model from the location of the base station and the measurement information, the path loss model enables continuous overage/capacity optimization.

A Node Management Scheme in Tactical Data Link Network (전술데이터링크 네트워크에서의 노드 이탈 관리 기법)

  • Ahn, Kwang-Ho;Lee, Ju-Hyung;Cho, Joon-Young;Oh, Hyuk-Jun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4B
    • /
    • pp.386-390
    • /
    • 2011
  • Modem warfares have changed from PCW (platform Centric Warfare) to NCW (Network Centric Warfare). Therefore, it is more important to operate and manage the network. This paper proposed a node management scheme in military wireless networks. In military wireless networks, nodes can join and leave the networks easily. It causes a degradation of network capacity. This paper figured out a problem caused by node which is leaving the network. This paper proposed a RSSI based method of estimating and detecting the leaving nodes in the networks. Finally, an experimental result was demonstrated to show the efficiency of the proposed method.