• Title/Summary/Keyword: 전술 메시지

Search Result 39, Processing Time 0.024 seconds

An Efficient Link-K Message Aggregation and Transmission Method for IP-based Tactical Networks (IP 기반 전술네트워크를 위한 효율적인 Link-K 메시지 통합 및 전송기법)

  • Yoon, Sun-Joong;Sung, Yun-Kyung;Cho, Youn-Chul;Ko, Young-Bae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.6
    • /
    • pp.1064-1070
    • /
    • 2010
  • Korea Department of Defense has been developing Link-K, Korean Joint Tactical Datalink, to support their independent joint operations and trying to enlarge the scope of Link-K tactical message delivery to nodes in IP based tactical networks for sharing situation awareness more broadly. A Link-K tactical message size is too small to fit into an IP packet, inefficiently wasting most of the IP packet space of the low bandwidth IP-based tactical networks. This paper proposes a new Link-K tactical message aggregation and delivery method when tactical messages need to be sent to some nodes located at IP-based tactical networks. With numerical analysis and OPNET simulation studies, we prove the effectiveness and efficiency of the proposed method.

Performance Analysis of Time Synchronization considering Message Collision Probability in Link-16 (Link-16 의 메시지 충돌 확률을 고려한 시간 동기 성능 분석)

  • Ko, Sangsoon;Baek, Hoki;Yu, Jepung;Lim, Jaesung
    • Annual Conference of KIPS
    • /
    • 2014.04a
    • /
    • pp.157-159
    • /
    • 2014
  • 전술데이터링크는 전장 환경에서 모든 플랫폼들을 네트워크를 통해 하나로 묶어 전쟁 효과를 극대화할 수 있는 기반이 되는 통신 기술이다. 이러한 전술데이터링크의 원활한 운영을 위해 플랫폼간 시간 동기가 필수적이며, 대부분 GPS(Global Positioning System)를 사용하고 있다. 전세계적으로 가장 널리 사용되고 있는 전술데이터링크인 Link-16 에서는 네트워크에 가입하면서 NTR(Network Time Reference) 과의 시간을 동기화하는 절차를 제공한다. 이러한 시간 동기 절차는 대략적인 동기와 정밀한 동기의 두 단계로 구분된다. 대략적인 동기는 프레임이 시작하는 첫 타임 슬롯에서 주변 노드로부터 IEM(Initial Entry Message)을 수신하여 전송 시간만큼의 오류를 포함하는 시간 동기 방식이다. 본 논문에서는 모의 실험을 통해 IEM 을 전송하는 노드의 거리에 따른 메시지의 충돌 확률을 구하고, 그 충돌 확률에 따라 시간 동기에 소요되는 시간으로 Link-16 의 시간 동기 성능을 분석하였다.

Recovering Network Joining State for Normal/Abnormal Termination of Battlefield Management System (전장관리시스템의 정상/비정상 종료 시 망 가입상태 복원)

  • Choi, YoonChang;Kwon, DongHo
    • Journal of KIISE
    • /
    • v.44 no.8
    • /
    • pp.749-759
    • /
    • 2017
  • The weapon system based on voice call can cause delay, error or damage to the message during the exchange of information. Furthermore, since the weapon system has a unique message format, it has limited data distribution. Therefore, a Korea Variable Message Format(KVMF) has been developed in this study to utilize a standard sized data format to guarantee the transmission quality and minimize the transmission amount. The ground tactical data link system quickly and accurately shares tactical information by incorporating a field management system that utilizes the KVMF standard message in the mobile weapon system. In this study, we examine the possibility of performing the mission immediately by recovering the state of network joining when a normal/abnormal termination situation of the battlefield management system occurs.

A Two-Way Authentication Protocol Based on Hash Collision for Unmanned Systems in Tactical Wireless Networks (전술 무선 네트워크에서 무인체계를 위한 해시 충돌 기반의 양방향 인증 프로토콜)

  • Lee, Jong-kwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.729-738
    • /
    • 2019
  • In this paper, we propose two-way authentication protocol between unmanned systems in tactical wireless networks in which long distance communications are not guaranteed due to a poor channel conditions. It is assumed that every unmanned systems have same random data set before they put into combat. The proposed protocol generates authentication code(AC) using random data that causes hash collision. The requester for authentication encrypts the materials such as their identifier, time-stamp, authentication code with the secret key. After then the requester transmits the encrypted message to the receiver. The receiver authenticates the requester by verifying the authentication code included in the request message. The performance analysis of the proposed protocol shows that it guarantees the security for various attack scenarios and efficiency in terms of communication overhead and computational cost. Furthermore, we analyzed the effect of the parameter values of the proposed protocol on the performance and suggest appropriate parameter value selection guide according to the level of security requirement.

Method of Format Conversion Between Link-K and KMTF Messages (Link-K와 KMTF 메시지 간 포맷 변환 방법)

  • Kim, Wan-Sik;Lee, Min-Sik;Kim, Sang-Jun;Park, Ji-Hyeon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.2
    • /
    • pp.264-271
    • /
    • 2017
  • Link-K message is the Tactical Data Link message standard developed by the Agency for Defense Development which is optimized for the Joint Operation of ROK Armed Force. KMTF message is the standard message format of Battle Management Information System. Interconversion and propagation between these messages are definitely needed to have efficient warfare such as situation data propagation using network, the convergence of collected situation data, common situational awareness, cooperative engagement. Therefore, this study suggests a way of rule and process for format conversion between Link-K and KMTF messages.

A Study on a Clustering for Military Tactical Information Communication Network (군 전술정보통신체계에서 클러스터 구조에 대한 연구)

  • Lee, Myung-Noh;Yoo, Jae-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.709-712
    • /
    • 2010
  • A military tactical information communication network uses no base station and all mobile terminal are independent while mobile networks use an infra structure that a fixed base station supports many mobile terminals. A clustering system is more efficient than the existing one in small Ad-hoc network using a limited message size. The development of an adaptive clustering algorithm is necessary to maximize the network efficiency via a study on a clustering for military tactical information communication network.

  • PDF

Simulator Design and Performance Analysis of Link-K Based Relative Navigation System (한국형전술데이터링크(Link-K) 기반 상대항법 시스템의 시뮬레이터 설계 및 성능분석)

  • Lee, Ju Hyun;Lee, Jin Hyuk;Choi, Heon Ho;Choi, Hyogi;Park, Chansik;Lee, Sang Jeong;Lee, Seung Chan
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.6
    • /
    • pp.528-538
    • /
    • 2016
  • In this paper, an extend kalman filter based relative navigation algorithm is proposed for Link-K based relative navigation. Link-K is a tactical data link system for joint operation capability upgrade of ROK forces. Link-K is inter-operable with Link-16 and transmit and received information of operations and target. In Link-K communication channel, PPLI message including transmitter position and TOA measurement can be used for relative navigation. Therefore Link-K based relative navigation system can be operated. In this paper, software based simulations were carried out for operational feasibility test and performance verification as error factors of proposed Link-K based relative navigation system.

An approach to define variable length messages using ASN.1 (ASN.1을 이용한 가변 길이 메시지 표현 방법)

  • Baek, Haeun;Kang, Sungwon;Kim, Jingyu;Kim, Jungmin;Kwon, Koohyung;Kim, Sangsoo
    • Journal of Software Engineering Society
    • /
    • v.25 no.2
    • /
    • pp.35-47
    • /
    • 2012
  • Variable Message Format(VMF) is a communications protocol that allows computers to exchange tactical military information over low-data-rate bearers. VMF is designed to define message length and structure variably in order to allow the user to transmit only the relevant information by using indicators. However, flexibility of messages makes it difficult to analyze messages structure and figure out meanings. Furthermore, whenever messages are added or modified, message processing software should be updated and distributed to systems. In this paper, we propose a systematic approach to defining VMF messages that uses the international standard notation ASN.1. By describing VMF messages in ASN.1, protocol architects can deal with VMF messages accurately and conveniently, and use various ASN.1 tool. This paper develops ASN.1 description templates for VMF message segments, and presents an approach to describing VMF messages in ASN.1 by combining the templates.

  • PDF

A Study on the Design of KVMF 2.0 Protocol for Ensuring Backward/Forward Compatibility between Different KVMF Message Standard Versions

  • Jeong-Min, Lee;Won-Gi, Lim;Won-Jun, Cho;Yong-Cheol, Kim;Jeung-Sub, Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.3
    • /
    • pp.45-58
    • /
    • 2023
  • KVMF(Korean Variable Message Format) 1.0 protocol is the Army's standard tactical datalink protocol that defines standard messages and communication methods to enable data communication between various weapon systems through bitwise variable message processing. The protocol has been applied to a variety of Army weapon systems over the past decade and has contributed to upgrade the Army's operational capabilities by enabling the implementation of Network Centric Warfare (NCW), the core of modern warfare. Since the KVMF 1.0 protocol was applied, new weapon systems with new technologies have been introduced over time, and new weapon systems have new messages based on the characteristics of the weapon system. As a result, compatibility problems arose due to different message versions with existing weapon systems, and it was expected that these problems would continue to emerge in the future, considering the need for continuous message revisions. Therefore, it became necessary to solve this problem, so this paper proposed a KVMF 2.0 protocol design that guarantees compatibility between forward and backward versions. In this paper, we implemented the design as SW, and confirmed that the design worked successfully by test between forward and backward versions on test environment. Therefore, when the KVMF 2.0 protocol design is applied to a weapon system, we can expect that the weapon system can be compatible with the forward and backward versions working with the existing weapon systems as well as with the future weapon systems.

An Adaptive Neighbor Discovery for Tactical Airborne Networks with Directional Antenna (지향성 안테나 기반 공중전술네트워크를 위한 적응적 이웃노드 탐색기법)

  • Lee, Sung-Won;Yoon, Sun-Joong;Ko, Young-Bae
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.1
    • /
    • pp.1-7
    • /
    • 2010
  • Network Centric Warfare(NCW) is becoming a prominent concept in the current trend of warfare. To support high quality communication between strategic/tactical units in the concept of NCW, Tactical Airborne Networks are likely to be constructed in the near future to take part in the NCW. In these Tactical Airborne Networks with dynamic topology variations due to very high mobility of participants nodes, more efficient and reliable neighbor discovery protocols are needed. This paper presents the adaptive HELLO message scheduling algorithm for Tactical Airborne Network using directional antennas. The purposed algorithm can reduce the overhead of periodic HELLO message transfer, while guaranteeing successful data transmission. We concluded a mathematical analysis and simulation studies using Qualnet 4.5 for evaluation the performance and efficiency of the proposed scheme.