• Title/Summary/Keyword: 전술 정보

Search Result 360, Processing Time 0.026 seconds

Secret Sharing based Node Authentication in Tactical Ad-Hoc Network (전술 애드혹 네트워크에서의 비밀분산 기반 노드 인증)

  • Yang, Ji-hun;Lee, Soo-jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.247-248
    • /
    • 2022
  • 본 논문에서는 군사용 전술통신 분야에서 활용성이 증대되고 있는 애드혹 네트워크에 적용 가능한 비밀분산 기반의 노드 인증 기법을 제안한다. 필드에 전개되기 이전에 네트워크를 형성할 각 노드는 지수형 분산비밀키과 원본비밀키를 저정하고, 필드에 배치된 이후 네트워크 형성 초기단계에서 비밀분산의 원본비밀키 정보 복원 연산을 통해 다수 노드에 대한 동시 인증을 실시한다. 그리고 인증과정에서 원본비밀키 복원 연산을 방해하는 노드를 원본비밀키 복원 연산을 수행하기 이전에 PUF값을 활용하여 탐지한다.

  • PDF

USN의 군 체계 적용방안

  • Lee, Dong-Jun;Han, Sang-Rok;Lee, No-Bok
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2007.11a
    • /
    • pp.319-323
    • /
    • 2007
  • 전투간 각급제대는 필요한 정보를 수집하기 위하여 다양한 수단을 사용해야 하는데 USN체계는 체계의 특성상 사단급이하의 전술제대에 적용이 적절하다고 보았다. USN을 군체계에 적용하는 방안을 정립하고 USN을 감시정찰체계로 사용하여 전시 및 평시에 사단급 이하에서의 전술작전간 운용하는 방안에 대하여 연구하였다. 이를 토대로 USN을 군체계에 적용할 경우에 보유해야 할 주요 성능 및 소요기술을 도출하고 분석하였다.

  • PDF

A Study on HCI Design based on Tactical Data Link integrated in KDDX Combat Management System for Korean-Type Mobile Fleet Control (차기구축함 전투관리체계에 통합된 전술데이터링크 기반의 한국형 기동함대 통제 HCI 설계에 관한 연구)

  • Song, Ha-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.5
    • /
    • pp.482-492
    • /
    • 2019
  • The naval ship consists of a variety of classes, including patrol, frigate, destroyer and landing ship. There are various means of communication between combat ships belonging to the mobile fleet, including voice network, text message network and tactical data link. The operation at the existing mobile fleet level was conducted mainly on voice and text message, and tactical data link were used mainly to share tactical information between combat ships. This study intended to design HCI for commander like as KDDX of fleet level based on tactical data link, a means of communication between ships, to secure operational control of the mobile fleet. Recently, naval ships have been developed in the organization of various sensors, weapons and tactical data links integrated into the combat management system, and this study also designed the HCI based on the tactical data links integrated in the combat management system. The purpose of this study was to secure the operational efficiency of the tactical data link based on the combat management system in operation of the mobile fleet, and to improve the capability of the fleet commander to recognize the battlefield situation awareness.

Simulator Design and Performance Analysis of Link-K Based Relative Navigation System (한국형전술데이터링크(Link-K) 기반 상대항법 시스템의 시뮬레이터 설계 및 성능분석)

  • Lee, Ju Hyun;Lee, Jin Hyuk;Choi, Heon Ho;Choi, Hyogi;Park, Chansik;Lee, Sang Jeong;Lee, Seung Chan
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.6
    • /
    • pp.528-538
    • /
    • 2016
  • In this paper, an extend kalman filter based relative navigation algorithm is proposed for Link-K based relative navigation. Link-K is a tactical data link system for joint operation capability upgrade of ROK forces. Link-K is inter-operable with Link-16 and transmit and received information of operations and target. In Link-K communication channel, PPLI message including transmitter position and TOA measurement can be used for relative navigation. Therefore Link-K based relative navigation system can be operated. In this paper, software based simulations were carried out for operational feasibility test and performance verification as error factors of proposed Link-K based relative navigation system.

Many-to-Many Warship Combat Tactics Generation Methodology Using the Evolutionary Simulation (진화론적 시뮬레이션을 이용한 다대다 함정교전 전술 생성 방법론)

  • Jung, Chan-Ho;Ryu, Han-Eul;You, Yong-Jun;Chi, Sung-Do;Kim, Jae-Ick
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.3
    • /
    • pp.79-88
    • /
    • 2011
  • In most existing warships combat simulation system, the tactics of a warship is manipulated by human operators. For this reason, the simulation results are restricted due to the stereotype of human operators. To deal with this, we have employed the genetic algorithm for supporting the evolutionary simulation environment. In which, the tactical decision by human operators is replaced by the human model with a rule-based chromosome for representing tactics so that the population of simulations are created and hundreds of simulation runs are continued on the basis of the genetic algorithm without any human intervention until to find emergent tactics which shows the best performance throughout the simulation. This paper proposes an evolutionary tactics generation methodology for the emergent tactics in many-to-many warship combat simulation. To do this, 3:3 warship combat simulation tests are performed.

An Adaptive Neighbor Discovery for Tactical Airborne Networks with Directional Antenna (지향성 안테나 기반 공중전술네트워크를 위한 적응적 이웃노드 탐색기법)

  • Lee, Sung-Won;Yoon, Sun-Joong;Ko, Young-Bae
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.1
    • /
    • pp.1-7
    • /
    • 2010
  • Network Centric Warfare(NCW) is becoming a prominent concept in the current trend of warfare. To support high quality communication between strategic/tactical units in the concept of NCW, Tactical Airborne Networks are likely to be constructed in the near future to take part in the NCW. In these Tactical Airborne Networks with dynamic topology variations due to very high mobility of participants nodes, more efficient and reliable neighbor discovery protocols are needed. This paper presents the adaptive HELLO message scheduling algorithm for Tactical Airborne Network using directional antennas. The purposed algorithm can reduce the overhead of periodic HELLO message transfer, while guaranteeing successful data transmission. We concluded a mathematical analysis and simulation studies using Qualnet 4.5 for evaluation the performance and efficiency of the proposed scheme.

Location Based Reliable Routing Protocol for Tactical Mobile Ad-Hoc Networks (전술 모바일 애드 혹 네트워크를 위한 위치 기반의 신뢰성 제공을 위한 라우팅 방법)

  • Youn, Myungjune;Kang, Tae Hun;Jeon, HahnEarl;Lee, Jaiyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1148-1161
    • /
    • 2012
  • Recently, developments in the field of communication and network technologies induced new paradigm in the defense weapon system. As a consequence, military authorities develop the Tactical Information Communication Network(TICN) system to adapt to the changing paradigm. One of the most important functions of TICN is real-time communication. As a result, TICN system needs to receive real-time information from the battlefield, and the key technology to support these features is MANET(Mobile Ad-Hoc Network) routing protocol. In this paper, we analyze problems of the shortest path scheme in tactical Ad-Hoc networks, which is widely used in common Ad-Hoc networks. We propose efficient routing protocol for tactical MANET by considering the environment of small combat units, such as node position, speed and data size. The proposed algorithm shows reliable data transfer and low latency in battlefield.

Conceptual Design of Networking Node with Real-time Monitoring for QoS Coordination of Tactical-Mesh Traffic (전술메쉬 트래픽 QoS 조율을 위한 네트워킹 노드의 개념 설계 및 실시간 모니터링)

  • Shin, Jun-Sik;Kang, Moonjoong;Park, Juman;Kwon, Daehoon;Kim, JongWon
    • Smart Media Journal
    • /
    • v.8 no.2
    • /
    • pp.29-38
    • /
    • 2019
  • With the advancement of information and communication technology, tactical networks are continuously being converted to All-IP future tactical networks that integrate all application services based on Internet protocol. Futuristic tactical mesh network is built with tactical WAN (wide area network) nodes that are inter-connected by a mesh structure. In order to guarantee QoS (quality of service) of application services, tactical service mesh (TSM) is suggested as an intermediate layer between infrastructure and application layers for futuristic tactical mesh network. The tactical service mesh requires dynamic QoS monitoring and control for intelligent QoS coordination. However, legacy networking nodes used for existing tactical networks are difficult to support these functionality due to inflexible monitoring support. In order to resolve such matter, we propose a tactical mesh WAN node as a hardware/software co-designed networking node in this paper. The tactical mesh WAN node is conceptually designed to have multi-access networking interfaces and virtualized networking switches by leveraging the DANOS whitebox server/switch. In addition, we explain how to apply eBPF-based traffic monitoring to the tactical mesh WAN node and verify the traffic monitoring feasibility for supporting QoS coordination of tactical-mesh traffic.

Design of Service-adaptive Tactical Data Transmission Protocol for Satellite Communications (위성통신을 위한 서비스 적응적인 전술 데이터 전송 프로토콜 설계)

  • Kim, Sujeong;Lee, Sooho
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.3
    • /
    • pp.72-79
    • /
    • 2016
  • In this paper, we propose a Service-adaptive Tactical Data Transmission Protocol (STTS) based on Satellite Communications with narrow bandwidth. STTS is designed to provide additional field for scalability and scheduler for reliability of transport stream protocol based on digital broadcasting standard, DVB-S and DVB-S2. It is also verified the effects of lost data packets with narrow bandwidth through the simulator by traffic model and re-transmission of critical data, and checked the design considerations based on STTS system.

Simulation-based Worm Damage Assessment on ATCIS (시뮬레이션 기반 육군전술지휘정보체계에 대한 웜 피해평가)

  • Kim, Gi-Hwan;Kim, Wan-Joo;Lee, Soo-Jin
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.2
    • /
    • pp.115-127
    • /
    • 2007
  • The army developed the ATCIS(Army Tactical Command Information System) for the battlefield information system with share the command control information through the realtime. The using the public key and the encryption equipment in the ATCIS is enough to the confidentiality, integrity. but, it is vulnerable about the availability with the zero day attack. In this paper, we implement the worm propagation simulation on the ATCIS infrastructure through the modelling on the ATCIS operation environment. We propose the countermeasures based on the results from the simulation.