• Title/Summary/Keyword: 전장관리체계

Search Result 74, Processing Time 0.02 seconds

A Study on Sharing Web Application between Battlefield Management System based on PKI Authentication (PKI 인증기반 전장관리체계 웹 연동에 관한 연구)

  • Kim, Young-Sung;Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the military operations research society of Korea
    • /
    • v.36 no.1
    • /
    • pp.123-140
    • /
    • 2010
  • Interworking Web Application to share the resource between Battlefield Management Systems(BMS) is critical issues for accomplishment of information superior. However, authentication system of BMS differ from each other because of having the independent plan for system build. This problem causes inefficiency such as the information insufficiency owing to not share web application and the need of additional laptops. To solve the problem, in this paper, we propose the improved certificate acquisition and verification algorithm for the user of different BMS. By testing the proposed algorithm appling to the real field, we verify the performance of proposed method.

A Study on Improvement Methods for Encrytion and Authentication in Batt le Field Management System(C4I) (전장관리체계(C4I)에서의 암호 및 인증방법 개선 방안에 관한연구)

  • Lee, Won Man;Koo, Woo Kwon;Park, Tae Hyeong;Lee, Dong Hoon
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.39-50
    • /
    • 2012
  • Battlefield management systems are operated by the Public Key Infrastructure (PKI) and cryptographic equipment is distributed through the personal delivery to the enemy has deodorizing prone to structure. In addition, Per person each battlefield management system (C4I) encryption key operate and authentication module to manage multiple encryption so, encryption key operating is restrictions. Analysis of the problems of this public key infrastructure(PKI), Identity-Based Cryptosystem(IBC) and Attribute-Based Cryptosystem(ABC) to compare construct the future of encrypt ion and authentication system were studied. Authentication method for the connection between the system that supports data encryption and secure data communication, storage, and communication scheme is proposed.

A Study on the Factors Affecting the Use of the Military Battlefield Management System in the Non-voluntary Use Environment

  • Cho, Jungik;Ahn, Hyunchul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.101-116
    • /
    • 2019
  • In this paper, we propose a novel behavioral model that explains the use of the military battlefield management system more effectively in the non-voluntary use environment. This study intends to suggest a model based on the Unified Theory of Acceptance and Use of Technology(UTAUT), an extended TAM. Also, it introduces the concept of 'Conative IS use' as a dependent variable that can explain user's behavior more effectively in non-voluntary technology acceptance environment. In addition, we propose the major factors affecting the UTAUT components from the TOE(Technology-Organization-Environment) perspectives, and analyze their effects. In order to validate the proposed model, this study applies PLS(Partial Least Squares) to the survey collected from military personnel. The findings of our study may shed a light on improving the effectiveness of battlefield management information system.

A Key Management Scheme through Three Stages Authentication for Hierarchical Tactical Ad-hoc Networks (계층형 전술 Ad-hoc 네트워크에서 3단계 인증을 통한 키 관리 기법)

  • Seo, Dong-Seon;Lee, Soo-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06c
    • /
    • pp.239-241
    • /
    • 2012
  • 우리 군은 미래전을 대비하기 위해 각종 전술 응용정보체계의 막힘없는 전송과 통신망간 연동 요구를 충족시키고 미래 전장을 주도할 통신체계 구축을 목표로 전술정보통신체계(TICN) 개발을 추진 중이다. Ad-hoc 네트워크 기술을 사용하는 전술정보통신체계의 부체계인 전투무선체계는 전장 환경에서 운영되는 특수성으로 인해 기존의 전통적인 플랫한 Ad-hoc 네트워크와는 차별화된 계층형 Ad-hoc 네트워크 구조를 가진다. 또한 Ad-hoc 네트워크를 운용하는 환경이 보안성이 극도로 요구되는 전장 환경임을 고려할 때 군 작전의 성공적인 목표 달성을 위한 보안대책은 반드시 필요하다. 특히 전장상황 하에서 유통될 각종 민감 정보들에 대한 기밀성, 무결성 등을 보장하기 위해 정당한 권한을 가진 노드들만이 네트워크에 참여할 수 있는 보안 매커니즘이 적용되어야 하며, 이를 위해선 효율적인 키 관리 기법을 적용해야 한다. 본 논문에서는 비밀키, 노드위치, 해시인증 등의 정보를 이용한 3단계 인증절차 적용으로 Ad-hoc 네트워크 참여 노드의 인증을 강화하고, 통신환경에 따라 3가지 비밀키를 구분 사용하여 계층형 Ad-hoc 네트워크 구조에서 기밀성 보장을 강화하기 위한 키 관리 기법을 제안한다.

A Role-based Storage Encryption for the Electronic Approval System of Battle Management Systems (전장관리체계 전자결재시스템을 위한 역할기반 스토리지 암호화 기법)

  • Her, Kyoung-Soon;Lee, Soo-Jin
    • Journal of the military operations research society of Korea
    • /
    • v.37 no.1
    • /
    • pp.71-85
    • /
    • 2011
  • The most important factors of Electronic approval system of battle management system are availability and reliability. Therefore, the electronic approval system uses a SAN(storage area network) to construct the reliable server and storage. In this paper, we analyze the security vulnerabilities of the SAN storage that stores the critical military information in the electronic approval system of battle management system. Based on the analysis, we verify the possibility of information leakage by the inside attackers through the scenario-based experiment. And we finally propose a new storage encryption algorithm on the basis of user's role that can prevent the leakage of information by the inside attackers.

Recovering Network Joining State for Normal/Abnormal Termination of Battlefield Management System (전장관리시스템의 정상/비정상 종료 시 망 가입상태 복원)

  • Choi, YoonChang;Kwon, DongHo
    • Journal of KIISE
    • /
    • v.44 no.8
    • /
    • pp.749-759
    • /
    • 2017
  • The weapon system based on voice call can cause delay, error or damage to the message during the exchange of information. Furthermore, since the weapon system has a unique message format, it has limited data distribution. Therefore, a Korea Variable Message Format(KVMF) has been developed in this study to utilize a standard sized data format to guarantee the transmission quality and minimize the transmission amount. The ground tactical data link system quickly and accurately shares tactical information by incorporating a field management system that utilizes the KVMF standard message in the mobile weapon system. In this study, we examine the possibility of performing the mission immediately by recovering the state of network joining when a normal/abnormal termination situation of the battlefield management system occurs.

An Interworking Model for Small Unit Location Data (소부대 위치 데이터 연동 모델)

  • Bae, Jung-Joo;Kim, Jeong-Dong;Baik, Doo-Kwon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.86-88
    • /
    • 2012
  • 우리 군은 부대의 규모 및 활용 용도에 따라 다양한 전장관리정보체계를 운용하고 있다. 또한, 새로운 전장관리정보체계를 도입하여 운용할 예정이다. 이에 데이터의 연동이 중요한 문제로 인식되고 있다. 본 연구에서는 우리 군의 데이터 연동을 위한 정책 및 시스템과 외국군의 데이터 연동 기법을 소개하고 소부대 위치 데이터 연동을 위한 모델을 제안한다.

Blockchain applied Military Electronic Secret Document Management Scheme (focused on C4i) (블록체인을 적용한 군(軍) 전자적 비밀관리 개선방안 (전장관리정보체계 중심으로))

  • Hong Yoon;Yeong Gyun Cha;Jong Beom Park
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.181-187
    • /
    • 2023
  • Recently, military operations have been aimed at winning using various information, analysis, weapons, and operation systems. These systems should consist of integrated composition and the function of analyzing and sharing data. Accordingly, military C4I collects and analyzes a lot of data and produces and shares secrets to perform effective operations. However, C4I cannot operate in electronic form from secret production to disposal. And as it is managed based on the output, problems such as difficulty in management and loss/leakage arise. Therefore, in this paper, we propose an ESDMB(Electronic Secret Document Management whit Bloockchain) plan based on blockchain technology to manage all secrets in electronic document format and provide integrity and denial prevention. In particular, the blockchain-based proposal method will be suitable as a protection measure against manipulation and leakage, from secret production to destruction.

An Implementation of the Battlefield Management System of Ground Fighting Vehicles for Insuring the Visualization of Battlefield using TMMR (다대역다기능 무전기(TMMR)기반하 지상전투차량에서 전장 가시화를 위한 전장관리체계(BMS) 구현)

  • Choi, Il-Ho;Kim, Dae-Young;Kwon, Chul-Hee;Lee, Sang-Myung;Kim, Chul-Hak
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.6
    • /
    • pp.752-761
    • /
    • 2016
  • Tactical Multiband Multirole radio(TMMR) has been developed and under some official testings now. Our army wants TMMR to be installed in Ground Fighting Vehicles(GFVs) and be incorporated with their Battlefield Management System(BMS). Also, BMS with TMMR should communicate with BMS on FM radio which is currently under use in most of GFVs. To achieve such goals, some significant changes should be made into the present BMS and in this paper, several considerations will be presented in the both sides of hardware and software point of view.

21세기 전차 사격통제장치의 발전추세

  • Kim, Sang-Ho
    • Defense and Technology
    • /
    • no.8 s.246
    • /
    • pp.66-77
    • /
    • 1999
  • 지상전의 핵심 무기체계인 전차에서도 무인 정찰기나 인공 위성에 의한 정확한 정보획득으로 효율적인 지휘통제가 이루어지도록 $C^4I$체계, 전자감시체계 및 정밀타격체계 등을 하나의 통합체계로 구성하여 전투효율의 극대화와 다차원 동시 통합전투라는 미래 전장 운영개념인 전투관리 시스템(BMS:Battle Management System)이 연구 개발되고 있다

  • PDF