• Title/Summary/Keyword: 전쟁양상

Search Result 125, Processing Time 0.025 seconds

An study on the common message design of Korean message format(KMTF) and direction of management procedure & tool (한국형 메시지포맷(KMTF)의 공통메시지 설계 및 관리 절차/도구 개발 방향 연구)

  • Ju, Jin-Chun;Kang, Suk-Jung;Lim, Dae-Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2010.07a
    • /
    • pp.349-352
    • /
    • 2010
  • 인터넷의 등장은 세계를 초단위 정보 소통 영역으로 묶어 정보가 사회를 주도하는 형태로 발전시켰듯이, 미래 전쟁 양상도 정보가 전쟁의 승패를 결정하는 네트워크중심전(NCW)으로 발전되고 있으며, NCW의 핵심은 무기체계간 상호운용성이다. 무기체계간 상호운용성을 확보하기 위해서는 표준화된 정보를 활용해서 연동하는 중요하며, 우리 군은 무기체계간 연동을 위해 연동메시지인 KMTF를 활용하고 있다. 그러나 현 KMTF 표준은 메시지구조(message frame)만을 제시하고 세부적인 메시지는 정의하지 않아 각 체계 개발자가 나름대로 메시지를 정의함으로써 중복된 메시지를 각 체계별로 관리하고 있고, 동일한 메시지를 다른 방식으로 적용하는 부작용이 발생할 수 있으며, 체계간 연동을 위해 별도의 변환기를 개발해야 하는 문제점이 발생하고 있다. 이를 위해 본 논문에서는 첫째, 미군 메시지포맷인 USMTF를 벤치마킹하여 무기체계에 공통 적용이 가능한 공통메시지 설계방안을 제시하며, 둘째, 메시지 생명주기 관리 및 메시지 추가등록 절차 관리를 위한 KMTF 표준 관리 절차를 제시하고, 셋째, 개정된 메시지 규격에 맞는 KMTF 관리도구 개발의 방향을 제시한다.

  • PDF

Mutual Authenticate Protocol among Sensor for Network Centric Warfare (네트워크 중심전을 위한 센서간의 상호인증기법)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwnag-Bin
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.25-30
    • /
    • 2012
  • As the network composed of numerous sensor nodes, sensor network conducts the function of sensing the surrounding information by sensor and of the sensed information. Our military has also developed ICT(Information and Communication Technology) along with the methods for effective war by sharing smooth information of battlefield resources through network with each object. In this paper, a sensor network is clustered in advance and a cluster header (CH) is elected for clusters. Before deployment, a certificate is provided between the BS and the sensor nodes, and after clustering, authentication is done between the BS and the sensor nodes. Moreover, inter-CH authentication technique is used to allow active response to destruction or replacement of sensor nodes. Also, because authentication is done twice, higher level of security can be provided.

A Leverage Strategy of the Cyber warfare Security Policy Based on systems Thinking (시스템 사고를 이용한 사이버전 보안 정책 레버리지 전략 연구)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Park, Ho-Kyun;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.77-83
    • /
    • 2013
  • As the network composed of numerous sensor nodes, sensor network conducts the function of sensing the surrounding information by sensor and of the sensed information. The concept of the battlefield is also changing to one that includes not only physical spaces but all areas including the networks of the nation's key industries and military facilities, energy facilities, transportation, and communication networks. In light of the changing warfare in terms of how it is conducted and what form it takes, the Korea military has to seek ways to effectively respond to threats of cyber warfare. In the past, although partial strategies on cyber warfare were studied, no research was done through the overall system flow. In this paper, key variables related to cyber warfare security are classified into personnel, management, and technology. A simple model and an extended model are suggested for each area, and based on the technology area of the extended model, formal methods are used to verify the validity and a detailed response strategy is suggested according to the identified leverage.

An Optimization of the Planned Target Sequencing Problem Using Scheduling Method (스케줄링을 이용한 계획표적 사격순서의 최적화 방안)

  • Hwang, Won-Shik;Lee, Jae-Yeong
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.1
    • /
    • pp.105-115
    • /
    • 2007
  • It is essential to give a fatal damage to the enemy force by using prompt and accurate fire in order to overcome the lack of artillery force. During the artillery fire operations, minimizing the firing time will secure the adapt ability in tactical operation. In this paper, we developed a mathematical model to schedule the artillery fire on the multiple targets to decrease total fire operation time. To design a program to describe a real firing situation, we consider many possible circumstances of changes such as commander's intention, firing constraints, target priority, and contingency plan to make a fire plan in an artillery unit. In order to work out the target sequencing problem, MIP is developed and the optimum solution is obtained by using ILOG OPL. If this analytical model is applied to a field artillery unit, it will improve the efficiency of the artillery fire force operations.

A Study on the Effective Military Use of Drones (드론의 효과적인 군사분야 활용에 관한 연구)

  • Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.61-70
    • /
    • 2020
  • The unmanned aerial vehicle that emerged with the 4th Industrial Revolution attracts attention not only from Korea but also from around the world, and its utilization and market size are gradually expanding. For the first time, it was used for military purposes, but it is currently used for transportation, investigation, surveillance, and agriculture. China, along with the US and Europe, is emerging as a leader in the commercial unmanned aerial vehicle market, and Korea, which has the world's seventh-largest technology in related fields, is striving to promote various technology development policies and system improvement related to unmanned aerial vehicles. Military drones will revolutionize the means of war by using a means of war called an unmanned system based on theories such as network-oriented warfare and effect-oriented warfare. Mobile equipment, including drones, is greatly affected by environmental factors such as terrain and weather, as well as technological developments and interests in the field. Now, drones are being used actively in many fields, and especially in the military field, the use of advanced drones is expected to create a new defense environment and provide a new paradigm for war.

A study on the use of reserve power in wartime by private guards (민간경비원 전시 예비전력 활용에 대한 연구)

  • JaeKeak Jung
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.153-158
    • /
    • 2023
  • Massacres of civilians are being committed in the Russia-Ukraine war, and the war is becoming a long-term war due to a lack of support for reserve combat forces. Considering the reality that South Korea is experiencing a rapid population decline and is rapidly entering an aging society, we are at a point where the nature of the war with North Korea must change. Among them, if private security guards are placed under the control of the police as regular security and crime prevention personnel and used as an alternative resource for reserve forces to ensure the safety of wartime areas and residents and prepare for long-term wars, it will help preserve combat power and maintain sustainability.Regarding private security, considering Japan's further development, we compared it with ours and looked into ways to utilize it as a reserve force for a divided country. In a future where low birth rates will lead to a decrease in military strength, if private security guards are used in local security vacuums during peacetime and participate in local defense during wartime, it could help improve the Korean military's reserve force.

The Remembrance of War and Overcoming its Aftermath through Literature: Focusing on the post Manchu's Invasion Period (전란의 기억과 문학적 극복 - 정묘·병자호란 이후 17세기 후반에 나타난 문학적 현상에 주목하여 -)

  • Baek, Jin-woo
    • (The)Study of the Eastern Classic
    • /
    • no.68
    • /
    • pp.69-97
    • /
    • 2017
  • In this paper, I tried to examine the aspects of overcoming the aftermath of war through literary works. As history is continuously being reinterpreted and reevaluated, historical figures are described differently and given new meanings especially in the field of literature. It is not only important to examine these interpretations from previous generations themselves; it is also important to analyze them from a modern day perspective and look closely at their meanings. This research, by focusing on the post Manchu's invasion period, I examined the contemporary discussion. Literary works which were written in the post Manchu's invasion had different meaning comparing to the other time. Scholars at that time wanted to use historical figures as an allegory of temporary national situation. And this social phenomena was deeply related to the temporary discourses such like wipe off a disgrace by taking revenge on Qing (boksu $s{\breve{o}}lch^{prime}I$, 復讐雪恥) or loyalty to the Ming dynasty ($taemy{\breve{o}}ng$ ${\breve{u}}iri$, 對明義理). So that this research takes genre, time period, and nationality as the main variables to interpret typical historical figures and study their aspects.

21Century of Combat Aspects of North Korean Attack Drones Through the War of the Century (21세기 전쟁을 통해 본 북한 공격 드론의 전투 양상 전망)

  • Kang-Il Seo;Sang-Keun Cho;Jong-Hoon Kim;Ki-Won Kim;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.299-304
    • /
    • 2023
  • Recently, drones have been used as a major means of attack drones in major wars around the world, and it seems likely that they will evolve into game changers in the future. Recently, drones have been used as a major means of attack drones in major wars around the world, and it seems likely that they will evolve into game changers in the future. In the major wars of the 21century, attack drones are used for precision fire-guided or self-destruct attacks, For the purpose of cognitive warfare, its territory is expanding not only to land and air, but also to sea and water. These attack drones will perform multi-domain operations, and for this purpose, the level of autonomy will be improved and High-Low Mix We will continue to develop by strengthening concept-based scalability. North Korea has also been making considerable efforts to operate attack drones for a long time, and activities such as third-country-level self-explosive drones, artificial intelligence-based clustered self-explosive drones, and self-destructive stealth unmanned semi-submersible are expected. In addition to North Korea's provocations and attacks, it is hoped that there will be a need for active follow-up research on our military's countermeasures and utilization plans.

A Study on the Identity and Activities of the Anti-US and Pro-Joseon Comfort group - New China's Culture Politics through the Korean War ('항미원조'(抗美援朝) 위문단의 실체와 활동 양상 -한국전쟁을 통한 신중국의 문화정치)

  • LI, FU-SHI
    • (The) Research of the performance art and culture
    • /
    • no.43
    • /
    • pp.173-202
    • /
    • 2021
  • During the Korean War, China dispatched 'the Anti-US and Pro-Joseon Comfort' group to North Korea 3 times. The purpose of the comfort group was to comfort the Chinese People's Supporting Soldiers and Joseon People's Army fighting the US imperial forces and at the same time, inform them of China's situation to booster their morale. Another purpose was to promote the socialism construction projects in the new China. Namely, China wanted to propagate various heroic achievements of the Chinese soldiers and accuse the US imperialist soldiers and thereby, inspire Chinese people's international sense and patriotism for the new China to mobilize the people for the war and promote the construction of the new China effectively. The comfort group consisted of diverse classes (laborers, farmers, intellectuals, women, students, soldiers, etc.) in various areas such as politics, military, ethnic, society, culture, education, etc. Their activities were conducted in various forms such as consolation, legwork, meeting and performances. Their activities were full of anger and compassion, sacrifice and emotion, battle and romance, impression and comfort. Such emotion was delivered intact to the Chinese people through the comfort group's propaganda activities back home in China. The Anti-US and Pro-Joseon Comfort' group revealed their identity of socialists New China in terms of their organization and their specific performances. Their identity claimed for democracy and equality, internationalism empathizing world peace and solidarity of the proletariats, and patriotism supporting the communists regime. The comfort group played a role in propagating such identity of new China effectively by crossing the border. It was a political and cultural performance that stipulated the political meaning of the Anti-US and Pro-Joseon Chosun Comfort' group

An Attack Model Based on Software Cruise for Information Warfare (정보전을 위한 소프트웨어 순항 기반 공격 모델)

  • Ryu Ho-Yeon;Nam Young-Ho
    • Journal of Internet Computing and Services
    • /
    • v.5 no.5
    • /
    • pp.49-60
    • /
    • 2004
  • Information Warfare(IW), a new aspect of war, is the field centralized the concern and research in the information security and national security, Both the defense and the offensive are important in the next generation IW, and so we need to do the various research to secure the network and system for gaining the superiority of IW. This paper proposes a model for IW based on software cruise to prepare the IW that is changing the offensive aspect. Software cruise is defined as a behavior of computer programs that travel toward specific destination from a source through the network. The proposed model have the cruise property and uses the cybermap to cruise toward the destination chosen in advance. Also, while self-movement, the model can function the predefined task.

  • PDF