• Title/Summary/Keyword: Battlefield Environment

Search Result 119, Processing Time 0.019 seconds

Hacking attack and vulnerability analysis for unmanned reconnaissance Tankrobot (무인정찰 탱크로봇에 대한 해킹 공격 및 취약점 분석에 관한 연구)

  • Kim, Seung-woo;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.9
    • /
    • pp.1187-1192
    • /
    • 2020
  • The dronebot combat system is a representative model of the future battlefield in the 4th industrial revolution. In dronebot, unmanned reconnaissance tankrobot can minimize human damage and reduce cost with higher combat power than humans. However, since the battlefield environment is very complex such as obstacles and enemy situations, it is also necessary for the pilot to control the tankrobot. Tankrobot are robots with new ICT technology, capable of hacking attacks, and if there is an abnormality in control, it can pose a threat to manipulation and control. A Bluetooth sniffing attack was performed on the communication section of the tankrobot and the controller to introduce a vulnerability to Bluetooth, and a countermeasure using MAC address exposure prevention and communication section encryption was proposed as a security measure. This paper first presented the vulnerability of tankrobot to be operated in future military operations, and will be the basic data that can be used for defense dronebot units.

The Development of Artificial Intelligence-Enabled Combat Swarm Drones in the Future Intelligent Battlefield (지능화 전장에서 인공지능 기반 공격용 군집드론 운용 방안)

  • Hee Chae;Kyung Suk Lee;Jung-Ho Eom
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.65-71
    • /
    • 2023
  • The importance of combat drones has been highlighted through the recent outbreak of the Russia-Ukraine war. The combat drones play a significant role as a a game changer that alters the conventional wisdom of traditional warfare. Many pundits expect the role of combat swarm drones would be more crucial in the future warfare. In this regard, this paper aims to analyze the development of artificial intelligence-enabled combat swarm drones. To transform the human-operated swarm drones into fully autonomous weaponry system our suggestions are as follows. Developments of (1) AI algorithms for optimized swarm drone operations, (2) decentralized command and control system, (3) inter-drones' mission analysis and allocation technology, (4) enhanced drone communication security and (5) set up of ethical guideline for the autonomous system. Specifically, we suggest the development of AI algorithms for drone collision avoidance and moving target attacks. Also, in order to adjust rapidly changing military environment, decentralized command and control system and mission analysis allocation technology are necessary. Lastly, cutting-edging secure communication technology and concrete ethical guidelines are essential for future AI-enabled combat swarm drones.

Performance Prediction and Analysis of Identification Friend or Foe(IFF) Radar by using Modeling & Simulation Methodology (M&S 기법을 통한 피아식별 레이다 성능예측 및 분석)

  • Kim, Hyunseung;Park, Myunghoon;Jeon, Woojoong;Hong, Sungmin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.2
    • /
    • pp.159-167
    • /
    • 2020
  • In actual battlefield environment, IFF radar plays an important role in distinguishing friend or foe targets and assigning unique identification code to management. Performance of IFF radar is greatly affected by radio environment including atmosphere and terrain, target maneuvering and operation mode. In this paper, M&S tool is consisted of interrogator(IFF radar) and answering machine(target) for radar performance analysis. The wave propagation model using APM(Advanced Propagation Model) and radar actuator system were modeled by considering beam waveform of individual operation beam mode. Using this tool, IFF radar performance was analyzed through two experimental results. As a result, it is expected that performance of IFF radar can be predicted in the operational environment by considering target maneuvering and operation beam mode.

Applied Research of Active Network to Control Network Traffic in Virtual Battlefield Environments (가상 전장 환경에서의 효율적인 네트워크 트래픽 처리를 위한 액티브 네트워크 응용방안)

  • 정창모;이원구;김성옥;이재광
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.3
    • /
    • pp.19-33
    • /
    • 2003
  • Computer simulation has used to a area of military training from about several years ago. War game mode(or computer simulation) endow a military man with lied training such as combat experience without operating combat strength or capabilities. To sanely construct simulation environment against actual combat environment associate among federates on network. us construct virtual combat environment enabling to efficiently manage network traffic among federates(or active nodes) by using active network technique on virtual military training space such as urgent combat field needed to rapidly transfer combat information including image and video, verify its validity by the help of simulation

  • PDF

Process for Identifying QoS Requirements in the Multi-Domain Operations Environment (Multi-Domain Operation Environment QoS 소요식별 절차)

  • Park, Dongsuk;Cho, Bongik;Park, Taehyung;Lim, Jaesung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.2
    • /
    • pp.177-186
    • /
    • 2022
  • A network QoS model for the joint integrated C4I structure was proposed for the integration of network infrastructure and network operations(NetOps) for NCOE. Detailed QoS requirements process of the joint integrated C4I systems are needs in the Multi-Domain Operation Environment(MDOE). A process is proposed for identifying QoS requirements and establishing in the MDOE using JMT(Joint Mission Thread) reference architecture and solution architecture. Mission analysis identify JCOAs(Joint Critical Operational Activities) and related activities based on JMT & System architecture's OVs, and Information analysis identify QoS attributes using System architecture's SVs. Identifying QoS attributes will be registered at PPS Registry by pre-regulated process, and will be set-up by NetOps. MDOE QoS requirement Process will support efficiently MUM-T and smart defense platform users under the future uncertain battlefield circumstances.

A Study on the Strategy for Improvement of Operational Test and Evaluation of Weapon System and the Determination of Priority (무기체계 운용시험평가 개선전략 도출 및 우선순위 결정)

  • Lee, Kang Kyong;Kim, Geum Ryul;Yoon, Sang Don;Seol, Hyeon Ju
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.177-189
    • /
    • 2021
  • Defense R&D is a key process for securing weapons systems determined by mid- and long-term needs to cope with changing future battlefield environments. In particular, the test and evaluation provides information necessary to determine whether or not to switch to mass production as the last gateway to research and development of weapons systems and plays an important role in ensuring performance linked to the life cycle of weapons systems. Meanwhile, if you look at the recent changes in the operational environment of the Korean Peninsula and the defense acquisition environment, you can see three main characteristics. First of all, continuous safety accidents occurred during the operation of the weapon system, which increased social interest in the safety of combatants, and the efficient execution of the limited defense budget is required as acquisition costs increase. In addition, strategic approaches are needed to respond to future battlefield environments such as robots, autonomous weapons systems (RAS), and cyber security test and evaluation. Therefore, in this study, we would like to present strategies for improving the testing and evaluation of weapons systems by considering the characteristics of the security environment that has changed recently. To this end, the improvement strategy was derived by analyzing the complementary elements of the current weapon system operational test and evaluation system in a multi-dimensional model and prioritized through the hierarchical analysis method (AHP).

Finite-Time Convergent Guidance Law Based on Second-Order Sliding Mode Control Theory

  • Ji, Yi;Lin, Defu;Wang, Wei;Lin, Shiyao
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.18 no.4
    • /
    • pp.697-708
    • /
    • 2017
  • The complex battlefield environment makes it difficult to intercept maneuvering targets for guided missiles. In this paper, a finite-time convergent (FTC) guidance law based on the second-order sliding mode (SOSM) control theory is proposed to achieve the requirements of stability, accuracy and robustness. More specifically, a second-order sliding mode observer (SMOB) is used to estimate and compensate for the total disturbance of the controlled system, while the target acceleration is extracted from the line-of-sight (LOS) angle measurement. The proposed guidance law can drive the LOS angular rate converge to zero in a finite time, which means that the missile will accurately intercept the target. Numerical simulations with some comparisons are performed to demonstrate the superiority of the proposed guidance law.

A Study on Simulation-Based Worm Damage Assessment on ATCIS (시뮬레이션 기반 육군전술지휘정보체계 웜 피해평가에 관한 연구)

  • Kim, Ki-Hwan;Kim, Wan-Ju;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.1
    • /
    • pp.43-50
    • /
    • 2008
  • The army developed the ATCIS(Army Tactical Command Information System) for the battlefield information system with share the command control information through the realtime. The using the public key and the encryption equipment in the ATCIS is enough to the confidentiality, integrity. But, it is vulnerable about the availability with the zero day attack. In this paper, we implement the worm propagation simulation on the ATCIS infrastructure through the modelling on the ATCIS operation environment. We propose the countermeasures based on the results from the simulation.

A Study on Safety Evaluation Method of Lithium Secondary Battery Module for Military Operation (리튬 2차전지 모듈의 전장운용을 위한 안전성 평가기법 연구)

  • Yoo, Eun Ji
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.3
    • /
    • pp.378-386
    • /
    • 2014
  • In this paper, safety evaluation method simulating battlefield environment was studied to verify military operability of commercial lithium secondary battery. Based on the MIL-STD-2105D and STANAG standards, safety tests of lithium secondary battery module were conducted, such as bullet impact, fragment impact, fast cook-off and slow cook-off. All results satisfied the safety evaluation criteria, founded on military standard. It suggests that the lithium secondary module has high potential to be applied in a military power source. The safety evaluation methods developed in this paper can be valuable to propose the new military standards for commercial lithium secondary batteries.

Combat Effectiveness Based Analysis Methodology for Optimal Requirement of Attack Helicopter Using Simulation (시뮬레이션을 이용한 전투효과기반 공격헬기 소요 분석방안)

  • Jung, Chi-Young;Lee, Jae-Yeong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.6
    • /
    • pp.1099-1105
    • /
    • 2010
  • The purpose of this paper is to propose a methodology that can estimate optimal requirement of attack helicopter Korea army will be operating in future. For estimating optimal requirement, attack helicopter's operation concept, performance, battlefield environment and enemy threat are considered. We use a wargame model, AAsim(Army Aviation simulation), as a analytic simulation model which is used to analyze DOTMLPF and operation in army aviation field. In this paper, we conduct battle experiment for anti armored corps operation which reflects attack helicopter's combat effectiveness very well. As a result of simulation, the destructive rate for enemy armored corps per each attack helicopter can be calculated. In this paper, we propose optimal requirement of attack helicopter using that destructive rate for enemy armored corps.