• Title/Summary/Keyword: Battlefield Information

Search Result 186, Processing Time 0.025 seconds

A Study on Complex Threat Emulation for Situation Awareness of ASE System (생존체계 위협조우 상황인지를 위한 복합/다중 위협상황 Emulation 연구)

  • Lee, Moon-Seok;Lee, Jung-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.10
    • /
    • pp.2180-2186
    • /
    • 2010
  • As the substantial increase in battlefield density, multiple and complex weapon systems, Ensuring the Survivability of the platform has been emphasized. Most of platforms have equipped with ASE (Aircraft Survivability Equipment) system in order to protect the platform and operator against at modernized hostile weapon. ASE system enhance the survivability of the platform through providing accurate situation awareness information by detecting and countermeasuring hostile threats. One of Key factor of the AE system performance is handling multiple and complex threats. In this study, it describes the fact that the performance of ASE system with proposed threat integration algorithm is verified in the developed threat emulation system and also, suggests system verification method before deployment by dealing with complex threat situation.

Mutual Authenticate Protocol among Sensor for Network Centric Warfare (네트워크 중심전을 위한 센서간의 상호인증기법)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwnag-Bin
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.25-30
    • /
    • 2012
  • As the network composed of numerous sensor nodes, sensor network conducts the function of sensing the surrounding information by sensor and of the sensed information. Our military has also developed ICT(Information and Communication Technology) along with the methods for effective war by sharing smooth information of battlefield resources through network with each object. In this paper, a sensor network is clustered in advance and a cluster header (CH) is elected for clusters. Before deployment, a certificate is provided between the BS and the sensor nodes, and after clustering, authentication is done between the BS and the sensor nodes. Moreover, inter-CH authentication technique is used to allow active response to destruction or replacement of sensor nodes. Also, because authentication is done twice, higher level of security can be provided.

A Study on the Net Centric Entity Interoperability Layer (NCEI레이어 모델에 관한연구)

  • Son, Hyun-Sik;Lee, Tae-Gong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4B
    • /
    • pp.269-277
    • /
    • 2012
  • The future battlefield environment has changed platform centric warfare into a network centric warfare. The NCO is a operational concept to improve combat power through information sharing, shared situational awareness, decision making and synchronized action based on powerful network grid. In addition, these operational environment is composed of physical, information, cognitive and social domains. The platform environment system is associated with the OSI 7 layer. However, OSI 7 layer is limited to express NCW environment including cognitive and social domains. Therefore, we requires a new model for expressing cognitive and social domains. After we developed a new model, this model applied to the NCW architecture taxonomy.

A Study on the Analysis Method of Technology Trend on Tactical Data Link Using Intellectual Property Information (지식재산 정보를 이용한 전술데이터링크 기술동향 분석방법 연구)

  • Noh, Giseop
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.539-544
    • /
    • 2021
  • The tactical data link is a military data network to improve the ability to recognize battlefield situations. The ROK military is promoting the tactical data link performance improvement programs. Tactical data link is essential to combine and integrate various platforms, sensor data, and command and control (C2) systems. Therefore, the research on related technical fields is required. However, the tactical data link has not disclosed detailed technical information due to the characteristics of military operation. In this paper, we propose a data-based automated analysis methodology using intellectual property information to understand the technology trend of tactical data link. In this paper, data related to intellectual property is automatically collected and pre-processed, and analyzed in terms of time series. In addition, the current status of each institution of patent technology information was generated, and the process of identifying key-researchers through network analysis was presented with providing results of our approach in this paper.

A Study on the Design of Network System for Defense Integrated Data Center Using NFV/SDN (NFV/SDN을 활용한 군(軍) 데이터센터 네트워크 체계 설계에 관한 연구)

  • Chae, Woong;Kwon, Taewook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.2
    • /
    • pp.31-36
    • /
    • 2020
  • The creation of the Defense Integrated Data Center(DIDC) has resulted in a reduction in manpower, operating costs, efficient and effective management of resources. However, it is difficult to effectively collect and manage the data of a large number of battlefields coming from equipments such as drones, robots, and IoT added to the fourth industrial revolution and the future battlefield. Therefore, we will propose the design of DIDC network system using NFV and SDN, which are emerging as the core technologies of 5G, a mobile communication technology. After analyzing the data sheet of each equipment, it is considered that by integrating the redundant functions, energy efficiency, resource utilization and effective network management will be possible.

Applied Research of Active Network to Control Network Traffic in Virtual Battlefield Environments (가상 전장 환경에서의 효율적인 네트워크 트래픽 처리를 위한 액티브 네트워크 응용방안)

  • 정창모;이원구;김성옥;이재광
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.3
    • /
    • pp.19-33
    • /
    • 2003
  • Computer simulation has used to a area of military training from about several years ago. War game mode(or computer simulation) endow a military man with lied training such as combat experience without operating combat strength or capabilities. To sanely construct simulation environment against actual combat environment associate among federates on network. us construct virtual combat environment enabling to efficiently manage network traffic among federates(or active nodes) by using active network technique on virtual military training space such as urgent combat field needed to rapidly transfer combat information including image and video, verify its validity by the help of simulation

  • PDF

Implementation of Mission Service Model and Development Tool for Effective Mission Operation in Military Environment (전장공간의 효율적 임무수행을 위한 임무서비스 모델 및 개발도구 구현)

  • Song, Seheon;Byun, Kohun;Lee, Sangil;Park, JaeHyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.6
    • /
    • pp.285-292
    • /
    • 2017
  • There are technological, operational and environmental constraints at tactical edge, which are disconnected operation, intermittent connectivity, and limited bandwidth (DIL), size, weight and power (SWaP) limitations, ad-hoc and mobile network, and so on. To overcome these limitations and constraints, we use service-oriented architecture (SOA) based technologies. In our research, we propose a hierarchical mission service model that supports service-oriented mission planning and execution in order for a commander to operate various SW required for mission in battlefield environment. We will also implement development tools that utilize the workflow technology and semantic capability-based recommendation and apply them to combat mission scenarios to demonstrate effectiveness.

Group Key Management Scheme for Survelliance and Reconnaissance Sensor Networks based on Probabilistic Key Sharing (확률론적 키 공유를 통한 감시정찰 센서네트워크에서의 그룹 키 관리 기법)

  • Bae, Si-Hyun;Lee, Soo-Jin
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.29-41
    • /
    • 2010
  • Survelliance and Reconnaissance Sensor Network(SRSN) which can collect various tactical information within battlefield in real time plays an important role in NCW environment, of sensor to shooter architecture. However, due to the resource-limited characteristics of sensor nodes and the intrinsic attributes of sensor network such as wireless communication, the SRSN may be vulnerable to various attacks compared to traditional networks. Therefore, in this paper, we propose a new group key management scheme to guarantee confidentiality, integrity, availability, and authentication during the operation of the SRSN. Proposed scheme generates and distributes the group key based on the topological characteristic of the SRSN and the probabilistic key sharing. The communication cost for distributing the group key is O(logn).

A Study on the Design of an Underwater Distributed Sensor Network for the Shallow Water by An Effectiveness Analysis (효과도 분석을 통한 천해용 수중분산 센서망 설계 연구)

  • Kim, Wan-Jin;Bae, Ho Seuk;Kim, Woo Shik;Lee, Sang Kug;Choi, Sang Moon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.5
    • /
    • pp.591-603
    • /
    • 2014
  • In this paper, we have described the characteristics of the Underwater Distributed Sensor Network (UDSN) and proposed the conceptual design guideline by an effectiveness analysis. To perform the effectiveness analysis, we defined an battlefield environment, and then analyzed principal components which compose the UDSN to find out simulation parameters and system constraints. We have chosen a measure of effectiveness based on a target trajectory, which could enhance intuitive understanding about current status, and performed various simulations to reveal critical design parameters in terms of sensor node types, arrangement, cost and combination of detection information.

ROI Image Compression Method Using Eye Tracker for a Soldier (병사의 시선감지를 이용한 ROI 영상압축 방법)

  • Chang, HyeMin;Baek, JooHyun;Yang, DongWon;Choi, JoonSung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.3
    • /
    • pp.257-266
    • /
    • 2020
  • It is very important to share tactical information such as video, images, and text messages among soldiers for situational awareness. Under the wireless environment of the battlefield, the available bandwidth varies dynamically and is insufficient to transmit high quality images, so it is necessary to minimize the distortion of the area of interests such as targets. A natural operating method for soldiers is also required considering the difficulty in handling while moving. In this paper, we propose a natural ROI(region of interest) setting and image compression method for effective image sharing among soldiers. We verify the proposed method through prototype system design and implementation of eye gaze detection and ROI-based image compression.