• Title/Summary/Keyword: C4ISR

Search Result 66, Processing Time 0.025 seconds

Future Cyber Information Warfare (사이버 정보전 준비 해야)

  • 오제상
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.31-35
    • /
    • 2001
  • Currently if we are to make a thought to depend on our fast developing information technology, a future war is necessarily to be made a situation of a cyber information warfare. A attacker in the cyber information warfare is able to make attack a military or a civil information and communication system, especially if a attack of a hacker, a virus or a electromagnetic pulse bomb at a military C4ISR system is able to make a confusion or a interruption in military operations, they are available to attack as a real time with non restrictions of physical distance, time, weather and space. While a expenditure of carrying out the cyber information warfares is the lowest expenditure, a effect of carrying out the cyber information warfares is the greatest effect in side of a interruption of information, a confusion, a terror, a pillage and crime of the people. This paper is to introduce "weapons of cyber information warfares", "offence capability of cyber information warfares about several nations" and to propose "a cyber information warfare organization" or the future knowledge warfare. the future knowledge warfare.

  • PDF

Design of the homomorphic encryption system for secure data management in the future battlefield environment (미래 전장환경에서 안전한 데이터 관리를 위한 준동형 시스템 설계)

  • Cha, HyunJong;Kim, JinMook;Ryou, HwangBin
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.51-56
    • /
    • 2014
  • Be expressed in network-centric warfare, mainly battlefield environment of the future. The purpose of the system for the war of the future, is to recognize the enemy before the enemy, and rapid decision-making, to hit accurately. For this reason, it is during the construction of the integrated system of C4ISR+PGM. In such an integrated system, it is necessary to further enhance the security aspects of the information. In particular, strengthening of security leads to a decrease of efficiency. Therefore, security and efficiency should be considered together. In this study, we provide a homomorphic encryption system that can be safely managed information environment on the battlefield of the future. The proposed method uses encryption technology of homomorphic that can be the arithmetic operations on encrypted state. It has changed from the state of the encryption. Therefore, the attacker can not know a decent information.

A Literature Review of the Effectiveness Measurement for NCW (NCW 효과측정에 관한 문헌조사 연구)

  • Jung, Chi-Young;Lee, Jae-Yeong
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.37 no.2
    • /
    • pp.1-16
    • /
    • 2012
  • NCW(Network Centric Warfare) offers BSEs(Battelspace-Entities) the capabilities of sharing information through C4ISRCommand, Control, Communications, Computers and Intelligence, Surveillance and Reconnaissance) network and it also improves their combat powers based on information superiority with awareness of common situation in battlefield and self-synchronization. Although the concept of NCW was developed at the end of 1990 and there have been various studies for NCW from the development of its concept, the effort for measuring the synergistic effect of NCW is insufficient at the present time. Therefore, in this paper we reviewed literatures concerning the effectiveness measurement of NCW. The category of our survey is network effect, metrics, simulation, battlefield information, social network analysis and mathematical model. The main purpose of this study is to suggest future researchers a research direction by analyzing the aspects and limitations of existing studies about the quantitative measurement of NCW.

Assessment of Equivalent Heights of Soil for the Lateral Earth Pressure Against Retaining Walls Due to Design Truck Load (표준트럭하중에 의해 옹벽에 작용하는 수평토압의 등가높이 산정)

  • Kim, Duhwan;Jin, Hyunsik;Seo, Seunghwan;Park, Jaehyun;Kim, Dongwook;Chung, Moonkyung
    • Journal of the Korean Geosynthetics Society
    • /
    • v.17 no.4
    • /
    • pp.119-128
    • /
    • 2018
  • Limit state design has been implemented in Korea since 2015; however, there exists no specification of lateral load determination on retaining wall due to the Korean standard traffic load on retaining wall's backfill surface. The lateral load from traffic depends on lane number, standard truck's axle loads and locations, loading distance from the inner wall. The concept of equivalent height of soil accounting for traffic loadings is typically used for design of retaining walls to quantify the traffic loads transmitted to the inner wall faces. Due to the different characteristics of the standard design trucks between Korea and US (AASHTO), the direct use of the guidelines from AASHTO LRFD leads to incorrect estimation of traffic load effects on retaining walls. This paper presents the results of evaluation of equivalent height of soil to reflect the Korean standard truck, based on the findings from analytical solutions using Bounessq's theory and numerical assessment using 2D finite element method. Consequently, it was found that the equivalent heights of soil from the Korean standard truck load were lower for lower retaining wall height.

Slot Antenna Embedded in a PCB for Zigbee Communication (지그비 통신용 PCB 내장형 슬롯 안테나)

  • Woo, Hee-Sung;Shin, Dong-Gi;Lee, Young-Soon
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.3
    • /
    • pp.223-228
    • /
    • 2021
  • In this paper, we proposed a slot-type antenna with microstrip feed embedded in a PCB for Zigbee communication (2.4 ~ 2.484 GHz). The proposed antenna is designed on a FR-4 substrate with dielectric constant 4.3, thickness of 1.6 mm, and size of 50×65 mm2. Through simulations, trends of design parameters are analyzed and optimized, and the proposed antenna composed with three slots satisfy the frequency band. The measured impedance bandwidths (|S11| ≤ -10 dB) of fabricated antenna are 900 MHz (2 ~ 2.9 GHz) in Zigbee frequency band. In addition, the radiation pattern showed omnidirectional characteristics for E and H-planes, and the gain of antenna in Zigbee frequency band was 1.782 dBi.

A Study on National Defense Enterprise Architecture Framework (국방 전군적 아키텍처 프레임워크에 관한 연구)

  • 이태공;김진우
    • Journal of the military operations research society of Korea
    • /
    • v.29 no.2
    • /
    • pp.45-60
    • /
    • 2003
  • As we live in real If era, If become a mandatory component for nations and organizations to survive in severe competition. If is also thought of as strategic asset for effective business operations, yet there is no proved statement on the interoperability and system integration which causes serious problem in terms of requirement engineering among current systems. The National Defense Enterprise Architecture Framework is a strategic information asset base, which define the military operation activities for the mission, the information necessary for military operations, the technologies necessary for implementing new technology in response to changing operational needs. It is an integrated model or representation. Information Systems will be evolved by the National Defense Enterprise Architecture framework. The purpose of this framework is to present overall picture of national defense information system domain so that information systems are interoperated, integrated and information sharing is increased among affiliated organization of Defense Military.

A Study on the Use of Ubiquitous Technologies in Military Sector

  • Ju Min-Seong;Kim Seok-Soo
    • International Journal of Contents
    • /
    • v.2 no.2
    • /
    • pp.6-9
    • /
    • 2006
  • The style of war in the $21^{st}$ century became digitalized cooperative union tactic, which relies heavily on the system providing real time information. Critical information is provided during the war from sensing to shooting. Therefore, epochal development in observation, reconnaissance (ISR), commanding (C4I) and precision strike (PGM) are necessary. Application of ubiquitous computing and network technologies in national defense is necessary for carrying out with various types of wars in the $21^{st}$ century. Therefore, the author wants to research core technology sector that can be developed and applied in preparation of ubiquitous national defense era. Also plans for applying recent u-Defense technology to the military sector had been suggested. Particularly, the author have suggested plans for utilizing combined future information technologies such as ad-hoc network, RFID for the logistic supply in construction of u-Defense system. By utilizing these information technologies, combat power and strategic capabilities of the military can be enhanced greatly.

  • PDF

A Scheme of Motor Control for Linux-based Quadcopter with Android Phone (안드로이드 폰을 이용한 리눅스 기반 쿼드콥터의 모터 제어 기법)

  • Rim, Seong-Rak;Kim, Du-Kyu
    • Journal of Information Technology Services
    • /
    • v.12 no.3
    • /
    • pp.379-387
    • /
    • 2013
  • This paper describes a scheme of motor control for Quadcopter with Android phone instead of a dedicated controller. Basically, user's requests (channel and speed) are inquired and transferred to the Quadcopter with Android phone, then the embedded Linux system receives them and controls the motor speed of corresponding channel. We have designed and implemented an App. for user interface and the modules of device driver and timer ISR for the motor control. Finally, we have up-loaded the App. and the modules to an Android (ver.4.0) phone and ARM processor (S3C6410)-based embedded board respectively, and reviewed the functional correctness by testing the motor control of Quadcopter.

A Design of Electronic Evidence-seizure Mechanism for the Response of Information-warfare (정보전 대응을 위한 전자적 증거포착 메커니즘 설계1))

  • Park, Myeong-Chan;Lee, Jong-Seop;Choe, Yong-Rak
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.285-314
    • /
    • 2004
  • The forms of current war are diversified over the pan-national industry. Among these, one kind of threats which has permeated the cyber space based on the advanced information technology causes a new type of war. C4ISR, the military IT revolution, as a integrated technology innovation of Command, Control, Communications, Computer, Intelligence, Surveillance and Reconnaissance suggests that the aspect of the future war hereafter is changing much. In this paper, we design the virtual decoy system and intrusion trace marking mechanism which can capture various attempts and evidence of intrusion by hackers in cyber space, trace the penetration path and protect a system. By the suggested technique, we can identify and traceback the traces of intrusion in cyber space, or take a legal action with the seized evidence.

  • PDF

A Communication Frame for Cooperative Engagement of Korean Navy Ships against Anti-ship Missiles (한국해군함정의 대함유도탄 협동교전을 위한 통신 프레임)

  • Kim, Jong-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.152-155
    • /
    • 2014
  • 현대전에서 C4ISR 및 PGM 능력 보유가 점점 중요해지는 만큼 무기체계 위협에 대응시간 또한 점차 짧은 시간을 요구하고 있다. 미 해군에서는 제1, 2차 세계대전을 통해 대공위협에 대한 협동 대응 필요성 자각이후 협동교전능력(CEC : Cooperative Engagement Capability)를 발전시켜왔지만 한국군에서는 아직 개념이 미개발되어 있는 상태이다. CEC의 여러 능력 성분 중에서 한국해군 수상전투단에서 가장 필요로 하는 요소가 가장 짧은 대응시간을 요구하는 대함유도탄 협동대응능력일 것이다. 이를 구현하기 위해 전투단내 함정 간 정보를 교환할 수 있는 통신프레임을 디자인하여 제시하고 실제 운용 가능성을 예측한다.