• Title/Summary/Keyword: Information Warfare

Search Result 372, Processing Time 0.028 seconds

Design of Security RoadMap for C4I System (C4I 시스템 보안 로드맵 설계)

  • Lee, Gang-Taek;Lee, Dong-Hwi;Yang, Jae-Su;J. Kim, Kui-Nam;Park, Sang-Min
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.113-120
    • /
    • 2006
  • C4I system is the centerpiece of the military force. The system is an information based system which facilitates information grid, collection of data and dissemination of the information. The C4I system seeks to assure information dominance by linking warfighting elements in the battlespace to information network which enables sharing of battlespace information and awareness; thereby shifting concept of warfare from platform-centric paradigm to Network Centric Warfare. Although, it is evident that C4I system is a constant target from the adversaries, the issues of vulnerability via cyberspace from attack still remains. Therefore, the protection of C4I system is critical. The roadmap I have constructed in this paper will guide through the direction to protect the system during peace and war time. Moreover, it will propose vision, objectives and necessary supporting framework to secure the system from the threat. In order to fulfill these tasks, enhanced investments and plans from the Joint chief of Staff and Defense of Acquisition and Program Administration (DAPA) is critical; thereby enabling the establishment of rapid and efficient security system.

  • PDF

An Algorithm for evaluating Combat Power Effectiveness by considering the Influence of Human Factors (인적요소의 영향력을 고려한 전투효과 평가 알고리즘)

  • Kwon, Oh-Sang;Park, Gun-Woo;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.1
    • /
    • pp.201-210
    • /
    • 2011
  • Each area of society has changed because of the development of information technology. Especially, the advent of NCW based on the technology of network has become a new paradigm for executing warfare. Effectiveness of NCW can be maximized by building the C4I system which is a core system of NCW. However, if we don't consider the influence in term of human dimension, we can't expect the effect of C4I system, since the key factor in C4I is human. In this paper, we propose an algorithm for evaluating Combat Power Effectiveness by considering the Influence of Human Factors that wasn't reflected in the past. Based on experimental validation our algorithm is more substantial than baseline algorithms. In addition, we proved that the Influence of Human Factors(e.g. collaboration) is the most important in battlefield. Therefore, proposed algorithm can be used for enhancing not only mission effectiveness in terms of military field but also work performance by effective Human Resource Management in terms of an enterprise.

A Proposal on Cryptographic Synchronization for T4 Link Encryption (T4급 링크 암호에 적합한 암호 동기방식 제안)

  • Lee, HoonJae;Kim, KiHwan;Kang, YongJin;Lee, Sang-Gon;Ryu, Young-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.202-210
    • /
    • 2018
  • The modern battlefield is being developed as a network-centric warfare where priority is given to rapid status grasp and power deployment through scientification and modernization. Therefore, tactical data link has been continuously improving the network speed, and recently, security technology is required for wireless communication with the UAV and various devices for reconnaissance. In addition, the future information warfare will utilize advanced IT technology positively. Efforts are needed to integrate various systems and networks. However, these efforts are meaningful only when they can assume sufficient security in a newly changing information and communication environment. In this paper, we propose a new cryptographic synchronization for link encryption suitable for tactical data links. The proposed cryptographic synchronization is useful for T4 UAV link encryption, and it is also adaptable for lower BER, then we analyze the performances analysis of that.

NCW를 위한 Military-BcN 요구사항과 아키텍처

  • Lee, Sun-Seok;Kim, Yeong-Seon;Gang, Seong-Yeol
    • Information and Communications Magazine
    • /
    • v.26 no.3
    • /
    • pp.52-59
    • /
    • 2009
  • 본 고에서는 정보통신 기술과 전쟁이론의 결합을 통하여 새롭게 제시되고 있는 네트워크중심전(Network-centric warfare)의 기본철학을 지원하는데 있어서 필수적으로 요구되는 도구의 통합과 정보의 통합을 효과적으로 추진하기 위하여 통신 네트워크의 요구사항을 도출하고, 이를 만족시키기 위하여 BcN(광대역통합망) 아키텍처를 기반으로 Military-BcN 아키텍처의 기본 설계 방향에 제시한다.

군 통신에서의 재밍(Jamming) 기술

  • Kim, Jin-Hyeong;Kim, Eun-Cheol;Lee, Jong-Myeong
    • Information and Communications Magazine
    • /
    • v.26 no.3
    • /
    • pp.32-40
    • /
    • 2009
  • 최근 전자전 (EW : Electronic Warfare)은 현대전의 핵심으로 자리매김하고 있다. 전자전에서 재밍 (Jamming)은 적군의 통신을 교란시키는 전자공격 (EA : Electronic Attack)을 의미하는 것으로 재밍 전술은공격 대상에 따라서 여러 가지로 나눌 수 있다. 본고에서는 군통신에서 사용되는 전자방해책 (ECM : Electronic Counter Measure)인 재밍 기술을 소개하고, 재밍 신호에 대한 대책으로 재밍 신호를 효과적으로 검출하고 제거할 수 있는 전자방해방어책인 (ECCM : Electronic Counter Counter Measure) 항재밍 (Anti-Jamming) 방안도 함께 분석 소개하고자 한다.

The Mitigation Avtivities of NAVWAR(Navigation Warfare) (항법전 대응방안)

  • Choi, Chang-Mook;Ko, Kwang-Soob
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.823-826
    • /
    • 2011
  • 위성항법시스템은 과거의 항법시스템에 비해 우수한 위치, 속도 및 시각정보를 제공할 수 있어 민간산업 분야 및 군사적응용 분야에 널리 사용되고 있다. 그러나 위성에서 보내는 신호가 지상에 도달 시 수신강도가 매우 미약하며, 공개되어 있는 위성신호체계에 의해 전파교란에 매우 취약함을 가지고 있다. 따라서 본 논문에서는 현재 및 미래의 위성항법시스템에 대하여 조사한 후 전자전 개념을 정립하여 재머에 의해 무력화 될 수 있는 항법전에서 우리의 대응방안을 제시하고자 한다.

  • PDF

A Study on Data Structure and Processing for Battlefield Information Management (전장정보관리를 위한 데이터 구조 및 처리에 관한 연구)

  • Baek, Joo-Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.2
    • /
    • pp.5-11
    • /
    • 2007
  • In digital warfare, communications between combat vehicles should be managed and synchronized in order to ensure the survivability of vehicles. Embedded battle management systems is designed to share battle information with combat vehicles in real-time. In this study, the details of embedded battle management systems which are successfully implemented in combat vehicles are presented.

North Korea's cyber attack threat analysis research (Based on the type of attack technology) (북한의 사이버 공격 위협 분석 연구 (공격 기술의 유형 중심으로))

  • Kim, Jin Gwang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.107-110
    • /
    • 2020
  • 북한의 사이버 공격은 매년 증가하고 있으며 공격 수행인력 또한 6,800여 명으로 지속 늘어나고 있어 우리에게 큰 위협이 되고 있다. 그럼에도 불구하고 현재까지 북한의 사이버 공격사례 분석은 각각의 사건에 대한 개별 현황분석밖에 되지 않아 큰 시각에서의 공격 기술 유형이 어떻게 변화하였는지와 관련된 연구가 필요하다. 이에 따라 본 논문에서는 우선 사이버전의 일반사항 및 공격 기술을 확인하고 최근 3년간 발생한 북한의 사이버 공격사례를 조사하여 세부적으로 사용된 주요 공격 기술의 유형을 확인하고자 한다.

  • PDF

The Extended-Military Multimedia Systems Based on Real-Time Scheduling Scheme (실시간 스케줄링을 적용한 Extended-Military Multimedia Systems)

  • Park, Sang-Hyuk;Kim, Jai-Hoon;Han, Chang-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.1
    • /
    • pp.26-32
    • /
    • 2011
  • It is very important for more effective military operation to share information required in recognizing a situation by monitoring battlefield. The recognition of situations is offered visually though multi-media systems such as a COP(Common Operation Picture), UAV etc. The operating method has rapidly changed into Network-Centric Warfare (NCW). As a result, the data that these Multimedia systems should control is increasing. Improved performance of Multimedia systems is required to deal with them. In this paper, we propose Extended-Military Multimedia System(E-MMS) applying the most excellent scheduling method in terms of meet-ratio in real time when Multimedia systems carry out assigned information in real time for monitoring as the method of improved performance. As a result of utility about proposed system, it is verified that realtime EDF(Earliest Deadline First) scheduling method is more improved up to 20% compared to non-realtime FCFS(First Come First Service) in terms of the deadline meet ratio.

Artificial Intelligence based Threat Assessment Study of Uncertain Ground Targets (불확실 지상 표적의 인공지능 기반 위협도 평가 연구)

  • Jin, Seung-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.305-313
    • /
    • 2021
  • The upcoming warfare will be network-centric warfare with the acquiring and sharing of information on the battlefield through the connection of the entire weapon system. Therefore, the amount of information generated increases, but the technology of evaluating the information is insufficient. Threat assessment is a technology that supports a quick decision, but the information has many uncertainties and is difficult to apply to an advanced battlefield. This paper proposes a threat assessment based on artificial intelligence while removing the target uncertainty. The artificial intelligence system used was a fuzzy inference system and a multi-layer perceptron. The target was classified by inputting the unique characteristics of the target into the fuzzy inference system, and the classified target information was input into the multi-layer perceptron to calculate the appropriate threat value. The validity of the proposed technique was verified with the threat value calculated by inputting the uncertain target to the trained artificial neural network.