• Title/Summary/Keyword: Information Warfare

Search Result 372, Processing Time 0.029 seconds

A Study on Assessment Model of Interoperability in Weapon Systems based on LISI (LISI 기반의 무기체계 상호운용성 평가모델에 관한 연구)

  • Oh, Haeng-Rok;Koo, Heung-Seo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.3
    • /
    • pp.410-416
    • /
    • 2007
  • There are many demands for interoperability between weapon systems as the operational needs for joint and coalition based on network in modern and future warfare have been increasingly needed. In DoD, LISI has been applied throughout information system life cycle from the planning phase to the development phase to assess the level of interoperability. We also developed SITES which is a tool to assess the level of interoperability in information systems. But we should extend the assessment model from the previous information systems to the weapon systems to assess the level of interoperability including weapon systems as well as information systems. In this paper, we proposed the assessment model of interoperability, implemented the E-SITE based on the proposed model, applied 12 weapon systems and analyzed the experimental result.

Ad Hoc Routing Method Based on Betweenness Centrality and Location Information for Unmanned Ground System Networks (지상 무인로봇체계 네트워크를 위한 매개 중심도와 위치정보 기반 Ad Hoc 라우팅)

  • Ahn, Hyochun;Yim, Jinhyuk;Ko, Young-Bae;Choi, HyungSeok;Kwon, DaeHoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.4
    • /
    • pp.441-450
    • /
    • 2016
  • Wireless multi-hop communication is one of the key technologies to operate Unmanned Ground System (UGS) networks efficiently. Conventionally a lot of routing protocol has been developed and studied for multi-hop networks like Mobile Ad-hoc Network (MANET). However, the routing protocol for the unique environment of the UGS requires further studies, since conventional routing protocols cannot be used itself for UGS networks. In this paper, we propose the Betweenness Centrality based Geographic Routing (BCGR) which considers the main function of UGS. BCGR utilizes expanded ego betweenness centrality, mobility and location information error, respectively. We have conducted a simulation study for evaluating the performance of the BCGR using ns-3, and our simulation results show that BCGR outperforms the conventional routing protocols such as AODV and GPSR in terms of end-to-end transmission reliability, throughput and delay.

A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure (협력대응기반 전역네트워크 보안정보공유 시스템)

  • Kim, Ki-Young;Lee, Sung-Won;Kim, Jong-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.2
    • /
    • pp.60-69
    • /
    • 2013
  • Highlighted by recent security breaches including Google, Western Energy Company, and the Stuxnet infiltration of Iranian nuclear sites, Cyber warfare attacks pose a threat to national and global security. In particular, targeted attacks such as APT exploiting a high degree of stealthiness over a long period, has extended their victims from PCs and enterprise servers to government organizations and critical national infrastructure whereas the existing security measures exhibited limited capabilities in detecting and countermeasuring them. As a solution to fight against such attacks, we designed and implemented a security monitoring system, which shares security information and helps cooperative countermeasure. The proposed security monitoring system collects security event logs from heterogeneous security devices, analyses them, and visualizes the security status using 3D technology. The capability of the proposed system was evaluated and demonstrated throughly by deploying it under real network in a ISP for a week.

Mutual Authenticate Protocol among Sensor for Network Centric Warfare (네트워크 중심전을 위한 센서간의 상호인증기법)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwnag-Bin
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.25-30
    • /
    • 2012
  • As the network composed of numerous sensor nodes, sensor network conducts the function of sensing the surrounding information by sensor and of the sensed information. Our military has also developed ICT(Information and Communication Technology) along with the methods for effective war by sharing smooth information of battlefield resources through network with each object. In this paper, a sensor network is clustered in advance and a cluster header (CH) is elected for clusters. Before deployment, a certificate is provided between the BS and the sensor nodes, and after clustering, authentication is done between the BS and the sensor nodes. Moreover, inter-CH authentication technique is used to allow active response to destruction or replacement of sensor nodes. Also, because authentication is done twice, higher level of security can be provided.

A Study on the Assessment Method of Battle Damage in Cyberspace by Cyberattacks (사이버공격에 의한 사이버공간 전투피해평가 방안 연구)

  • Jang, Won-gu;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1447-1461
    • /
    • 2019
  • Evaluating battle damage after conducting an attack on selected targets during warfare is essential. However, regarding the assessment of battle damage caused by cyber-attacks, some methods available under limited circumstances have been suggested so far. Accordingly, this paper suggests a militarily applicable, comprehensive, and specific method of battle damage assessment from battle damage assessment methods in combat assessment theories from the understanding of cyberspace. By using cyberspace components, this paper classifies cyber targets, suggests the assessment methods of data damage, social cognitive damage, derived damage, and the existing battle damage assessment methods such as physical damage, functional damage, and target systems, and provides an example to demonstrate that this method is applicable to the actual past cyberattack cases.

The Push Framework for UMPC Tactical Data Link(TDL) Based on The Legacy Radio (레거시 라디오 기반의 UMPC 전술 데이터 링크 Push 프레임워크)

  • Sim, Dong-Sub;Shin, Ung-Hee;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.3
    • /
    • pp.397-404
    • /
    • 2010
  • Recently, there is on-going research about tactical data link system based on the legacy radio. Tactical data link based on legacy radio is operated mostly in narrow bandwidth under 25khz. Communicating traffics in nodes participated at network need to be minimized for distributing tactical data in narrow bandwidth. In addition, the data distributing structure is necessary for distributing tactical informations such as a situation awareness and so on to war fighters. However, conventional server-client system wastes a lot of time to obtain information for war fighters as user uses pull system to gather necessary information by seeking it one by one. Especially, the fighter pilot is supposed to dedicate into a situation awareness and fight mission in every seconds but seeking information of a user terminal while aircraft maneuvering affects as obstacle to concentrate engaging hostiles. therefore, push technology, the tactical data distributing system, is necessary for war fighters to receive fixed tactical data automatically without putting attention to it. This paper propose the UMPC tactical data link push framework. the UMPC tactical data link is a tactical data link system based on the legacy radio. Proposed push framework is verified by composing experiment environment and testing.

Smart Device Security Technology for Cyber Defense (사이버 국방을 위한 스마트 단말 보안기술)

  • Son, Iek-Jae;Kim, Il-Ho;Yang, Jong-Hyu;Lee, Nam-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.986-992
    • /
    • 2012
  • As the utilization of smart mobile devices such as smartphones increases, the desire to utilize such devices to control and monitor combat situations also arises. As smart mobile devices with various ICT get integrated with various weaponry system, a new phase of future warfare can be introduced. Moreover, smartphone-based real-time information technology for joint battle command system will be converged with surveillance control to become a leading example of convergence of cyber defense and information technology. Furthermore, mobile device security technology ideal for mobile wireless network environments can be applied to military robots. The following paper will give an overview of smart mobile device usage used for military purposes in battle command system, various security threats and the mobile device security technology to correspond to such security threats.

Study on Developmental Strategy of National Defense & IT Convergence (국방IT융합기술의 발전전략에 관한 연구)

  • Koo, Han Lim;Kim, Seong Min;Rhee, Woo Seop
    • Convergence Security Journal
    • /
    • v.14 no.6_1
    • /
    • pp.99-112
    • /
    • 2014
  • National Defense & IT Convergence is ensuring actual force integration by developing new IT Convergence Technology for the purpose of realizing the concept of Network Centric Warfare. The Ministry of Defense has appointed National Defense & IT Convergence Center of Defense Agency for Technology and Quality as a specialized agency for the National Defense & IT Convergence development, a mission in the creative economy era and has been active in military demand inquiry and prior technology plan with the industrial-academic research institute for discovery of National Defense IT Convergence projects based on the Convergence Center. Further, it is promoting focused on the timely introduction of private IT new technology by operating the project planning team comprised of defense domain specialists and by applying the advanced planning method etc. Accordingly, for the development of National Defense & IT convergence, developmental strategy is urgently required to be utilized effectively after considering theoretically on the national IT Convergence policy enforcement and phenomenon of National Defense & IT Convergence technology and analyzing them comprehensively. This thesis promotes in phases the IT Convergence projects which are identified for the development, improves the efficiency of newly created National Defense & IT Convergence center and suggests training program of IT Convergence personnel related to the defense reforms. With such, it will achieve smart defense in advance and will also contribute largely for the realization of the immediate paradigm shift and of the creative economy.

A Study on the Investment Efficiency of Defense Science and Technology R&D (국방과학기술 연구개발 투자 효율화 방안 연구)

  • Gam, Hyemi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.11
    • /
    • pp.164-169
    • /
    • 2019
  • Defense R&D investment is expanding. This shows that major countries are preparing for future warfare by securing high-tech technologies and developing new concept weapons systems. In particular, it is expected to accelerate the development of the technology of the 4th Industrial Revolution in the future, and Korea needs its own ability to develop advanced weapons and medium- and long-term investment strategies to prepare for future warfare. The defense science and technology strategy will be established every five years. The strategy-dependent R&D drive has limitations in replacing the rapidly changing security environment and changes in science and technology. This study proposes an investment efficiency process to proactive incorporate information into R&D strategies with a focus on implementing policies and changing security threats, while maintaining continuity in which strategic and focused areas are linked to core technology development. The process can quickly reflect the needs of technological change, the security environment and defense policy. The process can be used to efficiently allocate defense R&D budgets and establish strategic investment directions.

Evaluation on South and North Korean Military Power by Military Officers (남북 군사력 우열에 대한 군간부들의 인식 평가)

  • Lee Sang-Jin
    • Survey Research
    • /
    • v.7 no.1
    • /
    • pp.29-53
    • /
    • 2006
  • This paper analyzes which of the military sub-fields has an effect on a soldier's evaluation of South and North Korean military power. There are three objectives of this paper. First, it is to analyze whether the South is superior to the North in the overall military power and military sub -fields, without the presence of the US armed forces in South Korea. Second, it is to assess which of the military sub-fields influences the overall evaluation of military power through a regression analysis. Finally, it is to look at whether the professional soldiers have a motivational bias, due to an argument that the military personnel tend to exaggerate the inferiority of their own military power to get more budget for defense construction. Research in 2002 and 2003 tell us that South Korean military power is slightly inferior to North Korea's. However, research in 2005 shows that military power of South and North Korea is almost equal. The sub-fields in which South Korea is superior are in the order of War Sustainability, Information Warfare, Air Force, and Navy. North Korea is regarded to be superior in the fields of Atomic Biological Chemical Warfare Capability, Special Force, Reserve Mobilization, and Army. The higher ranked soldiers tend to evaluate that the North is superior to the South.

  • PDF