• Title/Summary/Keyword: Information-Centric Network

Search Result 345, Processing Time 0.023 seconds

Aspects of Warfare in the Information Age - NCW Concerning (정보화 시대의 전쟁양상 - Network Centric Warfare(네트워크 중심 전쟁)을 중심으로)

  • Woo, Hee-Choul
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.4
    • /
    • pp.45-50
    • /
    • 2016
  • This research suggests a method to contribute to the perfect execution of duty in prospective information warfare by inspecting network-based warfare, in which its basic concepts and efficient management plans are provided; it is especially important, due to growing focus on information warfare caused by sudden improvements on information technology which affects not only civil matters but international military affairs as well. For this purpose, this research scrutinizes on the chronological organization of warfare traits during the information age, and information-warfare execution, as well as its effects, thereby providing proper management plans for network-based warfare.

Identification Algorithm for Up/Down Sliding PRIs of Unidentified RADAR Pulses With Enhanced Electronic Protection (우수한 전자 보호 기능을 가진 미상 레이더 펄스의 상/하 슬라이딩 PRI 식별 알고리즘)

  • Lee, Yongsik;Kim, Jinsoo;Kim, Euigyoo;Lim, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.6
    • /
    • pp.611-619
    • /
    • 2016
  • Success in modern war depends on electronic warfare. Therefore, It is very important to identify the kind of Radar PRI modulations in a lot of Radar electromagnetic waves. In this paper, I propose an algorithm to identify Linear up Sliding PRI, Non-Linear up Sliding PRI and Linear Down Sliding PRI, Non-Linear Down Sliding PRI among many Radar pulses. We applied not only the TDOA(Time Difference Of Arrival) concept of Radar pulse signals incoming to antennas but also a rising and falling curve characteristics of those PRI's. After making a program by such algorithm, we input each 40 data to those PRI's identification programs and as a result, those programs fully processed the data in according to expectations. In the future, those programs can be applied to the ESM, ELINT system.

Secure Routing Scheme in CCN-Based Mobile Ad-Hoc Networking Environments (CCN 기반 이동 애드혹 환경에서의 안전한 라우팅 방안)

  • Lee, Ju-Yong;Lee, Ji-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.304-308
    • /
    • 2014
  • As users generate lots of contents anytime and anywhere with an explosive growth of the number of mobile devices, Content centric networking (CCN) has emerged as a new networking architecture. However, the efficient CCN routing scheme is required for ad hoc network support because of its one to one message exchange characteristics. So, this paper proposes the new CCN ad hoc routing scheme using on-demand approach, which includes the secure routing configuration scheme based on multiple hash operation. It is shown from the simulation that the proposed method can provide lower control overhead because of its two-fold routing configuration architecture.

Approaches to Applying Social Network Analysis to the Army's Information Sharing System: A Case Study (육군 정보공유체계에 사회관계망 분석을 적용하기 위한방안: 사례 연구)

  • GunWoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.597-603
    • /
    • 2023
  • The paradigm of military operations has evolved from platform-centric warfare to network-centric warfare and further to information-centric warfare, driven by advancements in information technology. In recent years, with the development of cutting-edge technologies such as big data, artificial intelligence, and the Internet of Things (IoT), military operations are transitioning towards knowledge-centric warfare (KCW), based on artificial intelligence. Consequently, the military places significant emphasis on integrating advanced information and communication technologies (ICT) to establish reliable C4I (Command, Control, Communication, Computer, Intelligence) systems. This research emphasizes the need to apply data mining techniques to analyze and evaluate various aspects of C4I systems, including enhancing combat capabilities, optimizing utilization in network-based environments, efficiently distributing information flow, facilitating smooth communication, and effectively implementing knowledge sharing. Data mining serves as a fundamental technology in modern big data analysis, and this study utilizes it to analyze real-world cases and propose practical strategies to maximize the efficiency of military command and control systems. The research outcomes are expected to provide valuable insights into the performance of C4I systems and reinforce knowledge-centric warfare in contemporary military operations.

A Method of Service Refinement for Network-Centric Operational Environment

  • Lee, Haejin;Kang, Dongsu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.12
    • /
    • pp.97-105
    • /
    • 2016
  • Network-Centric Operational Environment(NCOE) service becomes critical in today's military environment network because reusability of service and interaction are being increasingly important as well in business process. However, the refinement of service by semantic similarity and functional similarity at the business process was not detailed yet. In order to enhance accuracy of refining of business service, in this study, the authors introduce a method for refining service by semantic similarity and functional similarity in BPMN model. The business process are designed in a BPMN model. In this model, candidated services are refined through binding related activities by the analysis result of semantic similarity based on word-net and functional similarity based on properties specification between activities. Then, the services are identified through refining the candidated service. The proposed method is expected to enhance the service identification with accuracy and modularity. It also can accelerate more standardized service refinement developments by the proposed method.

Applying Clustering Approach to Mobile Content-Centric Networking (CCN) Environment

  • Saad, Muhammad;Choi, Seungoh;Roh, Byeong-hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.450-451
    • /
    • 2013
  • Considering the recent few years, the usage of mobile content has increased rapidly. This brings out the need for the new internet paradigm. Content-Centric Networking (CCN) caters this need as the future internet paradigm. However, so far, the issue of mobility in the network using CCN has not been considered very efficiently. In this paper, we propose clustering in the network. We apply clustered approach to CCN for catering the mobility of client node in the network. Through this approach we achieve better convergence time and control overhead in contrast to the basic CCN.

Institutional Complement on In-Network Caching of Copyrighted Works (저작물의 In-network Caching에 관한 제도적 보완)

  • Cho, Eun-Sang;Hwang, Ji-Hyun;Kwon, Ted Tae-Kyoung;Choi, Yang-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8C
    • /
    • pp.703-710
    • /
    • 2012
  • The new article, related to temporary copy on exploitation of copyrighted works, has been introduced in the copyright law as partly revised on December 2, 2011. While number of researches on in-network caching including Content-Centric Networking are conducted quite actively in recent years, the need for legal and institutional considerations has arisen since temporal storage (i.e. temporal copy) may be made not only at user devices but also in routers such as network equipments. This paper examines issues on temporary copy of copyrighted works mainly focusing on the articles and the related articles of the recently revised copyright law as well as the Free Trade Agreement between the Republic of Korea and the United States of America and further studies necessary institutions required to actualize in-network caching.

Patent Analysis of Information Security Technology for Network-Centric Warfare (네트워크 중심전을 위한 정보보호기술의 특허동향 분석)

  • Kim, Do-Hoe;Park, Sang-Sung;Shin, Young-Geun;Jang, Dong-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.12
    • /
    • pp.355-364
    • /
    • 2007
  • The paradigm of war is basically changed by development of information and communication technologies. One of the paradigms in future war is NCW(Network-Centric Warfare) that is purposed of achievement in information-superiority. In this future war, the level of menace and fragility is rapidly increased in information-security according to the massive information and complex system. Therefore the Korean army is developing the information-security technologies for NCW. But, until now patent analysis concerning NCW has not performed. In this paper, we suggest a meaningful data for efficient R&D through patent analysis of information-security technologies on NCW.

Secure Naming Prefix Allocation Scheme for Mobile Content Centric Networking (이동 콘텐츠 중심 네트워크에서의 안전한 네이밍 할당 방안)

  • Lee, Jihoon;Lee, Juyong
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1466-1470
    • /
    • 2016
  • As individuals create many contents anytime and anywhere together with the widespread dissemination of smart devices as well as various social networking services (SNS), content centric networking (CCN) has regarded as a new networking technology. However, CCN is exposed to malicious attacks on the mobility management of mobile content sources during handover and high volume of control messages. Therefore, this paper presents a secure duplicate name detection (SecureDND) mechanism without additional control messages by signed information and secure token. It is shown from the performance evaluation that the proposed scheme can provide low control overhead, which results in the network scalability.