• 제목/요약/키워드: Military Communication

검색결과 755건 처리시간 0.023초

국방 지휘·통제 시설을 위한 ICAN, I3A 설계기준 (ICAN, I3A Design Criteria for Military Defense Command & Control Facilities)

  • 조윤정
    • 한국통신학회논문지
    • /
    • 제42권4호
    • /
    • pp.806-815
    • /
    • 2017
  • 한국군은 국방시설기준이 정립되어 있으나 대부분 시설위주의 설계기준에 중점을 두고 작성되어 있다. 특히 정보통신분야에서는 세부적인 기준은 제시하지 않고 대략적인 수준으로만 제시되어 있다. 미군의 경우 1990년부터 각 군이 공통적으로 적용 가능한 시설기준에 대하여 통합시설기준서(UFC : Unified Facilities Criteria)를 완성해 모든 사업에 공통적용 할 수 있도록 설계기준을 제시하고 있다. 특히 정보통신분야에서는 시설분야와 연계해서 건물내부체계는 미군의 기지통신 기반구조설계기준(I3A: Installation, Information, Infrastructure Architecture)과 시스템에 대해서는 기지 및 캠퍼스지역 네트워크설계기준(ICAN : Installation and Campus area Network)과 비교를 통해 우리군의 지휘 통제시설 및 일반/행정시설에 대한 바람직한 설계기준선을 제시한다.

A Study of Software Hazard Analysis for Safety Critical Function in Military Aircraft

  • Oh, Hung-Jae;Hong, Jin-Pyo
    • 전기전자학회논문지
    • /
    • 제16권2호
    • /
    • pp.145-152
    • /
    • 2012
  • This paper is the Software Hazard Analysis (SWHA) which will study the managerial process and the technical methode and techniques inherent in the performance of software safety task within the Military Aircraft System Safety program. This SWHA identifies potential hazardous effects on the software intensive systems and provides a comprehensive and qualitative assessment of the software safety. The purpose of this paper is to identify safety critical functions of software in Military A/C. The identified software hazards associated with the design or function will be evaluated for risks and operational constraint to further improve the software design requirement, analysis and testing efforts for safety critical software. This common SWHA, the first time analysis in KOREA, was review all avionics OFP(Operational Flight Program), and focus only on software segments which are safety critical. This paper provides a important understanding between the customer and developer as to how the software safety for the Military A/C will be accomplished. It will also provide the current best solution which may as one consider the necessary step in establishing a credible and cost-effective software safety program.

정보화된 군사시설관련 제기된 민원분석을 통한 해결 방안에 관한 연구 (A study on Information related to the military filed complaints resolved through analysis)

  • 신광식;김행조
    • 한국전자통신학회논문지
    • /
    • 제8권11호
    • /
    • pp.1755-1762
    • /
    • 2013
  • 본 연구는 군사시설보호법(1972년 제정)으로 인하여 제기된 민원을 분석하였다. 첫째 연구결과 민원을 해결할 수 있는 통합적인 시스템 등 개선책마련이 필요하다. 둘째 군이 지역사회에 기여하거나 함께 한다는 분위기 조성으로 상생하는 계기를 마련하여야 한다. 마지막으로 관련법이나 제도, 규정, 교리 등 다방면에서 전향적인 사고가 미흡하거나 부족한 면을 보완하여야 할 것으로 본다. 연구 자료는 국방부 관련부서에 업무에 참고가 되도록 제공하고자 한다.

Enhancing Internet of Things Security with Random Forest-Based Anomaly Detection

  • Ahmed Al Shihimi;Muhammad R Ahmed;Thirein Myo;Badar Al Baroomi
    • International Journal of Computer Science & Network Security
    • /
    • 제24권6호
    • /
    • pp.67-76
    • /
    • 2024
  • The Internet of Things (IoT) has revolutionized communication and device operation, but it has also brought significant security challenges. IoT networks are structured into four levels: devices, networks, applications, and services, each with specific security considerations. Personal Area Networks (PANs), Local Area Networks (LANs), and Wide Area Networks (WANs) are the three types of IoT networks, each with unique security requirements. Communication protocols such as Wi-Fi and Bluetooth, commonly used in IoT networks, are susceptible to vulnerabilities and require additional security measures. Apart from physical security, authentication, encryption, software vulnerabilities, DoS attacks, data privacy, and supply chain security pose significant challenges. Ensuring the security of IoT devices and the data they exchange is crucial. This paper utilizes the Random Forest Algorithm from machine learning to detect anomalous data in IoT devices. The dataset consists of environmental data (temperature and humidity) collected from IoT sensors in Oman. The Random Forest Algorithm is implemented and trained using Python, and the accuracy and results of the model are discussed, demonstrating the effectiveness of Random Forest for detecting IoT device data anomalies.

군 전술정보통신체계에서 클러스터 구조에 대한 연구 (A Study on a Clustering for Military Tactical Information Communication Network)

  • 이명노;유재영
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2010년도 추계학술대회
    • /
    • pp.709-712
    • /
    • 2010
  • 다수의 이동 가입자 단말들을 고정된 기지국이 관리하는 인프라 구조를 갖는 이동통신망과는 달리 미래 군 전술정보통신체계에서는 네트워크를 관리하는 중심 단말기가 존재하지 않고 모든 이동 단말기가 독립적인 형태로 존재하며 사전에 특정한 네트워크에 속하거나 액세스 포인트를 갖지 않는 특징을 가지고 있다. 이러한 비교적 작은 규모의 Ad-hoc 네트워크에 대해서는 특정한 크기로 메시지 크기가 제한되는 경우에서만 클러스터 구조가 보다 큰 효율성을 보장할 것으로 예상되며, 군 전술정보통신체계를 위한 클러스터 구조에 대한 연구를 통하여 네트워크의 효율성을 최대로 활용할 수 있도록 적응형 클러스터 형성 알고리즘의 개발이 반드시 필요함을 알 수 있다.

  • PDF

정보화시대 병무행정과 병영정보화의 실태와 발전 방안 (Reality and Improvement Plan of Information-Oriented Age Conscription Administration and Barracks informationization)

  • 김두현
    • 한국인터넷방송통신학회논문지
    • /
    • 제14권1호
    • /
    • pp.109-112
    • /
    • 2014
  • 대한민국의 정보화 기술의 발전속도는 빠르게 성장하고 있고 IT기술은 세계최고의 수준으로 발전하였다. 특히, IT기술을 군사분야의 전쟁지휘체계에 접목하여 네트워크 중심의 작전환경을 구축하였다. 그러나 병무행정과 병영정보화는 많은 부분이 미흡한바 병영의무자와 부모에게 편익을 제공하고 군 복무간에 장병들이 온라인 체계를 이용한 학습여건 보장 등 IT시대에 부합된 병무행정과 병영정보화 기반체계를 발전시키고자 개선방안을 제시하였다.

A New Soft-Fusion Approach for Multiple-Receiver Wireless Communication Systems

  • Aziz, Ashraf M.;Elbakly, Ahmed M.;Azeem, Mohamed H.A.;Hamid, Gamal A.
    • ETRI Journal
    • /
    • 제33권3호
    • /
    • pp.310-319
    • /
    • 2011
  • In this paper, a new soft-fusion approach for multiple-receiver wireless communication systems is proposed. In the proposed approach, each individual receiver provides the central receiver with a confidence level rather than a binary decision. The confidence levels associated with the local receiver are modeled by means of soft-membership functions. The proposed approach can be applied to wireless digital communication systems, such as amplitude shift keying, frequency shift keying, phase shift keying, multi-carrier code division multiple access, and multiple inputs multiple outputs sensor networks. The performance of the proposed approach is evaluated and compared to the performance of the optimal diversity, majority voting, optimal partial decision, and selection diversity in case of binary noncoherent frequency shift keying on a Rayleigh faded additive white Gaussian noise channel. It is shown that the proposed approach achieves considerable performance improvement over optimal partial decision, majority voting, and selection diversity. It is also shown that the proposed approach achieves a performance comparable to the optimal diversity scheme.

전술정보통신체계(TICN)에 적합한 침입탐지 기법 (An Intrusion Detection Technique Suitable for TICN)

  • 이윤호;이수진
    • 한국군사과학기술학회지
    • /
    • 제14권6호
    • /
    • pp.1097-1106
    • /
    • 2011
  • Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.

군 환경시험규격 현실화를 위한 한반도 자연환경 조건분석 (A Study on The Korean Climatic Condition for The Military Environmental Testing Specification.)

  • 이관훈;송병석;홍원식;강보철;염대원;이도희;김준원;금종주
    • 한국군사과학기술학회지
    • /
    • 제4권2호
    • /
    • pp.70-83
    • /
    • 2001
  • The required standards for environmental tests for communication and electronic equipment used currently in the army are not standards into which the Korean climate and use environment are taken into consideration. But the environmental testing standards of the U.S. army at the time of its establishment(MIL-STD-810) “A” version has been used without taking into consideration the Korean domestic situation and conditions by simply translating the US standards. Adherence to these standards may limit the ability to supply materials in case of emergency since the increase in the manufacturing costs according to excessively strict standards induces an increase in the acquisition cost of military equipment, unnecessarily high maintenance and repair expenses are consumed, and stocks of parts for the military use have to be retained at all times.

  • PDF

군작전 효율화를 위한 셀룰라망 연동구조 설계 (An Architecture Design of Military Operation System Utilizing Cellular Networks)

  • 김재철;김인택
    • 안보군사학연구
    • /
    • 통권9호
    • /
    • pp.257-282
    • /
    • 2011
  • In this paper, we propose an architecture design of military operation system utilizing cellular networks. The main contribution of this paper is to provide a cost-effective military operation solution for ground forces, which is based on IT(information technology). By employing the cellular phones of officers' and non-commissioned officers' as the tools of operational communication, the proposed system can be constructed in the minimum duration and be built on the four components: command and control system, gateway, security system, and terminal(cell phone). This system is most effective for the warfare of limited area, but the effectiveness does not decrease under the total war covering the whole land of Korea. For the environmental change of near future, expanded architecture is also provided to utilize the functionalities of smart phones.

  • PDF