• Title/Summary/Keyword: Military Hybrid Network

Search Result 11, Processing Time 0.018 seconds

Constructing κ-redundant Data Delivery Structure for Multicast in a Military Hybrid Network (군 하이브리드 네트워크에서 생존성 향상을 위한 다중 경로 멀티캐스팅)

  • Bang, June-Ho;Cho, Young-Jong;Kang, Kyungran
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.6
    • /
    • pp.770-778
    • /
    • 2012
  • In this paper, we propose a multi-path construction scheme to improve the survivability of a multicast session in military hybrid networks. A military hybrid network consists of a static backbone network and multiple mobile stub networks where some nodes are frequently susceptible to be disconnected due to link failure and node mobility. To improve the survivability of multicast sessions, we propose a construction scheme of ${\kappa}$ redundant multi-paths to each receiver. In order to take account of different characteristics of static and mobile networks, we propose quite different multi-path setup approaches for the backbone and stub networks, respectively, and combine them at the boundary point called gateway. We prove that our proposed scheme ensures that each receiver of a multicast session has ${\kappa}$ redundant paths to the common source. Through simulations, we evaluate the performance of the proposed schemes from three aspects : network survivability, recovery cost, and end-to-end delay.

An Efficient Location Aided Routing Protocol for Hybrid Wireless Networks (하이브리드 무선 네트워크에서 위치 정보를 사용한 효율적인 라우팅 프로토콜)

  • Kim, Sun-Il;Lee, Jun-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.1
    • /
    • pp.117-125
    • /
    • 2009
  • In hybrid wireless networks, a mobile node in MANET can communicate with other mobile nodes as well as nodes in the Internet. Hybrid mobile networks help to expand the application domains of MANET from limited areas, such as military applications to more diverse and general application areas. Previous routing protocols in hybrid wireless networks have not taken advantage of location information of nodes in a network. By using location information of nodes, a routing protocol can reduce the overhead of control messages for efficient network operations. This paper proposes a routing protocol for hybrid mobile networks, called Location-aided AODV+ (LAp) that is based on ADOV+ and takes advantage of node's location information. Performance evaluation shows that LAp performs better than ADOV+ when there are a sufficient number of nodes in a network for route establishments.

Development of newly recruited privates on-the-job Training Achievements Group Classification Model (신병 주특기교육 성취집단 예측모형 개발)

  • Kwak, Ki-Hyo;Suh, Yong-Moo
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.2
    • /
    • pp.101-113
    • /
    • 2007
  • The period of military personnel service will be phased down by 2014 according to 'The law of National Defense Reformation' issued by the Ministry of National Defense. For this reason, the ROK army provides discrimination education to 'newly recruited privates' for more effective individual performance in the on-the-job training. For the training to be more effective, it would be essential to predict the degree of achievements by new privates in the training. Thus, we used data mining techniques to develop a classification model which classifies the new privates into one of two achievements groups, so that different skills of education are applied to each group. The target variable for this model is a binary variable, whose value can be either 'a group of general control' or 'a group of special control'. We developed four pure classification models using Neural Network, Decision Tree, Support Vector Machine and Naive Bayesian. We also built four hybrid models, each of which combines k-means clustering algorithm with one of these four mining technique. Experimental results demonstrated that the highest performance model was the hybrid model of k-means and Neural Network. We expect that various military education programs could be supported by these classification models for better educational performance.

A Hybrid Key Management Scheme in Tactical Ad-hoc Network (전술 Ad-hoc 네트워크에서 하이브리드 키 관리 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1413-1421
    • /
    • 2011
  • A next generation military communication system called Tactical Information Communication Network(TICN) is designed to advance into large capacity, high speed, and long distance wireless relay transmission. To support mobility in battlefield, the application of Ad-hoc networking technology to its wireless communication is being considered. In Ad-hoc network, the key management technique is very important to ensure the confidentiality, integrity, and authentication. In this paper, we propose a new hybrid key management scheme considering the hierarchical characteristics of the tactical ad-hoc such as TICN. For upper layer with sufficient energy and computation capability, we apply PKI based key management scheme. For lower layer with restricted resources, we propose a new key management scheme using the location-based authentication to ensure the energy efficiency.

Hybrid Feature Selection Method Based on a Naïve Bayes Algorithm that Enhances the Learning Speed while Maintaining a Similar Error Rate in Cyber ISR

  • Shin, GyeongIl;Yooun, Hosang;Shin, DongIl;Shin, DongKyoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5685-5700
    • /
    • 2018
  • Cyber intelligence, surveillance, and reconnaissance (ISR) has become more important than traditional military ISR. An agent used in cyber ISR resides in an enemy's networks and continually collects valuable information. Thus, this agent should be able to determine what is, and is not, useful in a short amount of time. Moreover, the agent should maintain a classification rate that is high enough to select useful data from the enemy's network. Traditional feature selection algorithms cannot comply with these requirements. Consequently, in this paper, we propose an effective hybrid feature selection method derived from the filter and wrapper methods. We illustrate the design of the proposed model and the experimental results of the performance comparison between the proposed model and the existing model.

NATO's Factor in Ensuring the National Security of Modern Ukraine

  • Biloshytskyi, Volodymyr;Hanhal, Artur;Mokliak, Sergii;Pysmennyi, Oleksii;Smolianiuk, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.689-695
    • /
    • 2021
  • The study is based on the elaborated normative and legal documentation regulating the national security of modern Ukraine and the normative and legal documents adopted by NATO in the responding policy to the challenges that arose after 2014. The main advantages of cooperation with NATO are ensuring military security, developing army standards, improving the country's investment climate, and reducing expenditures on the army. The disadvantages of cooperation with NATO in hostilities with Russia are not highlighted. Still, defined obstacles show that Ukraine is not ready to realize entry into NATO in the short term. Such factors include weak information support, corruption, and unclear diplomatic decisions.

A Design of Du-CNN based on the Hybrid Machine Characters to Classify Target and Clutter in The IR Image (적외선 영상에서의 표적과 클러터 구분을 위한 Hybrid Machine Character 기반의 Du-CNN 설계)

  • Lee, Juyoung;Lim, Jaewan;Baek, Haeun;Kim, Chunho;Park, Jungsoo;Koh, Eunjin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.6
    • /
    • pp.758-766
    • /
    • 2017
  • In this paper, we propose a robust duality of CNN(Du-CNN) method which can classify the target and clutter in coastal environment for IR Imaging Sensor. In coastal environment, there are various clutter that have many similarities with real target due to diverse change of air temperature, water temperature, weather and season. Also, real target have various feature due to the same reason. Thus, the proposed Du-CNN method adopts human's multiple personality utilization and CNN technique to learn and classify target and clutter. This method has an advantage of the real time operation. Experimental results on sampled dataset of real infrared target and clutter demonstrate that the proposed method have better success rate to classify the target and clutter than general CNN method.

Efficient Feature Selection Based Near Real-Time Hybrid Intrusion Detection System (근 실시간 조건을 달성하기 위한 효과적 속성 선택 기법 기반의 고성능 하이브리드 침입 탐지 시스템)

  • Lee, Woosol;Oh, Sangyoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.471-480
    • /
    • 2016
  • Recently, the damage of cyber attack toward infra-system, national defence and security system is gradually increasing. In this situation, military recognizes the importance of cyber warfare, and they establish a cyber system in preparation, regardless of the existence of threaten. Thus, the study of Intrusion Detection System(IDS) that plays an important role in network defence system is required. IDS is divided into misuse and anomaly detection methods. Recent studies attempt to combine those two methods to maximize advantagesand to minimize disadvantages both of misuse and anomaly. The combination is called Hybrid IDS. Previous studies would not be inappropriate for near real-time network environments because they have computational complexity problems. It leads to the need of the study considering the structure of IDS that have high detection rate and low computational cost. In this paper, we proposed a Hybrid IDS which combines C4.5 decision tree(misuse detection method) and Weighted K-means algorithm (anomaly detection method) hierarchically. It can detect malicious network packets effectively with low complexity by applying mutual information and genetic algorithm based efficient feature selection technique. Also we construct upgraded the the hierarchical structure of IDS reusing feature weights in anomaly detection section. It is validated that proposed Hybrid IDS ensures high detection accuracy (98.68%) and performance at experiment section.

An Improved Coyote Optimization Algorithm-Based Clustering for Extending Network Lifetime in Wireless Sensor Networks

  • Venkatesh Sivaprakasam;Vartika Kulshrestha;Godlin Atlas Lawrence Livingston;Senthilnathan Arumugam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1873-1893
    • /
    • 2023
  • The development of lightweight, low energy and small-sized sensors incorporated with the wireless networks has brought about a phenomenal growth of Wireless Sensor Networks (WSNs) in its different fields of applications. Moreover, the routing of data is crucial in a wide number of critical applications that includes ecosystem monitoring, military and disaster management. However, the time-delay, energy imbalance and minimized network lifetime are considered as the key problems faced during the process of data transmission. Furthermore, only when the functionality of cluster head selection is available in WSNs, it is possible to improve energy and network lifetime. Besides that, the task of cluster head selection is regarded as an NP-hard optimization problem that can be effectively modelled using hybrid metaheuristic approaches. Due to this reason, an Improved Coyote Optimization Algorithm-based Clustering Technique (ICOACT) is proposed for extending the lifetime for making efficient choices for cluster heads while maintaining a consistent balance between exploitation and exploration. The issue of premature convergence and its tendency of being trapped into the local optima in the Improved Coyote Optimization Algorithm (ICOA) through the selection of center solution is used for replacing the best solution in the search space during the clustering functionality. The simulation results of the proposed ICOACT confirmed its efficiency by increasing the number of alive nodes, the total number of clusters formed with the least amount of end-to-end delay and mean packet loss rate.

An Implementation of IEEE 1516.1-2000 Standard with the Hybrid Data Communication Method (하이브리드 데이터 통신 방식을 적용한 IEEE 1516.1-2000 표준의 구현)

  • Shim, Jun-Yong;Wi, Soung-Hyouk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1094-1103
    • /
    • 2012
  • Recently, software industry regarding national defense increases system development of distributed simulation system of M&S based to overcome limit of resource and expense. It is one of key technologies for offering of mutual validation among objects and reuse of objects which are discussed for developing these systems. RTI, implementation of HLA interface specification as software providing these technologies uses Federation Object Model for exchanging information with joined federates in the federation and each federate has a characteristic that is supposed to have identical FOM in the federation. This technology is a software which is to provide the core technology which was suggested by the United state's military M&S standard framework. Simulator, virtual simulation, and inter-connection between military weapons system S/W which executes on network which is M&S's core base technology, and it is a technology which also can be used for various inter-connection between S/W such as game and on-line phone. These days although RTI is used in military war game or tactical training unit field, there is none in Korea. Also, it is used in mobile-game, distribution game, net management, robot field, and other civilian field, but the number of examples are so small and informalized. Through this developing project, we developed the core technique and RTI software and provided performance of COTS level to improve communication algorithms.