• 제목/요약/키워드: Military Networks

검색결과 270건 처리시간 0.025초

국방 전산망의 효율적인 설계를 위한 휴리스틱 알고리듬 개발 (Development of a heuristic algorithm for the effective design of military information networks)

  • 우훈식;윤동원
    • 안보군사학연구
    • /
    • 통권1호
    • /
    • pp.345-360
    • /
    • 2003
  • To build an information oriented armed forces, the Korean military telecommunication networks adopt TCP/IP standard communication infrastructures based on ATM packet switched networks. Utilizing this network infrastructure, the Korean armed forces also applies to the areas of battleship management for efficient operation command controls and resource management for efficient resource allocations. In this military communication networks, it is essential to determine the least cost network topology under equal performance and reliability constraints. Basically, this type of communication network design problem is known in the literature as an NP Hard problem. As the number of network node increases, it is very hard to obtain an optimal solution in polynomial time. Therefore, it is reasonable to use a heuristic algorithm which provides a good solution with minimal computational efforts. In this study, we developed a simulated annealing based heuristic algorithm which can be utilized for the design of military communication networks. The developed algorithm provides a good packet switched network topology which satisfies a given set of performance and reliability constraints with reasonable computation times.

  • PDF

Enhancing Internet of Things Security with Random Forest-Based Anomaly Detection

  • Ahmed Al Shihimi;Muhammad R Ahmed;Thirein Myo;Badar Al Baroomi
    • International Journal of Computer Science & Network Security
    • /
    • 제24권6호
    • /
    • pp.67-76
    • /
    • 2024
  • The Internet of Things (IoT) has revolutionized communication and device operation, but it has also brought significant security challenges. IoT networks are structured into four levels: devices, networks, applications, and services, each with specific security considerations. Personal Area Networks (PANs), Local Area Networks (LANs), and Wide Area Networks (WANs) are the three types of IoT networks, each with unique security requirements. Communication protocols such as Wi-Fi and Bluetooth, commonly used in IoT networks, are susceptible to vulnerabilities and require additional security measures. Apart from physical security, authentication, encryption, software vulnerabilities, DoS attacks, data privacy, and supply chain security pose significant challenges. Ensuring the security of IoT devices and the data they exchange is crucial. This paper utilizes the Random Forest Algorithm from machine learning to detect anomalous data in IoT devices. The dataset consists of environmental data (temperature and humidity) collected from IoT sensors in Oman. The Random Forest Algorithm is implemented and trained using Python, and the accuracy and results of the model are discussed, demonstrating the effectiveness of Random Forest for detecting IoT device data anomalies.

군 하이브리드 네트워크에서 생존성 향상을 위한 다중 경로 멀티캐스팅 (Constructing κ-redundant Data Delivery Structure for Multicast in a Military Hybrid Network)

  • 방준호;조영종;강경란
    • 한국군사과학기술학회지
    • /
    • 제15권6호
    • /
    • pp.770-778
    • /
    • 2012
  • In this paper, we propose a multi-path construction scheme to improve the survivability of a multicast session in military hybrid networks. A military hybrid network consists of a static backbone network and multiple mobile stub networks where some nodes are frequently susceptible to be disconnected due to link failure and node mobility. To improve the survivability of multicast sessions, we propose a construction scheme of ${\kappa}$ redundant multi-paths to each receiver. In order to take account of different characteristics of static and mobile networks, we propose quite different multi-path setup approaches for the backbone and stub networks, respectively, and combine them at the boundary point called gateway. We prove that our proposed scheme ensures that each receiver of a multicast session has ${\kappa}$ redundant paths to the common source. Through simulations, we evaluate the performance of the proposed schemes from three aspects : network survivability, recovery cost, and end-to-end delay.

협대역 다중홉 전투무선망에서 기회적 데이터 중계 기법 (Opportunistic Data Relay Scheme for Narrowband Multihop Combat Radio Networks)

  • 이종관
    • 한국군사과학기술학회지
    • /
    • 제25권1호
    • /
    • pp.65-71
    • /
    • 2022
  • In this paper, we propose an opportunistic data relay scheme in narrowband multihop combat radio networks. Narrowband networks have physical restrictions on high-speed transmission. Furthermore, the topology changes dynamically due to the jamming of the enemy, signal interference between friendly forces, and movement of network entities. Therefore, the traditional relay scheme that collects topology information and calculates a relay path before transmission is unsuitable for such networks. Our proposed scheme does not collect topology information and transmits data opportunistically. The scheme can cause unnecessary data relaying that is not related to data delivery to the destination node. However, for small networks, the effect of increasing network throughput by not gathering topology information is much greater than the effect of reducing throughput by unnecessary data relays. We demonstrate the performance superiority of the proposed scheme through simulation in the worst case of network topology.

군 통합 물류센터의 최적 위치 결정 (Military Logistics Consolidation Center Location Problem : Modeling and Analysis)

  • 심승배;장지홍;정호상;정봉주
    • 대한산업공학회지
    • /
    • 제39권6호
    • /
    • pp.587-598
    • /
    • 2013
  • In Korea military (KM), various military supplies are distributed to individual military units via three different multi-tier supply networks owned and operated by army, navy, and air force, respectively. Under the current supply networks, the chances for the occurrence of delayed supply, undersupply, and oversupply increase, and supply redundancy also can become a problem. Thus, KM is now trying to improve its current multi-tier supply networks by constructing logistics consolidation centers. Private companies operate logistics consolidation centers to effectively manage various types of inventories before delivering them to final customers. In this paper, we newly propose a mathematical model for building the optimized military supply network considering adopting the military logistics consolidation centers. Based on the real situation of KM, the proposed model was validated in terms of its feasibility, and it seems that the outcome (the location of the military logistics consolidation centers) of the proposed model can be one of the good alternatives for KM.

차기군위성통신에서 지상망 ALL-IP 연동을 위한 네트워크 운용구조 및 데이터링크 프로토콜 연구 (A Study on Network Operation Structure and DataLink Protocol for Interworking of Ground Network ALL-IP at Next-Military Satellite Communication)

  • 이창영;강경란;심용희
    • 한국군사과학기술학회지
    • /
    • 제21권6호
    • /
    • pp.826-841
    • /
    • 2018
  • The military satellite communication of ROK military, ANASIS is designed for analog data such as voice and streaming data. ANASIS cannot fully support ALL-IP communications due to its long propagation delay. The next generation satellite communication system is being designed to overcome the limitation. Next generation satellite communications system considers both high-speed and low-speed networks to support various operating environment. The low-speed satellite supports both broadband and narrow-band communication. This network works as the infrastructure for of wide-area internetworking over multiple AS's in the terrestrial network. It requires minimum satellite frequency and minimum power and works without PEP and router. In this paper, we propose a network operation structure to enable the inter-operation between high and low-speed satellite networks. In addition, we propose a data link protocol for low speed satellite networks.

국방용 합성이미지 데이터셋 생성을 위한 대립훈련신경망 기술 적용 연구 (Synthetic Image Dataset Generation for Defense using Generative Adversarial Networks)

  • 양훈민
    • 한국군사과학기술학회지
    • /
    • 제22권1호
    • /
    • pp.49-59
    • /
    • 2019
  • Generative adversarial networks(GANs) have received great attention in the machine learning field for their capacity to model high-dimensional and complex data distribution implicitly and generate new data samples from the model distribution. This paper investigates the model training methodology, architecture, and various applications of generative adversarial networks. Experimental evaluation is also conducted for generating synthetic image dataset for defense using two types of GANs. The first one is for military image generation utilizing the deep convolutional generative adversarial networks(DCGAN). The other is for visible-to-infrared image translation utilizing the cycle-consistent generative adversarial networks(CycleGAN). Each model can yield a great diversity of high-fidelity synthetic images compared to training ones. This result opens up the possibility of using inexpensive synthetic images for training neural networks while avoiding the enormous expense of collecting large amounts of hand-annotated real dataset.

이동성과 보안성 만족 군용 통신을 위한 IPSec 기반 네트워크 설계 (IPSec based Network Design for the Mobile and Secure Military Communications)

  • 정윤찬
    • 한국통신학회논문지
    • /
    • 제35권9B호
    • /
    • pp.1342-1349
    • /
    • 2010
  • 군용 환경에서 동적으로 변화하는 PT (Plain Text) 네트워크들이 Black (Blk) 네트워크를 통하여 서로 보안성있는 통신을 하기 위해서는 Blk 네트워크를 형성하는 완전 그물형 IPSec 터널이 필요하다. 이동성과 보안성이 요구되는 Blk 네트워크에서 IPSec 터널과 보안 방안, 즉 SPD (Security Policy Database)를 동적으로 재구성하는 것은 어려운 과제이다. 본 논문에서는 기존의 IPSec 터널 터널 모드 기술과 IPSec 비밀 키 관리 기술을 바탕으로 하여 군 네트워크에서 요구하는 이동성과 보안성 능력을 제공하기 위해서 구비해야 할 기술인 DMIDP(Dynamic Multicast-based IPSec Discovery Protocol) 기술과 관련된 핵심 기술을 체계적으로 제안한다. 또 제안된 DMIDP 기법에서 나타날 이동성 및 보안성과 관련된 성능에 영향을 미치는 주요 변수와 이들의 운영 방법을 도출하고 제안된 변수 상태에서의 DMIDP 운영 효율성을 분석한다.

Performance Simulations of Wireless Grid Communication Networks

  • ;김세목;이종명
    • 한국위성정보통신학회논문지
    • /
    • 제9권2호
    • /
    • pp.18-22
    • /
    • 2014
  • 위성 통신은 지상 무선국과 위성 사이의 통신으로, 지상 무선국을 유기적으로 활용함으로써 효율적인 위성 통신이 가능하다. 무선 통신은 이동성, 지형 및 방해 신호가 중요한 성능 결정 요인이며, 그리드 네트워크의 한 요소이다. 따라서 그리드 네트워크의 지속적인 연구 성과를 차기 위성 통신에 적용할 수 있을 것이다. 군 통신은 무선 시스템을 기반으로 사용하기에, 군 통신에서 많이 사용하고 있는 라우팅 프로토콜, OSFP (Open Short Path First) 를 적용하여 그리드 네트워크의 성능 향상을 위한 시뮬레이션을 실시하였다. 본 논문에서는 BER (Bit Error Rate) 및 라우터 수에 따른 성능 변화와 그에 의한 네트워크의 MSS (Maximum Segment Size)를 연구하였으며, 그 결과를 제시하였다. 연구 결과를 통하여 다양한 BER 및 라우터 수에서 최적의 MSS를 확인할 수 있었다.

전술 무선 네트워크에서 고비밀성 정보 공유를 위한 위치 종속적 그룹키 관리 기법 (A Location Dependent Group Key Management Scheme for High Confidential Information in Tactical Wireless Networks)

  • 이종관;신규용;김경민
    • 한국군사과학기술학회지
    • /
    • 제21권5호
    • /
    • pp.658-664
    • /
    • 2018
  • In this paper, we propose a group key management scheme for very high confidential information in tactical wireless networks. For the proposed scheme, we consider the tactical networks that has a hierarchical topology and the nature of high confidential information. The leader node, which may have higher probability of good channel state than others, provides some data to all the network member in order to generate a geographical group key and it transmits the encrypted information with minimum transmission power level to others. By this scheme, the security and reliability for sharing confidential information is ensured. The performance of the proposed scheme is validated by mathematical analysis. It shows that the proposed scheme makes nodes to share a high confidential information securely if the proper parameters for network design are selected.