• Title/Summary/Keyword: Military Networks

Search Result 272, Processing Time 0.027 seconds

Research for Network Layer of Sensor Network (센서 네트워크에서 네트워크 계층의 고찰)

  • Cho, Do-Hyeoun;Lee, Jong-Young;Lee, Sang-Hun;Lee, Tae-Sik
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.1191-1192
    • /
    • 2008
  • Recent advancement in wireless communications and electronics has enabled the development of low-cost sensor networks. The sensor networks can be used for various application areas(e.g., health, military, home). For different application areas, there are different technical issues that researchers are currently resolving. The current stats of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections. This article also point out the open research issues and intends to spark new interests and developments in this field.

  • PDF

A Novel Adaptive Routing Scheme for the QoS-Based Multimedia Services in Mobile Ad-Hoc Networks

  • Lee, Chang-Bum;Kim, Young-Woong;Soh, Surng-Ryurl;Kim, Yung-Kwon
    • Journal of IKEEE
    • /
    • v.4 no.2 s.7
    • /
    • pp.281-287
    • /
    • 2000
  • A mobile ad-hoc network is composed of only mobile nodes, which are distributed dynamically, without any wired backbone or centralized entities. Since the existing works on ad-hoc routing protocol are mostly biased toward a military application, we need a new routing scheme for a support of multimedia services in mobile ad-hoc networks. Therefore, we propose a novel scheme that can support a variety of traffic attributes and can be applicable to high-speed and multimedia data services in mobile ad-hoc networks by using adaptive transmission power level. As a result of simulation, the proposed scheme has better performance than conventional method, which is performed with uniform transmission power level, in view of route query delay time.

  • PDF

A Delay Efficient and Bursty Traffics Friendly MAC Protocol in Wireless Sensor Networks (무선 센서 네트워크에서 지연과 버스티 트래픽에 적합한 MAC 프로토콜)

  • Kim, Hye Yun;Kim, Seong Cheol
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.254-260
    • /
    • 2017
  • Data packets from sensor nodes scattered over measuring fields are generally forwarding to the sink node, which may be connected to the wired networks, in a wireless sensor network. So many data packets are gathered near the sink node, resulting in significant data packet collisions and severe transmission latency. In an event detection application such as object tracking and military, bursty data is generated when an event occurs. So many data packet should be transmitted in a limited time to the sink node. In this paper, we present a delay efficient and bursty traffic friendly MAC protocol called DEBF-MAC protocol for wireless sensor networks. The DEBF-MAC uses a slot-reserved mechanism and sleep period control method to send multiple data packets efficiently in an operational cycle time. Our simulation results show that DEBF-MAC outperforms DW-MAC and SR-MAC in terms of energy consumption and transmission delay.

Fire detection system and alarm system using wild boars (동물들을 이용한 재난 조기 경보 시스템의 설계 및 분석)

  • Jeong, Eui-Jong;Lee, Goo-Yeon
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.719-720
    • /
    • 2006
  • Ad hoc networks does not need any wired network infrastructure. Therefore, they have been developed in temporary networks or mainly in military networks. Infostations offer geographically intermittent coverage at high speeds. Up-to-date there have been frequent big forest fires in Korea mountain areas. It is very important to detect them early to prevent them from being big disasters. In this paper, we propose a disaster emergency management system using sensor attached wild boars' mobility combined with infostation system. We also make a numerical analysis of the performance of the system.

  • PDF

Swarm Group Mobility Model for Ad Hoc Wireless Networks

  • Kim, Dong-Soo S.;Hwang, Seok-K.
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.1 no.1
    • /
    • pp.53-59
    • /
    • 2007
  • This paper proposes a new group mobility model for wireless communication. The mobility model considers the psychological and sociological behavior of each node and the perception of other nodes for describing interactions among a set of nodes. The model assumes no permanent membership of a group, capable of capturing natural behaviors as fork and join. It emulates a cooperative movement pattern observed in mobile ad hoc networks of military operation and campus, in which a set of mobile stations accomplish a cooperative motion affected by the individual behavior as well as a group behavior. The model also employs a physic model to avoid a sudden stopping and a sharping turning.

  • PDF

Authentication Protocol for Unmanned Combat Systems in Tactical Wireless Networks (전술 무선 네트워크에서 무인전투체계를 위한 인증 프로토콜)

  • Lee, Jong-Kwan;Lee, Minwoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.298-299
    • /
    • 2019
  • In this paper, we propose a stable mutual authentication protocol between unmanned combat systems in tactical wireless networks where long distance communications are not always guaranteed due to a poor channel condition. The proposed protocol generates an authentication code using hash collision of arbitrarily selected random data. The authentication requester encrypts and transmits it to the authenticator. They performs authentication by sharing the valid authentication code. We analyze the safety of the proposed method for various attack scenarios.

  • PDF

Shortest Path Problems of Military Vehicles Considering Traffic Flow Characteristics (교통류특성을 고려한 군화물차량군 경로선정)

  • 방현석;김건영;강경우
    • Journal of Korean Society of Transportation
    • /
    • v.21 no.2
    • /
    • pp.71-82
    • /
    • 2003
  • The shortest path problems(SPP) are critical issues in the military logistics such as the simulation of the War-Game. However, the existing SPP has two major drawbacks, one is its accuracy of solution and the other is for only one solution with focused on just link cost in the military transportation planning models. In addition, very few previous studies have been examined for the multi-shortest path problems without considering link capacity reflecting the military characteristics. In order to overcome these drawbacks, it is necessary to apply the multi-shortest paths algorithm reflecting un-expected military incidents. This study examines the multi-shortest paths in the real networks using Shier algorithm. The network contains both military link capacity and time-based cost. Also, the modes are defined as a platoon(group) rather than unit which is used in most of previous studies in the military logistics. To verify the algorithm applied in this study. the comparative analysis was performed with various sizes and routes of network which compares with Dijkstra algorithm. The major findings of this study are as follows ; 1) Regarding the unique characteristics of the military transportation plan, Shier algorithm, which is applied to this study, is more realistic than Dijkstra algorithm. Also, the time based concept is more applicable than the distance based model in the military logistics. 2) Based on the results from the various simulations of this study the capacity-constraint sections appeared in each scenarios. As a consequence, the alternatives are necessary such as measures for vulnerable area, improvement of vehicle(mode), and reflection of separated-marching column in the military manuals. Finally. the limits and future research directions are discussed : 1) It is very hard to compare the results found in this study. which is used in the real network and the previous studies which is used in arbitrary network. 2) In order to reflect the real military situations such as heavy tanks and heavy equipment vehicles. the other constraints such as the safety load of bridges and/or the height of tunnels should be considered for the future studies.

The Satisfaction Research on the Multilateral Cooperative Military Training of Using the XR Technology (XR 기술을 활용한 다자간 협업 군사훈련 만족도조사)

  • Lee Yong Il
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.5
    • /
    • pp.23-28
    • /
    • 2024
  • So far, most of the military trainings were carried out in the field, and were influenced by the various parameters of the weather, the climate and the civil complaints regarding the noise. Also, it's the reality that the considerable time and resources are required to maneuver the weapon system used for the military training. Furthermore, the serious damage and casualties during tha military training are important parameters that can't be ignored. Recently, with the development of 5G communication networks and XR technologies, XR technologies are used in various fields that participate with multilateral parts, i.e. in military technology and training. In this paper, to implement the military education, 5G communication network and military education training system were established. The military education training system were composed that over 10 persons were possible to train in the various circumstances such as counter combat, mountains combat, urban combat and beaches combat. Also it is possible to fight with AI combatants, and train the gun disassembly and assembly, and train the various firing exercise. The military training system of using XR technologies were applied to the multilateral military training, and we analyzed the satisfaction results for the experienced persons of this XR system.

Security Improvement of ID-based Multiple Key Management Scheme for t Scalable Ad Hoc Networks

  • Park, Yo-Han;Park, Young-Ho;Moon, Sang-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.2
    • /
    • pp.13-18
    • /
    • 2011
  • Security supports are a significant factor in mobile ad hoc networks. Especially in dynamic topologies, considering cluster, key management is essential to provide a secure system. Recently, Li-Liu proposed iD-based multiple key management scheme for cluster-based ad hoc networks. However, we found the security weakness of their scheme. In this paper, we analyze the security of Li-Liu's scheme and show that master secret key and fragment of the master secret key can be revealed to compromised CHs and nodes. Furthermore, we propose a solution to improve the scheme against disclosure of the share key and the master secret key even though system parameters are opened to compromised nodes and modify the Li-Liu's scheme fitted for a scalable networks. The improved IMKM scheme could be usefully applied in dynamic cluster-based MANETs such as the military battlefields, mobile marketplace and VANETs.

A Danger Theory Inspired Protection Approach for Hierarchical Wireless Sensor Networks

  • Xiao, Xin;Zhang, Ruirui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2732-2753
    • /
    • 2019
  • With the application of wireless sensor networks in the fields of ecological observation, defense military, architecture and urban management etc., the security problem is becoming more and more serious. Characteristics and constraint conditions of wireless sensor networks such as computing power, storage space and battery have brought huge challenges to protection research. Inspired by the danger theory in biological immune system, this paper proposes an intrusion detection model for wireless sensor networks. The model abstracts expressions of antigens and antibodies in wireless sensor networks, defines meanings and functions of danger signals and danger areas, and expounds the process of intrusion detection based on the danger theory. The model realizes the distributed deployment, and there is no need to arrange an instance at each sensor node. In addition, sensor nodes trigger danger signals according to their own environmental information, and do not need to communicate with other nodes, which saves resources. When danger is perceived, the model acquires the global knowledge through node cooperation, and can perform more accurate real-time intrusion detection. In this paper, the performance of the model is analyzed including complexity and efficiency, and experimental results show that the model has good detection performance and reduces energy consumption.