• 제목/요약/키워드: Military service

검색결과 548건 처리시간 0.029초

지상 기동 무기 체계에 장착된 미사일 경고 레이더의 간섭에 대한 연구 (A Study for Interference of the Missile Warning Radar in the GVWS)

  • 박규철;홍성용
    • 한국군사과학기술학회지
    • /
    • 제11권2호
    • /
    • pp.5-15
    • /
    • 2008
  • Cooperation between the GVWS within a few hundred meters has forced MWRs equipped to have service ranges in such a short ranges as well as the limited numbers of channels are available. This kind of situation often produces the frequency interferences between MWRs due to the easy uses of the common and adjacent frequencies between them. Current work provides the details of the frequency interferences and the possible degrees of detections. It is also described that the effective distances for the operation between the GVWS are investigated when they use the common and the adjacent frequencies each other with the factors as the frequency intervals and the antenna arrangement angles.

Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems

  • Lee, Jongkwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권9호
    • /
    • pp.3858-3869
    • /
    • 2020
  • In this paper, we propose a hash-chain based friendly force identification protocol for personal combatants equipped with a personal combat system in a tactical wireless network. It is imperative in military operations to effectively and quickly identify friendly forces. If the identification of friendly forces is not correct, this can cause friendly fire. In current ground operations, the identification of friendly forces by personal combatants is neither secure nor safe. To address this issue, the proposed protocol uses a hash-chain to determine if a detected person is friendly. Only friendly forces with the same materials that are assigned before they deploy can construct an initial hash-chain. Moreover, the hash-chain is changed at specific times. The performance of the proposed protocol is evaluated on the assumption that the secret key is leaked, which is the worst scenario in the security research field. We verify that the proposed protocol is secure for the various attack scenarios, such as message replay attack, fabrication attack, and Denial of Service attack.

함정전투시스템 미들웨어 IPCS의 성능 개선 (Performance Improvement of IPCS : A Middleware for Warship Combat Systems)

  • 류원재;신수용;허성길;최윤석
    • 한국군사과학기술학회지
    • /
    • 제16권5호
    • /
    • pp.659-665
    • /
    • 2013
  • IPCS(Inter Process Communication Service) is a real-time communication middleware designed for warship combat battle systems based on publisher-subscriber communication model. Because IPCS was originally designed to operated under 100 Mbps network environment, increasing network speed into Gigabit environment does not linearly increase the throughput of IPCS. To solve this problem, we anaylized IPCS structure and optimized IPCS into Gigabit-Ethernet environment. We found parameters to improve IPCS based on UDP and Token-ring structure. By improving, IPCS has reliability and higher throughput than TCP although IPCS is based on UDP.

A study on the AC and PMI model for the Defense computer network

  • 윤희승;김상천;송주석
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2001년도 추계학술발표논문집 (하)
    • /
    • pp.977-980
    • /
    • 2001
  • This paper is a study on the AC and PMI model for the defense computer network. It is suggested that the organization plan of PMI model is a proper model for the characteristics of military system and military defense network security demands based on defense PKI system. Futhermore, it will be presented both various types of defense AC and AC according to the role and clearance in PMI. Defense AC will provide strong users' authentication and Role Based Access Control to give more secured and trusted authentication service by using users' attribute such as role and clearance.

  • PDF

HLA Interface Specification 1.3를 이용한 OO기반의 페더레이트 모델링 및 구현 ((Object-Oriented Federate Modeling and Implementation using HLA Interface Specification 1.3))

  • 최웅철;유기훈
    • 한국국방경영분석학회지
    • /
    • 제35권1호
    • /
    • pp.95-103
    • /
    • 2009
  • HLA는 이기종 시뮬레이션간의 연동을 위한 IEEE 1516 표준이며, RTI는 연동을 위한 하부 인프라 서비스를 제공하는 기술이다. 본 논문에서는 HLA/RTI에 호환 가능한 OO기반의 페더레이트 모델 구조를 제안함으로써 코드의 재사용성을 높인다. 이는 시스템 개발 프로세스의 효율을 높이고, 개발시간의 단축 및 소프트웨어 개발 비용의 절감효과를 가져 온다. 제안된 페더레이트 모델은 이를 구현한 페더레이트에 대한 HLA 인증으로 그 실질적인 효과를 검증 받는다.

공중.미사일방어의 네트워크중심 전장관리체계 발전방안 (Prospective Scheme of Network Based Battle Management System in AMD)

  • 권용수;함병운;김하철
    • 한국군사과학기술학회지
    • /
    • 제9권4호
    • /
    • pp.50-60
    • /
    • 2006
  • This work describes a basic concept of network based battle management system in AMD(Air & Missile Defense). The AMD operation inherently is joint concept that each single service do not satisfy the requirements of AMD theater operation. It is integrated system of joint forces that is operated simultaneously. The analysis of the future battlespace and air & missile threat is shown. From this analysis the prospective scheme of network based battle management system in building Korean future AMD is presented.

로제타넷표준을 적용한 SCM 연계에 관한 연구 (A Study on SCM Connection using the Rosetta-net Standard)

  • 서장훈;김용범;김우열
    • 한국국방경영분석학회지
    • /
    • 제29권1호
    • /
    • pp.43-56
    • /
    • 2003
  • This paper is intended to investigate the Build-up Method of SCM(Supply Chain Management) Connection applying EC Standard. SCM helps companies plan and supply to meet customer demand. SCM is the only solution available today that enables an organization to strategize, plan and execute a company's buy, make, move, store, fulfill and service business processes across multiple enterprises for total profitability. The research of modern scientists has thrown new light on the subject. However, the study of SCM for EC Standard has been strangely neglected by critics. Consequently, existing SCM systems, which require to introduce the functions of EC, need to be changed. Summarizations of the main points that have been analyzed in this paper are as follows:. the sharing information for connection and the Rosetta-net standard of the existing SCM system(Order management module(PIP 3A4) of the Rosetta-net specifications for connection by the Rosetta-net). Finally, it shows the process of the gateway for connecting among the existing SCM systems.

국방정보체계의 서비스 품질(QoS) 보장을 위한 정책기반(Policy-Based)네트워킹 적용에 관한 연구 (A study on the Application of Policy-Based Networking for QoS in The Defense Information System)

  • 김광영;이승종
    • 한국국방경영분석학회지
    • /
    • 제29권1호
    • /
    • pp.57-75
    • /
    • 2003
  • Policy-based networking offers a network manager the ability to manage the network in a holistic and dynamic fashion rather than force a network manager to manage the network by dealing with each device individually. Policy-based networking is focusing on users and applications instead of emphasizing devices and interfaces. An important part of the policy-based networking is to simplify the task of administration and management for different disciplines. The Defense Information System(DIS) of today are complex and heterogeneous systems. Operational needs are not a trivial task and Quality of Service(QoS) is not generally guaranteed. So, important data may be missed or congested by trivial data. Policy-based networking provide a way to support QoS and simplify the management of multiple devices deploying complex technologies. This paper suggest implementation of policy-based networking in DIS to improvement of performance, and implementation is progressed step by step. Especially this paper is focusing on the providing QoS with policy-based networking using Lightweight Directory Access Protocol(LDAP) Server.

승강기 대기시스템의 시뮤레이션 모델 (A Simulation Model for the Elevator Queueing System)

  • 오형재;민은기
    • 한국국방경영분석학회지
    • /
    • 제12권1호
    • /
    • pp.87-105
    • /
    • 1986
  • Among the various types of waiting line systems, the elevator servicing system is quite different from the usual queueing system in view of the service characteristics. For example, the FIFO discipline is not always valid depending upon the situation when the direction of first-come customer's is opposite of the operating elevator direction and at that time a later-arrived one has a luck to be served first. In this paper, a simulation model is constructed and tested by the sample data and the results have turned out to be fairly adequate. This model, therefore, will provide a good guide to anyone who is interested in the decision of optimal location selection of no-passenger elevator in high buildings whatsoever. This model is also available, with slight modification, to the problem of city bus dispatching or any other waiting line problems where the servicing equipments are moving.

  • PDF

TMN 개념을 이용한 C31 통합 통신망 관리 구조 설계 (Design of C31 Integrated Network Management Architecture based on TMN Concept)

  • 김도현
    • 한국국방경영분석학회지
    • /
    • 제23권1호
    • /
    • pp.115-137
    • /
    • 1997
  • It was required Integrated Network Management Architecture(INMA) with consistency and standardization in order to support efficiently communication service for operators and users. In such ITU-T(International Telecommunication Union - Telecommunication) recommended TMN(Telecommunication Management Network) which is Network management architecture for telecommunication, and intended to achieve uniform and comprehensive network management using standardized network management interface. This paper proposes C31 management services and management functions based on ITU-T and RACE project. This designs C31 INMA based on TMN concept in order to manage efficiently C31 communication network. The C31 INMA supports to manage C31 LAN and WAN devices and lines with global and correspondence, and helps Integrated Network Management system design and implementation.

  • PDF