• Title/Summary/Keyword: Network Centric Warfare(NCW)

Search Result 97, Processing Time 0.023 seconds

A Network QoS Model for Joint Integrated C4I Structure (합동지휘통제 통합망 구조 QoS 모델(안))

  • Park, Dongsuk;Oh, Donghan;Choi, Eunho;Lim, Jaesung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.2
    • /
    • pp.106-114
    • /
    • 2020
  • NCW which is shaping favorable conditions with obtaining initiative through superiority in C2 and information sharing is critical to the result of the war in a modern warfare. An important requirement to attain superiority through an effective networking in a war-environment is to apply QoS to ensure priority in supporting critical mission and services. In order to obtain an effective NCOE through JCS-led QoS support, standard doucments have been reviewed and analyzed to understand the current level of technology and development. In addition, QoS-related policy documents which is currently being applied by the ROK armed forces have been analyzed to substantiated the JCS-led QoS model and propose the directions of development and enhancement required in the realm of technology, policy and system.

The Study Application of Identification Based on Small Units USN(Ubiquitous Sensor Network) (소부대급 USN 기반 전장감시체계 적용 방안)

  • Kim, Do-Heon;Kim, Do-Yeob
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.2
    • /
    • pp.283-295
    • /
    • 2010
  • Although some large units, upper than division, have a identification system, most of them depend on US military. Especially, the company unit can not but execute GOP(General OutPost) guidance and battles inefficiently because they apply the method of conventional identification system. urrently, North Korea causes the high tension of peninsular by experimenting nuclear weapons and launching ICBM(Intercontinental Ballistic Missile). In addition, ROK military will reduce the number of personnel and division through reorganizing the structure into NCW (Network Centric Warfare) until 2020. These unstable situation and future tendency require the high technical identification system based on USN(Ubiquitous Sensor Network) in company unit level. his study suggests the method that the company unit apply the identification system based on USN which distinguish between friend and foe in the warfare. The identification system concludes the results through experiment of military analysis model (AWAM; Army Weapon effectiveness Analysis Model). After analyzing the experiment results, it indicates the budget requirement and operational operability of identification system. This will be able to improves battle efficiency and to prevent damages of friendly forces.

A Combat Effectiveness Evaluation Algorithm Considering Technical and Human Factors in C4I System (NCW 환경에서 C4I 체계 전투력 상승효과 평가 알고리즘 : 기술 및 인적 요소 고려)

  • Jung, Whan-Sik;Park, Gun-Woo;Lee, Jae-Yeong;Lee, Sang-Hoon
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.2
    • /
    • pp.55-72
    • /
    • 2010
  • Recently, the battlefield environment has changed from platform-centric warfare(PCW) which focuses on maneuvering forces into network-centric warfare(NCW) which is based on the connectivity of each asset through the warfare information system as information technology increases. In particular, C4I(Command, Control, Communication, Computer and Intelligence) system can be an important factor in achieving NCW. It is generally used to provide direction across distributed forces and status feedback from thoseforces. It can provide the important information, more quickly and in the correct format to the friendly units. And it can achieve the information superiority through SA(Situational Awareness). Most of the advanced countries have been developed and already applied these systems in military operations. Therefore, ROK forces also have been developing C4I systems such as KJCCS(Korea Joint Command Control System). And, ours are increasing the budgets in the establishment of warfare information systems. However, it is difficult to evaluate the C4I effectiveness properly by deficiency of methods. We need to develop a new combat effectiveness evaluation method that is suitable for NCW. Existing evaluation methods lay disproportionate emphasis on technical factors with leaving something to be desired in human factors. Therefore, it is necessary to consider technical and human factors to evaluate combat effectiveness. In this study, we proposed a new Combat Effectiveness evaluation algorithm called E-TechMan(A Combat Effectiveness Evaluation Algorithm Considering Technical and Human Factors in C4I System). This algorithm uses the rule of Newton's second law($F=(m{\Delta}{\upsilon})/{\Delta}t{\Rightarrow}\frac{V{\upsilon}I}{T}{\times}C$). Five factors considered in combat effectiveness evaluation are network power(M), movement velocity(v), information accuracy(I), command and control time(T) and collaboration level(C). Previous researches did not consider the value of the node and arc in evaluating the network power after the C4I system has been established. In addition, collaboration level which could be a major factor in combat effectiveness was not considered. E-TechMan algorithm is applied to JFOS-K(Joint Fire Operating System-Korea) system that can connect KJCCS of Korea armed forces with JADOCS(Joint Automated Deep Operations Coordination System) of U.S. armed forces and achieve sensor to shooter system in real time in JCS(Joint Chiefs of Staff) level. We compared the result of evaluation of Combat Effectiveness by E-TechMan with those by other algorithms(e.g., C2 Theory, Newton's second Law). We can evaluate combat effectiveness more effectively and substantially by E-TechMan algorithm. This study is meaningful because we improved the description level of reality in calculation of combat effectiveness in C4I system. Part 2 will describe the changes of war paradigm and the previous combat effectiveness evaluation methods such as C2 theory while Part 3 will explain E-TechMan algorithm specifically. Part 4 will present the application to JFOS-K and analyze the result with other algorithms. Part 5 is the conclusions provided in the final part.

A Study on Acceptance Factors for MND-MDM (국방 MDM 수용요인에 관한 연구)

  • Lee, In-Seog;Lee, Choon-Yeul
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.355-368
    • /
    • 2011
  • For an effective warfare under the condition of NCW, the sharing of data between systems must be essential. Thus, the standardization and the integration of data which is considered as the MND-EA improvement and the Megacenter is important. The purpose of this research is to investigate the factors that affected the BI(Behavioral Intention to USE) by using the TAM(Technology Acceptance Model), That is to introduce the MDM into the national defense field which is an issue in every agency sector for data sharing. Also, based on the implementation architecture of Gartner which applies depending on the business enterprise type, the preferred architecture should be selected considering the national defense environment and the characteristics, and suggest an effective MND-MDM plan by analysing the effects on the BI. The survey was done through 19th September till the 7th of October 2011, by investigating the people in charge of the development and maintenance of the national defense information systems and the SI company's national defense team people who have experienced the development of the national defense information systems.

Mutual Authenticate Protocol among Sensor for Network Centric Warfare (네트워크 중심전을 위한 센서간의 상호인증기법)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwnag-Bin
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.25-30
    • /
    • 2012
  • As the network composed of numerous sensor nodes, sensor network conducts the function of sensing the surrounding information by sensor and of the sensed information. Our military has also developed ICT(Information and Communication Technology) along with the methods for effective war by sharing smooth information of battlefield resources through network with each object. In this paper, a sensor network is clustered in advance and a cluster header (CH) is elected for clusters. Before deployment, a certificate is provided between the BS and the sensor nodes, and after clustering, authentication is done between the BS and the sensor nodes. Moreover, inter-CH authentication technique is used to allow active response to destruction or replacement of sensor nodes. Also, because authentication is done twice, higher level of security can be provided.

Implementation of Smartphone Adaptor for Real-Time Live Simulations (실시간 Live 시뮬레이션을 위한 스마트폰 연동기 구현)

  • Kim, Hyun-Hwi;Lee, Kang-Sun
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.1
    • /
    • pp.9-20
    • /
    • 2013
  • Defense M&S for weapons effectiveness is a realistic way to support virtual warfare similar to real warfare. As the war paradigm becomes platform-centric to network-centric, people try to utilize smartphones as the source of sensor, and command/control data in the simulation-based weapons effectiveness analysis. However, there have been limited researches on integrating smartphones into the weapon simulators, partly due to high modeling cost - modeling cost to accomodate client-server architecture, and re-engineering cost to adapt the simulator on various devices and platforms -, lack of efficient mechanisms to exchange large amount of simulation data, and low-level of security. In this paper, we design and implement Smartphone Adaptor to utilize smartphones for the simulationbased weapons effectiveness analysis. Smartphone Adaptor automatically sends sensor information, GPS and motion data of a client's smartphone to a simulator and receives simulation results from the simulator on the server. Also, we make it possible for data to be transferred safely and quickly through JSON and SEED. Smartphone Adaptor is applied to OpenSIM (Open simulation engine for Interoperable Models) which is an integrated simulation environment for weapons effectiveness analysis, under development of our research team. In this paper, we will show Smartphone Adaptor can be used effectively in constructing a Live simulation, with an example of a chemical simulator.

Derivation of Critical Functions of the Future Attack Helicopter Using QFD (QFD를 이용한 미래 공격헬기의 핵심기능 도출)

  • Lee, Jae-Won;Kwon, Yong-Soo;Ko, Nam-Kyoung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.3
    • /
    • pp.348-357
    • /
    • 2013
  • This work describes an approach that contributes to derive from mission to critical functions of the attack helicopter under future battle space environment. An existing mission of the attack helicopter is limited to the only shooter oriented functions. In the future environment, mission and its functions of the helicopter might be much expanded. The functions should be derived by the top down approach based on systems engineering approach. In this point of view, this work describes network based future battle environment. From this environment, the missions of the attack helicopter are identified and optimized functions are derived through sequential procedures like from missions to tasks, tasks to activities, and activities to functions. The selected activities are obtained from the tasks using QFD. The weighting scores of the QFD are calculated by the AHP computational procedure. Finally the critical functions are presented through the similar procedure.

A Study on Safety Coordination for a Complex System Comprised of Interoperable Systems Utilizing DoD Architectural Framework (상호운용성을 요구하는 복합시스템 개발에서 DoD 아키텍처 프레임워크를 활용한 안전성 확보에 관한 연구)

  • Kim, Young-Min;Lee, Jae-Chon
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.1
    • /
    • pp.1-10
    • /
    • 2013
  • The recent trend in the war fields on the globe may be characterized by the network-centric warfare, which would, in turn, make the concept of weapon systems be changed. To this end, the concept of system of systems (SoS) has been introduced in literature. An SoS is a collection of multiple systems, each of which is an independent system and can be interoperable with each other. Thus, in defense domain each SoS is a big weapon system as a whole operated in actual environment and each element of it is also an independent smaller weapon system, but they should be interoperable via network among each other. The safety results studied for each elementary system alone may not be fully applicable to the whole SoS. As such, the objective of this paper is to study how to make the SoS safety requirements be distributed down over the interoperable elementary systems. Since handling the interoperability requires a technique of systems architecture, a standard method called the DoD Architectural Framework (DoDAF) has been used here to derive a solution. Using DoDAF, the safety requirements were first analyzed in the operability environment. The results were then studied to be included in an integrated model of both the systems design and safety processes. A further study of present paper would facilitate ensuring safety in the development of SoS weapon systems in practice.

A Study on the Design of KVMF 2.0 Protocol for Ensuring Backward/Forward Compatibility between Different KVMF Message Standard Versions

  • Jeong-Min, Lee;Won-Gi, Lim;Won-Jun, Cho;Yong-Cheol, Kim;Jeung-Sub, Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.3
    • /
    • pp.45-58
    • /
    • 2023
  • KVMF(Korean Variable Message Format) 1.0 protocol is the Army's standard tactical datalink protocol that defines standard messages and communication methods to enable data communication between various weapon systems through bitwise variable message processing. The protocol has been applied to a variety of Army weapon systems over the past decade and has contributed to upgrade the Army's operational capabilities by enabling the implementation of Network Centric Warfare (NCW), the core of modern warfare. Since the KVMF 1.0 protocol was applied, new weapon systems with new technologies have been introduced over time, and new weapon systems have new messages based on the characteristics of the weapon system. As a result, compatibility problems arose due to different message versions with existing weapon systems, and it was expected that these problems would continue to emerge in the future, considering the need for continuous message revisions. Therefore, it became necessary to solve this problem, so this paper proposed a KVMF 2.0 protocol design that guarantees compatibility between forward and backward versions. In this paper, we implemented the design as SW, and confirmed that the design worked successfully by test between forward and backward versions on test environment. Therefore, when the KVMF 2.0 protocol design is applied to a weapon system, we can expect that the weapon system can be compatible with the forward and backward versions working with the existing weapon systems as well as with the future weapon systems.

The Study of Data Recorder for Mission Replay (임무 재생을 위한 데이터 기록장치 연구)

  • Lee, Sang-Myung;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1817-1823
    • /
    • 2012
  • On the matter in line with NCW(Network Centric Warfare) and information age, the military is on an efficient-expanding trend as sharing with status and information promptly through the various and complex exchange of messages and the voice communication between operators, using a highly efficient operating console. The recording devices that record an operational situation to plan a new operation through the mission analysis and result reviews after finishing military operation or training are developed and operated. Recording method is classified into two groups. one is the direct recording of video data for screen, another is the recording of an exchange of data. This study proposes the new data-oriented recording method to reduce the readiness time for replay and the improvement scheme.