• Title/Summary/Keyword: Tactical Information

Search Result 342, Processing Time 0.021 seconds

Distributed Mobility Management Scheme for the Tactical Network (전술망을 위한 분산 이동성 관리 기법)

  • Kim, Yongsin;Sun, Kyoungjae;Kim, Younghan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1078-1087
    • /
    • 2014
  • In the conventional centralized mobility management schemes, it can lead to single points of failure, occurrence of a bottleneck, since all data and control are concentrated on the mobility anchor which is located in home network. In the current research of distributed mobility management, it is doing research into distributed mobility management which is supported by distributed mobility anchors. Such schemes do not consider a failure of the mobility anchor. However, it could be an issue under tactical environment since it occur non-service problem due to anchor movement, maintenance, failure, etc. In this paper, we proposed new DMM scheme named T-DMM(Tactical-Distributed Mobility Management) which can support handover even if mobility anchor breaks down. From the numerical analysis, we evaluate signaling cost and handover latency.

A Study on the Prediction Method of Information Exchange Requirement in the Tactical Network (전술네트워크의 정보교환요구량 예측 방법에 관한 연구)

  • Pokki Park;Sangjun Park;Sunghwan Cho;Junseob Kim;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.95-105
    • /
    • 2022
  • The Army, Navy, and Air Force are making various efforts to develop a weapon system that incorporates the 4th industrial revolution technology so that it can be used in multi-domain operations. In order to effectively demonstrate the integrated combat power through the weapon system to which the new technology is applied, it is necessary to establish a network environment in which each weapon system can transmit and receive information smoothly. For this, it is essential to analyze the Information Exchange Requirement(IER) of each weapon system, but many IER analysis studies did not sufficiently reflect the various considerations of the actual tactical network. Therefore, this study closely analyzes the research methods and results of the existing information exchange requirements analysis studies. In IER analysis, the size of the message itself, the size of the network protocol header, the transmission/reception structure of the tactical network, the information distribution process, and the message occurrence frequency. In order to be able to use it for future IER prediction, we present a technique for calculating the information exchange requirement as a probability distribution using the Poisson distribution and the probability generating function. In order to prove the validity of this technique, the results of the probability distribution calculation using the message list and network topology samples are compared with the simulation results using Network Simulator 2.

Interoperable XML Messaging System for Tactical Data Link (전술데이터링크 상호운용을 위한 XML 기반 메시징 시스템)

  • Kim, Hong-Jae;Oh, Sang-Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.75-87
    • /
    • 2011
  • Tactical Data Links are standardized radio communication data links for military armed forces and used to transmit and receive data. Because they are the core elements of achieving information superiority in a NCW environment, various kinds of TDL are used by the Korean armed forces. Operating various types of TDL is very helpful in getting more information; however, at the same time, it is hard to integrate and make them co-operate with other TDLs or C4ISR systems. In this paper, we propose a XML based messaging system to make various types of TDL interoperable in a NCW environment. For the messaging system between TDL and C4ISR systems, we define XML message processing interfaces and suggest binary XML for serialization to save transmission loads over constrained military communication bandwidth. Our experiment results show that the TDL message can be transformed into generalized XML data that is interoperable with other TDLs and binary XML serialization, and it saves parsing and transmission time.

A Concept Study on Improving Command Post Vehicles for Operating Battle Management System (전장관리체계 운용을 위한 전투지휘용 차량의 성능개량 개념)

  • Park, Seung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.2
    • /
    • pp.16-22
    • /
    • 2008
  • So far, Korean command post vehicles(CPs) have used voice-only radio communication among the mechanized troop units such MBTs and IFVs, etc. But digital data communication technology should be introduced to improve mission success capabilities and accommodate integrated combat capabilities through increasing SA(situation Awareness), or spatiotemporal synchronization of military operation in battle field environment. Therefore, conventional CPs, which have been operated without digital network, urgently needs to mount a battle management system which furnish with tactical information network, considering that korean new MBTs or new IFVs will be fielded soon. This study suggests some performance enhancement method which might be applicable to CPs which have a role of connecting Battalion unit to Brigade C4I system.

Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems

  • Lee, Jongkwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3858-3869
    • /
    • 2020
  • In this paper, we propose a hash-chain based friendly force identification protocol for personal combatants equipped with a personal combat system in a tactical wireless network. It is imperative in military operations to effectively and quickly identify friendly forces. If the identification of friendly forces is not correct, this can cause friendly fire. In current ground operations, the identification of friendly forces by personal combatants is neither secure nor safe. To address this issue, the proposed protocol uses a hash-chain to determine if a detected person is friendly. Only friendly forces with the same materials that are assigned before they deploy can construct an initial hash-chain. Moreover, the hash-chain is changed at specific times. The performance of the proposed protocol is evaluated on the assumption that the secret key is leaked, which is the worst scenario in the security research field. We verify that the proposed protocol is secure for the various attack scenarios, such as message replay attack, fabrication attack, and Denial of Service attack.

Flood Search Algorithm with MFDL Path in Circuit-Switched Networks (회선 교환망에서 MFDL 경로를 이용한 Flood Search 알고리즘)

  • 박영철;이상철;은종관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.3
    • /
    • pp.360-371
    • /
    • 1993
  • Flood search algorithm is known to be an effective routing mechanism for tactical application, since it provides high degree of survivability and robustness. But it is known that it has significant drawbacks with respect to the network efficiency [1]. We consider a tactical circuit-switched grid network with a maximum of four links and two priority classes of voice traffic, Using the minimum first-derivative length (MFDL) path, we improve the blocking probability performance of the circuit-switched network without increasing the call set-up time and processor loading of the algorithm.

  • PDF

Study of applicable security tunneling technique for military wireless network (군 무선네트워크 환경에서 적용 가능한 보안 터널링 기법 연구)

  • Kim, Yun-young;Namkung, Seung-Pil
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.107-112
    • /
    • 2015
  • Due to the rapid development of wireless communication technology, foundation system of military communication that is based on the daily use technology has been changed in to wireless system. However, military communication contains clssified information, and it is expected to have increase amount of enemy's there in such a imperfect security system. The next generation of tactical network communication system is expected to adopt All IP based wireless system. This research studies expected threatening factor on the wireless environment, and find the appropriate tunneling techniques.