• 제목/요약/키워드: Tactical Operations

검색결과 85건 처리시간 0.025초

다중데이터링크 기반에서 데이터링크 처리기와의 데이터 무결성 보장을 위한 전술상황전시기 간 데이터 기록 및 재생 방법 연구 (A Study on Data Recording and Play Method between Tactical Situations to Ensure Data Integrity with Data Link Processor Based on Multiple Data Links)

  • 이현주;정은미;이성우;염재걸;김상준;박지현
    • 디지털산업정보학회논문지
    • /
    • 제13권2호
    • /
    • pp.13-25
    • /
    • 2017
  • Recently, the high performance of tactical situation display console and tactical data links are used to integrate the operational situations in accordance with information age and NCW (Network Centric Warfare). The tendency to maximize the efficiency of task execution has been developed by sharing information and the state of the battle quickly through complex and diverse information exchange. Tactical data link is a communication system that shares the platform with core components of weapons systems and battlefield situation between the command and control systems to perform a Network Centric Warfare and provides a wide range of tactical data required for decision-making and implementation.It provides the tactical information such as tactical information such as operational information, the identification of the peer, and the target location in real time or near real time in the battlefield situation, and it is operated for the exchange of mass tactical information between the intellectuals by providing common situation recognition and cooperation with joint operations. In this study, still image management, audio file management, tactical screen recording and playback using the storage and playback, NITF (National Imagery Transmission Format) message received from the displayer integrates the tactical situation in three dimensions according to multiple data link operation to suggest ways to ensure data integrity between the data link processor during the entire operation time.

Software structure design for processing various tactical data

  • Kim, Jin Woo;Lee, Woo Sin;Lee, Seung Chan;Kim, Young Don;Jin, So Yeon
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권11호
    • /
    • pp.39-47
    • /
    • 2017
  • In this paper, we propose a message transmission processing structure for efficient use of radio resources. Existing tactical data links have more data and accumulate more data than the amount of tactical data planned according to the situation. This may result in delays in operations and additional problems. To prevent this, priority is assigned to the message and transmission is performed according to the priority on a single basis. And we design a processing structure that can update duplicate messages and delete old messages in order to prevent waste of radio resources. Experiments are conducted to verify that these structures can be implemented and applied to data links.

Kill Chain 기반 해상기동부대의 효과적인 해상작전 모델 제안 (Development of Kill Chain Based Effective Maritime Operations Model for Naval Task Forces)

  • 이철화;장동모;이태공;임재성
    • 정보화연구
    • /
    • 제9권2호
    • /
    • pp.177-186
    • /
    • 2012
  • 해군은 다양한 해상작전을 수행하기 위해 해상기동부대(TF)를 구성한다. 해양 환경하에서 해상기동부대(TF)는 대함전(ASUW), 대잠전(ASW), 대공전(AAW), 그리고 상륙돌격 작전 등과 같은 동시 병행적으로 성분작전을 수행한다. TF는 임무완수를 위하여 C4I, 인터넷 음성전화(VOIP) 및 디지털 전보처리체계(DMHS)와 LINK-11, 16, ISDL 등과 같은 전술데이터링크를 갖춘 많은 전술체계들을 구성하고 있다. TF가 수명한 임무를 완수하기 위해 해상작전을 수행할 때, TF의 작전절차에 관심을 갖게 되었다. 작전절차는 적을 격파하기 위한 해상작전 수행을 위한 표준절차이다. 각 함정은 '어떻게 싸울 것인가'에 대한 매뉴얼에 교전절차는 갖고 있지만, 현재 TF의 상세한 작전절차는 미흡하다. 따라서, 본 논문에서 우리는 효과적인 해상작전 수행에 필요한 작전절차를 제안한다. 그런 작전절차 환경에서 TF의 작전 효과성은 전술데이터링크 운영의 작전 시나리오를 통해 결정하고자 한다. 전술데이터링크를 적용한 해상작전에서 데이터 링크 기반으로 국방 아키텍처프레임워크(MND-AF) OV-6c(운용상태 추적 기술서)에서 작전정보 공유효과를 살펴보고, 정보 전파과정 개선을 식별하는 것이다. 본 논문에서는 효과적인 해군작전의 해상 TF를 위한 작전절차 모델을 제안하였다.

시뮬레이션 기반 육군전술지휘정보체계에 대한 웜 피해평가 (Simulation-based Worm Damage Assessment on ATCIS)

  • 김기환;김완주;이수진
    • 한국국방경영분석학회지
    • /
    • 제33권2호
    • /
    • pp.115-127
    • /
    • 2007
  • 육군은 실시간으로 지휘통제 정보를 공유하는 전장정보체계의 구성을 위해 육군전술지휘정보체계(ATCIS : Army Tactical Command Information System)를 개발하였다. 이러한 ATCIS 체계는 공개키 및 암호화 장비를 이용하여 무결성, 비밀성은 충분히 충족시키지만, zero day attack을 이용한 새로운 방법의 DDoS(Distributed Denial of service)공격 등 가용성에 대해서는 무결성, 비밀성만큼의 안전성이 확보되지 못한 실정이다. 따라서 본 논문에서는 네트워크 시뮬레이터인 NS-2(3)에서 제공하는 DN-AN 모델을 이용하여 웜 피해평가를 위한 시뮬레이션을 구현하였다. 또한, 도출된 결과를 통해 ATCIS에서의 웜 취약점을 분석하고, 대응방안을 제안한다.

이종(異種)의 전투기동차량 간 전술정보 연동 방안 검토 (A Research on Intercommunication Method for Tactical Information Among Heterogeneous Mobile Combat Vehicles)

  • 최일호;노해환;송충호
    • 한국군사과학기술학회지
    • /
    • 제25권2호
    • /
    • pp.187-195
    • /
    • 2022
  • Modern Battle Fields are covered with various weapon systems, such as tanks, infantry vehicles, or artillery vehilces. In such environment, it is important to take it into consideration what kind of efficient method should be developed to communicate with heterogeneous friend combat systems for the exchange of tactical information aqcuired because military operations require coordinated actions. For this purpose, we made a research on tactical information equipments such as Battlefield Management Systems(BMSs) equipped in multiple kinds of Mobile Combat Vehicles(MCVs). The exchange of tactical information could be divieded into separate domains, such as connectivity, messages, and recognition processes by operators. In this article, we will deal with wireless radio connectivity, KVMF messages, and User Interfaces showing shared data.

Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems

  • Lee, Jongkwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권9호
    • /
    • pp.3858-3869
    • /
    • 2020
  • In this paper, we propose a hash-chain based friendly force identification protocol for personal combatants equipped with a personal combat system in a tactical wireless network. It is imperative in military operations to effectively and quickly identify friendly forces. If the identification of friendly forces is not correct, this can cause friendly fire. In current ground operations, the identification of friendly forces by personal combatants is neither secure nor safe. To address this issue, the proposed protocol uses a hash-chain to determine if a detected person is friendly. Only friendly forces with the same materials that are assigned before they deploy can construct an initial hash-chain. Moreover, the hash-chain is changed at specific times. The performance of the proposed protocol is evaluated on the assumption that the secret key is leaked, which is the worst scenario in the security research field. We verify that the proposed protocol is secure for the various attack scenarios, such as message replay attack, fabrication attack, and Denial of Service attack.

시뮬레이션을 이용한 ASP 탄약 불출에 관한 연구 (Studies on ASP Ammo Issue using Simulation)

  • 김장현;이해관;박헌근;박춘식;곽종선
    • 한국국방경영분석학회지
    • /
    • 제30권1호
    • /
    • pp.92-106
    • /
    • 2004
  • This is a case study which establishes effective ammo issue plan and determines ammo support capability by linking various situations about ammo issue with wargame simulation. Ammo function simulation model has been developed for this matter and it has been proven that the model has significant impact on type of round, parking space for magazine, number of workers and capacity of equipment, etc. during establishing ammo issue plan and determining ammo supply capability. Also, ammo support capability varies significantly depending on tactical damage and MOPP status, etc. ASP's tactical situation, such as magazine damage, MOPP status, type of issuing round, parking space for magazine, number of workers and capacity of equipment, can be reflected when preparing an effective wartime ammo working hour issuing plan for supplying ammo to units through studies results, so that the issuing plan can be realistic and actual.

전술적 고려요소 (METT+TC)의 세분화 및 우선순위 결정에 관한 연구 (A Study on Segmentation and Priority of Tactical Considerations (METT+TC))

  • 한승조;박준형
    • 디지털융복합연구
    • /
    • 제14권10호
    • /
    • pp.173-181
    • /
    • 2016
  • 본 논문의 목적은 델파이 (Delphi) 기법과 분석적계층과정 (AHP; Analytic Hierarchy Process)를 통해서 전술적 고려요소인 METT+TC (임무, 적, 지형 및 기상, 가용부대, 가용시간, 민간요소)를 세분화하고 우선순위를 정하는 것이다. 군의 작적수행과정상의 의사결정과정에서 전술적 고려요소는 매우 중요한 요소로 작용하지만, 6개 요소의 세분화 및 우선순위 결정에 관한 연구는 그동안 충분히 수행되지 않았다. 델파이와 분석적계층과정은 군사 전문가들의 인터뷰와 설문지 작성을 통해 이루어졌으며, 최초 6개의 전술적 고려요소는 델파이 분석을 통해 34개의 하위요소로 세분화되었고, 분석적계층과정을 통해 6개의 고려요소와 34개의 하위요소는 우선순위가 정량적으로 공격과 방어 국면을 구분하여 제시되었다. 본 연구결과는 군의 ATCIS와 같은 의사결정지원시스템상의 DB로 활용되고, 이를 활용할 수 있는 의사결정 애플리케이션이 도입된다면, 효과적이고 빠른 의사결정에 도움이 될 것으로 기대된다.

지상작전의 원칙 측면에서 미 제1해병사단의 장진호 연결작전 고찰 (From the point of view of ground operations principle, Chosin Link-up operation discussion of the US 1st Marine Division)

  • 김규빈;최영렬
    • 안보군사학연구
    • /
    • 통권13호
    • /
    • pp.1-41
    • /
    • 2016
  • US 8th Army in the attack on the Western Front was a situation that was frustrated by the 13th Corps Communist army. To this time support this, goals that have been granted to the US 1st Marine Division that initiated the attack in Mupyonri direction, lack the potential to achieve was not decisive. It was a operation specific erroneous judgment that occurred because there was no one accurately grasp the battlefield of the situation the wrong UN Forces Command. Tactical victory can be to maximize the operation outcomes. However, there is no possible failure of the operation is to expand the tactical success. This is because the failure of the operation, because directly linked to the success or failure of the war. Tactical victory can be to maximize the operation outcomes. However, operation specific failure is not it possible to expand the tactical victory. Therefore tactical success of the US 1st Marine Division, can not compensate for operation specific failure of the United Nations Forces Command. However, Chinese Communist Army 9th Corps is obsessed only victory of tactics to annihilate the US 1st Marine Division, by being fixation to the Chosin whole area, it was not possible to run a operational operation. Therefore tactical success df the US 1st Marine Division, Chinese Communist Army 9th Corps is to extinguish the ability to increase the number of the 13th Corps of the Western Front, 8th Army US have contributed to have escaped the crisis. In addition, the US 10th Corps while maintaining the combat force, by an important role to withdraw through the sea, was able to complement the misjudgment of the operation.

  • PDF