• Title/Summary/Keyword: Tactical Operations

Search Result 85, Processing Time 0.021 seconds

A Study on Data Recording and Play Method between Tactical Situations to Ensure Data Integrity with Data Link Processor Based on Multiple Data Links (다중데이터링크 기반에서 데이터링크 처리기와의 데이터 무결성 보장을 위한 전술상황전시기 간 데이터 기록 및 재생 방법 연구)

  • Lee, Hyunju;Jung, Eunmi;Lee, Sungwoo;Yeom, Jaegeol;Kim, Sangjun;Park, Jihyeon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.13-25
    • /
    • 2017
  • Recently, the high performance of tactical situation display console and tactical data links are used to integrate the operational situations in accordance with information age and NCW (Network Centric Warfare). The tendency to maximize the efficiency of task execution has been developed by sharing information and the state of the battle quickly through complex and diverse information exchange. Tactical data link is a communication system that shares the platform with core components of weapons systems and battlefield situation between the command and control systems to perform a Network Centric Warfare and provides a wide range of tactical data required for decision-making and implementation.It provides the tactical information such as tactical information such as operational information, the identification of the peer, and the target location in real time or near real time in the battlefield situation, and it is operated for the exchange of mass tactical information between the intellectuals by providing common situation recognition and cooperation with joint operations. In this study, still image management, audio file management, tactical screen recording and playback using the storage and playback, NITF (National Imagery Transmission Format) message received from the displayer integrates the tactical situation in three dimensions according to multiple data link operation to suggest ways to ensure data integrity between the data link processor during the entire operation time.

Software structure design for processing various tactical data

  • Kim, Jin Woo;Lee, Woo Sin;Lee, Seung Chan;Kim, Young Don;Jin, So Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.11
    • /
    • pp.39-47
    • /
    • 2017
  • In this paper, we propose a message transmission processing structure for efficient use of radio resources. Existing tactical data links have more data and accumulate more data than the amount of tactical data planned according to the situation. This may result in delays in operations and additional problems. To prevent this, priority is assigned to the message and transmission is performed according to the priority on a single basis. And we design a processing structure that can update duplicate messages and delete old messages in order to prevent waste of radio resources. Experiments are conducted to verify that these structures can be implemented and applied to data links.

Development of Kill Chain Based Effective Maritime Operations Model for Naval Task Forces (Kill Chain 기반 해상기동부대의 효과적인 해상작전 모델 제안)

  • Lee, Chul-Hwa;Jang, Dong-Mo;Lee, Tae-Gong;Lim, Jae-Sung
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.2
    • /
    • pp.177-186
    • /
    • 2012
  • Navy establishes the Naval Task Forces (TF) for many kinds of maritime operations. Then the TF in the maritime environment performs simultaneous component operations such as ASUW (Anti-Surface Warfare), ASW (Anti-Submarine Warfare), AAW (Anti-Aircraft Warfare), and assault operations. The TF consists of many tactical systems for the completion of missions C4I, VOIP (Voice Over Internet Protocol), DMHS (Digital Massage Handling System), and TDLs (Tactical Data Links) such as LINK-11, 16, ISDL (Inter Site Data Link). When the TF executes naval operations to complete a mission, we are interested in the kill chain for the maritime operations in the TF. The kill chain is a standard procedure for the naval operations to crush enemy defenses. Although each ship has a procedure about a manual for 'how to fight', it leave something to be desired for the TF detailed kill chain currently. Therefore, in this paper, we propose the naval TF's kill chain to perform the naval operations. Then, the operational effectiveness of the TF in the kill chain environment is determined through operation scenarios of TDL system implementation. It is to see the operational information sharing effect to a data link model based on MND-AF OV 6c (statement of tracking operational status) in the maritime operations applied to TDL and is to identify improvements in information dissemination process. We made the kill chain of maritime TF for the effective naval operations.

Simulation-based Worm Damage Assessment on ATCIS (시뮬레이션 기반 육군전술지휘정보체계에 대한 웜 피해평가)

  • Kim, Gi-Hwan;Kim, Wan-Joo;Lee, Soo-Jin
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.2
    • /
    • pp.115-127
    • /
    • 2007
  • The army developed the ATCIS(Army Tactical Command Information System) for the battlefield information system with share the command control information through the realtime. The using the public key and the encryption equipment in the ATCIS is enough to the confidentiality, integrity. but, it is vulnerable about the availability with the zero day attack. In this paper, we implement the worm propagation simulation on the ATCIS infrastructure through the modelling on the ATCIS operation environment. We propose the countermeasures based on the results from the simulation.

A Research on Intercommunication Method for Tactical Information Among Heterogeneous Mobile Combat Vehicles (이종(異種)의 전투기동차량 간 전술정보 연동 방안 검토)

  • Choi, Il-Ho;No, Hae-Whan;Song, Choong-Ho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.2
    • /
    • pp.187-195
    • /
    • 2022
  • Modern Battle Fields are covered with various weapon systems, such as tanks, infantry vehicles, or artillery vehilces. In such environment, it is important to take it into consideration what kind of efficient method should be developed to communicate with heterogeneous friend combat systems for the exchange of tactical information aqcuired because military operations require coordinated actions. For this purpose, we made a research on tactical information equipments such as Battlefield Management Systems(BMSs) equipped in multiple kinds of Mobile Combat Vehicles(MCVs). The exchange of tactical information could be divieded into separate domains, such as connectivity, messages, and recognition processes by operators. In this article, we will deal with wireless radio connectivity, KVMF messages, and User Interfaces showing shared data.

Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems

  • Lee, Jongkwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3858-3869
    • /
    • 2020
  • In this paper, we propose a hash-chain based friendly force identification protocol for personal combatants equipped with a personal combat system in a tactical wireless network. It is imperative in military operations to effectively and quickly identify friendly forces. If the identification of friendly forces is not correct, this can cause friendly fire. In current ground operations, the identification of friendly forces by personal combatants is neither secure nor safe. To address this issue, the proposed protocol uses a hash-chain to determine if a detected person is friendly. Only friendly forces with the same materials that are assigned before they deploy can construct an initial hash-chain. Moreover, the hash-chain is changed at specific times. The performance of the proposed protocol is evaluated on the assumption that the secret key is leaked, which is the worst scenario in the security research field. We verify that the proposed protocol is secure for the various attack scenarios, such as message replay attack, fabrication attack, and Denial of Service attack.

Studies on ASP Ammo Issue using Simulation (시뮬레이션을 이용한 ASP 탄약 불출에 관한 연구)

  • 김장현;이해관;박헌근;박춘식;곽종선
    • Journal of the military operations research society of Korea
    • /
    • v.30 no.1
    • /
    • pp.92-106
    • /
    • 2004
  • This is a case study which establishes effective ammo issue plan and determines ammo support capability by linking various situations about ammo issue with wargame simulation. Ammo function simulation model has been developed for this matter and it has been proven that the model has significant impact on type of round, parking space for magazine, number of workers and capacity of equipment, etc. during establishing ammo issue plan and determining ammo supply capability. Also, ammo support capability varies significantly depending on tactical damage and MOPP status, etc. ASP's tactical situation, such as magazine damage, MOPP status, type of issuing round, parking space for magazine, number of workers and capacity of equipment, can be reflected when preparing an effective wartime ammo working hour issuing plan for supplying ammo to units through studies results, so that the issuing plan can be realistic and actual.

A Study on Segmentation and Priority of Tactical Considerations (METT+TC) (전술적 고려요소 (METT+TC)의 세분화 및 우선순위 결정에 관한 연구)

  • Han, Seung-Jo;Park, Joon-Hyoung
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.173-181
    • /
    • 2016
  • The objective of this study is to subdivide the tactical considerations (METT+TC; Mission, Enemy, Terrain & Weather, Troops available, Time available, Civil considerations) through Delphi method and prioritize those via AHP (Analytic Hierarchy Process). Though it has been taken for granted that the tactical considerations were inevitable for decision making relating to military operations, their segmentation and priority have not been studied sufficiently in military. The data for Delphi method and AHP were based on interview with military experts and questionnaires answered by those. Six tactical considerations were segmented into 34 sub-considerations by Delphi, and Six tactical considerations and 34 sub-ones were prioritized through AHP in attack and defense aspects. If the research results will be embedded into database of automatic command and control system (e.g. ACTIS; Army Tactical Command Information System), effective decision-making process will get easier and faster.

From the point of view of ground operations principle, Chosin Link-up operation discussion of the US 1st Marine Division (지상작전의 원칙 측면에서 미 제1해병사단의 장진호 연결작전 고찰)

  • Kim, Kyu-Bin;Choi, Yong-Yoel
    • Journal of National Security and Military Science
    • /
    • s.13
    • /
    • pp.1-41
    • /
    • 2016
  • US 8th Army in the attack on the Western Front was a situation that was frustrated by the 13th Corps Communist army. To this time support this, goals that have been granted to the US 1st Marine Division that initiated the attack in Mupyonri direction, lack the potential to achieve was not decisive. It was a operation specific erroneous judgment that occurred because there was no one accurately grasp the battlefield of the situation the wrong UN Forces Command. Tactical victory can be to maximize the operation outcomes. However, there is no possible failure of the operation is to expand the tactical success. This is because the failure of the operation, because directly linked to the success or failure of the war. Tactical victory can be to maximize the operation outcomes. However, operation specific failure is not it possible to expand the tactical victory. Therefore tactical success of the US 1st Marine Division, can not compensate for operation specific failure of the United Nations Forces Command. However, Chinese Communist Army 9th Corps is obsessed only victory of tactics to annihilate the US 1st Marine Division, by being fixation to the Chosin whole area, it was not possible to run a operational operation. Therefore tactical success df the US 1st Marine Division, Chinese Communist Army 9th Corps is to extinguish the ability to increase the number of the 13th Corps of the Western Front, 8th Army US have contributed to have escaped the crisis. In addition, the US 10th Corps while maintaining the combat force, by an important role to withdraw through the sea, was able to complement the misjudgment of the operation.

  • PDF