• Title/Summary/Keyword: Tactical Wireless Network

Search Result 67, Processing Time 0.029 seconds

A Study on Relay Enhancing Method of MIL-STD-188-220 using ACK Reply in CNR Network (Ack 응답을 이용한 MIL-STD-188-220의 중계전송 성능향상에 관한 연구)

  • Choi, Young-Min;Sung, Bo Hyon;Youn, Jong Taek;Kim, Young-Ho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.5
    • /
    • pp.635-642
    • /
    • 2012
  • The Packet radio C2OTM(Command and Control On The Move) for Command, Control and situational awareness in communication environment of current Combat Net Radio Network is required in a relay transmission techniques. This is to assure the reliability of information transfer, and extend Wireless Coverage and overcome Communication obstacles of mountainous terrain. For the reliability of information transmission in tactical environment, Ad hoc Networking is necessary considering communication environment and an appropriate application of error correction. In this study, We propose a on-demand SDR algorithm that is currently being applied the FEC, Golay, Repetition Code. This enhanced relay transfer uses Ack Reply in tactical operating environment of MIL-STD-188-220 Protocol.

An Intrusion Detection Technique Suitable for TICN (전술정보통신체계(TICN)에 적합한 침입탐지 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1097-1106
    • /
    • 2011
  • Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.

Performance Simulations of Wireless Grid Communication Networks

  • Abdulsam, Ibraheem Read;Kim, Se Mog;Rhee, Jong Myung
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.2
    • /
    • pp.18-22
    • /
    • 2014
  • Satellite communications consist of communications between base stations of the ground and satellites. For efficient satellite communications, ground networks should be organically utilized. Grid networks are frequently used in and outside the country for wireless communications. The performance of wireless communications is determined by mobility, topography, and jamming signals. Therefore, continuous studies of grid networks are necessary for the utilization of next period satellite networks. Since military communications are used based on wireless systems, they can be considered as a sample of utilization of grid networks. Therefore, this paper presented the results of simulations conducted for the improvement of the performance of the grid networks used in military communications that employing the OSPF, a popular routing protocol for military applications. First we investigate the effects of changing the bit error rate (BER) and number of routers. Then we discuss the effects of maximum segment size (MSS) on network behavior and stability. In this way, we can determine the appropriate MSS for a grid network under various values of BER and number of routers. Such results can be also applied to commercial grid network evaluations.

Efficient Clustering and Data Transmission for Service-Centric Data Gathering in Surveillance Sensor Networks (감시정찰 센서 네트워크에서 서비스 기반 정보수집을 위한 효율적인 클러스터링 및 데이터 전송 기법)

  • Song, Woon-Seop;Jung, Woo-Sung;Seo, Youn;Ko, Young-Bae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.3
    • /
    • pp.304-313
    • /
    • 2013
  • Wireless Sensor Networks, especially supporting for surveillance service, are one of the core properties of network-centric warfare(NCW) that is a key factor of victory in future battlefields. Such a tactical surveillance sensor network must be designed not just for energy efficiency but for real-time requirements of emergency data transmission towards a control center. This paper proposes efficient clustering-based methods for supporting mobile sinks so that the network lifetime can be extended while emergency data can be served as well. We analyze the performance of the proposed scheme and compare it with other existing schemes through simulation via Qualnet 5.0.

Rendezvous Node Selection in Interworking of a Drone and Wireless Sensor Networks (드론과 무선 센서 네트워크 연동에서 랑데부 노드 선정)

  • Min, Hong;Jung, Jinman;Heo, Junyoung;Kim, Bongjae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.167-172
    • /
    • 2017
  • Mobile nodes are used for prolonging the life-time of the entire wireless sensor networks and many studies that use drones to collected data have been actively conducted with the development of drone related technology. In case of associating a drone and tactical wireless sensor networks, real-time feature and efficiency are improved. The previous studies so focus on reducing drone's flight distance that the energy consumption of sensor nodes is unbalanced. This unbalanced energy consumption accelerates the network partition and increases drone's flight distance. In this paper, we proposed a new selection scheme considered drone's flight distance and nodes' life-time to solve this problem when rendezvous nodes that collect data from their cluster and directly communicate with a drone are selected.

A Study on modifying OSPF protocol for wireless tactical backbone networks (무선 전술 백본망을 위한 OSPF 프로토콜 수정 방안)

  • Yoon-Young Sung;Sung-Sook Kook;Moon-Jeong Chang;Mee-Jeong Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1336-1339
    • /
    • 2008
  • 최근, 우리 군에서는 무선을 기반으로 하는 차세대 전술통신 체계인 전술 종합 정보 통신 체계 (TICN: Tactical Information Communication Network) 구축 사업을 진행하고 있다. 이 시스템의 백본 역할을 수행하는 TICN 전달망에서의 라우팅 알고리즘은 기존 인터넷에서 사용 중인 표준 라우팅 알고리즘과는 다른 특성이 요구된다. 즉 무선전송 링크의 특성 및 재밍 등의 영향으로 링크 상태가 불안정한 상황에서도 생존성과 안정성이 요구되는 군 전술망 환경에 적합하여야 하며, TICN 전달망의 자원 효율성도 최대화할 수 있어야 한다. 그러므로 본 논문에서는 기존의 인터넷 표준 라우팅 프로토콜들 중에서 네트워크 상태변화에 신속하게 대처할 수 있으며, 이미 널리 사용되고 있는 OSPF 프로토콜을 TICN 전달망에 적합한 라우팅 프로토콜이 되도록 수정하고자 한다. 이를 위해 라우팅 프로토콜의 대상 네트워크가 유선망에서 무선 전술 백본망으로 변경됨에 따라 튜닝될 필요가 있는 프로토콜 파라미터들을 추출하고, 시뮬레이션을 통해 추출한 파라미터들의 값들을 튜닝 하고자 한다.

Efficient Data Storage & Query Processing Methods in Military Ubiquitous Sensor Networks (군 USN 환경에서 효율적인 데이터 저장 및 질의 처리 방법 연구)

  • Kwon, Young-Mo;Choi, Hyun-Sik;Chung, Yon-Dohn
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.5
    • /
    • pp.875-885
    • /
    • 2010
  • Recently, the role of Ubiquitous Sensor Network(USN) has been considered to be essential for supporting the near future Network Centric Warfare(NCW) and Tactical Information Communication Network(TICN). In this paper, we explore a set of data storage methods(external storage, local storage and data storage) and query processing methods in WSN. In particular, we focus on analyzing a novel data structure for supporting the local storage method, named the partial ordered tree(POT). The main idea behind POT is that sensor readings are usually correlated with the physical spatial domain. With the help of POT, only a small portion of sensor nodes participate in query processing tasks, and thus network lifetime is greatly increased. Through a series of simulation experiments, we demonstrate that the POT based local storage method clearly outperforms the existing data storage methods in terms of the energy-efficiency, which directly affects the network lifetime, for processing exact match queries, range queries and top-k queries.

Development of Korean Joint Tactical Data Link System Based on CLIP (CLIP 기반의 한국형 합동전술데이터링크 체계 개발)

  • Kim, Seung-Chun;Lee, Hyung-Keun
    • Journal of IKEEE
    • /
    • v.15 no.1
    • /
    • pp.15-22
    • /
    • 2011
  • In order to performing the joint operation of Korean army efficiently, informations about surveillance, reconnaissance, and situation awareness need to be possessed jointly. In the first development phase (basis type) of the Korean joint tactical data link system (JTDLS-K), essential tactical information and recognized situation are owned among platforms in common by using existing wireless terminals. In the second development phase (completion type) of the JTDLS-K, a JTDLS which can perform network centric warfare (NCW) will be developed in due consideration of technology development of the basis type and common technology maturity degree. This is a joint battlefield system that can show fighting power simultaneous and polysynthetically through providing command and control messages effectively to each platform, which is participating in the joint and combined operations. In this paper, the development of JTDLS-K with a common data processor based on common link integration processing (CLIP) is described. From the test results of the system presented in this paper, it is demonstrated that quadrature phase shift keying (QPSK) signals can be applied to the system.

A Proposal on Cryptographic Synchronization for T4 Link Encryption (T4급 링크 암호에 적합한 암호 동기방식 제안)

  • Lee, HoonJae;Kim, KiHwan;Kang, YongJin;Lee, Sang-Gon;Ryu, Young-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.202-210
    • /
    • 2018
  • The modern battlefield is being developed as a network-centric warfare where priority is given to rapid status grasp and power deployment through scientification and modernization. Therefore, tactical data link has been continuously improving the network speed, and recently, security technology is required for wireless communication with the UAV and various devices for reconnaissance. In addition, the future information warfare will utilize advanced IT technology positively. Efforts are needed to integrate various systems and networks. However, these efforts are meaningful only when they can assume sufficient security in a newly changing information and communication environment. In this paper, we propose a new cryptographic synchronization for link encryption suitable for tactical data links. The proposed cryptographic synchronization is useful for T4 UAV link encryption, and it is also adaptable for lower BER, then we analyze the performances analysis of that.

Group Key Management Scheme for Survelliance and Reconnaissance Sensor Networks based on Probabilistic Key Sharing (확률론적 키 공유를 통한 감시정찰 센서네트워크에서의 그룹 키 관리 기법)

  • Bae, Si-Hyun;Lee, Soo-Jin
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.29-41
    • /
    • 2010
  • Survelliance and Reconnaissance Sensor Network(SRSN) which can collect various tactical information within battlefield in real time plays an important role in NCW environment, of sensor to shooter architecture. However, due to the resource-limited characteristics of sensor nodes and the intrinsic attributes of sensor network such as wireless communication, the SRSN may be vulnerable to various attacks compared to traditional networks. Therefore, in this paper, we propose a new group key management scheme to guarantee confidentiality, integrity, availability, and authentication during the operation of the SRSN. Proposed scheme generates and distributes the group key based on the topological characteristic of the SRSN and the probabilistic key sharing. The communication cost for distributing the group key is O(logn).