• Title/Summary/Keyword: Tactical network

Search Result 218, Processing Time 0.025 seconds

Entropy based Resource Allocation Scheme for Tactical Wireless Sensor Networks (전술 무선 센서 네트워크를 위한 엔트로피 기반 자원할당 기법)

  • Lee, Jongkwan;Lee, Minwoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.220-222
    • /
    • 2021
  • In this paper, we propose a resource allocation scheme based on entropy for tactical wireless networks. In a tactical situation, the sensing nodes that are located randomly provide transmitted data values depending on environmental conditions. Since they share wireless resources, nodes providing valuable data compared to others need to have more resources. The proposed scheme evaluates the value of received data by a sink node. Based on the results, the sink node reallocates resources to sensing nodes. Through various experiments, we verified the proposed scheme is superior to the fixed allocation scheme.

  • PDF

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

Improvement and Verification of TMFT Power Circuit Design (전술다기능단말기(TMFT)의 전원회로 설계 개선 및 검증)

  • Kim, Jin-Sung;Kim, Byung-Jun;Kim, Byung-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.2
    • /
    • pp.357-362
    • /
    • 2020
  • The TMFT, a sub-system of TINC, provides voice calls, data transmission and reception, and multimedia services to individual users. At the time of development in 2011, the power circuit of the TMFT was designed to electrical power supply to each device via a charger IC. However, the newly improved power supply circuit allows power to be supplied to each device through the PMIC without configuring the charger IC separately. In this paper, the power circuit design structure of TMFT applied in the development stage and the improved power circuit design structure were compared. And we verified through experiments whether the improved power circuit can be applied to TMFT. The experimental method was verified by directly comparing the current consumption test, charge time comparison test, and rising temperature test during charging each of before and after improvement terminals.

Scenario-based Future Infantry Brigade Information Distribution Capability Analysis (시나리오 기반의 미래 보병여단 정보유통능력 분석 연구)

  • Junseob Kim;Sangjun Park;Yiju You;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.139-145
    • /
    • 2023
  • The ROK Army is promoting cutting-edge, future-oriented military development such as a mobile, intelligent, and hyper-connected Army TIGER system. The future infantry brigade plans to increase mobility with squad-level tactical vehicles to enable combat in multi-domain operations and to deploy various weapon systems such as surveillance and reconnaissance drones. In addition, it will be developed into an intelligent unit that transmits and receives data collected through the weapon system through a hyper-connected network. Accordingly, the future infantry brigade will transmit and receive more data. However, the Army's tactical information communication system has limitations in operating as a tactical communication system for future units, such as low transmission speed and bandwidth and restrictions on communication support. Therefore, in this paper, the information distribution capability of the future infantry brigade is presented through the offensive operation scenario and M&S.

A Concept Study on Improving Command Post Vehicles for Operating Battle Management System (전장관리체계 운용을 위한 전투지휘용 차량의 성능개량 개념)

  • Park, Seung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.2
    • /
    • pp.16-22
    • /
    • 2008
  • So far, Korean command post vehicles(CPs) have used voice-only radio communication among the mechanized troop units such MBTs and IFVs, etc. But digital data communication technology should be introduced to improve mission success capabilities and accommodate integrated combat capabilities through increasing SA(situation Awareness), or spatiotemporal synchronization of military operation in battle field environment. Therefore, conventional CPs, which have been operated without digital network, urgently needs to mount a battle management system which furnish with tactical information network, considering that korean new MBTs or new IFVs will be fielded soon. This study suggests some performance enhancement method which might be applicable to CPs which have a role of connecting Battalion unit to Brigade C4I system.

Verification Methods of ATE for TICN System (전술정보통신체계 ATE 유효성 검증 방안)

  • Bak, HyeonJeong;Kim, JinSung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.4
    • /
    • pp.17-27
    • /
    • 2020
  • In this paper, we proposed verification methods to prove the effectiveness of automatic test equipment (ATE) for weapon systems. Since the test results from the unproven ATE is not reliable and its use is limited as objective data, it is essential to verify the test equipment in order to guarantee the quality level of the unit under test (UUT). Through the suggested methods, it is applied to the ATE of the tactical information communications network (TICN) system to confirm the verification results and to describe the validation results.

Design of An Effective Resource Allocation System in the Satellite Network using MF-TDMA DAMA Method (MF-TDMA DAMA 방식 위성 망에서 효율적인 자원할당 시스템 설계)

  • Heo, Jun;Choi, Yong-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.85-93
    • /
    • 2012
  • In this paper, I designed the satellite system, using the MF-TDMA (Multi Frequency-Time Division Multiple Access) DAMA (Demand-Assigned Multiple Access) method, that allocates the satellite resources more effectively to prevent a large quantity data discard when Earth Terminals (ETs) request their satellite network resource to Network Controller (NC) by using their history information, such as traffic pattern or traffic class which have been receiving, and the network controller allocates the satellite network resource and send to earth terminals by using his history information that earth terminals have been requested already. The U.S. Military Warfighter Information Network-Tactical (WIN-T) community has selected the L-3 Linkabit MF-TDMA DAMA Network Centric Waveform (NCW) as the networking standard for full-mesh IP over SHF satellite communications. In the MF-TDMA DAMA satellite network, network controller allocates the satellite network resources and enables maximum 255 earth terminals to communicate each other for periodic satellite network resource requests of earth terminals.

1-hop Data Traffic Reduction Method in Tactical Wireless Mobile Ad-Hoc Network based on MIL-STD-188-220C (MIL-STD-188-220C 기반 전술 무선 이동 Ad-Hoc 망에서 1-hop내 데이터 트래픽 감소 방법)

  • You, Ji-Sang
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.1
    • /
    • pp.15-24
    • /
    • 2008
  • The data delivery confirmation method of MIL-STD-188-220C, which is a tactical wireless mobile Ad-Hoc communication protocol, is that a source node requires the end-to-end ack from all destination nodes and the data-link ack from 1-hop neighboring destination nodes and relaying nodes, regardless of the hop distance from a source node to destination nodes. This method has the problem to degrade the whole communication network performance because of excessive data traffic due to the duplicate use of end-to-end ack and data-link ack, and the collision among end-to-end acks on the wireless network in the case of confirming a data delivery within an 1-hop distance. In order to solve this problem, this paper has proposed the method to perform the data delivery confirmation with the improvement of communication network performance through the data traffic reduction by achieving the reliable data delivery confirmation requiring the only data-link ack within an 1-hop distance. The effects of the proposed method are analyzed in the two aspects of the data delivery confirmation delay time and the data delivery confirmation success ratio.

Optimal Location Selection Algorithm of MSAP for Tactical Communication Networks (전술통신 환경 구축을 위한 MSAP의 최적위치 선정 알고리즘)

  • Cho, Sang-Mok;Kang, Jung-Ho;Kim, Jae-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1736-1743
    • /
    • 2011
  • In Network Centric Warfare (NCW) environment, having a tactical communication network which provides high data exchange rate is very important. In the process, Korean Army developed Mobile Subscriber Access Point (MSAP) which is based on the commercial Wireless BroadBand (Wibro). MSAP is a vehicle attached base station which provide high data exchange communication environment in a given area. Thus MSAP can provide high data exchange rate and mobility to accomplish missions in the battlefield more effectively. In this paper, we propose an operational strategy of using MSAP to provide tactical communication network in the battlefield. The idea is to find the optimal location point of the MSAP in the operational area where all the troops in the operational area can be supported by the MSAP with a minimum number of MSAP. Since the current Korean Army's basic idea of using MSAP is just distribute this MSAP to each troop, so by applying our strategy we can save MSAP devices for more flexible operation. We will show our strategy's benefits through the mathematical model and the algorithm of the presented problem.