• Title/Summary/Keyword: Tactical network

Search Result 218, Processing Time 0.027 seconds

Study on Trends and Strategies for Defense Blockchain and ICT Technologies (국방 블록체인 기술 동향 및 국방 ICT 융합 전략 연구)

  • Lee, K.Hyu;Park, H.Sook
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.1
    • /
    • pp.12-24
    • /
    • 2020
  • To keep pace with other powerful nations in this era of the era of digitalization and to emerge stronger in the world, the defense forces of South Korea aim to innovate and prepare themselves for digital battlefields of possible wars in the future. The resources in the defense sector, which is the core of defense intelligence, is based on an intelligent mission collaboration tactical network system via cyber, command, control, communication, and computer (C4), and military and non-human weapons. Defense intelligence depends on the degree of the convergence of advanced Information and communication technologies (ICTs). Considering this aspect of defense intelligence, We plan to determine the application status of defense blockchain technology and examine the feasibility of applying blockchain technology and the core of applied technology. Generally, a key feature of blockchain technology is its data integrity in untrusted environments. There are various types of core technologies for the blockchain depending on the target areas of application in the defense sector, and it is also essential to derive new application strategies for core technologies that are applied in combination with other ICT technologies. We plan to demonstrate new defense ICT converged technologies (DNAB2: Data, Network, AI, BigData, Blockchain) and DNAB2-As-Services in the defense strategy.

A Study on the Estimation of Required Communication Capacity for Link-16 Based Tactical Networks (Link-16 기반 전술 네트워크를 위한 요구통신용량 산출에 관한 연구)

  • Kim, Young-Beom
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.1
    • /
    • pp.105-111
    • /
    • 2012
  • In this paper, we investigate the most commonly adopted networking technology for Network Centric Warfar (NCW), namely Link-16 in the perspectives of physical, data link, and network layers (specifically, strategic message exchanges) and derive its merits with some constraints therein. Furthermore, we perform a quantitative evaluation on its communication capacity, focusing on whether Link-16 can indeed meet the capacity requirements for major operations, based on the time slot structure, NPG, and multi-netting concepts.

Reality and Improvement Plan of Information-Oriented Age Conscription Administration and Barracks informationization (정보화시대 병무행정과 병영정보화의 실태와 발전 방안)

  • Kim, Doo-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.109-112
    • /
    • 2014
  • Korean informationization technology development speed is growing fastly and IT technology become world-class. Especially, by grafting IT technology to war commanding system, built an network center operational environment. However, conscription administration and the barracks informationization have inadequate points, to provide the people who have a duty of military service and parents with benefits and develop conscription administration and the barracks informationization base system conformed to IT age include using online system to guarantee military personnel's studying environment, writer proposed an improvement plan.

Study of consideration for future tactical communication system development (미래 전술통신체계개발을 위한 고려사항 연구)

  • Byun, Jongsin;Park, Sangjun;Kim, Yongchul
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.35-41
    • /
    • 2018
  • The Army has developed the concept of terrestrial warfare in conjunction with the Joint Concept and has introduced TICN as the base communication system to support it. TICN has been used to improve the transmission speed and to increase the coverage distance. Through this, TICN is making efforts to create network-centered operation environment so that information can be distributed in real time or near real time from the monitoring system to the hitting system. However, TICN is not enough to overcome the network limitations that may arise from various contingencies in battlefield situations. Therefore, in this paper, we investigated the limitations of communication according to the situations that can occur in the battlefield situation and studied the considerations to overcome them.

  • PDF

Systematic Approach to Involving the Tools of Digital Marketing as a Guarantee of the International Business Development

  • Chernenko, Oksana;Kovalchuk, Svitlana;Perevozova, Iryna;Fayvishenko, Diana;Zaburmekha, Yevgena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.311-317
    • /
    • 2022
  • The research is devoted to the substantiation of the system approach to the involvement of digital marketing tools as a guarantee of international business development. It is proved that digital marketing, as a type of marketing based on the use of digital technologies allows to make a profit, to promote the brand, as well as goods and services in the market. The digital marketing toolkit system is a set of elements with existing relationships that ensure the effectiveness of the entire digital marketing, which in total is greater than its individual components. The implementation of a systems approach involves the implementation of the philosophy of digital marketing in general, its functions in the form of systems analysis, formation of strategic development goals and entry and promotion in the international market, preparation and implementation of tactical and strategic development plans.The use of such digital marketing tools as: content marketing, social media marketing, Email-marketing, targeted advertising, contextual advertising, media advertising, Search Engine Optimization, affiliate programs and the company's website is analyzed in detail.

Mobile WiMAX 기반의 전술이동통신체계 테스트베드 성능분석

  • Yu, Jeong-Hun;Jo, Jeong-Ho;Gwon, O-Ju;Park, Gwi-Sun
    • Information and Communications Magazine
    • /
    • v.26 no.3
    • /
    • pp.9-15
    • /
    • 2009
  • 전쟁양상이 네트워크 중심 전으로 발전되기 위해서는 기동중에도 멀티미디어 등 대용량의 정보를 실시간으로 소통할 수 있는 정보통신기반체계가 필수적으로 요구된다. 이러한 기반을 구축하기 위해 개발 중인 전술정보통신체계(TICN: Tactical Information and Communication Network)의 부체계 중 하나인 전술이동통신체계는 이동하는 전장가입자에게 음성서비스이외 전장상황 공유를 위한 대용량의 데이터 서비스를 제공해야 하므로, 주파수 효율성이 좋은 Mobile WiMAX 기술을 기반으로 구현되었다. 구현된 장비는 전장 환경과 비슷한 산악지형의 테스트베드에 설치되어서 운용 가능성을 검증하였다. 본고에서는 Mobile WiMAX기반의 전술이동통신체계의 가용성을 확인하기 위해 수행한 이론적인 분석과 테스트베드에서 확인한 성능에 대해 소개한다.

Method of Format Conversion Between Link-K and KMTF Messages (Link-K와 KMTF 메시지 간 포맷 변환 방법)

  • Kim, Wan-Sik;Lee, Min-Sik;Kim, Sang-Jun;Park, Ji-Hyeon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.2
    • /
    • pp.264-271
    • /
    • 2017
  • Link-K message is the Tactical Data Link message standard developed by the Agency for Defense Development which is optimized for the Joint Operation of ROK Armed Force. KMTF message is the standard message format of Battle Management Information System. Interconversion and propagation between these messages are definitely needed to have efficient warfare such as situation data propagation using network, the convergence of collected situation data, common situational awareness, cooperative engagement. Therefore, this study suggests a way of rule and process for format conversion between Link-K and KMTF messages.

Method for Position Estimation of Network Entry Terminal based on DTDMA(Dynamic Time Division Multiple Access) (DTDMA 기반 초기 망가입 단말의 효율적 위치 추정 방법)

  • Seo, Nan Sol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.5
    • /
    • pp.623-629
    • /
    • 2012
  • In this paper, we analysis the performance of position estimation when adopting Dynamic TDMA(DTDMA) in JTIDS RelNav. JTIDS RelNav is widely understood as a new navigation solution possibly capable to support or take cover of the role of conventional systems including INS or GPS no matter if they are working well or not. By maximizing the efficiency of radio resource management in MAC(Medium Access Control) layer we enhance the system performance without any replacement of hardware.

Public Key Authentication using Newton Interpolation Polynomials and Secret Sharing Scheme in Tactical Ad-hoc Network (전술 Ad-hoc 네트워크에서 Newton의 보간 다항식과 비밀분산기법을 이용한 공개키 인증)

  • So, Jin-Seok;Lee, Soo-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06c
    • /
    • pp.236-238
    • /
    • 2012
  • Ad-hoc 네트워크에서 각 노드는 분산 및 협동을 통해 자체적으로 이웃노드와 무선네트워크를 구축하고 주고받게 된다. 그러나 Ad-hoc 네트워크에서 하위노드의 제한적인 저장/통신/계산 능력, 상호인증의 어려움 등으로 기존의 보안대책을 그대로 적용할 수 없어 Ad-hoc 네트워크 특성에 맞는 새로운 보안대책이 필요하다. 이를 위해 비밀분산기법 중의 일종인 (t,n) 임계치 기법을 통해 노드를 인증하는 방식이 제안되기도 하였으나, 이는 고정된 t개 노드의 분산정보가 모여야만 원래의 비밀을 복원할 수 있는 것으로 주로 적대적 환경에 배치되어야 하는 전술 Ad-hoc 네트워크의 요구사항과는 부합하지 않는다. 따라서, 본 논문에서는 기존의 (t,n) 임계치 기법에 Newton의 보간 다항식을 최초로 적용하여 임계값 t를 동적으로 변경할 수 있는 공개키 인증방식을 제안하고, 그 유효성을 증명하고자 한다.

Secret Sharing based Node Authentication in Tactical Ad-Hoc Network (전술 애드혹 네트워크에서의 비밀분산 기반 노드 인증)

  • Yang, Ji-hun;Lee, Soo-jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.247-248
    • /
    • 2022
  • 본 논문에서는 군사용 전술통신 분야에서 활용성이 증대되고 있는 애드혹 네트워크에 적용 가능한 비밀분산 기반의 노드 인증 기법을 제안한다. 필드에 전개되기 이전에 네트워크를 형성할 각 노드는 지수형 분산비밀키과 원본비밀키를 저정하고, 필드에 배치된 이후 네트워크 형성 초기단계에서 비밀분산의 원본비밀키 정보 복원 연산을 통해 다수 노드에 대한 동시 인증을 실시한다. 그리고 인증과정에서 원본비밀키 복원 연산을 방해하는 노드를 원본비밀키 복원 연산을 수행하기 이전에 PUF값을 활용하여 탐지한다.

  • PDF