• Title/Summary/Keyword: Warfare

Search Result 773, Processing Time 0.023 seconds

A Basic Study on the Jamming Mechanisms and Characteristics against GPS/GNSS Based on Navigation Warfare

  • Ko, Kwang-Soob
    • Journal of Navigation and Port Research
    • /
    • v.34 no.2
    • /
    • pp.97-103
    • /
    • 2010
  • It has been recognized that the risk from the vulnerability of GPS can lead to the extreme damage in the infrastructure of the civil and military in recent years. As an example, the intentional interference to GPS signal, named GPS jamming, was really performed to misguide GPS guided weapons during Iraq war in 2003, and the fact has also followed by the serious issues on GPS in civilian community. In the modernized military society, the navigation warfare(NAVWAR) based on the GPS jamming has been emerged and introduced as a military operation. The intentional interference to the future global navigation satellite system(GNSS) involving GPS must be also an important issue to civilian users in near future. This study is focused on the fundamental research prior to the research on "Potential principle of NAVWAR" under NAVWAR of the future warfare. In this paper, we would study on the investigation of NAVWAR based on electronic warfare(EW) and analyze characteristics of the jamming against GNSS's receivers. Then the general mechanism on GNSS jamming is proposed.

An Architecture Design and Implementation of Stateful Traffic Generation for Cyber Warfare Training (사이버전 훈련을 위한 상태 저장 트래픽 발생 Architecture 설계 및 구현)

  • Hong, Suyoun;Kim, Kwangsoo;Kim, Taekyu
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.3
    • /
    • pp.267-276
    • /
    • 2020
  • Threats targeting cyberspace are becoming more intelligent and increasing day by day. To cope with such cyber threats, it is essential to improve the coping ability of system security officers. In this paper, we propose a stateful traffic generator that provide network background traffic for cyber warfare training. The proposed architecture is designed for generating traffic similar to real system traffic, so the trainee can perform more realistic training.

Conceptual Analysis of Cyber Electronic Warfare by OSI Reference Model (OSI 참조 모델에 의한 사이버전자전 개념 분석)

  • Lee, Minwoo;Lee, Jongkwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.600-601
    • /
    • 2021
  • The cyberspace, which is the fifth battle field, should be utilized for multi-domain maneuvering between the cyberspace and the physical space using an electromagnetic spectrum. This becomes a major concept of cyber electronic warfare that combines the characteristics of cyber warfare and electronic warfare. In this study, the concept of cyber electronic warfare is analyzed by using the OSI reference model and examining the threats of the two-layer data link layer.

  • PDF

A Review on the Change in Submarine Roles in Naval Warfare: Based on Warfare Paradigm (전쟁 패러다임의 전환에 따른 잠수함의 역할 변화에 대한 고찰)

  • Jang, Jun-Seop
    • Strategy21
    • /
    • s.46
    • /
    • pp.89-122
    • /
    • 2020
  • The longing for submarine manufacture and the fear of her power had exited for a long time, but submarine that could submerge and attack was built from 20th century by science technology development. The question, 'Submarine can exercise her power in naval warfare?' had exited before World War I, but the effective value of submarine was shown in the procedure of a chain of naval warfare during World War I and World War II. Germany and the United States made the best use of submarines at that time. The submarines of these nations mounted fierce attack on the enemy's battleships and merchant ships and blocked the sea lanes for war material. These fierce attack on ships became impossible After World War II, and the major powers reduced and coordinated the defence budget, so they considered the role of submarine. However, submarine is still powerful weapon system because she can secretly navigate under the water, and one of the most important force in the navy. The aim of this thesis is analyzing submarine roles in each naval warfare and integrating maritime strategy and weapon system technology into her roles. First, the research about represent submarine roles like anti-surfaceship warfare, anti-submarine warfare, intelligence gathering, land attack, supporting special operation and mine landing warfare will be presented, then the major naval warfare where submarine participated(during ex-World War I, World War I, World War II, The Cold War Era and post Cold War) and the analyzing of submarine roles by time will be presented. Submarine was developed for anti-surfaceship warfare during ex-World War I but could not make remarkable military gain in naval warfare because her performance and weapon was inadequate. However, the effective value of submarine in the procedure of a chain of naval warfare was shown during World War I and World War II. The major powers put battleships into naval warfare undiscriminatingly to command the sea power and submarines did massive damage to enemy navy power, so put a restraint the maritime power of enemy, and blocked the sea lanes for war material. After World War II, the battlefield situation changed rapidly and the concept of preemption became difficult to apply in naval warfare. Therefore, the submarine was unable to concentrate on anti-surfaceship mission. Especially during the Cold War era, nuclear submarine came to appear and her weapon system developed rapidly. These development gave submarines special missions: anti-submarine warfare and intelligence gathering. At that time, United States and Soviet submarines tracked other nation's submarines loaded with nuclear weapons and departing from naval their base. The submarines also collected information on the volume of ships and a coastal missile launching site in company with this mission. After Cold War, the major powers despatched forces to major troubled regions to maintain world peace, their submarines approached the shores of these regions and attacked key enemy installations with cruise missiles. At that time, the United States eased the concept of preemption and made the concept of Bush doctrine because of possible 911 terrorism. The missiles fired from submarines and surface battleships accurately attacked key enemy installations. Many nations be strategically successful depending on what kind of mission a submarine is assigned. The patterns of future naval warfare that my country will provide against will be military power projection and coalition/joint operations. These suggest much more about what future missions we should assign to submarines.

Implementation of VGPO/VGPI Velocity Deception Jamming Technique using Phase Sampled DRFM (위상 샘플방식 DRFM을 이용한 VGPO/VGPI 속도기만 재밍기법 구현)

  • Kim, Yo-Han;Moon, Byung-Jin;Hong, Sang-Guen;Sung, Ki-Min;Jeon, Young-Il;Na, In-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.955-961
    • /
    • 2021
  • In modern warfare, the importance of electronic warfare, which carries out a mission that using radio wave to find out enemy information or to protect ally information, has increased. Radar jamming technique is one of the most representative techniques of EA(Electronic Attack), it disturbs and deceives enemy radar system in order to secure ally location information. Velocity deception jamming technique, which is one of the radar jamming techniques, generally operate against pulse-doppler radar which use doppler effect in order to track target's velocity and location. Velocity Deception Jamming Technique can be implemented using DRFM(Digital Radio Frequency Memory) that performs Frequency Modulation. In this paper, I describe implementation method of VGPO/VGPI(Velocity Gate Pull-Off/Pull-In) velocity deception jamming technique using phase-sampled DRFM, and verify the operation of VGPO/VGPI velocity deception jamming technique with board test under signal injection condition.

A Study on Countermeasures on Seabed Warfare: Focused on Submarine Cables (해저전 대응방안 연구: 해저케이블을 중심으로)

  • Cho, Seong-jin;Lim, Soohoon
    • Maritime Security
    • /
    • v.8 no.1
    • /
    • pp.103-128
    • /
    • 2024
  • The Nord Stream explosion and the damage to submarine cables in the Baltic Sea and Red Sea have raised interest in seabed warfare all the world. And each country is preparing response plans and strategy. However, although South Korea relies on submarine cables for most of its internet network and is vulnerable to threats from North Korea and neighboring countries, even the term Seabed Warfare is unfamiliar. This paper is the first domestic study to analyze the definition and characteristics of seabed warfare, the current status of each country, and suggest countermeasures. In order to respond to seabed warfare, I propose establishing a cooperative system based on Mini-multilateralism between countries that share an international rules-based order, and establishing governance with related domestic organizations and companies. And I propose a military response plan based on deterrence by denial and deterrence by retaliation

  • PDF

Development of a Digital Receiver for Detecting Radar Signals (레이더 신호 탐지용 디지털수신기 개발)

  • Cha, Minyeon;Choi, Hyeokjae;Kim, Sunghoon;Moon, Byungjin;Kim, Jaeyun;Lee, Jonghyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.3
    • /
    • pp.332-340
    • /
    • 2019
  • Electronic warfare systems are needed to be advantageous in the modern war. Many radar threat signals with various frequency spectrums and complicated techniques exist. For detecting the threats, a receiver with wide and narrow-band digital processing is needed. To process a wide-band searching mode, a polyphase filter bank has become the architecture of choice to efficiently detect threats. A polyphase N-path filter aligns the re-sampled time series in each path, and a discrete Fourier transform aligns phase and separates the sub-channel baseband aliases. Multiple threats and CW are detected or rejected when the signals are received in different sub-channels. And also, to process a narrow-band precision mode, a direct down converter is needed to reduce aliasing by using a decimation filter. These digital logics are designed in a FPGA. This paper shows how to design and develop a wide and narrow-band digital receiver that is capable to detect the threats.

Precautionary Action by a Military Aircraft in the Law of Air Warfare: its Rules and Problems (국제항공규범의 전시적용 법리와 쟁점 - 공전규범상 사전예방조치 (Precautionary Measure)의 법리와 쟁점을 중심으로 -)

  • Hwang, Won-Ho;Kim, Hyoung-Ku
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.26 no.2
    • /
    • pp.41-68
    • /
    • 2011
  • This article deals with the current rules of law of air warfare and its surrounding issues on precautionary action by a military aircraft at air-to-air operation in international armed conflict. However there is no separate and independent legal system to regulate warfare in aerospace in the current system of law of war (or law of armed conflict). In other words, law of air warfare does not exist in a form of a separate treaty. Air warfare has been regulated by international customary law and the relevant provisions in different Conventions, including 1949 four Geneva Conventions and two Additional Protocols, which mainly regulate land and naval warfare. And this makes difficult to make clear a legal term or legal tests on an issue concerned with law of air warfare, which concludes from time to time a dispute on interpretation and implementation of law of air warfare between states. Therefore, this article refers various materials (including 1949 Geneva Conventions and Additional Protocols, San Remo Manual, Harvard Manual, and ICAO Manual on Interception of Civilian Aircraft) for the purpose of defining the current and desirable legal test on precautionary action by military aircraft. In addition to the main purpose of this article, this article tried to show a characteristic of developing mechanism of law of air Warfare taking into account interactions between international air law and law of air warfare.

  • PDF

A Study on the Justification of Moral Responsibility in Hybrid Warfare: Focused on a Critical Evaluation of Jus In Bello (하이브리드 전쟁에서 도덕적 책임의 정당화에 관한연구: Jus In Bello에 대한 비판적 고찰을 중심으로)

  • Sangsu Kim;Hyunyoung Moon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.57-63
    • /
    • 2023
  • The purpose of this paper is to analyze the aspects of hybrid warfare and show the limits of jus in bello, a principle that evaluates the moral responsibility of the agents. As a theory of the morality of war presented in traditional warfare, the just war theory has been widely accepted. In particular, jus in bello offers the criteria of moral legitimacy regarding the actions of individuals participating in or involved in war. However, hybrid warfare, in which various aspects of warfare operate in a complex way, has obvious differences compared to traditional warfare, and this difference causes difficulties in determining the moral evaluation and attribution of responsibility for actions in war. In order to appropriately resolve the moral problems arising from hybrid warfare, it is necessary to clarify what the limitations of existing moral justification theories are. To this end, in this paper, we will first present a conceptual understanding of hybrid warfare, specify the differences from traditional warfare, and then show the limits of its application in hybrid warfare in light of the three principles that compose jus in bello.

DEVS-Based Simulation Model Development for Composite Warfare Analysis of Naval Warship (함정의 복합전 효과도 분석을 위한 DEVS 기반 시뮬레이션 모델 개발)

  • Mi Jang;Hee-Mun Park;Kyung-Min Seo
    • Journal of the Korea Society for Simulation
    • /
    • v.32 no.4
    • /
    • pp.41-58
    • /
    • 2023
  • As naval warfare changes to composite warfare that includes simultaneous engagements against surface, underwater, and air enemies, performance and tactical analysis are required to respond to naval warfare. In particular, for practical analysis of composite warfare, it is necessary to study engagement simulations that can appropriately utilize the limited performance resources of the detection system. This paper proposes a DEVS (Discrete Event Systems Specifications)-based simulation model for composite warfare analysis. The proposed model contains generalized models of combat platforms and armed objects to simulate various complex warfare situations. In addition, we propose a detection performance allocation algorithm that can be applied to a detection system model, considering the characteristics of composite warfare in which missions must be performed using limited detection resources. We experimented with the effectiveness of composite warfare according to the strength of the detection system's resource allocation, the enemy force's size, and the friendly force's departure location. The simulation results showed the effect of the resource allocation function on engagement time and success. Our model will be used as an engineering basis for analyzing the tactics of warships in various complex warfare situations in the future.