• Title/Summary/Keyword: air defense network

Search Result 61, Processing Time 0.025 seconds

I3A Framework of Defense Network Centric Based C2 Facilities (국방 NC 기반 C2 시설 I3A Framework)

  • Kim, Young-Dong;Lee, Tae-Gong;Park, Bum-Shik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.615-625
    • /
    • 2014
  • Ministry of National Defense, MND, established a "Master Plan of Military Facility" in 2010 based on the defense reform to prepare for future war. It was a plan for consolidating small military facilities into battalion units, reflecting on and preparing for the needs of various changes in defense environment as well as balanced growth of ROK Army, Navy, and Air Force. However, to move forward with "Military Facility Master Plan," current design criteria for military facilities need to be revised to be enacted due to numerous calculation errors in facility footprints because of the absence of a sound facility criteria. Because the future war environment will be changed from Platform basis to Network Centric Warfare basis, Command & Control capability of C4I systems is getting more important. Therefore, Successful mission accomplishment can be secured by convergence of facility and military Information Technology(IT). So, MND should quickly prepare for the operational guidance, design criteria and policy that are suitable for Network Centric Warfare accomplishment, and implement infrastructure of IT and installation of C2 facility in conjunction with consolidation movement of military facilities. In this paper, we propose the defense I3A framework in order to solve this problem.

Air Threat Evaluation System using Fuzzy-Bayesian Network based on Information Fusion (정보 융합 기반 퍼지-베이지안 네트워크 공중 위협평가 방법)

  • Yun, Jongmin;Choi, Bomin;Han, Myung-Mook;Kim, Su-Hyun
    • Journal of Internet Computing and Services
    • /
    • v.13 no.5
    • /
    • pp.21-31
    • /
    • 2012
  • Threat Evaluation(TE) which has air intelligence attained by identifying friend or foe evaluates the target's threat degree, so it provides information to Weapon Assignment(WA) step. Most of TE data are passed by sensor measured values, but existing techniques(fuzzy, bayesian network, and so on) have many weaknesses that erroneous linkages and missing data may fall into confusion in decision making. Therefore we need to efficient Threat Evaluation system that can refine various sensor data's linkages and calculate reliable threat values under unpredictable war situations. In this paper, we suggest new threat evaluation system based on information fusion JDL model, and it is principle that combine fuzzy which is favorable to refine ambiguous relationships with bayesian network useful to inference battled situation having insufficient evidence and to use learning algorithm. Finally, the system's performance by getting threat evaluation on an air defense scenario is presented.

Anti-Jamming and Time Delay Performance Analysis of Future SATURN Upgraded Military Aerial Communication Tactical Systems

  • Yang, Taeho;Lee, Kwangyull;Han, Chulhee;An, Kyeongsoo;Jang, Indong;Ahn, Seungbeom
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.3029-3042
    • /
    • 2022
  • For over half a century, the United States (US) and its coalition military aircrafts have been using Ultra High Frequency (UHF) band analog modulation (AM) radios in ground-to-air communication and short-range air-to-air communications. Evolving from this, since 2007, the US military and the North Atlantic Treaty Organization (NATO) adopted HAVE QUICK to be used by almost all aircrafts, because it had been revealed that intercepting and jamming of former aircraft communication signals was possible, which placed a serious threat to defense systems. The second-generation Anti-jam Tactical UHF Radio for NATO (SATURN) was developed to replace HAVE QUICK systems by 2023. The NATO Standardization Agreement (STANAG) 4372 is a classified document that defines the SATURN technical and operational specifications. In preparation of this future upgrade to SATURN systems, in this paper, the SATURN technical and operational specifications are reviewed, and the network synchronization, frequency hopping, and communication setup parameters that are controlled by the Network (NET) Time, Time Of Day (TOD), Word Of Day (WOD), and Multiple Word of Day (MWOD) are described in addition to SATURN Edition 3 (ED3) and future Edition 4 (ED4) basic features. In addition, an anti-jamming performance analysis (in reference to partial band jamming and pulse jamming) and the time delay queueing model analysis are conducted based on a SATURN transmitter and receiver assumed model.

Development of the Data Communication based Future Air Base Defence Operation Model (데이터통신 기반 차세대 기지방어작전 모델 개발)

  • Pyo, Sang-Ho;Kim, Ki-Hyung;Lee, Tae-Gong
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.157-173
    • /
    • 2014
  • As Air Base Defence, Anti-Aircraft Defence and Nuclear-Biological-Chemical Protection model considered as ground operation models in Republic of Korea Air Force are designed as the voice-centered system between participant nodes, there is a problem communicating accurately. In recent years, the military is developing a command and control capability using data communication technology to solve the problem. Therefore, this paper proposes new model to maximize efficiency of performance improvement through the Data Communication-based Future Air Base Defence Model. We refer to a research paper that is related existing and developed new model. and then we really experimented under WiBro Network that is constructed to Air Base for maintenance control. Based on the analysis and the test result of new Air Base Defence Model, we have concluded that the performance improvement effect is reached.

A Proposal of Spectrum COP Design for Effective Frequency Management in Air Force's Battlefields Environment (공군 전장 환경에서 효과적 주파수 관리를 위한 Spectrum COP 설계 제안)

  • Koo, Ja-Yeul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.11
    • /
    • pp.1033-1040
    • /
    • 2012
  • Recently, several researches are focused on the frequency sharing and the liberalization of frequency use for utilizing the limited frequency resources efficiently. In military, as Network Centric Warfare(NCW), which requires significant mutual operability of battle elements and real-time operation speed, has come to the fore front as an important aspect of modern warfare, the methods to manage limited frequency resources in wireless communications environment efficiently has been studied and utilized. In this paper, we propose a Spectrum COP(Common Operation Picture) design suitable for the battlefields of air force. To construct the Spectrum COP of Air Force, we analyze the requirements and design the frequency management system by using EA(Enterprise Architecture) Framework. The simulation results of the proposed design proved the effectiveness by using EADSIM(Extended Air Defense Simulation) of Air Force.

A Study of Fine Dust Blocking Network Using Electrospinning Nanofiber Deposition (전기방사를 활용한 나노섬유 증착 미세먼지 방진망에 관한 연구)

  • Chan Young Lee;Sang Min Lee;Hyeon Jin Song;Jae Jun Lee;Young Soon Kim;Hong Gun Kim
    • Journal of The Korean Institute of Defense Technology
    • /
    • v.6 no.1
    • /
    • pp.13-18
    • /
    • 2024
  • While fine dust is currently spreading around the world, fine dust is so small that it easily enters indoors and deteriorates indoor air quality, so it is an essential issue that must be solved to maintain cleanliness and improve air quality in households. Research on nanoradiation technology is continuously being conducted to effectively block fine dust and secure air permeability and dust collection rate. In this study, a PVDF fine dust dust-proof net was manufactured through electrospinning, and an experiment was conducted to confirm the external environmental resistance and indoor air quality improvement efficiency of the manufactured dust-proof net. It was verified that this dustproof net can be a practical alternative to effectively block fine dust and prevent diseases caused by fine dust.

  • PDF

A Design of Du-CNN based on the Hybrid Machine Characters to Classify Target and Clutter in The IR Image (적외선 영상에서의 표적과 클러터 구분을 위한 Hybrid Machine Character 기반의 Du-CNN 설계)

  • Lee, Juyoung;Lim, Jaewan;Baek, Haeun;Kim, Chunho;Park, Jungsoo;Koh, Eunjin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.6
    • /
    • pp.758-766
    • /
    • 2017
  • In this paper, we propose a robust duality of CNN(Du-CNN) method which can classify the target and clutter in coastal environment for IR Imaging Sensor. In coastal environment, there are various clutter that have many similarities with real target due to diverse change of air temperature, water temperature, weather and season. Also, real target have various feature due to the same reason. Thus, the proposed Du-CNN method adopts human's multiple personality utilization and CNN technique to learn and classify target and clutter. This method has an advantage of the real time operation. Experimental results on sampled dataset of real infrared target and clutter demonstrate that the proposed method have better success rate to classify the target and clutter than general CNN method.

A DDoS Attack Detection of private mobile network using Time Series Analysis (시계열 분석을 적용한 사설 모바일 네트워크의 DDoS 공격 탐지)

  • Kim, Dae Hwan;Lee, Soo Jin;Pyo, Sang Ho
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.17-24
    • /
    • 2016
  • Many companies and organizations are building a mobile office environment using the LTE network, the national disaster network and Air Force LTE network are built for public safety and national defense. However the recent threats on information security have been evolving from information leakage to DDoS attacks to neutralize the service. Especially, the type of device such as Smart phones, smart pad, tablet PC, and the numbers are growing exponentially and As performance of mobile device and speed of line develop rapidly, DDoS attacks in the mobile environment is becoming a threat. So far, universal countermeasure to DDoS attacks has been interception the network and server step, Yet problem regarding DDoS attack traffic on mobile network and expenditure of network resources still remains. Therefore, this paper analyzes the traffic type distributed in the private mobile network such as the National Disaster Network, and Air Force LTE network in order to preemptively detect DDoS attacks on terminal step. However, as direct analysis on traffic distributed in the National Disaster Network, and Air Force LTE network is restricted, transmission traffics in Minecraft and uploading video file upload which exhibit similar traffic information are analyzed in time series, thereby verifing its effectiveness through establishment of DDoS attacks standard in mobile network and application that detects and protects DDoS attacks

Deployment Strategies of Cloud Computing System for Defense Infrastructure Enhanced with High Availability (고가용성 보장형 국방 클라우드 시스템 도입 전략)

  • Kang, Ki-Wan;Park, Jun-Gyu;Lee, Sang-Hoon;Park, Ki-Woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.3
    • /
    • pp.7-15
    • /
    • 2019
  • Cloud computing markets are rapidly growing as cost savings and business innovation are being carried out through ICT worldwide. In line with this paradigm, the nation is striving to introduce cloud computing in various areas, including the public sector and defense sector, through various research. In the defense sector, DIDC was established in 2015 by integrating military, naval, air and military computing centers, and it provides cloud services in the form of IaaS to some systems in the center. In DIDC and various future cloud defense systems, It is an important issue to ensure availability in cloud defense systems in the defense sector because system failures such as network delays and system resource failures are directly linked to the results of battlefields. However, ensuring the highest levels of availability for all systems in the defense cloud can be inefficient, and the efficiency that can be gained from deploying a cloud system can be reduced. In this paper, we classify and define the level of availability of defense cloud systems step by step, and propose the strategy of introducing Erasure coding and failure acceptance systems, and disaster recovery system technology according to each level of availability acquisition.

Military Logistics Consolidation Center Location Problem : Modeling and Analysis (군 통합 물류센터의 최적 위치 결정)

  • Sim, Seungbae;Jang, Jihong;Jung, Hosang;Jeong, Bongju
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.39 no.6
    • /
    • pp.587-598
    • /
    • 2013
  • In Korea military (KM), various military supplies are distributed to individual military units via three different multi-tier supply networks owned and operated by army, navy, and air force, respectively. Under the current supply networks, the chances for the occurrence of delayed supply, undersupply, and oversupply increase, and supply redundancy also can become a problem. Thus, KM is now trying to improve its current multi-tier supply networks by constructing logistics consolidation centers. Private companies operate logistics consolidation centers to effectively manage various types of inventories before delivering them to final customers. In this paper, we newly propose a mathematical model for building the optimized military supply network considering adopting the military logistics consolidation centers. Based on the real situation of KM, the proposed model was validated in terms of its feasibility, and it seems that the outcome (the location of the military logistics consolidation centers) of the proposed model can be one of the good alternatives for KM.