• Title/Summary/Keyword: electronic warfare system

Search Result 87, Processing Time 0.023 seconds

Research on the Layered Architecture for Electronic Warfare System Software based on Attribute-Driven Design 3.0 (ADD 3.0 기반 전자전 소프트웨어의 계층적 아키텍처 연구)

  • Jeongwoo Lee;Sujin Kim;Jinhyuk Heo;Hyojeong Jang;Jinwoo Han
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.2
    • /
    • pp.247-255
    • /
    • 2024
  • Development of electronic warfare(EW) software has become increasingly challenging due to stricter regulations, shorter development cycles, and increased reliability testing. Consequently, software development often proceeds without proper architecture design, which can lead to missing critical quality requirements and potential system redesigns. In this study, we propose using Attribute-Driven Design(ADD) 3.0 to design software architecture specifically tailored for EW systems, enabling a more systematic approach to address quality requirements. The paper presents an overview of EW software and ADD 3.0 methodology, followed by an analysis of the architecture design results using static and dynamic views. The paper concludes by discussing the effectiveness of the proposed architecture design.

A Search Band Implementation Considering the Receivers of the Electronic Warfare Support System (전자전 ES 시스템의 수신기를 고려한 탐색대역 생성)

  • Yoon, In-Bok;Jeong, Chang-Min
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1091-1096
    • /
    • 2011
  • The main factors of radar signals used in electronic warfare are Radio Frequency(RF), Pulse Repetition Interval(PRI), Pulse Width(PW), Scan Parameter(SP) and so on. This radar signals may have some important information for the electronic warfare. So, there is a necessity for making a threat database to decide whether the radar signal is a threat or not. When the electronic support system collects some threat radar signals, it needs the search band to control the receivers and filter banks of the system. In this paper we propose search band implementation considering the type and center frequency of the receivers of the electronic support system.

A Study on Battle Damage Assessment of Electronic Warfare associated with Cyber Warfare (사이버전 연계 전자전 전투피해평가 지표 산출을 위한 연구)

  • Choi, Seungcheol;Cho, Joonhyung;Kwon, Oh-Jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.201-210
    • /
    • 2020
  • This paper proposes a framework for the battle damage assessment (BDA) of electronic warfare linked to cyber warfare. Thanks to the rapid development of information and communication technology, the importance of cyber warfare and electronic warfare in cyberspace is increasing. Therefore, the BDA for cyber warfare and its associated electronic warfare in cyberspace is an important factor that affects the success or failure of military operations. In this paper, we propose a method to calculate measure of performance and measure of effectiveness by classifying the electronic warfare system into large / medium / small classes according to the type of electronic warfare. By setting up a hypothetical scenario, we show the effectiveness of the proposed framework.

Development of Wide-Band Planar Active Array Antenna System for Electronic Warfare (전자전용 광대역 평면형 능동위상배열 안테나 시스템 개발)

  • Kim, Jae-Duk;Cho, Sang-Wang;Choi, Sam Yeul;Kim, Doo Hwan;Park, Heui Jun;Kim, Dong Hee;Lee, Wang Yong;Kim, In Seon;Lee, Chang Hoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.30 no.6
    • /
    • pp.467-478
    • /
    • 2019
  • This paper describes the development and measurement results of a wide-band planar active phase array antenna system for an electronic warfare jamming transmitter. The system is designed as an $8{\times}8$ triangular lattice array using a $45^{\circ}$ slant wide-band antenna. The 64-element transmission channel is composed of a wide-band gallium nitride(GaN) solid state power amplifier and a gallium arsenide(GaAs) multi-function core chip(MFC). Each GaAs MFC includes a true-time delay circuit to avoid a wide-band beam squint, a digital attenuator, and a GaAs drive amplifier to electronically steer the transmitted beam over a ${\pm}45^{\circ}$ azimuth angle and ${\pm}25^{\circ}$ elevation angle scan. Measurement of the transmitted beam pattern is conducted using a near-field measurement facility. The EIRP of the designed system, which is 9.8 dB more than the target EIRP performance(P), and the ${\pm}45^{\circ}$ azimuth and ${\pm}25^{\circ}$ elevation beam steering fulfill the desired specifications.

A Research on Naval Electronic Warfare System Engagement HILS Technology (해상 전자전체계 조우 HILS 연구)

  • Shin, Dong-Cho;Lee, Jeong-Hoon;Ryu, Si-Chan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.5
    • /
    • pp.785-792
    • /
    • 2010
  • This paper on the Research of Naval Electronic Warfare System HILS(Hardware In the Loop System) describes the EW engagement HILS construction method for evaluation of the operational concept analysis on active RF Decoy in staying in the air and the deceit ability to anti-ship missile seeker. We obtain the EW M&S technology of EW engagement HILS and EW efficiency analysis from this project. This Naval Electronic Warfare System HILS technology will support Active Decoy Development Project and any other HILS of EW weapon in KOREA ARMY/NAVY/AIR FORCE.

Analysis of Iran's Air Defense Network and Implications for the Development of South Korea's Air Defense Network

  • Hwang Hyun-Ho
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.2
    • /
    • pp.249-257
    • /
    • 2024
  • This study analyzes the current status and prospects of Iran's air defense network, focusing on the Russian-made S-300 system, and derives implications for the development of South Korea's air defense network. Iran's air defense network exhibits strengths such as long-range detection and interception capabilities, multi-target processing, high-altitude interception, and electronic warfare response. However, it also reveals weaknesses, including lack of mobility, difficulty in detecting low-altitude targets, obsolescence, training level of operating personnel, and vulnerability to electronic warfare. Real-world cases confirm these weaknesses, making the system susceptible to enemy evasion tactics, swarm drone attacks, and electronic warfare. Drawing from Iran's case, South Korea should establish a multi-layered defense system, strengthen low-altitude air defense and electronic warfare capabilities, foster the domestic defense industry for technological self-reliance, and enhance international cooperation. By addressing these aspects, South Korea can establish a robust air defense network and firmly protect its national security. Future research should aim to secure and analyze materials from the Iranian perspective for a more objective evaluation of Iran's air defense network and continuously track Iran's efforts to improve its air defense network and the trend of strengthening drone forces to predict changes in the Middle East security situation.

Implementation of VGPO/VGPI Velocity Deception Jamming Technique using Phase Sampled DRFM (위상 샘플방식 DRFM을 이용한 VGPO/VGPI 속도기만 재밍기법 구현)

  • Kim, Yo-Han;Moon, Byung-Jin;Hong, Sang-Guen;Sung, Ki-Min;Jeon, Young-Il;Na, In-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.955-961
    • /
    • 2021
  • In modern warfare, the importance of electronic warfare, which carries out a mission that using radio wave to find out enemy information or to protect ally information, has increased. Radar jamming technique is one of the most representative techniques of EA(Electronic Attack), it disturbs and deceives enemy radar system in order to secure ally location information. Velocity deception jamming technique, which is one of the radar jamming techniques, generally operate against pulse-doppler radar which use doppler effect in order to track target's velocity and location. Velocity Deception Jamming Technique can be implemented using DRFM(Digital Radio Frequency Memory) that performs Frequency Modulation. In this paper, I describe implementation method of VGPO/VGPI(Velocity Gate Pull-Off/Pull-In) velocity deception jamming technique using phase-sampled DRFM, and verify the operation of VGPO/VGPI velocity deception jamming technique with board test under signal injection condition.

The Engagement HILS Technology Research in the Laboratory for Simulated Warfare between Electronic Warfare Equipment and High-speed Maneuvering Weapon System (실험실에서 전자전 장비와 고속 기동 무기체계 간 실 교전 모의용 조우 HILS 기술 연구)

  • Shin, Dongcho;Choe, Wonseok;Kim, Soyeon;Lee, Chiho
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.49-57
    • /
    • 2019
  • In this paper, we describe the implementation methods and algorithms for the various technologies and devices required for the construction of the engagement HILS(Hardware In the Loop Simulation) in the limited space to simulate the high-speed maneuvering encounter situation of the weapon system in 3-dimensional real world space. Through this research, we have been able to suggest ways to analyze the major design elements of future electronic warfare equipment through experiments simulating actual engagements between various high-speed maneuvering weapons systems and electronic warfare devices in the future battlefield. It was confirmed that the M&S technology could be used to eliminate technical risks, reduce development cost, and shorten development time in the future real system development. The results of this study can be a great assist not only for the field of electronic warfare system research and development, but also for the research & implementation on HILS of various engaging class weapons systems.

A Survey for Vulnerability Attack and Defense Method of Satellite-Link Based Communication System

  • Isaac Sim;Jinwoo Jeong;Sangbom Yun;Yunsik Lim;Junghyun Seo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.128-133
    • /
    • 2023
  • Satellite based communication is networks in which users in a wide area can access without wired-based ground infrastructure. In particular, the need is emerging due to the recent Ukraine-Russia war. Satellite network systems acquire data that is difficult to observe on Earth as well as communication networks and are also used for research and development, which allows additional data to be produced. However, due to the nature of communication networks existing in outer space, certain vulnerabilities are revealed, and attacks based on them can be exposed. In this paper, we analyze vulnerabilities that may arise due to the nature of satellite communication networks and describes current research, countermeasures, and future research directions.

A Basic Study on the Jamming Mechanisms and Characteristics against GPS/GNSS Based on Navigation Warfare

  • Ko, Kwang-Soob
    • Journal of Navigation and Port Research
    • /
    • v.34 no.2
    • /
    • pp.97-103
    • /
    • 2010
  • It has been recognized that the risk from the vulnerability of GPS can lead to the extreme damage in the infrastructure of the civil and military in recent years. As an example, the intentional interference to GPS signal, named GPS jamming, was really performed to misguide GPS guided weapons during Iraq war in 2003, and the fact has also followed by the serious issues on GPS in civilian community. In the modernized military society, the navigation warfare(NAVWAR) based on the GPS jamming has been emerged and introduced as a military operation. The intentional interference to the future global navigation satellite system(GNSS) involving GPS must be also an important issue to civilian users in near future. This study is focused on the fundamental research prior to the research on "Potential principle of NAVWAR" under NAVWAR of the future warfare. In this paper, we would study on the investigation of NAVWAR based on electronic warfare(EW) and analyze characteristics of the jamming against GNSS's receivers. Then the general mechanism on GNSS jamming is proposed.