• Title/Summary/Keyword: information warfare

Search Result 374, Processing Time 0.022 seconds

A Study on the Critical Defense Information Resources Mobilization for Information Warfare (정보전 대비 국방부문 핵심정보자원 동원 방안에 관한 연구)

  • 이승구;김화수
    • Journal of the military operations research society of Korea
    • /
    • v.26 no.2
    • /
    • pp.131-142
    • /
    • 2000
  • The emergence of computer-based information society has fundamentally changed the paradigms of everyday human life and will continue its trend in the 21st century when resources of information technology become more and more important because they can be directly transformed into military use. Future warfare will include such high-tech weapon systems as precision-guided munitions and satellite. But, with the spread of internet and advances in information technology, cyber space appears to be resources can be deciding factor in winning future war. In this paper we proposed to identify core information technology in national defense, improve mobilizing method of information resources in time of crisis, come up with combat effective measures utilizing information technology by estimating future information technological developments.

  • PDF

A Study on Optimized Plan for Mass Acquisition and Processing of Battlefield Information (전장 정보의 대량 획득과 처리를 위한 최적화 방안 연구)

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Shin, Hyo-Young;Park, Ho-Kyun;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.45-50
    • /
    • 2013
  • The future warfare will universalize the operation of a combined weapon system that utilizes this technology and create an operational environment that is centered on a network requiring a high level of interoperability between combat elements as well as a high level of operation speed. In this kind of operational environment, future combat will take on the aspects of network centric warfare, which is capable of realizing a real-time sensor to shooter cycle by horizontally connecting operation elements. Therefore, the study attempts to draw out a Korean measurement plan concerning battlefield environment changes in the future by investigating and analyzing all problems occurring during the mass acquisition and processing of battlefield information in battlefield situations of network centric warfare currently conducted by the US military in Afghanistan and Iraq.

Analysis on the Distribution of RF Threats Using Unsupervised Learning Techniques (비지도 학습 기법을 사용한 RF 위협의 분포 분석)

  • Kim, Chulpyo;Noh, Sanguk;Park, So Ryoung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.3
    • /
    • pp.346-355
    • /
    • 2016
  • In this paper, we propose a method to analyze the clusters of RF threats emitting electrical signals based on collected signal variables in integrated electronic warfare environments. We first analyze the signal variables collected by an electronic warfare receiver, and construct a model based on variables showing the properties of threats. To visualize the distribution of RF threats and reversely identify them, we use k-means clustering algorithm and self-organizing map (SOM) algorithm, which are belonging to unsupervised learning techniques. Through the resulting model compiled by k-means clustering and SOM algorithms, the RF threats can be classified into one of the distribution of RF threats. In an experiment, we measure the accuracy of classification results using the algorithms, and verify the resulting model that could be used to visually recognize the distribution of RF threats.

The Impact of Information-Centric Force Improvements on Deterrence of Invasion: A Game-Theoretic Analysis (정보중심 전력증강의 전쟁억제 효과: 게임이론적 분석)

  • Cho, Jea-Yeong;Kim, Seung-Kwon
    • Journal of the military operations research society of Korea
    • /
    • v.31 no.1
    • /
    • pp.1-13
    • /
    • 2005
  • Due to the rapid developments in information and computer technology, the warfare paradigm is being transformed into information-centric and knowledge-based warfare. This atmosphere may have significant impact on the ROK armed forces' Force Improvement Plans (FIP) which is documented in 'Defense White Paper 2004'. We focus here on the relationship of information-centric force and deterrence of invasion. Particularly, we are interested in understanding the level of information superiority that might be required to deter the invasion. In order to solve this problem, we employed two-sided, zero-sum strategic game to simulate the outcome with six hypothetical cases devised by varying the level of information superiority.

A Study on the Army Tactical C4I System Information Security Plan for Future Information Warfare (미래 정보전에 대비한 육군전술지휘정보체계(C4I) 정보보호대책 연구)

  • Woo, Hee-Choul
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.1-13
    • /
    • 2012
  • This study aims to analyze actual conditions of the present national defense information network operation, the structure and management of the system, communication lines, security equipments for the lines, the management of network and software, stored data and transferred data and even general vulnerable factors of our army tactical C4I system. Out of them, by carrying out an extensive analysis of the army tactical C4I system, likely to be the core of future information warfare, this study suggested plans adaptive to better information security, based on the vulnerable factors provided. Firstly, by suggesting various information security factor technologies, such as VPN (virtual private network), IPDS (intrusion prevention & detection system) and firewall system against virus and malicious software as well as security operation systems and validation programs, this study provided plans to improve the network, hardware (computer security), communication lines (communication security). Secondly, to prepare against hacking warfare which has been a social issue recently, this study suggested plans to establish countermeasures to increase the efficiency of the army tactical C4I system by investigating possible threats through an analysis of hacking techniques. Thirdly, to establish a more rational and efficient national defense information security system, this study provided a foundation by suggesting several priority factors, such as information security-related institutions and regulations and organization alignment and supplementation. On the basis of the results above, this study came to the following conclusion. To establish a successful information security system, it is essential to compose and operate an efficient 'Integrated Security System' that can detect and promptly cope with intrusion behaviors in real time through various different-type security systems and sustain the component information properly by analyzing intrusion-related information.

Radio Link Modem System Architecture Design for Korean Tactical Data Link System Implementation (한국형 전술데이터링크 시스템 구현을 위한 무선모뎀 시스템 설계)

  • Choi, Hyo-Ki;Jang, Ho-Joon;Song, Young-Hwan;Jang, Dhong-Woon;Joo, Jae-Woo;Seo, Nan-Sol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.6
    • /
    • pp.789-796
    • /
    • 2013
  • Next Generation Weapon system from the center of the platform to share information in real-time Network Centric Warfare(NCW: Network Centric Warfare) has been changed. Data link system is defined as a network. That is, all in real-time battlefield information is to enable sharing. Data link system is classified as a precision strike, Monitoring/control, control of a Patriot missile battery systems. These systems are most effective in a Joint warfare and precision strike. Data Link Systems(Data Communications) implementation is accomplished by using the KDLM(Korean Data Link Modem) and Radio Transceiver. KDLM is operated in conjunction with the legacy Radios(re-using fielded HF/VHF/UHF radio systems). In this paper, we describe in terms of KDLM system design. In this paper, the proposed design structure is how to effectively interact with legacy various radio. First, The results provide an analysis of that Dynamic TDMA system and apply modem structure. Radio characteristics data are necessary for an effective TDMA system design. This article analyzes the test results and describes the structure to improve the receive performance.

Patent Analysis of Information Security Technology for Network-Centric Warfare (네트워크 중심전을 위한 정보보호기술의 특허동향 분석)

  • Kim, Do-Hoe;Park, Sang-Sung;Shin, Young-Geun;Jang, Dong-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.12
    • /
    • pp.355-364
    • /
    • 2007
  • The paradigm of war is basically changed by development of information and communication technologies. One of the paradigms in future war is NCW(Network-Centric Warfare) that is purposed of achievement in information-superiority. In this future war, the level of menace and fragility is rapidly increased in information-security according to the massive information and complex system. Therefore the Korean army is developing the information-security technologies for NCW. But, until now patent analysis concerning NCW has not performed. In this paper, we suggest a meaningful data for efficient R&D through patent analysis of information-security technologies on NCW.

Security Measures in Response to Future Warfare and Changes in the Network Environment (미래전과 네트워크 환경 변화에 따른 보안대책)

  • Donghan Oh;Kwangho Lee
    • Convergence Security Journal
    • /
    • v.21 no.4
    • /
    • pp.49-57
    • /
    • 2021
  • The 4th industrial revolution will develop the network environment of future warfare through the increase of IoT devices, individual warrior platforms, the operation of manned and unmanned weapon systems, intelligent command post. They are leading to the weapon system combined with hundreds or thousands of sensors will be used for surveillance and reconnaissance, electronic warfare, and deception operations on the battlefield. This change to the environment brings superiority in operational performance on the battlefield, but if the weapon system is exposed to the outside, it will lead to fatal results. In this paper, we analyze the network environment that is changing in the future warfare environment, focusing on the currently used network. In addition, it considers information security issues that must correspond to the evolving network technology and suggests various security measures to suggest the direction our military should take in the future.

A Study on the Accuracy Enhancement Using the Direction Finding Process Improvement of Ground-Based Electronic Warfare System (지상용 전자전장비의 방향 탐지 프로세스 개선을 통한 정확도 향상에 관한 연구)

  • Chin, Huicheol;Kim, Seung-Woo;Choi, Jae-In;Lee, Jae-Min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.6
    • /
    • pp.627-635
    • /
    • 2017
  • Modern warfare is gradually changing into a network war, and information electronic warfare is also progressing. In modern war, electronic warfare is all military activity concerned with electromagnetic field use, such as signal collecting, communication monitoring, information analysis, and electronic attack. The one key function of signal collecting for enemy signal analysis, direction finding, collects the signal radiated from enemy area and then calculates the enemy direction. This paper examined the Watson-Watt algorithm for an amplitude direction finding system and CVDF algorithm for phase direction finding system and analyzed the difference in the direction finding accuracy between in the clean electromagnetic field environment and in the real operating field environment of electronic warfare system. In the real field, the direction finding accuracy was affected by the reflected field from the surrounding obstacles. Therefore, this paper proposesan enhanced direction finding process for reducing the effect. The result of direction finding by applying the proposed process was enhanced above $1.24^{\circ}$ compared to the result for the existing process.