• Title/Summary/Keyword: information warfare

Search Result 374, Processing Time 0.028 seconds

The Analysis of Crypto Communication Relay Effect in the Security Framework Technique of Network Centric Warfare Environment (NCW환경의 보안 프레임워크 기술에서 암호통신 중계영향 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.788-794
    • /
    • 2007
  • The policy of US DoD is moving towards implementation of Network Centric Warfare(NCW) concepts. NCW is commonly described as the integration and synchronization of four key interdependent elements such as command and control, sensor system, engagement systems and the network. Therefore the military policy of Korea military is needed to access and examine the policy of NCW communication environment and crypto communication, which is able to apply it. In this case study, We are reviewed the security framework of the concept of network centric warfare in the centering around the US. It is introduced the core technology in the network centric warfare, and it is reviewed the security framework such as, the requirements of security, the characteristics security of global information grid, joint tactical radion system, net centric enterprise services, transformational communication satellite, in the basis of core technology, and analysis the effect of crypto communication relay between command node and surbornate node in NCW environment. This report support the assistance, which is considered the elements of surrounding effects in the varied crypto communication research area of NCW.

  • PDF

(The Design and Development of a Web Based Information System for Effective Military Material Supply Chains) (효율적인 국방물자 보급체인을 위한 웹 기반 정보체계의 설계 및 구현)

  • Woo, Hoon-Shik;Lee, Bong-Ho;Park, Jung-Kap
    • Journal of the military operations research society of Korea
    • /
    • v.35 no.1
    • /
    • pp.83-93
    • /
    • 2009
  • The future warfare is known as an effective centric paralysis warfare where military high technologies such as pinpoint strikes are applied. In this future warfare, for supporting military operation leadership and power of concentration in the combat, a new concept of logistic support is required and the focused logistic is proposed as an alternative. To implement this focused logistic, asset visibility should be assumed for every combat units in real time. However, current logistic information systems provide only limited information. In this study, a prototype information system for class 2 and 4 supplies is proposed for overcome limitations of current information system. The developed prototype zooms in on combat units providing business process integrations and logistic function synchronization. Also, asset visibility, the essential element of focused logistics, is presented and utilized to show the speedy and effective logistic support.

An Agent based Emergency Warning System for Dealing With Defensive Information Warfare in Strategic Simulation Exercises (전략시뮬레이션 훈련에서의 방어적 정보전을 위한 에이전트 기반 위기경보시스템의 개발)

  • Lee Yong-Han;Kumara Soundar R.T.
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.3
    • /
    • pp.11-26
    • /
    • 2004
  • Software for analyzing documents on the net to detect specific categories of occurrences is in great demand. In the current world where detecting terrorist threats is critical there is a great need for such systems. One of the critical application areas of such software is the automatic detection of a national infrastructure emergency. In this research an agent-based generic architecture for emergency warning systems is proposed and implemented. This system, called the National Infrastructure Emergency Warning System (NIEWS), is designed to analyze given documents, to detect threats, and to report possible threats with the necessary information to the appropriate users autonomously. In addition, a systematic analysis framework to detect emergencies on the subject of defensive information warfare is designated and implemented through a knowledge base. The developed system along with the knowledge base is implemented and successfully deployed to Strategic Crisis Exercise (SCE) at the United State Army War College (USAWC), saving a good amount of money by replacing human SMEs (subject matter experts) in the SCE.

  • PDF

A Literature Review of the Effectiveness Measurement for NCW (NCW 효과측정에 관한 문헌조사 연구)

  • Jung, Chi-Young;Lee, Jae-Yeong
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.37 no.2
    • /
    • pp.1-16
    • /
    • 2012
  • NCW(Network Centric Warfare) offers BSEs(Battelspace-Entities) the capabilities of sharing information through C4ISRCommand, Control, Communications, Computers and Intelligence, Surveillance and Reconnaissance) network and it also improves their combat powers based on information superiority with awareness of common situation in battlefield and self-synchronization. Although the concept of NCW was developed at the end of 1990 and there have been various studies for NCW from the development of its concept, the effort for measuring the synergistic effect of NCW is insufficient at the present time. Therefore, in this paper we reviewed literatures concerning the effectiveness measurement of NCW. The category of our survey is network effect, metrics, simulation, battlefield information, social network analysis and mathematical model. The main purpose of this study is to suggest future researchers a research direction by analyzing the aspects and limitations of existing studies about the quantitative measurement of NCW.

Algorithm for Threat Data Integration of Multiple Sensor and selection of CounterMeasures (이기종 다중센서 위협데이터 통합 및 대응책 선정 알고리즘)

  • Go, Eun-Kyoung;Woo, Sang-Min;Jeong, Un-Seob
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.3
    • /
    • pp.474-481
    • /
    • 2011
  • The Electronic Warfare Computer for the Aircraft Survivability Equipment will improve the ability for countermeasures by analysis about threat information. This paper suggests method that threat data integration of multiple sensors(Radar Warning Receiver, Laser Warning Receiver, Missile Warning Receiver). The algorithm of threat data integration is based on detected threat sequence and azimuth information. The threat sequence information is analyzed in advance and the azimuth data is received from sensors. The suggested method is evaluated through simulation under the environment like real helicopter.

The Trends of Domestic and Overseas Cyber Security Training (국내외 사이버보안 훈련 동향)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.6
    • /
    • pp.857-860
    • /
    • 2021
  • The 21st century society has entered the fourth industrial society of machine to machine from the information society of human to machine. Accordingly, countries around the world are always operating efficient crisis management systems that can quickly respond to disasters or crises. As cyber attacks such as cyber warfare are actually progressing, countries around the world are conducting defense training in response to cyber attacks, and reflecting the results of simulation attacks in improving or building security systems. In this paper, we would like to consider the future cyber training development guide by comparing and analyzing the trends of cyber training in domestic and foreign countries.

Analysis of Network Influence Factor considering Social Network Analysis and C2 Time (소셜 네트워크 분석과 지휘통제시간을 고려한 네트워크 영향력 요소 분석)

  • Jeon, Jin-Tae;Park, Gun-Woo;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.257-266
    • /
    • 2011
  • Over the society the trial for several systems to be connected with Network has been continued to share information and to make it various. In accordance with such a change, the concept of military warfare conduction has been changing form platform centric warfare in separate combat system based on network centric warfare in network based. We have continuously made an effort that we try to get the goal with efficient system which is linked up with network, but such a study on that one in military system analysis is still slower than the study out of military until now. So this study is searching network influence factor by using military network with application of social network analysis method which is used broadly in the society and the science as well. At this time we search co-relationships between social network and the thing that we can analyse C2 time by effectiveness measurement means. By this study it has value of network influence factor identification for the growing network composition.

Enhanced Pulse Amplitude Estimation Method for Electronic Warfare Support (전자전 지원을 위한 향상된 펄스 세기 추정 기법)

  • Lee, Yu-Ri;Kim, Dong-Gyu;Kwak, Hyungyu;Kim, Hyoung-Nam
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.3
    • /
    • pp.649-660
    • /
    • 2017
  • In electronic warfare, the pulse amplitude, one of information of a pulse signal emitted by an enemy, is used for estimating distance from the source and for deinterleaving mixed source signals. An estimate of pulse amplitude is conventionally determined as the maximum magnitude of a Fourier transformed signal within its pulse width which is estimated pre-step in an electronic warfare receiver. However, when frequency modulated signals are received, it is difficult to estimate their pulse amplitudes with this conventional method because the energy of signals is dispersed in frequency domain. In order to overcome this limitation, this paper proposes an enhanced pulse amplitude estimation method which calculates the average power of the received pulse signal in time domain and removes the noise power of the receiver. Simulation results show that even in case the frequency modulated signal is received, the proposed method has the same performance as estimating the pulse amplitude when unmodulated signal is received. In addition, the proposed method is shown to be more robust to an estimation error of pulse width, which affects the estimation performance of pulse amplitude, than the conventional method.

Design of Over-sampled Channelized DRFM Structure in order to Remove Interference and Prevent Spurious Signal (간섭 제거 및 스퓨리어스 방지를 위한 오버샘플링 된 채널화 DRFM 구조 설계)

  • Kim, Yo-Han;Hong, Sang-Guen;Seo, Seung-Hun;Jo, Jung-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.8
    • /
    • pp.1213-1221
    • /
    • 2022
  • In Electronic Warfare, the need to develop a jamming system that protects our location information from enemy radar is constantly increasing. The jamming system normally uses wide-band DRFM(Digital Radio Frequency Memory) that processes the entire bandwidth at once. However, it is difficult to jam if there is a CW(Continuous Wave) interference signal in the band. Recently, instead of wide-band signal processing, a structure using a filter bank that divides the entire band into several sub-bands and processes each sub-band independently has been proposed. Although it is possible to handle interference signal through the filter bank structure, spurious signal occurs when the signal is received at a boundary frequency between sub-bands. Spurious signal makes a output power of jamming signal distributed, resulting in lower JSR(Jamming to Signal Ratio) and less jamming effect. This paper proposes an over-sampled channelized DRFM structure that enables interference response and prevents spurious signal for sub-band boundary frequency input.