• Title/Summary/Keyword: tactical communications

Search Result 106, Processing Time 0.02 seconds

An approach to define variable length messages using ASN.1 (ASN.1을 이용한 가변 길이 메시지 표현 방법)

  • Baek, Haeun;Kang, Sungwon;Kim, Jingyu;Kim, Jungmin;Kwon, Koohyung;Kim, Sangsoo
    • Journal of Software Engineering Society
    • /
    • v.25 no.2
    • /
    • pp.35-47
    • /
    • 2012
  • Variable Message Format(VMF) is a communications protocol that allows computers to exchange tactical military information over low-data-rate bearers. VMF is designed to define message length and structure variably in order to allow the user to transmit only the relevant information by using indicators. However, flexibility of messages makes it difficult to analyze messages structure and figure out meanings. Furthermore, whenever messages are added or modified, message processing software should be updated and distributed to systems. In this paper, we propose a systematic approach to defining VMF messages that uses the international standard notation ASN.1. By describing VMF messages in ASN.1, protocol architects can deal with VMF messages accurately and conveniently, and use various ASN.1 tool. This paper develops ASN.1 description templates for VMF message segments, and presents an approach to describing VMF messages in ASN.1 by combining the templates.

  • PDF

Development of a GNSS Signal Generator Considering Reception Environment of a Vehicle (이동체의 수신 환경을 고려한 GNSS 신호 생성기 개발)

  • Cho, Sung Lyong;Park, Chansik;Hwang, Sang Wook;Choi, Yun Sub;Lee, Ju Hyun;Lee, Sang Jeong;Pack, Jeong-Ki;Lee, Dong-Kook;Jee, Gyu-In
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.9
    • /
    • pp.811-820
    • /
    • 2012
  • GNSS signal is vulnerable to jamming signal because of well-known signal structure and weak signal power. For these reasons, the need for analysis of jamming effects and anti-jamming techniques of is increasing. In this paper, a GNSS signal generator is designed which includes a radio wave propagation model for six kind of tactical environments and a body masking model for the reception environment of a vehicle. The radio wave propagation model for downtown, rural, forest, coastline, waste land and snow or ice area is designed using two-ray model. The body masking model is designed the effect which the antenna is affected by the reception environment of a vehicle and radiation pattern from a user configuration. The performance of generated signals from the GNSS signal generator considering reception environment of a vehicle is evaluated by a commercial GPS L1 receiver(NordNav) in normal and jamming environment. Also, the generated GNSS signal is compared to a commercial GPS L1 H/W based RF signal generator(STR4500). The results show that the designed GNSS signal generator in a normal environment compared to the same navigation performance. In jamming environment, it is shown that the body masking effect and GNSS signal acquisition and tracking loss in compliance with the jamming signal are precisely working in the reception environment of a vehicle.

An Implementation of IEEE 1516.1-2000 Standard with the Hybrid Data Communication Method (하이브리드 데이터 통신 방식을 적용한 IEEE 1516.1-2000 표준의 구현)

  • Shim, Jun-Yong;Wi, Soung-Hyouk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1094-1103
    • /
    • 2012
  • Recently, software industry regarding national defense increases system development of distributed simulation system of M&S based to overcome limit of resource and expense. It is one of key technologies for offering of mutual validation among objects and reuse of objects which are discussed for developing these systems. RTI, implementation of HLA interface specification as software providing these technologies uses Federation Object Model for exchanging information with joined federates in the federation and each federate has a characteristic that is supposed to have identical FOM in the federation. This technology is a software which is to provide the core technology which was suggested by the United state's military M&S standard framework. Simulator, virtual simulation, and inter-connection between military weapons system S/W which executes on network which is M&S's core base technology, and it is a technology which also can be used for various inter-connection between S/W such as game and on-line phone. These days although RTI is used in military war game or tactical training unit field, there is none in Korea. Also, it is used in mobile-game, distribution game, net management, robot field, and other civilian field, but the number of examples are so small and informalized. Through this developing project, we developed the core technique and RTI software and provided performance of COTS level to improve communication algorithms.

Detection Model of Malicious Nodes of Tactical Network for Korean-NCW Environment (한국형 NCW를 위한 전술네트워크에서의 악의적인 노드 검출 모델)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.71-77
    • /
    • 2011
  • NCW(Network Centric- Warfare) encompasses the concept to use computer data processing and network linkage communications techniques, share information and furthermore, enhance the effectiveness of computer-operating systems. As IT(Information & Technology) have become developed in the recent years, the existing warfare system-centered conventional protocol is not use any longer. Instead, network-based NCW is being widely-available, today. Under this changing computer environment, it becomes important to establish algorithm and build the stable communication systems. Tools to identify malign node factors through Wireless Ad-hoc network cause a tremendous error to analyze and use paths of even benign node factors misreported to prove false without testing or indentifying such factors to an adequate level. These things can become an obstacle in the process of creating the optimum network distribution environment. In this regard, this thesis is designed to test and identify paths of benign node factors and then, present techniques to transmit data through the most significant open short path, with the tool of MP-SAR Protocol, security path search provider, in Ad-hoc NCW environment. Such techniques functions to identify and test unnecessary paths of node factors, and thus, such technique users can give an easy access to benign paths of node factors.

Experimental Research on Radar and ESM Measurement Fusion Technique Using Probabilistic Data Association for Cooperative Target Tracking (협동 표적 추적을 위한 확률적 데이터 연관 기반 레이더 및 ESM 센서 측정치 융합 기법의 실험적 연구)

  • Lee, Sae-Woom;Kim, Eun-Chan;Jung, Hyo-Young;Kim, Gi-Sung;Kim, Ki-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5C
    • /
    • pp.355-364
    • /
    • 2012
  • Target processing mechanisms are necessary to collect target information, real-time data fusion, and tactical environment recognition for cooperative engagement ability. Among these mechanisms, the target tracking starts from predicting state of speed, acceleration, and location by using sensors' measurements. However, it can be a problem to give the reliability because the measurements have a certain uncertainty. Thus, a technique which uses multiple sensors is needed to detect the target and increase the reliability. Also, data fusion technique is necessary to process the data which is provided from heterogeneous sensors for target tracking. In this paper, a target tracking algorithm is proposed based on probabilistic data association(PDA) by fusing radar and ESM sensor measurements. The radar sensor's azimuth and range measurements and the ESM sensor's bearing-only measurement are associated by the measurement fusion method. After gating associated measurements, state estimation of the target is performed by PDA filter. The simulation results show that the proposed algorithm provides improved estimation under linear and circular target motions.

Code for Unplanned Encounters at Sea(CUES): Its Limitation and Recommendations for Improvement (해상에서의 우발적 조우 시 신호 규칙(CUES)의 제한점과 개선을 위한 제언)

  • Oh, Dongkeon
    • Strategy21
    • /
    • s.44
    • /
    • pp.323-351
    • /
    • 2018
  • Adopted in Western Pacific Naval Symposium(WPNS) 2014, Code for Unplanned Encounters at Sea(CUES) has been the most valuable output of WPNS history. Written and suggested by Australian Navy in 1999, the goal of CUES is to decrease the possibility of the naval conflict by establishing the code among international navies in the Western Pacific region. Facing many oppositions and requirement of People's Liberation Army Navy(PLAN) in WPNS 2012 and 2013, but it finally adopted in WPNS 2014, with many changes in detailed provisions. From then, navies in the Western Pacific region have followed CUES to prevent maritime conflicts in the region, CUES, however, sometimes does not work correctly. Contents of CUES is the mixture of the parts of Multinational Maritime Tactical Signal and Maneuvering Book(MTP) and International Regulations for Preventing Collision at Sea 1972(CORLEGs). There are means of radio communications such as frequency and signals, instructions for maneuvering and so on. Thus, it is not a new document for the U.S. Navy and its allies, but it requires training to implicate at sea for navies other than U.S. allies, like PLAN. Lots of provisions in CUES were changed because of the opposition of PLAN, and CUES has many shortcomings and practical limitations. First, since CUES is non-legally binding, and there are no methods to force the naval assets on the sea to follow. Second, CUES is only applied to naval assets; naval ships - warships, naval auxiliaries, and submarines - and naval aircraft. Third, the geographical scope in CUES is not clear. Fourth, there is no provision for submerged submarines. Finally, CUES has no time-based framework or roadmap for training. In this regard, there would be six recommendations for improvement. First, CUES should be reviewed by WPNS or other international institutions, while keeping non-binding status so that WPNS could send signals to the navies which do not answer CUES on the sea. Second, the participation of Maritime Law Enforcements(MLEs) such as coast guard is inevitable. Third, navies would use full text of MTP rather than current CUES, which extracts some parts of MTP. Fourth, CUES needs provisions with respect to submerged submarines, which recognizes as offensive weapons themselves. Fifth, the geographic scope of CUES should be clear. Since there are some countries in which claim that a rock with a concrete structure is their territory, CUES should be applied on every sea including EEZ and territorial seas. Finally, the detailed training plan is required to implicate CUES at sea. Rim of the Pacific (RIMPAC) is a good exercise to train CUES, because almost all WPNS member countries except six countries are participating in RIMPAC. CUES is a meaningful document not only for navies but also for nation-states in the region. To prevent escalation of conflict in the region, potentially caused by an unplanned collision at sea, CUES should be applied more strictly. CUES will continue to be in subsequent WPNS and therefore continue to improve in the effectiveness as both an operational and diplomatic agreement.