• Title/Summary/Keyword: tactical intelligence communication system

Search Result 6, Processing Time 0.023 seconds

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

Imagery Intelligence Transmission Analysis of Common Data Link (CDL) on Aeronautical Wireless Channel (항공통신정찰링크(CDL)에서 영상정보 전송을 위한 통신방안 연구)

  • Park Young-mi;Yoon Jang-hong;Kim Sung-jo;Son Young-ho;Yoon E-joong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.7
    • /
    • pp.1425-1431
    • /
    • 2005
  • In this paper, we consider the ISR(Intelligence, Surveillance, and Reconnaissance) system which collects the imagery intelligence from an airplane and CDL(common data link) communication system which transports the information obtained by the ISR system. The IMINT(imagery intelligence) consists of MPEG-2 transport stream packets and they transmit through CDL. We have some simulations for communication performances of CDL and show performance improvements using convolutional coding. We have compared BER performances under AWGN channel and fading channel which is caused by the velocity of an airplane.

Study on Trends and Strategies for Defense Blockchain and ICT Technologies (국방 블록체인 기술 동향 및 국방 ICT 융합 전략 연구)

  • Lee, K.Hyu;Park, H.Sook
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.1
    • /
    • pp.12-24
    • /
    • 2020
  • To keep pace with other powerful nations in this era of the era of digitalization and to emerge stronger in the world, the defense forces of South Korea aim to innovate and prepare themselves for digital battlefields of possible wars in the future. The resources in the defense sector, which is the core of defense intelligence, is based on an intelligent mission collaboration tactical network system via cyber, command, control, communication, and computer (C4), and military and non-human weapons. Defense intelligence depends on the degree of the convergence of advanced Information and communication technologies (ICTs). Considering this aspect of defense intelligence, We plan to determine the application status of defense blockchain technology and examine the feasibility of applying blockchain technology and the core of applied technology. Generally, a key feature of blockchain technology is its data integrity in untrusted environments. There are various types of core technologies for the blockchain depending on the target areas of application in the defense sector, and it is also essential to derive new application strategies for core technologies that are applied in combination with other ICT technologies. We plan to demonstrate new defense ICT converged technologies (DNAB2: Data, Network, AI, BigData, Blockchain) and DNAB2-As-Services in the defense strategy.

A Study on the Design of KVMF 2.0 Protocol for Ensuring Backward/Forward Compatibility between Different KVMF Message Standard Versions

  • Jeong-Min, Lee;Won-Gi, Lim;Won-Jun, Cho;Yong-Cheol, Kim;Jeung-Sub, Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.3
    • /
    • pp.45-58
    • /
    • 2023
  • KVMF(Korean Variable Message Format) 1.0 protocol is the Army's standard tactical datalink protocol that defines standard messages and communication methods to enable data communication between various weapon systems through bitwise variable message processing. The protocol has been applied to a variety of Army weapon systems over the past decade and has contributed to upgrade the Army's operational capabilities by enabling the implementation of Network Centric Warfare (NCW), the core of modern warfare. Since the KVMF 1.0 protocol was applied, new weapon systems with new technologies have been introduced over time, and new weapon systems have new messages based on the characteristics of the weapon system. As a result, compatibility problems arose due to different message versions with existing weapon systems, and it was expected that these problems would continue to emerge in the future, considering the need for continuous message revisions. Therefore, it became necessary to solve this problem, so this paper proposed a KVMF 2.0 protocol design that guarantees compatibility between forward and backward versions. In this paper, we implemented the design as SW, and confirmed that the design worked successfully by test between forward and backward versions on test environment. Therefore, when the KVMF 2.0 protocol design is applied to a weapon system, we can expect that the weapon system can be compatible with the forward and backward versions working with the existing weapon systems as well as with the future weapon systems.

Reality and Improvement Plan of Information-Oriented Age Conscription Administration and Barracks informationization (정보화시대 병무행정과 병영정보화의 실태와 발전 방안)

  • Kim, Doo-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.109-112
    • /
    • 2014
  • Korean informationization technology development speed is growing fastly and IT technology become world-class. Especially, by grafting IT technology to war commanding system, built an network center operational environment. However, conscription administration and the barracks informationization have inadequate points, to provide the people who have a duty of military service and parents with benefits and develop conscription administration and the barracks informationization base system conformed to IT age include using online system to guarantee military personnel's studying environment, writer proposed an improvement plan.

A Study of Building a Model for Tactical C4I System (전술 C4I체계 모델 구축에 관한 연구)

  • Kim, Ho-Jin;Lee, Sang-Kook;Kwon, Young-Sik
    • IE interfaces
    • /
    • v.12 no.2
    • /
    • pp.193-204
    • /
    • 1999
  • Development of high technology especially in telecommunication and precise weapon systems will impact the future battle field environment. So it is not difficult to anticipate the environment of military command and control system will be changed rapidly. Considering these future battle field environment, military needs automated C4I (Command, Control, Communication, Computer and Intelligence) system, namely real time decision support system which is combined high technologies. Most of advanced countries have been studied and developed these kinds of systems and already applied these systems in real military operations. In order to take a military initiative in Korea peninsula it is essential to catch up with this trend and procure C4I system. The purpose of this research is to present the method and the direction of optimal C4I system development model. First we survey the related theory about C4I systems. Second we present the conceptual framework for C4I system concept development. Third we model the system using Timed Petri-Net and perform simulation. Finally we analyze the through-put time and suggest alternatives. If we model using the real organization structure, operational tasks and various situations then optimal C4I system would be developed.

  • PDF