• Title/Summary/Keyword: warfare information system

Search Result 199, Processing Time 0.026 seconds

Electronic Attack Signal Transmission System using Multiple Antennas (다중 안테나를 이용한 전자 공격 신호 전송 시스템)

  • Chang, Jaewon;Ryu, Jeong Ho;Park, Joo Rae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.1
    • /
    • pp.41-49
    • /
    • 2021
  • In electronic warfare, beamforming using multiple antennas is applied for effective transmission of electronic attack signals. In order to perform an electronic attack against multiple threats using the same frequency resource, it is necessary to apply a multi-beam transmission algorithm that has been studied in wireless communication systems. For electronic attacks against multiple threats, this paper presents an MMSE(Minimum Mean-Squared Error) beam-forming technique based on the prior location information of threats and an optimization method for power allocation. In addition, the performance of the proposed method is evaluated and received signals of multiple threats are compared and analyzed.

An Architecture Design of Military Operation System Utilizing Cellular Networks (군작전 효율화를 위한 셀룰라망 연동구조 설계)

  • Kim, Jae-Cheol;Kim, In-Taek
    • Journal of National Security and Military Science
    • /
    • s.9
    • /
    • pp.257-282
    • /
    • 2011
  • In this paper, we propose an architecture design of military operation system utilizing cellular networks. The main contribution of this paper is to provide a cost-effective military operation solution for ground forces, which is based on IT(information technology). By employing the cellular phones of officers' and non-commissioned officers' as the tools of operational communication, the proposed system can be constructed in the minimum duration and be built on the four components: command and control system, gateway, security system, and terminal(cell phone). This system is most effective for the warfare of limited area, but the effectiveness does not decrease under the total war covering the whole land of Korea. For the environmental change of near future, expanded architecture is also provided to utilize the functionalities of smart phones.

  • PDF

Association between Object and Sonar Target for Post Analysis of Submarine Engaged Warfare Simulation (잠수함 교전 시뮬레이션의 사후분석을 위한 객체와 소나 표적간의 연관 기법)

  • Kim, Junhyeong;Bae, Keunsung
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.3
    • /
    • pp.65-72
    • /
    • 2017
  • We propose a method to generate the object-target identifier mapping information for system performance and effectiveness analysis of submarine engage system and verify the validity of the proposed method through experiments. In the submarine model of the engage simulator, the signal processing algorithm of the actual sonar system is installed. In the target information obtained through the sonar or signal processing process, the actual object information is not known, and the simulator does not provide such information. Therefore, in this study, we generated identifier mapping information for simulation post-analysis by using bearing, range, and speed of the target obtaind from sonar signal processing and the object collected.

A Study on the Net Centric Entity Interoperability Layer (NCEI레이어 모델에 관한연구)

  • Son, Hyun-Sik;Lee, Tae-Gong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4B
    • /
    • pp.269-277
    • /
    • 2012
  • The future battlefield environment has changed platform centric warfare into a network centric warfare. The NCO is a operational concept to improve combat power through information sharing, shared situational awareness, decision making and synchronized action based on powerful network grid. In addition, these operational environment is composed of physical, information, cognitive and social domains. The platform environment system is associated with the OSI 7 layer. However, OSI 7 layer is limited to express NCW environment including cognitive and social domains. Therefore, we requires a new model for expressing cognitive and social domains. After we developed a new model, this model applied to the NCW architecture taxonomy.

The Diagnosis and Prescription for Cybersecurity in Korea: Focusing on Policy and System

  • Park, Sangdon;Kim, Il Hwan;Kim, Jaehyoun;Lee, Kyung Lyul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.843-859
    • /
    • 2018
  • Cybersecurity has emerged as a serious problem in Korea and there have been relevant movements to improve domestic cybersecurity policy and system. However, discussions have yet to result in actual progress and the legislation for improvement of cybersecurity policy and system have been stagnant until now. As evidenced by the introduction of primary government legislation bill for national cybersecurity in 2017, the preparations for improvements to the policy and system are still in progress. However, we cannot be positive about the possibility of implementing these improvements during the process. Recognition of the importance of cybersecutiry has gradually risen and is more prevalent than in years past, however, in-depth discussions are not being made. In principle, misunderstandings about cybersecurity itself and insufficient understandings of the relevant legislation seem to cause such problems. Therefore, it is necessary to review key issues related to the improvement of cybersecurity policy and system and reconsider tasks for the future. Such issues include the relationship between cybersecurity and fundamental rights, establishing responsibility and capability of each of entities for cybersecurity, and the role of the military in cybersecurity. This type of in-depth discussion will be helpful for finding ways to improve upon cybersecurity policy and system. Moreover, this study aims to key issues with questionnaire survey and political and normative inquiry.

A Study on the Emergency Response System for Internet game event with simulation circumstance (시뮬레이션 환경하에서 인터넷 게임 사고 대응시스템모델 연구)

  • Shin, Seung-Jung;Choi, Woon-Ho
    • Journal of Korea Game Society
    • /
    • v.5 no.1
    • /
    • pp.41-44
    • /
    • 2005
  • This paper is model can be useful and capable of automatically collecting and classifying the various information about a wide range of security incidents such as hackings, worms, spyware, cyber-terror, network espionage and information warfare from firewall, IDS, VPN and so on. According to them Internet game and an automated/integrated computer emergency response system can perform an attack assessment and an early warning for any incidents based on Enterprise Security Management environment.

  • PDF

Interoperability Assessment Framework for Embedded Software of Weapon Systems (무기체계 내장형 소프트웨어 상호운용성 평가 프레임워크)

  • Oh, Haeng-Rok;Koo, Heung-Seo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.4
    • /
    • pp.116-124
    • /
    • 2007
  • As NCW has appeared, the importance of interoperability in modern warfare has been also increased. Korean Defense has constructed and used the Systems Interoperability Test & Evaluation System based on LISI, in order to increase interoperability between Defense Information Systems. However, its evaluating targets are limited to only the information systems, so that it is difficult to apply it to weapon systems. This paper proposes an integrated interoperability assessment framework for korean embedded software of weapon systems based on reviewing the limitations of SITES and the other interoperability assessment models.

A Design of Electronic Evidence-seizure Mechanism for the Response of Information-warfare (정보전 대응을 위한 전자적 증거포착 메커니즘 설계1))

  • Park, Myeong-Chan;Lee, Jong-Seop;Choe, Yong-Rak
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.285-314
    • /
    • 2004
  • The forms of current war are diversified over the pan-national industry. Among these, one kind of threats which has permeated the cyber space based on the advanced information technology causes a new type of war. C4ISR, the military IT revolution, as a integrated technology innovation of Command, Control, Communications, Computer, Intelligence, Surveillance and Reconnaissance suggests that the aspect of the future war hereafter is changing much. In this paper, we design the virtual decoy system and intrusion trace marking mechanism which can capture various attempts and evidence of intrusion by hackers in cyber space, trace the penetration path and protect a system. By the suggested technique, we can identify and traceback the traces of intrusion in cyber space, or take a legal action with the seized evidence.

  • PDF

Weighted Energy Detector for Detecting Uunknown Threat Signals in Electronic Warfare System in Weak Power Signal Environment (전자전 미약신호 환경에서 미상 위협 신호원의 검출 성능 향상을 위한 가중 에너지 검출 기법)

  • Kim, Dong-Gyu;Kim, Yo-Han;Lee, Yu-Ri;Jang, Chungsu;Kim, Hyoung-Nam
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.3
    • /
    • pp.639-648
    • /
    • 2017
  • Electronic warfare systems for extracting information of the threat signals can be employed under the circumstance where the power of the received signal is weak. To precisely and rapidly detect the threat signals, it is required to use methods exploiting whole energy of the received signals instead of conventional methods using a single received signal input. To utilize the whole energy, numerous sizes of windows need to be implemented in a detector for dealing with all possible unknown length of the received signal because it is assumed that there is no preliminary information of the uncooperative signals. However, this grid search method requires too large computational complexity to be practically implemented. In order to resolve this complexity problem, an approach that reduces the number of windows by selecting the smaller number of representative windows can be considered. However, each representative window in this approach needs to cover a certain amount of interval divided from the considering range. Consequently, the discordance between the length of the received signal and the window sizes results in degradation of the detection performance. Therefore, we propose the weighted energy detector which results in improved detection performance comparing with the conventional energy detector under circumstance where the window size is smaller than the length of the received signal. In addition, it is shown that the proposed method exhibits the same performance under other circumstances.

Analysis of Influencing Factors of Cyber Weapon System Core Technology Realization Period (사이버 무기체계 핵심기술 실현시기의 영향 요인 분석)

  • Lee, Ho-gyun;Lim, Jong-in;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.281-292
    • /
    • 2017
  • It is demanded to promote research and development of cyber weapons system and core technology in response to the ongoing cyber attack of North Korea. In this paper, core technologies of the future cyber weapon system are developed and the factors affecting the realization timing of core technologies were analyzed. 9 core technology groups and 36 core technologies are derived. Afterwards, these core technology groups are compared to the operation phase of the joint cyber warfare guideline and the cyber kill chain of Lockheed Martin. As a result of the comparison, it is confirmed that the core technology groups cover all phases of the aforementioned tactics. The results of regression analyses performed on the degree of influence by each factor regarding the moment of core technology realization show that the moment of core technology realization approaches more quickly as factors such as technology level of the most advanced country, technology level of South Korea, technology transfer possibility from the military sector to the non-military sector(spin-off factor), and technology transfer possibility from the non-military sector to the military sector(spin-on factor) increase. On the contrary, the moment of core technology realization is delayed as the degree at which the advanced countries keep their core technologies from transferring decrease. The results also confirm that the moment of core technology realization is not significantly correlated to the economic ripple effect factor. This study is meaningful in that it extract core technologies of cyber weapon system in accordance with revision of force development directive and join cyber warfare guideline, which incorporated cyber weapon system into formal weapon system. Furthermore, the study is significant because it indicates the influential factor of the moment of core technology realization.