• Title/Summary/Keyword: warfare information system

Search Result 199, Processing Time 0.025 seconds

The Push Framework for UMPC Tactical Data Link(TDL) Based on The Legacy Radio (레거시 라디오 기반의 UMPC 전술 데이터 링크 Push 프레임워크)

  • Sim, Dong-Sub;Shin, Ung-Hee;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.3
    • /
    • pp.397-404
    • /
    • 2010
  • Recently, there is on-going research about tactical data link system based on the legacy radio. Tactical data link based on legacy radio is operated mostly in narrow bandwidth under 25khz. Communicating traffics in nodes participated at network need to be minimized for distributing tactical data in narrow bandwidth. In addition, the data distributing structure is necessary for distributing tactical informations such as a situation awareness and so on to war fighters. However, conventional server-client system wastes a lot of time to obtain information for war fighters as user uses pull system to gather necessary information by seeking it one by one. Especially, the fighter pilot is supposed to dedicate into a situation awareness and fight mission in every seconds but seeking information of a user terminal while aircraft maneuvering affects as obstacle to concentrate engaging hostiles. therefore, push technology, the tactical data distributing system, is necessary for war fighters to receive fixed tactical data automatically without putting attention to it. This paper propose the UMPC tactical data link push framework. the UMPC tactical data link is a tactical data link system based on the legacy radio. Proposed push framework is verified by composing experiment environment and testing.

Performance Analysis of Unmanned Robot System based on LOS/NLOS channel (LOS/NLOS 채널에 따른 무인로봇체계의 시스템 성능분석)

  • Song, Yuchan;Cha, Gyeong Hyeon;Hwang, Yu Min;Lee, Jae-Seang;Han, Myoung-hun;Kim, Jin Young;Shin, Yoan
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.4
    • /
    • pp.12-16
    • /
    • 2015
  • Unmanned robot system has become a significant part of network centric warfare. Unnlike the commercial wireless system, however, it is tricky to provide reliable communication in the harsh environment: tactical and military communication. Therefore, it needs to be considered when the base station and mobile has poor communication channel. In this paper, we proposed an efficient operating algorithm for unammned robot system with ensuring communication survivability in the harsh environment. From the simulation, we adopted the SUI channel suitable for domestic mountainous area and open terrain with Rician factor K.

Study of consideration for future tactical communication system development (미래 전술통신체계개발을 위한 고려사항 연구)

  • Byun, Jongsin;Park, Sangjun;Kim, Yongchul
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.35-41
    • /
    • 2018
  • The Army has developed the concept of terrestrial warfare in conjunction with the Joint Concept and has introduced TICN as the base communication system to support it. TICN has been used to improve the transmission speed and to increase the coverage distance. Through this, TICN is making efforts to create network-centered operation environment so that information can be distributed in real time or near real time from the monitoring system to the hitting system. However, TICN is not enough to overcome the network limitations that may arise from various contingencies in battlefield situations. Therefore, in this paper, we investigated the limitations of communication according to the situations that can occur in the battlefield situation and studied the considerations to overcome them.

  • PDF

An active intrusion-confronting method using fake session and Honeypot (거짓 세션과 허니팟을 이용한 능동적 침입 대응 기법)

  • 이명섭;신경철;박창현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7C
    • /
    • pp.971-984
    • /
    • 2004
  • In the coming age of information warfare, information security patterns need to be changed such as to the active approach using offensive security mechanisms rather than traditional passive approach just protecting the intrusions. In an active security environment, it is essential that, when detecting an intrusion, the immediate confrontation such as analysing the intrusion situation in realtime, protecting information from the attacks, and even tracing the intruder. This paper presents an active intrusion-confronting system using a fake session and a honeypot. Through the fake session, the attacks like Dos(Denial of Service) and port scan can be intercepted. By monitoring honeypot system, in which the intruders are migrated from the protected system and an intrusion rule manager is being activated, new intrusion rules are created and activated for confronting the next intrusions.

A Study on HLA Federate Compliance Testing Process and its Applications (HLA 페더레이트 연동화 인증철차 및 적용사례)

  • 김용효;박헌근;이해관
    • Journal of the military operations research society of Korea
    • /
    • v.30 no.1
    • /
    • pp.81-91
    • /
    • 2004
  • Since HLA (High Level Architecture) was selected as a standardized distributed simulation architecture by US DoD in order to guarantee interoperability among all types of simulations, weapons system and C4I systems, to improve reusability of developed models in mid 1990s, a large number of federates have been developed and certified in accordance with HLA specifications. This paper illustrates case studies on HLA compliance test which are helpful for developers and managers. Based on experiences obtained from international HLA compliance test of CJ21_NG being developed for ground warfare simulation during ROKA's BCTP and UFL exercises, compliance procedures of US Defense and Modelling Simulation Office (DMSO) are introduced, and detail information at each phase of compliance test is provided.

A General Purpose Engagement Simulator using a Tactical Data-link (범용 전술데이터링크 교전 시뮬레이터)

  • Yun, Keun-Ho;Jin, Jung-Hun;Kim, Seh-Hwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.2
    • /
    • pp.218-226
    • /
    • 2010
  • The tactical data-link is useful to exchanging automatic information and controling command in combat environment. This is a essential factor of interoperability in the future combat situation of network centric warfare. In a aspect of a weapon system development, Modeling & Simulation can save expense. HLA RTI is a standard communication protocol in M&S. So, we suggest that Link Simulator connect tactical data-link through RTI. This simulator has the interoperability between M&S and tactical data-link, the reusability through adabing M&S framework, and the wide usability by automatic engagement function.

Radar Pulse Clustering using Kernel Density Window (커널 밀도 윈도우를 이용한 레이더 펄스 클러스터링)

  • Lee, Dong-Weon;Han, Jin-Woo;Lee, Won-Don
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.973-974
    • /
    • 2008
  • As radar signal environments become denser and more complex, the capability of high-speed and accurate signal analysis is required for ES(Electronic warfare Support) system to identify individual radar signals at real-time. In this paper, we propose the new novel clustering algorithm of radar pulses to alleviate the load of signal analysis process and support reliable analysis. The proposed algorithm uses KDE(Kernel Density Estimation) and its CDF(Cumulative Distribution Function) to compose clusters considering the distribution characteristics of pulses. Simulation results show the good performance of the proposed clustering algorithm in clustering and classifying the emitters.

  • PDF

A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure (협력대응기반 전역네트워크 보안정보공유 시스템)

  • Kim, Ki-Young;Lee, Sung-Won;Kim, Jong-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.2
    • /
    • pp.60-69
    • /
    • 2013
  • Highlighted by recent security breaches including Google, Western Energy Company, and the Stuxnet infiltration of Iranian nuclear sites, Cyber warfare attacks pose a threat to national and global security. In particular, targeted attacks such as APT exploiting a high degree of stealthiness over a long period, has extended their victims from PCs and enterprise servers to government organizations and critical national infrastructure whereas the existing security measures exhibited limited capabilities in detecting and countermeasuring them. As a solution to fight against such attacks, we designed and implemented a security monitoring system, which shares security information and helps cooperative countermeasure. The proposed security monitoring system collects security event logs from heterogeneous security devices, analyses them, and visualizes the security status using 3D technology. The capability of the proposed system was evaluated and demonstrated throughly by deploying it under real network in a ISP for a week.

Design of the homomorphic encryption system for secure data management in the future battlefield environment (미래 전장환경에서 안전한 데이터 관리를 위한 준동형 시스템 설계)

  • Cha, HyunJong;Kim, JinMook;Ryou, HwangBin
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.51-56
    • /
    • 2014
  • Be expressed in network-centric warfare, mainly battlefield environment of the future. The purpose of the system for the war of the future, is to recognize the enemy before the enemy, and rapid decision-making, to hit accurately. For this reason, it is during the construction of the integrated system of C4ISR+PGM. In such an integrated system, it is necessary to further enhance the security aspects of the information. In particular, strengthening of security leads to a decrease of efficiency. Therefore, security and efficiency should be considered together. In this study, we provide a homomorphic encryption system that can be safely managed information environment on the battlefield of the future. The proposed method uses encryption technology of homomorphic that can be the arithmetic operations on encrypted state. It has changed from the state of the encryption. Therefore, the attacker can not know a decent information.

A Development of Weapon System Test Set's Display Using an Ecological Interface Design Methodology (생태학적 인터페이스 디자인(EID) 기법을 활용한 무기체계점검장비(WSTS) 디스플레이 개발)

  • Park, Jae-Eun;Seo, Yang-Woo;Kim, Ko-Kyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.6
    • /
    • pp.4147-4157
    • /
    • 2015
  • The weapon system has developed by adding various functions because of the warfare change. And, an weapon system test set (WSTS) that is used to test and judge the condition of weapon system also deal with a lot of complex information. However, almost WSTS is developed on the basis of developer-centric. Because of it, it is hard to make a result by apprehending information on WSTS's display. Thus, I proposed a new display of WSTS by adapting the Ecological Interface Design(EID) Methodology to reduce operator's cognitive workload and assure safe testing. WSTS's Display is developed through Information Requirement and Work Domain Model as a result of Work Domain Analysis. The most powerful thing in the new display is that operator can identify his testing and status of WSTS directly. I expect that it reduces operator's cognitive workload and helps safe testing.