• Title/Summary/Keyword: warfare information system

Search Result 200, Processing Time 0.028 seconds

Analysis of Network Influence Factor considering Social Network Analysis and C2 Time (소셜 네트워크 분석과 지휘통제시간을 고려한 네트워크 영향력 요소 분석)

  • Jeon, Jin-Tae;Park, Gun-Woo;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.257-266
    • /
    • 2011
  • Over the society the trial for several systems to be connected with Network has been continued to share information and to make it various. In accordance with such a change, the concept of military warfare conduction has been changing form platform centric warfare in separate combat system based on network centric warfare in network based. We have continuously made an effort that we try to get the goal with efficient system which is linked up with network, but such a study on that one in military system analysis is still slower than the study out of military until now. So this study is searching network influence factor by using military network with application of social network analysis method which is used broadly in the society and the science as well. At this time we search co-relationships between social network and the thing that we can analyse C2 time by effectiveness measurement means. By this study it has value of network influence factor identification for the growing network composition.

An Analysis of Satellite Communications System structure for NCW (NCW대비 군 위성통신 구조 분석)

  • Park, Woo-Chul;Cha, Jae-Ryong;Kim, Jae-Hyun
    • Journal of Satellite, Information and Communications
    • /
    • v.4 no.1
    • /
    • pp.1-7
    • /
    • 2009
  • As the information age comes out, the aspect of future war brings about the many changes in terms of war-fighting environment. Accordingly, information superiority and intelligence-centric warfare have been important and new war-fighting concept such as NCW(network centric warfare) have been turned up. This paper proposed all-weather core-strategy communications systems guaranteeing not only the real-time transmission of the information collected in a battlefield and expansion, automation, and rapidity of a battlefield but also broadband, mobility, survivability, and flexibility. The proposed military satellite communications system is classified into wideband mass capacity link, survivability, and the system supporting OTM(on the move) communication for the real-time transmission of battlefield information. This paper analyzed the essential operation concepts and core schemes of the U.S. Army's next generation system, TSAT(Transformational Satellite Communication System). Base on the analysis results, this paper proposed that the architecture of next generation military satellite communications systems for NCW have to provide the data rate, anti-jamming capability, network control and management capability which are optimally adaptable for the wireless channel environments such as jamming and interference and to support the variety of platforms like high-speed mobile vehicles, micromini devices, super-high speed unmanned aerial vehicles. Finally, this paper also proposed that next generation military satellite communications systems need the technologies such as the adaptable multi-antenna, laser link, and next-generation anti-jamming waveform.

  • PDF

A Study on Architecture Design of Network Management System for DX (구축함(DX) 네트워크 관리 시스템 구조 설계에 대한 연구)

  • Lee, Kwang-Je;Chung, Jin-Wook
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.2
    • /
    • pp.95-103
    • /
    • 2002
  • We know that the all of warfare system has been becoming complex and variety in warfield thru the Gulf-War. The all of warfare electronic systems is designed to inter-operate by networks in recently. Especially Warfare Equipment systems of Men-of-War(War ship) as like KDX(Korea Destroyer, Experimental), FF(Frigate), PCC(Costal Patrol Craft), Submarine are connected by Combat System Databus to the Command system(C2 System), so C2 system can control all of equipments in ship. In this view, the status of network(Combat System Databus) is very critical parameter in war field. So In this paper, we propose the method of Network Management System construction for War ship, and especially propose the architectural design of network management system for DX(Destroyer, Experimental) equipments using SNMP(Simple Network Management Protocol). And Link Utilization is monitored by simulation. 

Performance Analysis on Digital Phase Difference Measurement Techniques for Interferometer Direction Finder (인터페로미터 방향 탐지기의 디지털 위상차 측정 기법 성능 분석)

  • Kang, Jong-jin;Park, Sung-kyun;Roh, Ji-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.8
    • /
    • pp.1076-1082
    • /
    • 2018
  • This paper describes interferometer direction finder which measures the angle of arrival based on calculation of the phase difference of received radio signal from different antennas. Modern Electronic Warfare direction finder uses digital phase difference measuring techniques which have less effect on temperature variation and better performance under low Signal to Noise Ratio environment. In this paper, we analyze acceptable phase difference error for requirement of system's direction finding accuracy and introduce digital phase difference calculation techniques. We have investigated quantitative analysis on phase difference calculation according to sample number, SNR, interference injection. Through the simulation, frequency domain measurement technique is better performance than the time domain one at the environment of low SNR and interference injection. Proposed method can be used to determine the performance of interferometer direction finder.

Identification Algorithm for Up/Down Sliding PRIs of Unidentified RADAR Pulses With Enhanced Electronic Protection (우수한 전자 보호 기능을 가진 미상 레이더 펄스의 상/하 슬라이딩 PRI 식별 알고리즘)

  • Lee, Yongsik;Kim, Jinsoo;Kim, Euigyoo;Lim, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.6
    • /
    • pp.611-619
    • /
    • 2016
  • Success in modern war depends on electronic warfare. Therefore, It is very important to identify the kind of Radar PRI modulations in a lot of Radar electromagnetic waves. In this paper, I propose an algorithm to identify Linear up Sliding PRI, Non-Linear up Sliding PRI and Linear Down Sliding PRI, Non-Linear Down Sliding PRI among many Radar pulses. We applied not only the TDOA(Time Difference Of Arrival) concept of Radar pulse signals incoming to antennas but also a rising and falling curve characteristics of those PRI's. After making a program by such algorithm, we input each 40 data to those PRI's identification programs and as a result, those programs fully processed the data in according to expectations. In the future, those programs can be applied to the ESM, ELINT system.

Building an Analysis Model for Social Engineering Based Cyberspace Operations (사회공학 사이버작전 분석모델 정립연구)

  • Shin, Kyuyong;Kim, Jeewon;Lim, Hyun-myung;Kim, Yongju;Yoo, Jincheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1595-1606
    • /
    • 2018
  • Recently, there has been an increase in the number of social engineering techniques that indirectly attack the target system administrators or organizational weaknesses rather than the traditional technical cyber attacks that directly attacked the target systems. Accordingly, the type analysis and case study of social engineering techniques are being actively conducted. There has been, however, little effort to derive an analysis model that systematically analyzes social engineering based cyberspace operations. Therefore, this paper aims at building a Social Engineering Based Cyberspace Operations Analysis Model, which can be used as a reference framework for a case study or attack scenario generation of social engineering based cyberspace operations.

A Study on Optimized Plan for Mass Acquisition and Processing of Battlefield Information (전장 정보의 대량 획득과 처리를 위한 최적화 방안 연구)

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Shin, Hyo-Young;Park, Ho-Kyun;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.45-50
    • /
    • 2013
  • The future warfare will universalize the operation of a combined weapon system that utilizes this technology and create an operational environment that is centered on a network requiring a high level of interoperability between combat elements as well as a high level of operation speed. In this kind of operational environment, future combat will take on the aspects of network centric warfare, which is capable of realizing a real-time sensor to shooter cycle by horizontally connecting operation elements. Therefore, the study attempts to draw out a Korean measurement plan concerning battlefield environment changes in the future by investigating and analyzing all problems occurring during the mass acquisition and processing of battlefield information in battlefield situations of network centric warfare currently conducted by the US military in Afghanistan and Iraq.

The Analysis of Crypto Communication Relay Effect in the Security Framework Technique of Network Centric Warfare Environment (NCW환경의 보안 프레임워크 기술에서 암호통신 중계영향 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.788-794
    • /
    • 2007
  • The policy of US DoD is moving towards implementation of Network Centric Warfare(NCW) concepts. NCW is commonly described as the integration and synchronization of four key interdependent elements such as command and control, sensor system, engagement systems and the network. Therefore the military policy of Korea military is needed to access and examine the policy of NCW communication environment and crypto communication, which is able to apply it. In this case study, We are reviewed the security framework of the concept of network centric warfare in the centering around the US. It is introduced the core technology in the network centric warfare, and it is reviewed the security framework such as, the requirements of security, the characteristics security of global information grid, joint tactical radion system, net centric enterprise services, transformational communication satellite, in the basis of core technology, and analysis the effect of crypto communication relay between command node and surbornate node in NCW environment. This report support the assistance, which is considered the elements of surrounding effects in the varied crypto communication research area of NCW.

  • PDF

A P2P Based Tactical Information Sharing System for Mobile Nodes (P2P 기반의 모바일 노드간의 전술 정보 공유 시스템)

  • Lee, Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.4
    • /
    • pp.501-509
    • /
    • 2014
  • In NCW(Network Centric Warfare) environment, mobile nodes communicate through wireless link. But wireless link provides limited networking performance due to signal interferences or mobility of nodes. So it is quite challenge to acquire enough networking resources and use the resources efficiently. In this paper, we have proposed a P2P based tactical information sharing system which provides satisfactory visual information playout for mobile nodes(i.e., military personnel, vehicle,..) in NCW environment. Our proposed system consists of two components. One is caching-enabled switch which stores tactical information segments at its internal storage and then transports them to mobile nodes when require. Another is centralized scheduling algorithm which exploits networking resources more efficiently. To validate performance of proposed system, we performed series of experiments in wireless network testbed. Results show improved performance in terms of segment-missing ratio, networking resources usage, sharing time, and number of simultaneous playout mobile nodes with acceptable playout continuity(i.e., over 95%).

A Study on the Improvement of Naval Combat Management System for the Defense of Drone

  • Ki-Chang Kwon;Ki-Pyo Kim;Ki-Tae Kwon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.4
    • /
    • pp.93-104
    • /
    • 2023
  • Recently, the technology of drones is developing remarkably. The role of military drones is so great that they can cause serious damage to the enemy's important strategic assets without any damage to our allies in all battlefield environments (land, sea, air). However, the battleship combat management system currently operated by the Korean Navy is vulnerable to defense because there is no customized defense system against drones. As drones continue to develop, they are bound to pose a major threat to navy in the future. This paper proposes a way for the warfare software of naval combat management system sets a combat mode suitable for anti-drone battle, evaluates the threat priority in order to preemptively respond to drone threats and eliminate drone threats through automatic allocation of self-ship-mounted weapons and sensors, and through a test of the improved warfare software in a simulated environment, it was proved that the time to respond to the drone was improved by 62%.