• Title/Summary/Keyword: 전투기 소프트웨어

Search Result 6, Processing Time 0.02 seconds

A Study of Fighter-plane Airworthiness Security Certification (전투기 감항 보안 인증에 관한 연구)

  • Kim, HyunJu;Kang, DongSu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.05a
    • /
    • pp.117-120
    • /
    • 2018
  • 최신 전투기로 발전할수록 증가되는 소프트웨어 의존도와 네트워크 중심전으로의 작전 수행 개념의 변화, 그리고 무기체계에 대하여 지속적으로 발전하는 사이버 위협의 증가는 전투기 소프트웨어에 대한 강화된 보안 대책을 요구하고 있다. 이러한 상황의 변화는 전투기의 운용 및 소프트웨어 결함에 대한 감항인증 뿐만 아니라, 전투기 소프트웨어에 대한 사이버 위협의 보안 대책도 함께 요구한다. 따라서 본 연구에서는 항공기 및 시스템 감항 보안 인증기준인 DO-326A와 DO-356을 적용하여 전투기 운용 환경을 고려한 항공무기체계의 특성과 항공기에 대한 사이버 공격에 대해 살펴보고, 이를 바탕으로 감항 보안 프로세스를 적용해 본다.

A Design of Risk-Based Security Threat Assessment Process for Fighter-Aircraft Airworthiness Security Certification (전투기 감항 보안 인증을 위한 위험기반 보안위협 평가 프로세스 설계)

  • Kim, Hyunju;Kang, Dongsu
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.6
    • /
    • pp.223-234
    • /
    • 2019
  • Cyber attacks are an important factor that determines the victory and defeat of Network-centric wars in which advanced weapon systems are highly interlinked. In addition the increasing dependability on software as its develop as the latest fighter is demanding enhanced security measures for fighter software to Cyber attacks. In this paper, we apply the DO-326A, which is an airworthiness security certification standard, to design a risk-based security threat assessment process by reflecting characteristics and operational environment of fighter aircraft. To do this, we add the following steps in security threat assessment stage of DO-326A's airworthiness security certification process. First, we derive security threats of fighter. And then, we scored the security threat in terms of possibility and impact on the fighter. Finally, we determine the security risk severity.

호주 공군의 새로운 사업계획

  • Park, Seong-Jun
    • Defense and Technology
    • /
    • no.5 s.135
    • /
    • pp.56-63
    • /
    • 1990
  • 호주 공군에서 추진하고 있는 여러가지 사업들은 첨단 전자장비의 성능개량 특히 그중에서도 소프트웨어 개발능력 향상에 모아지고 있다. F/A-18의 경우 호주업체와 정부연구기관의 설계, 개발, 시험기술에 의해 호주 공군이 요청하는 대로 이 전투기의 잠재능력을 도출한후 필요한 성능개량작업을 대부분 수행할 것이다. 이에 따라 F/A-18은 보다 긴 항속능력, 장거리 항법시스템, 신형 레이다, 하픈(Harpoon)과 같은 신형 대함미사일을 장착할 수 있게 될 것이다

  • PDF

KF-16 Software Upgrade Cost Analysis (KF-16 항공기 SW성능향상사업 비용분석)

  • Min, Sung Ki;Lee, Cheol Woo;Dalton, Carl
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.2 no.1
    • /
    • pp.18-23
    • /
    • 2006
  • The purpose of this study and report is to provide, to the MND, an independent cost analysis of modernizing software of F-16 fighter fleets to support the use of several weapon system options, including JDAM, AIM-9X and HARM Targeting System etc. The study analyzed each options with software sizing, software cost, enabling hardware cost, flight test cost, system engineering cost, and 3 strategies. And the study proposed and analyzed some alternative strategies: strategy1 is to modernize software only within existing electronic processing capability; strategy2 is a full upgrade of weapons avionics with plug compatible electronics; strategy3 is an approach defined to mirror the USAF Common Configuration Implementation Approach (CCIP). The recommended alternative is strategy2.

  • PDF

A Study on HILS for Performance Analysis of Airborne EOTS for Aircraft (항공기용 EOTS 성능분석을 위한 HILS시스템 구축에 관한 연구)

  • Chun, Seungwoo;Baek, Woonhyuk;La, Jongpil
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.55-64
    • /
    • 2013
  • In this paper, the HILS (Hardware In-the-Loop Simulation) system to analyze and to verify the performance of the targeting pod is addressed. The main functions of the targeting pod is acquiring and tracking targets to guide a LGB (Laser Guided Bomb) to the targets. For the analysis of targeting pod, the real time simulate images generation of IR and daylight cameras, sever control technology, and the analysis of laser transfer characteristics are necessary. For the real time image generation and the laser transfer characteristics analysis, off-the-shelf SDK(Software Development Kit) OKTAL-SE is used. For the servo controller, well-proven mechanism in the previous program is applied to increase servo control accuracy. To analyze the performance of a targeting pod in a realistic environment, 1553B, ARINK818 interface and etc. which are actually implemented in real combat aircrafts are applied in the system. By using the developed HILS system, the performance of currently operating targeting pods in real combat aircrafts can be analyzed and predicted. Additionally, the relationship between overall system performance and each module performance can be analyzed, the currently developed HILS system is expected to be a very useful tool to generate system development requirements of targeting pods and to reduce any possible future development risks.

Multidisciplinary Aircraft Wing Design Using the MDO Framework (MDO 프레임워크 개발을 통한 항공기 날개 통합최적화 설계)

  • Lee, Jae-Woo;Kim, Jong-Hwan;Jeang, Ju-Young;Jeon, Kwon-Su;Byun, Yung-Hwan
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.32 no.6
    • /
    • pp.23-33
    • /
    • 2004
  • MDO framework, which provides multidisciplinary system design and optimization environment, requires integration of the analyses codes developed at various computer languages and operating systems, integration of CAD and DBMS, and development of complex GUI. Emphases must be given to the software modification and upgrades in conjunction with the analysis code addition and MDO method implementation. In this study, techniques about system integration and analysis code interface have been studied extensively, and the database design and communication methods which can handle the MDO methods like MDF and CO have been studied. Using the dedicated MDO framework developed for the air vehicle design, the multidisciplinary fighter aircraft wing design has been performed to demonstrate the efficiency and usefulness of the software. Optimum wing configuration is derived using the gradient-based optimization methods within thirty design iterations.