• Title/Summary/Keyword: Advanced weapon systems

Search Result 99, Processing Time 0.027 seconds

The Applicability of Avionics Simulation Model Framework by Analyzing the Performance (항공용 시뮬레이션 모델 프레임워크 성능 분석을 통한 적용성 평가)

  • Seo, Min-gi;Cho, Yeon-je;Shin, Ju-chul;Baek, Gyong-hoon;Kim, Seong-woo
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.5
    • /
    • pp.336-343
    • /
    • 2021
  • Avionics corresponds to the brain, nerves and five senses of an aircraft, and consists of aircraft mounted electronic equipment of communication, identification, navigation, weapon, and display systems to perform flight and missions. It occupies about 50% of the aircraft system, and its importance is increasing as the technology based on the 4th industrial revolution is developed. As the development period of the aircraft is getting shorter, it is definitely necessary to develop a stable avionics SIL in a timely manner for the integration and verification of the avionics system. In this paper, we propose a method to replace the legacy SIL with the avionics simulation model framework based one and evaluate the framework based on the result of alternative application.

A Design of Risk-Based Security Threat Assessment Process for Fighter-Aircraft Airworthiness Security Certification (전투기 감항 보안 인증을 위한 위험기반 보안위협 평가 프로세스 설계)

  • Kim, Hyunju;Kang, Dongsu
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.6
    • /
    • pp.223-234
    • /
    • 2019
  • Cyber attacks are an important factor that determines the victory and defeat of Network-centric wars in which advanced weapon systems are highly interlinked. In addition the increasing dependability on software as its develop as the latest fighter is demanding enhanced security measures for fighter software to Cyber attacks. In this paper, we apply the DO-326A, which is an airworthiness security certification standard, to design a risk-based security threat assessment process by reflecting characteristics and operational environment of fighter aircraft. To do this, we add the following steps in security threat assessment stage of DO-326A's airworthiness security certification process. First, we derive security threats of fighter. And then, we scored the security threat in terms of possibility and impact on the fighter. Finally, we determine the security risk severity.

Automatic Test case Generation Mechanism from the Decision Table of Requirement Specification Techniques based on Metamodel (메타모델 기반 요구사항 명세 기법인 의사 결정표를 통한 자동 테스트 케이스 생성 메커니즘)

  • Hyun Seung Son
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.2
    • /
    • pp.228-234
    • /
    • 2023
  • As the increasing demand for high-quality software, there is huge requiring for quality certification of international standards, industrial functional safety (IEC 61508), automotive (ISO 26262), embedded software guidelines for weapon systems, etc., in the industry. Software companies are very difficult to systematically acquire the quality certification in terms of cost and manpower of Startup, venture small-sized companies. For their companies one test case automatic generation is considered as a core technique to evaluate or improve software quality. This paper proposes a test case automatic generation method based on the design decision table for system and software design verification. We apply the proposed method with OMG's standard techniques of metamodel and model transformation for automatically generating test cases. To do this, we design the metamodels of design decision table (Model) and test case document (Text) and define model transformation to automatically generate test cases, which will expect to easily work MC/DC coverage.

An Empirical Study on Defense Future Technology in Artificial Intelligence (인공지능 분야 국방 미래기술에 관한 실증연구)

  • Ahn, Jin-Woo;Noh, Sang-Woo;Kim, Tae-Hwan;Yun, Il-Woong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.409-416
    • /
    • 2020
  • Artificial intelligence, which is in the spotlight as the core driving force of the 4th industrial revolution, is expanding its scope to various industrial fields such as smart factories and autonomous driving with the development of high-performance hardware, big data, data processing technology, learning methods and algorithms. In the field of defense, as the security environment has changed due to decreasing defense budget, reducing military service resources, and universalizing unmanned combat systems, advanced countries are also conducting technical and policy research to incorporate artificial intelligence into their work by including recognition systems, decision support, simplification of the work processes, and efficient resource utilization. For this reason, the importance of technology-driven planning and investigation is also increasing to discover and research potential defense future technologies. In this study, based on the research data that was collected to derive future defense technologies, we analyzed the characteristic evaluation indicators for future technologies in the field of artificial intelligence and conducted empirical studies. The study results confirmed that in the future technologies of the defense AI field, the applicability of the weapon system and the economic ripple effect will show a significant relationship with the prospect.

The Study on the Education and Training for the Personnel in the Military Acquisition Field in US (미국 국방획득인력의 교육·훈련체계 및 관련동향)

  • Kim, Myunghyun;Lee, Youngwoo;Kim, Kyoungrok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.3
    • /
    • pp.223-229
    • /
    • 2020
  • The current technological advances are changing the way people live. In the history of war in the past, nations or people with an edge in military science and technology have always been the victor. The emergence of new technologies not only alters war patterns drastically but also affects military operational concepts and organizational systems. As the paradigm of the security environment changes, developed countries are investing heavily in defense R & D for their security. Therefore, the importance of professionalism of the defense acquisition personnel who perform their tasks from the exploration and development of weapon systems to mass production, deployment, and logistics support cannot be overemphasized. In the United States, an advanced country in this field, to improve the work efficiency of acquisition personnel in the defense field, the Directive of Ministry of Defense issued a law on education and training career development for personnel in 1990. The present study refers to related materials, such as the Desk Guide for the main education requirements for the US acquisition personnel in the military field, which contributes to the improvement of the workforce of the acquired manpower after the systematic education system.

South Korea's strategy to cope with local provocations by nuclear armed North Korea (핵위협하 국지도발 대비 대응전략 발전방향)

  • Kim, Tae-Woo
    • Strategy21
    • /
    • s.31
    • /
    • pp.57-84
    • /
    • 2013
  • North Korea's continuous threats and provocative behaviors have aggravated tension on the Korean peninsula particularly with the recent nuclear weapons test. South Korea's best way to cope with this situation is to maintain the balance among three policy directions: dialogue, sanctions, and deterrence. Among the three, I argue that deterrence should be prioritized. There are different sources of deterrence such as military power, economic power, and diplomatic clouts. States can build deterrence capability independently. Alternatively, they may do so through relations with other states including alliances, bilateral relations, or multilateral relations in the international community. What South Korea needs most urgently is to maintain deterrence against North Korea's local provocations through the enhancement of independent military capability particularly by addressing the asymmetric vulnerability between militaries of the South and the North. Most of all, the South Korean government should recognize the seriousness of the negative consequences that North Korea's 'Nuclear shadow strategy' would bring about for the inter-Korea relations and security situations in Northeast Asia. Based on this understanding, it should develop an 'assertive deterrence strategy' that emphasizes 'multi-purpose, multi-stage, and tailored deterrence whose main idea lies in punitive retaliation.' This deterrence strategy requires a flexible targeting policy and a variety of retaliatory measures capable of taking out all targets in North Korea. At the same time, the force structures of the army, the air force, and the navy should be improved in a way that maximizes their deterrence capability. For example, the army should work on expanding the guided missile command and the special forces command and reforming the reserve forces. The navy and the air force should increase striking capabilities including air-to-ground, ship-to-ground, and submarine-to-ground strikes to a great extent. The marine corps can enhance its deterrence capability by changing the force structure from the stationary defense-oriented one that would have to suffer some degree of troop attrition at the early stage of hostilities to the one that focuses on 'counteroffensive landing operations.' The government should continue efforts for defense reform in order to obtain these capabilities while building the 'Korean-style triad system' that consists of advanced air, ground, and surface/ subsurface weapon systems. Besides these measures, South Korea should start to acquire a minimum level of nuclear potential within the legal boundary that the international law defines. For this, South Korea should withdraw from the Nuclear Non-proliferation Treaty. Moreover, it should obtain the right to process and enrich uranium through changing the U.S.-South Korea nuclear cooperation treaty. Whether or not we should be armed with nuclear weapons should not be understood in terms of "all or nothing." We should consider an 'in-between' option as the Japanese case proves. With regard to the wartime OPCON transition, we need to re-consider the timing of the transition as an effort to demonstrate the costliness of North Korea's provocative behaviors. If impossible, South Korea should take measures to make the Strategic Alliance 2015 serve as a persisting deterrence system against North Korea. As the last point, all the following governments of South Korea should keep in mind that continuing reconciliatory efforts should always be pursued along with other security policies toward North Korea.

  • PDF

Suggestion for the Enhancement of Military Supplies via Segregation of Defense Quality Management System (국방 분야 품질경영시스템 세분화를 통한 군수품 품질향상 방안)

  • Ju, Jin-Chun;Kim, Sung-kon;Lee, Jong-chan;Ahn, Nam-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.251-261
    • /
    • 2016
  • Recently, many weapon related quality issues have arisen in the armed forces, such as failures of K-21 Infantry Fighting Vehicles, K-9 self-propelled mounts, and grenade explosion during boot training. Since all of the issues are repetitive phenomena, we examined the defense quality management system and identified the possible solutions for it. Since the government quality assurance agency performs their quality assurance activity using the system evaluation technique, we first reviewed the regulations related to the defense quality management system. Then, we benchmarked some other advanced quality management systems. We suggested two types of defense quality management system, one for small (in terms of the amount of the contract) competitive contracts and the other for large private contracts. For the first one, we adopted the framework of MIL-I-45208 (Inspection System Requirement), while for the second one, we adopted the framework of NATO AQAP 2310 (Quality Management System Requirements for Aviation, Space and Defense Suppliers).

A Study on the international legality issues of armed attack by drone (무인항공기의 무력공격을 둘러싼 국제법상 쟁점에 관한 연구)

  • Shin, Hong-Kyun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.28 no.2
    • /
    • pp.37-61
    • /
    • 2013
  • In modern international law, the absence of legal definition regarding drone(Unmanned Aerial Vehicle) has made legal scholars work on an typical analogy between aircraft codified in the international document and drone. The wording of the Convention on International Civil Aviation is limited to two categories of aircraft, such as civil aircraft and state aircraft, whereas military aircraft is not legally defined. As such it is, the current practices of the State regarding the drone flight over foreign territory have proven a hypothese that drone is being deemed as military aircraft. Principal usage of drone lies in reconnaissance and surveillance mission as well as so-called targeted killing, which is prohibited if the killing is treacherous. Claimed war against terrorism, however, is providing a legal rationale that targeted killing is not treacherous, and that the targeted person is not civilian but combatant. In such context, armed attack of drone is deemed legal and justified. Consequently, such attack is legal in the general context of the war. The rules that govern targeting do not turn on the type of weapon system used, and there is no prohibition under the laws of war on the use of technologically advanced weapons systems in armed conflict so long as they are employed in conformity with applicable laws of war. Drones may present interesting new challenges because of their sophistication and the technological advantage they convey to their operators.

  • PDF

CIA-Level Driven Secure SDLC Framework for Integrating Security into SDLC Process (CIA-Level 기반 보안내재화 개발 프레임워크)

  • Kang, Sooyoung;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.909-928
    • /
    • 2020
  • From the early 1970s, the US government began to recognize that penetration testing could not assure the security quality of products. Results of penetration testing such as identified vulnerabilities and faults can be varied depending on the capabilities of the team. In other words none of penetration team can assure that "vulnerabilities are not found" is not equal to "product does not have any vulnerabilities". So the U.S. government realized that in order to improve the security quality of products, the development process itself should be managed systematically and strictly. Therefore, the US government began to publish various standards related to the development methodology and evaluation procurement system embedding "security-by-design" concept from the 1980s. Security-by-design means reducing product's complexity by considering security from the initial phase of development lifecycle such as the product requirements analysis and design phase to achieve trustworthiness of product ultimately. Since then, the security-by-design concept has been spread to the private sector since 2002 in the name of Secure SDLC by Microsoft and IBM, and is currently being used in various fields such as automotive and advanced weapon systems. However, the problem is that it is not easy to implement in the actual field because the standard or guidelines related to Secure SDLC contain only abstract and declarative contents. Therefore, in this paper, we present the new framework in order to specify the level of Secure SDLC desired by enterprises. Our proposed CIA (functional Correctness, safety Integrity, security Assurance)-level-based security-by-design framework combines the evidence-based security approach with the existing Secure SDLC. Using our methodology, first we can quantitatively show gap of Secure SDLC process level between competitor and the company. Second, it is very useful when you want to build Secure SDLC in the actual field because you can easily derive detailed activities and documents to build the desired level of Secure SDLC.