• Title/Summary/Keyword: Battlefield Environment

Search Result 119, Processing Time 0.027 seconds

Environmental Data Management and Supply Plan for Building Synthetic Battlefield Environment of Air Combat Simulation (항공 전투 시뮬레이션의 합성전장환경 구축을 위한 환경 데이터 관리 및 공급 방안)

  • Yang, Ka-Ram;Hwam, Won K.;Park, Sang C.
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.3
    • /
    • pp.7-14
    • /
    • 2013
  • In this paper, there is a research for providing environmental data to reflect environmental effects to the simulation for the aviation weapon systems by the construction of the synthetic battlefield. The results of the aviation engagement simulation are able to differ by environmental effect. This paper analyzes the real aviation battlefield and designs the synthetic battlefield based on the analysis. In order to construct the designed synthetic battlefield, we collects the real environmental data for the atmosphere and structures the collected data using GIS (Geographic information system interpolation). The main objective of this paper is to design the synthetic battlefield based on the derived environmental factors from the analysis of the real aviation battlefield, and it constructs the designed synthetic battlefield by the collection of real atmosphere data. The constructed synthetic battlefield provides the environmental data which are requested from the distributed simulation system, and it makes the system reflect environmental effects to the simulation.

A Study on Optimized Plan for Mass Acquisition and Processing of Battlefield Information (전장 정보의 대량 획득과 처리를 위한 최적화 방안 연구)

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Shin, Hyo-Young;Park, Ho-Kyun;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.45-50
    • /
    • 2013
  • The future warfare will universalize the operation of a combined weapon system that utilizes this technology and create an operational environment that is centered on a network requiring a high level of interoperability between combat elements as well as a high level of operation speed. In this kind of operational environment, future combat will take on the aspects of network centric warfare, which is capable of realizing a real-time sensor to shooter cycle by horizontally connecting operation elements. Therefore, the study attempts to draw out a Korean measurement plan concerning battlefield environment changes in the future by investigating and analyzing all problems occurring during the mass acquisition and processing of battlefield information in battlefield situations of network centric warfare currently conducted by the US military in Afghanistan and Iraq.

Study of Development for Distributed Battlefield Simulation Environment : One-to-One Single Unit Engagement Model (분산전장 모의환경 구축 방법에 대한 연구 : 단일부대 1:1 교전모델 개발)

  • Choi, Jeongseok;Moon, Sunghwan;Kim, Taeyoung;Kim, Jaekwon;Lee, Jongsik
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.4
    • /
    • pp.69-76
    • /
    • 2015
  • Modern warfare, which adopt an intensive technique of applied sciences, is difficult to predict, and has a high complexity. Thus, it is necessary to build a battle-field environment and simulation-based analysis. Various organizations are participated to build battlefield model for defense M&S according to a scale and format. On the basis of this trend, approaching from various systems is needed to reconfigure battlefield modeling for distributed system. This paper proposes building design for battlefield simulation environment with a sample of one-to-one single unit engagement model. The proposed method can expect to utilize an example of distributed environment for various participants that are involved in battlefield modeling and simulation.

Cooperative Multi-agent Reinforcement Learning on Sparse Reward Battlefield Environment using QMIX and RND in Ray RLlib

  • Minkyoung Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.11-19
    • /
    • 2024
  • Multi-agent systems can be utilized in various real-world cooperative environments such as battlefield engagements and unmanned transport vehicles. In the context of battlefield engagements, where dense reward design faces challenges due to limited domain knowledge, it is crucial to consider situations that are learned through explicit sparse rewards. This paper explores the collaborative potential among allied agents in a battlefield scenario. Utilizing the Multi-Robot Warehouse Environment(RWARE) as a sparse reward environment, we define analogous problems and establish evaluation criteria. Constructing a learning environment with the QMIX algorithm from the reinforcement learning library Ray RLlib, we enhance the Agent Network of QMIX and integrate Random Network Distillation(RND). This enables the extraction of patterns and temporal features from partial observations of agents, confirming the potential for improving the acquisition of sparse reward experiences through intrinsic rewards.

Research on Cyber IPB Visualization Method based on BGP Archive Data for Cyber Situation Awareness

  • Youn, Jaepil;Oh, Haengrok;Kang, Jiwon;Shin, Dongkyoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.749-766
    • /
    • 2021
  • Cyber powers around the world are conducting cyber information-gathering activities in cyberspace, a global domain within the Internet-based information environment. Accordingly, it is imperative to obtain the latest information through the cyber intelligence preparation of the battlefield (IPB) process to prepare for future cyber operations. Research utilizing the cyber battlefield visualization method for effective cyber IPB and situation awareness aims to minimize uncertainty in the cyber battlefield and enable command control and determination by commanders. This paper designed architecture by classifying cyberspace into a physical, logical network layer and cyber persona layer to visualize the cyber battlefield using BGP archive data, which is comprised of BGP connection information data of routers around the world. To implement the architecture, BGP archive data was analyzed and pre-processed, and cyberspace was implemented in the form of a Di-Graph. Information products that can be obtained through visualization were classified for each layer of the cyberspace, and a visualization method was proposed for performing cyber IPB. Through this, we analyzed actual North Korea's BGP and OSINT data to implement North Korea's cyber battlefield centered on the Internet network in the form of a prototype. In the future, we will implement a prototype architecture based on Elastic Stack.

Lightweight Key Escrow Scheme for Internet of Battlefield Things Environment (사물인터넷 환경을 위한 경량화 키 위탁 기법)

  • Tuan, Vu Quoc;Lee, Minwoo;Lim, Jaesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.12
    • /
    • pp.1863-1871
    • /
    • 2022
  • In the era of Fourth Industrial Revolution, secure networking technology is playing an essential role in the defense weapon systems. Encryption technology is used for information security. The safety of cryptographic technology, according to Kerchoff's principles, is based on secure key management of cryptographic technology, not on cryptographic algorithms. However, traditional centralized key management is one of the problematic issues in battlefield environments since the frequent movement of the forces and the time-varying quality of tactical networks. Alternatively, the system resources of each node used in the IoBT(Internet of Battlefield Things) environment are limited in size, capacity, and performance, so a lightweight key management system with less computation and complexity is needed than a conventional key management algorithm. This paper proposes a novel key escrow scheme in a lightweight manner for the IoBT environment. The safety and performance of the proposed technique are verified through numerical analysis and simulations.

A Study on the Factors Affecting the Use of the Military Battlefield Management System in the Non-voluntary Use Environment

  • Cho, Jungik;Ahn, Hyunchul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.101-116
    • /
    • 2019
  • In this paper, we propose a novel behavioral model that explains the use of the military battlefield management system more effectively in the non-voluntary use environment. This study intends to suggest a model based on the Unified Theory of Acceptance and Use of Technology(UTAUT), an extended TAM. Also, it introduces the concept of 'Conative IS use' as a dependent variable that can explain user's behavior more effectively in non-voluntary technology acceptance environment. In addition, we propose the major factors affecting the UTAUT components from the TOE(Technology-Organization-Environment) perspectives, and analyze their effects. In order to validate the proposed model, this study applies PLS(Partial Least Squares) to the survey collected from military personnel. The findings of our study may shed a light on improving the effectiveness of battlefield management information system.

Information Delivery Scheme by Using DTN in Battlefield Eenvironment (전장 환경에서 DTN을 이용한 정보전달기법)

  • Kim, Young-An
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3B
    • /
    • pp.260-267
    • /
    • 2011
  • Wireless Local Area Network (WLAN) is recently become popular on the internet since we can download and transfer mass data through it. However, transferring data with distances over 100m often causes some troubles. When downloading mass data from moving vehicles such as cars, jeeps, tanks, etc., if the download process from the first AP (Access Point) is not completed then we have to re-start this process from the second AP (from 0%). Therefore, the question is how to maintain the data we have received from the first AP, and then continuously download remaining data from the next APs in a battlefield environment. In this paper, we propose an effective method for receiving mass data separately from the mobile receive nodes in a Delay Tolerant Network (DTN). We carried on an experiment and evaluation by simulation; these simulation results are provided to show the proposed information delivery scheme performance.

A Study on Operational Element Identification and Integrated Time Series Analysis for Cyber Battlefield Recognition (사이버 전장인식을 위한 작전상태 요소 식별 및 통합 시계열 분석 연구)

  • Son-yong Kim;Koo-hyung Kwon;Hyun-jin Lee;Jae-yeon Lee;Jang-hyuk Kauh;Haeng-rok Oh
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.65-73
    • /
    • 2022
  • Since cyber operations are performed in a virtual cyber battlefield, the measurement indicators that can evaluate and visualize the current state of the cyber environment in a consistent form are required for the commander to effectively support the decision-making of cyber operations. In this paper, we propose a method to define various evaluation indicators that can be collected on the cyber battlefield, normalized them, and evaluate the cyber status in a consistent form. The proposed cyber battlefield status element consists of cyber asset-related indicators, target network-related indicators, and cyber threat-related indicators. Each indicator has 6 sub-indicators and can be used by assigning weights according to the commander's interests. The overall status of the cyber battlefield can be easily recognized because the measured indicators are visualized in time series on a single screen. Therefore, the proposed method can be used for the situational awareness required to effectively conduct cyber warfare.

Design of the homomorphic encryption system for secure data management in the future battlefield environment (미래 전장환경에서 안전한 데이터 관리를 위한 준동형 시스템 설계)

  • Cha, HyunJong;Kim, JinMook;Ryou, HwangBin
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.51-56
    • /
    • 2014
  • Be expressed in network-centric warfare, mainly battlefield environment of the future. The purpose of the system for the war of the future, is to recognize the enemy before the enemy, and rapid decision-making, to hit accurately. For this reason, it is during the construction of the integrated system of C4ISR+PGM. In such an integrated system, it is necessary to further enhance the security aspects of the information. In particular, strengthening of security leads to a decrease of efficiency. Therefore, security and efficiency should be considered together. In this study, we provide a homomorphic encryption system that can be safely managed information environment on the battlefield of the future. The proposed method uses encryption technology of homomorphic that can be the arithmetic operations on encrypted state. It has changed from the state of the encryption. Therefore, the attacker can not know a decent information.