• Title/Summary/Keyword: Battlefield environments

Search Result 34, Processing Time 0.025 seconds

An Efficient Key Management Scheme in Tactical Ad-Hoc Network (전술 Ad-hoc 네트워크에서의 효율적인 키 관리 기법)

  • Kim, Eun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.3
    • /
    • pp.317-324
    • /
    • 2009
  • Tactical Information Communication Network(TICN) uses both a wireless and wired network. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. However, Ad-hoc network is faced to many security threats due to its intrinsic characteristics. Therefore, to apply the Ad-hoc networking technology to battlefield environments and TICN, an intensive study on security countermeasure must go side by side with the development of enabling technology. In this paper, we suggest an efficient key management scheme for TICN of which the Ad-hoc networking technology is applied.

Lightweight Key Escrow Scheme for Internet of Battlefield Things Environment (사물인터넷 환경을 위한 경량화 키 위탁 기법)

  • Tuan, Vu Quoc;Lee, Minwoo;Lim, Jaesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.12
    • /
    • pp.1863-1871
    • /
    • 2022
  • In the era of Fourth Industrial Revolution, secure networking technology is playing an essential role in the defense weapon systems. Encryption technology is used for information security. The safety of cryptographic technology, according to Kerchoff's principles, is based on secure key management of cryptographic technology, not on cryptographic algorithms. However, traditional centralized key management is one of the problematic issues in battlefield environments since the frequent movement of the forces and the time-varying quality of tactical networks. Alternatively, the system resources of each node used in the IoBT(Internet of Battlefield Things) environment are limited in size, capacity, and performance, so a lightweight key management system with less computation and complexity is needed than a conventional key management algorithm. This paper proposes a novel key escrow scheme in a lightweight manner for the IoBT environment. The safety and performance of the proposed technique are verified through numerical analysis and simulations.

Cooperative Multi-agent Reinforcement Learning on Sparse Reward Battlefield Environment using QMIX and RND in Ray RLlib

  • Minkyoung Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.11-19
    • /
    • 2024
  • Multi-agent systems can be utilized in various real-world cooperative environments such as battlefield engagements and unmanned transport vehicles. In the context of battlefield engagements, where dense reward design faces challenges due to limited domain knowledge, it is crucial to consider situations that are learned through explicit sparse rewards. This paper explores the collaborative potential among allied agents in a battlefield scenario. Utilizing the Multi-Robot Warehouse Environment(RWARE) as a sparse reward environment, we define analogous problems and establish evaluation criteria. Constructing a learning environment with the QMIX algorithm from the reinforcement learning library Ray RLlib, we enhance the Agent Network of QMIX and integrate Random Network Distillation(RND). This enables the extraction of patterns and temporal features from partial observations of agents, confirming the potential for improving the acquisition of sparse reward experiences through intrinsic rewards.

Development Trends of Defense Science and Technology based on the 4th Industrial Revolution (제4차 산업혁명 기반의 국방과학기술 개발 동향)

  • Jeong, Y.H.;Kim, S.N.;Park, H.S.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.6
    • /
    • pp.56-67
    • /
    • 2020
  • The core technologies of the 4th Industrial Revolution, such as artificial intelligence, the Internet of Things, the cloud, big data, and mobile networks, are inspiring major changes and innovations in the defense sector worldwide. The United States, China, and Russia are pursuing defense research and development strategies that seek to maintain their leadership on the battlefield in the future through the overwhelming superiority of defense science technology. Defense science and technology concentrate on the development of challenging new disruptive technologies to efficiently respond to future battlefield environments, where the immediate process of determining the outcome of a war will lead to combat power. In this paper, we first look at the development strategies of the 4th Industrial Revolution in major countries and describe the latest trends in defense science and technology accordingly.

A Study on Lanchester Type Combat Models for Heterogeneous Forces with Terrain Coefficient (지형계수를 고려한 Lanchester형 이질부대 전투모형연구)

  • 신희래;김충영
    • Journal of the military operations research society of Korea
    • /
    • v.26 no.1
    • /
    • pp.1-14
    • /
    • 2000
  • This research studies an attrition rate considering terrain feature in a battlefield. Lanchester-type combat models for heterogeneous forces and the Weapon Effectiveness Index are used in this study. The various environments of the battlefield can be explained by the terrain feature. Attrition rates of heterogeneous model are estimated by applying the battle of Baek-Sek mountain during the Korean War. Estimated attrition rates are checked by the paired samples T-Test. Specific cases are shown in this paper as an example. If we study out the relative influence of the terrain feature upon the performance of individual weapons, these will be a possible alternative to analyze the military operations.

  • PDF

A Wireless Location-Based Routing Algorithm in Multi-User Game Environments

  • Lee, Jong-Min;Kim, Seong-Woo;Lee, Jung-Hwa
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1733-1740
    • /
    • 2007
  • In this paper, we propose a wireless location-based routing algorithm which uses the location information of its neighbor nodes and a destination node. At first, the proposed routing algorithm forwards a packet to the X direction by selecting a closest node to its destination as a next hop in terms of the X coordinate until the packet reaches closely to the packet's destination. Then the packet is forwarded to the Y direction by selecting a closest node to its destination in terms of the Y coordinate. We use a back off mechanism in case that a next hop cannot be found using the proposed routing algorithm, which resolves loops while forwarding. The experimental results show that the proposed routing algorithm performs well like the existing routing algorithms Ad hoc On-demand Distance Vector and Greedy Perimeter Stateless Routing. It is expected to use the proposed routing algorithm in the digital battlefield of military environments and survival games of commercial environments.

  • PDF

Study on the Vulnerabilities of Automatic Speech Recognition Models in Military Environments (군사적 환경에서 음성인식 모델의 취약성에 관한 연구)

  • Elim Won;Seongjung Na;Youngjin Ko
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.201-207
    • /
    • 2024
  • Voice is a critical element of human communication, and the development of speech recognition models is one of the significant achievements in artificial intelligence, which has recently been applied in various aspects of human life. The application of speech recognition models in the military field is also inevitable. However, before artificial intelligence models can be applied in the military, it is necessary to research their vulnerabilities. In this study, we evaluates the military applicability of the multilingual speech recognition model "Whisper" by examining its vulnerabilities to battlefield noise, white noise, and adversarial attacks. In experiments involving battlefield noise, Whisper showed significant performance degradation with an average Character Error Rate (CER) of 72.4%, indicating difficulties in military applications. In experiments with white noise, Whisper was robust to low-intensity noise but showed performance degradation under high-intensity noise. Adversarial attack experiments revealed vulnerabilities at specific epsilon values. Therefore, the Whisper model requires improvements through fine-tuning, adversarial training, and other methods.

Data Abstraction in Battlefield Smart Maps Based on QR Tags (QR 태그 기반 전장 스마트 지도에서의 자료 추상화)

  • Kwak, Noh Sup;Yun, Young-Sun;Jung, Jinman;So, Sun Sup;Eun, Seongbae
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.3
    • /
    • pp.440-446
    • /
    • 2020
  • The application field of smart terminals is increasing and its application is also spreading in the defense field. The use of smart terminal based map application is very important in battle fields. The problem is that the communication infrastructure is easy to collapse and the use of GPS is usually disturbed. In this paper, we studied the maps stored in the QR tag at the battle field. The problem is to abstract the map information so that it can be stored in the small QR tag. We have abstracted path information on a vector basis and require only a small amount of data compared to imaged path information. We analyzed the amount of data generated by the abstraction and mathematically analyzed the boundary where the amount does not exceed the capacity limit of the QR tag. Our research can be applied not only to battlefields, but also to disaster / disaster scenes, or in environments with difficult Internet communications, such as mountainous areas.

Firing Data Calculation Algorithm for Smart Weapon System Under Non-standard Conditions (스마트무장 비 표준조건 사격제원 산출 알고리즘)

  • Moon, Kyujin;Jeong, Ui-Taek;Lee, Yongseon;Choi, Sungho;Ryoo, Chang-Kyung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.50 no.4
    • /
    • pp.233-240
    • /
    • 2022
  • The smart weapon system is a new weapon system of the future battlefield environment as a miniature guided weapon that performs precision strike missions through terminal phase guidance. However, it has small coverage to guide due to its low maneuverability because the smart weapon is controlled by using actuator of piezoelectric drive type due to the structural limitations. In this paper, we propose a firing data calculation algorithm under non-standard conditions to increase the effectiveness of the smart weapon. The proposed algorithm calculates firing data under non-standard conditions by calibrating firing data under standard conditions using information acquired in battlefield environments. The performance of the proposed algorithm is verified by numerical simulations under various conditions.

Development of the Power Assist System for High Efficiency and Lightweight Wearable Robot in Unstructured Battlefield (비정형화된 전장 환경에 활용 가능한 고효율-경량형 외골격 착용 로봇의 근력 보조 시스템 개발)

  • Huichang Park
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.4
    • /
    • pp.313-323
    • /
    • 2023
  • The wearable robot system is designed to assist human skeletal and muscular systems for enhancing user's abilities in various fields, including medical, industrial, and military. The military has an expanding need for wearable robots with the integration of surveillance/control systems and advanced equipment in unstructured battlefield environments. However, there is a lack of research on the design and mechanism of wearable robots, especially for power assist systems. This study proposes a lightweight wearable robot system that provides comfortable wear and muscle support effects in various movements for soldiers performing high-strength and endurance missions. The Power assist mechanism is described and verified, and the tasks that require power assist are analyzed. This study explain the system including its driving mechanism, control system, and mechanical design. Finally, the performance of the robot is verified through experiments and evaluations, demonstrating its effectiveness in muscle support.