• 제목/요약/키워드: Command and control (C2)

검색결과 85건 처리시간 0.023초

대공무기체계 표적거리예측 알고리즘 성능향상에 관한 연구 (A Study on Performance Improvement of Distance Estimation Algorithm for Anti-Aircraft Weapon System)

  • 서승범;김영길
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2017년도 추계학술대회
    • /
    • pp.235-237
    • /
    • 2017
  • 전투무선망을 통해 방공C2A 체계로부터 전송되는 표적거리는 전투무성망의 여러 가지 특성으로 인해 오차가 발생한다. 본 논문에서는 칼만필터를 이용한 거리추정 알고리즘의 성능을 향상 시켜 오차를 최소화할 수 있는 방법을 제안한다.

  • PDF

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • 제12권4호
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

가속기 저장링 진공 챔버 온도측정용 제어시스템 개발 및 EPICS 적용 (EPICS Based Vacuum Chamber Temperature Control System for PAL Storage Ring)

  • 윤종철;최진혁;강흥식
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 제36회 하계학술대회 논문집 D
    • /
    • pp.2652-2654
    • /
    • 2005
  • A vacuum chamber temperature control system of Pohang Accelerator Laboratory (PAL) storage ring is a subsystem upgraded PAL control system, which is based upon Experimental Physics and Industrial Control System (EPICS) [1]. There are two control components, data acquisition system (SA120 data logger), development control system IOC (Input/Output Controller) at the storage ring of PAL. There are 240 vacuum chamber at the storage ring. It was a very important problem to solve how to monitor such a large number of vacuum chamber temperature distributed around the ring. The IOC connect MODBUS/JBUS field network to asynchronous serial ports for communication with serial device. It can simultaneously control up to 4 data acquisition systems. Upon receiving a command from a IOC running under Windows2k through the network, the IOC communicate through the slave serial interface ports to SA120. We added some software components on the top of EPICS toolkit. The design of the vacuum control system is discussed. This paper describes the development vacuum chamber temperature control system and how the design of this system.

  • PDF

DNS Response Policy Zone 을 이용한 DNS 싱크홀 운영 방안 연구 (A Study on DNS sinkhole operation using DNS Response Policy Zone)

  • 최재영;오상석;민성기
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 춘계학술발표대회
    • /
    • pp.1528-1531
    • /
    • 2011
  • 최근 악성봇은 해커에 의해 원격 조정되어 명령에 의해 스팸메일 발송, DDoS 공격 등의 악성행위를 수행하는 웜/바이러스이다[2]. 악성봇은 이전의 웜/바이러스와 달리 금전적인 이득을 목적으로 하는 것이 많아 작게는 일상생활의 불편함으로부터 크게는 사회적, 국가적으로 악영향을 주고 있다. 국내에서는 이러한 위험을 방어하기 위한 효과적인 대응 방법으로 DNS 싱크홀을 운영 하고 있다. 본 논문에서는 DNS 싱크홀 운영 중 수집한 봇 명령/제어 (Command and Control, C&C) 도메인을 Internet Service Provider (ISP) DNS 싱크홀 시스템에 적용하는 과정에서 나타나는 문제점을 효과적으로 해결 하기 위한 DNS Response Policy Zone(RPZ)을 이용한 DNS 싱크홀 운영 방안을 제시 하였다.

모터제어센터의 효율적인 운영을 위한 실시간 관리 시스템의 설계 및 구현 (Design and Implementation of Real-Time Management System for Efficient Operation of Motor Control Center)

  • 이태오
    • 한국정보통신학회논문지
    • /
    • 제12권2호
    • /
    • pp.247-253
    • /
    • 2008
  • 본 논문은 모터제어센터의 감시와 제어를 통한 효율적인 운영을 위한 실시간 관리 시스템의 설계 및 구현에 대해서 논한다. 실시간 관리 시스템은 하드웨어(MCC 판넬)와 소프트웨어(관리 프로그램)로 나눌 수 있다. 첫 번째, 하드웨어는 모터가 부착된 부하부분과 제어와 데이터 네트워크를 운용할 수 있는 MCC 구성요소 이다. 두 번째, 관리 프로그램은 통신인터페이스, 환경설정, 데이터의 처리 부분으로 구성되어 있다. 제작 구현된 MCC 판넬의 축소형 모델은 m-PRO, iM-PRO 디바이스, 하이퍼터미널을 이용하여 사전 테스트하였다. 그리고 필드 테스트를 위하여 MCC 판넬은 RS-232C/485를 이용하여 테스트하였고, 관리 시스템의 통신 절차는 제어 명령을 이용하여 메시지를 송 수신하여 확인 하였다. 실험 결과, 구현한 실시간 관리 시스템은 MCC 시스템을 효과적으로 운영하는데 이용할 수 있다.

Implementation of Data Storage Media Control and Command(DSM-CC) Core User-to-User Interface for MPEG-2 Bit Stream Transport

  • Park, Seong-Jong;Kim, Yong-Han;Kim, Jae-Woo;Lee, Ho-Jang;Shim, Jae-Kyu;Kim, Jae-D.;Koh, Jong-Seong
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송공학회 1998년도 Proceedings of International Workshop on Advanced Image Technology
    • /
    • pp.79-84
    • /
    • 1998
  • This paper describes implementation of the core DSM-CC UU interface. It briefly describes the reference model for the DSM-CC and related standards that should be reviewed for the implementation. The Common Object Request Broker Architechture, Revision 2.0 (CORBA 2.0) is sued as a remote procedure call (RPC) scheme for the UU Interface. Entire system was implemented with C++ on Windows NT platforms. The implementation procedure has been decomposed ito two tasks. The first task is to implement the Naming Service for service navigation. The Naming Service is one of the CORBA Services that extend the core CORBA specification. A client GUI is implemented for easy navigation among various services. The second task is to construct multimedia server and client for a Video-on-Demand (VoD) system. MPEG-2 Transport Stream is transported via ATM AAL5 using the Windows Socket 2.2 ATM extension API. A GUI enables the user to navigate the service domain and select a program. After the selection the user can control the MPEG-2 stream with VCR-like buttons.

  • PDF

Development of the Command and Data Handling System and Flight Software of BITSE

  • Park, Jongyeob;Baek, Ji-Hye;Jang, Bi-ho;Choi, Seonghwan;Kim, Jihun;Yang, Heesu;Kim, Jinhyun;Kim, Yeon-Han;Cho, Kyung-Suk;Swinski, Joseph-Paul A.;Nguyen, Hanson;Newmark, Jeffrey S.;Gopalswamy, Natchumuthuk
    • 천문학회보
    • /
    • 제44권2호
    • /
    • pp.57.4-57.4
    • /
    • 2019
  • BITSE is a project of balloon-borne experiments for a next-generation solar coronagraph developed by a collaboration with KASI and NASA. The coronagraph is built to observe the linearly polarized brightness of solar corona with a polarization camera, a filter wheel, and an aperture door. For the observation, the coronagraph is supported by the power distribution unit (PDU), a pointing system WASP (Wallops Arc-Second Pointer), telemetry & telecommand system SIP (Support Instrument Package) which are developed at NASA's Goddard Space Flight Center, Wallops Flight Facility, and Columbia Scientific Balloon Facility. The BITSE Command and Data Handling (C&DH) system used a cost-off-the-shelf electronics to process all data sent and received by the coronagraph, including the support system operation by RS232/422, USB3, Ethernet, and digital and analog signals. The flight software is developed using the core Flight System (cFS) which is a reusable software framework and set of reusable software applications which take advantage of a rich heritage of successful space mission of NASA. The flight software can process encoding and decoding data, control the subsystems, and provide observation autonomy. We developed a python-based testing framework to improve software reliability. The flight software development is one of the crucial contributions of KASI and an important milestone for the next project which is developing a solar coronagraph to be installed at International Space Station.

  • PDF

회생전력 제어용 인버터 시스템의 구현에 관한 연구 (A Study on the Implementation of Inverter Systems for Regenerated Power Control)

  • 金 敬 源;徐 永 泯;洪 淳 瓚
    • 전력전자학회논문지
    • /
    • 제7권2호
    • /
    • pp.205-213
    • /
    • 2002
  • 본 논문에서는 직류모선에서 교류모선으로 회생되는 전력을 제어할 수 있는 3상 전압원 인버터 시스템을 구현하였다. 전체 시스템은 선간접압 및 선전류용 센서, d-q 변환방식을 사용한 실제전력 연산기. PI제어기법을 적용한 복소전력 제어기, 수정 q도통방식을 구현하기 위한 게이팅신호 생성기, 주파수를 추종하기 위한 DPLL과 전력회로로 구성된다. 제어보드는 32비트 DSP인 TMS32C32, EFLD 2개, ACD 6개와 DAC로 구성하였다. 제안한 시스템의 성능을 검증하기 위해 교류 220V에서 5kVA 전력용량인 축소모델을 설계, 제작하였다. 실험결과, 회생 유효전력은 명령값으로 잘 제어되며 회생 무효전력은 운전동안 내내 거의 0의 값을 유지함을 확인하였다.

전장 정보체계의 전투력 상승효과 측정을 위한 새로운 MOE 제안 (A proposal of new MOE to assess the combat power synergistic effect of warfare information system.)

  • 이용복;김용흡;이재영
    • 한국경영과학회:학술대회논문집
    • /
    • 한국경영과학회 2008년도 추계학술대회 및 정기총회
    • /
    • pp.104-112
    • /
    • 2008
  • In modern war information system development makes battlefield materialize, and combat factors can maximize combat power exhibition as that apply synchronization. Information system is the core of combat power operation under NCW(Network centric Warfare). This paper proposed a new MOE(Measure of Effectiveness) that can assess the combat power synergistic effect of information system at the theater joint fire operation in NCW environment. This methodology applied the rule of Newton's second law $F=(m{\Delta}{\upsilon})/t{\Rightarrow}(M{\upsilon}I)/T$) Details factor in combat power evaluation is as following. (1) M : Network power; (2) v : Movement velocity; (3) I : Information superiority; (4) T : C2(command and control) time. We applied this methodology to the "JFOS-K(Joint Fire Operating System-Korea) in Joint Chief of Staff" in the real military affair section.

  • PDF

Development of a Novel Direct-Drive Tubular Linear Brushless Permanent-Magnet Motor

  • Kim, Won-jong;Bryan C. Murphy
    • International Journal of Control, Automation, and Systems
    • /
    • 제2권3호
    • /
    • pp.279-288
    • /
    • 2004
  • This paper presents a novel design for a tubular linear brushless permanent-magnet motor. In this design, the magnets in the moving part are oriented in an NS-NS―SN-SN fashion which leads to higher magnetic force near the like-pole region. An analytical methodology to calculate the motor force and to size the actuator was developed. The linear motor is operated in conjunction with a position sensor, three power amplifiers, and a controller to form a complete solution for controlled precision actuation. Real-time digital controllers enhanced the dynamic performance of the motor, and gain scheduling reduced the effects of a nonlinear dead band. In its current state, the motor has a rise time of 30 ms, a settling time of 60 ms, and 25% overshoot to a 5-mm step command. The motor has a maximum speed of 1.5 m/s and acceleration up to 10 g. It has a 10-cm travel range and 26-N maximum pull-out force. The compact size of the motor suggests it could be used in robotic applications requiring moderate force and precision, such as robotic-gripper positioning or actuation. The moving part of the motor can extend significantly beyond its fixed support base. This reaching ability makes it useful in applications requiring a small, direct-drive actuator, which is required to extend into a spatially constrained environment.