• 제목/요약/키워드: Data Link Message

검색결과 89건 처리시간 0.025초

다중 전술데이터링크 운용에 따른 데이터 루핑 방지 방안 (A Method For Preventing Data Looping in Multi Tactical Datalink Operation)

  • 우순;임재성
    • 한국군사과학기술학회지
    • /
    • 제16권3호
    • /
    • pp.314-321
    • /
    • 2013
  • In this paper, we have proposed a method which can prevent data looping in multi tactical data-link operating situation. Because the situation of multi tactical data-link in Korea would be more complex than ever before, data looping is more likely to be happened. To prevent data looping, forwarder has to manage TQ(Track Quality) in forwarded track message by degrading it to enlarge correlation gate. Forwarder also has to discard useless track message which can be determined by minimum TQ value. To decide optimal formula for forwarder to degrade TQ and to determine minimum TQ, a research about track motion, correlation, TQ managing, etc in real system is necessary.

무장데이터링크 메시지를 이용한 기동표적 타격평가 연구 (Study of the Bomb Hit Indication of Moving Target Using Weapon Data Link Message)

  • 백인혜;우상효;김기범
    • 한국군사과학기술학회지
    • /
    • 제24권2호
    • /
    • pp.187-196
    • /
    • 2021
  • The Network-Centric warfare over weapon data link networks has been developed for the recent decade. Since the US navy had begun to develop tactical digital information chain, it has gradually transformed into weapon data link technology. As data link network system and its protocol have been advanced into high-technology, focusing and targeting on moving targets become possible in net-enabled environments. However, it is difficult to identify the primary information from numerous battlefields and understanding approaches to damage a target in a timely manner. In this paper, to better understand the targeting assessment, we suggest a specific solution: Bomb Hit Indication(BHI) using information in weapon data link messages. In order to prove our suggestion, we implement the BHI solution and apply it into the weapon data link integrating system.

전술객체 위치 모의 및 추적을 위한 필터링 알고리즘 연구 (Filtering Algorithms for Position Evaluation and Tracking of Tactical Objects)

  • 김석권;진승리;손재원;박동조
    • 한국시뮬레이션학회논문지
    • /
    • 제19권4호
    • /
    • pp.199-208
    • /
    • 2010
  • 모델링 시뮬레이션에서 전술객체의 위치는 시공간 위치 정보(Time, Space and Position Information, TSPI)로 표현된다. 미 국방성에서 시험, 훈련, 평가 시스템을 연동하기 위해 개발한 TENA(Test and Training Enabling Architecture)의 TSPI 객체 모델을 참고하여 시공간 위치 정보의 형태 및 정보 기록 소요를 도출하였다. 전술 데이터 링크(Tactical Data Link, TDL) 중 가장 정교한 링크 16(Link-16)의 PPLI(Precise Participant Location and Identification) 메시지를 통해 시공간 위치 정보의 교환 방식에 대해 알아보았다. 객체 위치 모의 및 추적을 위한 필터링 알고리즘으로 선형 시스템을 위한 칼만 필터 및 비선형 시스템을 위한 확장형 칼만 필터와 unscented 칼만 필터를 소개한다. 운동 방정식을 이용하여 탄도 미사일의 궤적을 모델링 한 후에, unscented 칼만 필터로 추정한 탄도 미사일의 궤적 추적 성능을 시뮬레이션 하였다.

Link-16에서 이미지 전송을 위한 신뢰성 기반의 동적 TDMA 기법과 새로운 패킹 방법 (Reliable Dynamic TDMA Scheme with new Packing method for Image Transmission over Link-16)

  • 백호기;임재성;구자열;진정환;전필성;오일혁
    • 한국통신학회논문지
    • /
    • 제37C권11호
    • /
    • pp.1045-1053
    • /
    • 2012
  • Link-16은 가장 널리 사용 중인 전술데이터링크로써 TDMA(Time Division Multiple Access)를 기반으로 동작한다. Link-16은 안정적이지만 전송 속도가 매우 낮아 전술 메시지, 음성 등 작은 사이즈의 데이터 전송을 지원한다. 그러나 최근 효과중심작전(EBO: Effect-Based Operation)에 대한 관심이 증가하면서, Link-16을 통해 이미지와 같은 상황 인식 정보를 전송하려는 동향이 있다. 이미지는 기존 메시지에 비해 크기가 매우 크기 때문에 Link-16의 Static TDMA가 아닌 별도의 TDMA 스케줄링이 필요하다. 따라서 본 논문에서는 Link-16의 MAC을 진화시킨 Link-16K를 제안하였다. Link-16K는 Link-16과 호환성을 유지한다. 그리고 이미지 전송을 효과적으로 지원하기 위해 DTDMA(Dynamic TDMA), 새로운 재전송 방법, 새로운 패킹 방법을 포함한다. 제안하는 아이디어의 시뮬레이션 결과를 통해 이미지 전송 시간이 단축되었고, 채널 효율성이 높아졌음을 확인하였다.

모바일 인스턴트 메신저 의존도에 관한 연구 (A Study on the Dependence of Mobile Instant Messenger)

  • 김재전;이윤희;노희옥;박경자
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제23권1호
    • /
    • pp.225-246
    • /
    • 2014
  • With the recent establishment of a ubiquitous environment and the paradigm shift to a smart society, the use of mobile devices, such as smart phones and tablet PCs, has become widespread. Thus, the trend is gradually shifting from using Web-based Instant Messenger to using Mobile-based Instant Messenger. Mobile Instant Messenger refers to a service that allows instant messaging as well as data sending and receiving between individuals with exclusive application programs(mobile Apps), which can be used in portable devices-such as smart phones-with wireless Internet access. Korea's portal sites, telecommunication companies, and even big companies have all rushed into the MIM market to join the competition. The reason so many companies are showing interest in the MIM business is because it is rising as a core platform to substitute portal sites in the mobile society, and MIM is perceived as the best means to attract and secure users. The intention to reuse or use continually was considered an important factor in maintaining a dominant position amidst such fierce competition, and consequently, most research thus far has reflected such thought. However, the frequent or long-term use of a system alone cannot indicate the definite success of the system, nor guarantee its dominant position in the market. On the contrary, MIM dependence, which goes beyond simple repetitive use and indicates a state where users actually or emotionally depend on a specific system, can better explain the user action. However, not much research has been conducted on dependence. The research results showed that lively message, concise message, message responsiveness, and social belonging significantly affected perceived usefulness. Message responsiveness, Link, and social belonging significantly affected flow. Flow significantly affected MIM dependence, and perceived usefulness did not affect MIM dependence. This study has proven that lively message, concise message, message responsiveness, Link, social belonging and perceived usefulness are important antecedents and mediating factors of MIM dependence. Moreover, this study is significant in that it explains the overall process of MIM dependence, and expands on the variety and scope of research that can be applied to MIM-related studies.

Design and evaluation of an alert message dissemination algorithm using fuzzy logic for VANETs

  • Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • 제21권4호
    • /
    • pp.783-793
    • /
    • 2010
  • Several multi-hop applications developed for vehicular ad hoc networks use broadcast as a means to either discover nearby neighbors or propagate useful traffic information to other vehicles located within a certain geographical area. However, the conventional broadcast mechanism may lead to the so-called broadcast storm problem, a scenario in which there is a high level of contention and collisions at the link layer due to an excessive number of broadcast packets. We present a fuzzy alert message dissemination algorithm to improve performance for road safety alert application in Vehicular Ad-hoc Network (VANET). In the proposed algorithm, when a vehicle receives an alert message for the first time, the vehicle rebroadcasts the alert message according to the fuzzy control rules for rebroadcast degree, where the rebroadcast degree depends on the current traffic density of the road and the distance between source vehicle and destination vehicle. Also, the proposed algorithm is the hybrid algorithm that uses broadcast protocol together with token protocol according to traffic density. The performance of the proposed algorithm is evaluated through simulation and compared with that of other alert message dissemination algorithms.

Security Architecture for T4 Class Common Data Link

  • Lee, Sang-Gon;Lee, Hoon-Jae;Kim, Hyeong-Rag;Ryu, Young-Jae
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권8호
    • /
    • pp.63-72
    • /
    • 2017
  • In this paper, we propose a security architecture for HDLC-based T4 class common data link. The common data links are composed of point-to-point, multi-to-point, and point-to-multi mode. For multi-to-point mode, one node has a bundle of point-to-point links with different end-point on the other side of the links. Thus multi-to-point mode can be considered as a bundle of point-to-point mode. Point-to-multi mode is broadcasting link. For point-to-point mode we adopted robust security network scheme to establish a secure data link, and for multi-to-point mode we use broadcast encryption scheme based on ID-based cryptography to distribute encryption key for broadcasting message encryption. We also included MACsec technology for point-to-point data link security. Computational and communicational complexity analysis on the broadcast encryption have been done.

무선 인터넷을 이용한 DGPS 및 성능분석 (Wireless Internet Based DGPS and Performance Analysis)

  • 이영식;김휘;지규인
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2000년도 제15차 학술회의논문집
    • /
    • pp.96-96
    • /
    • 2000
  • Today, Internet is an everyone's tool for information searching and communication. Furthermore, with the wireless Internet, we can get connected while moving. The Internet, especially wireless Internet could be an excellent data Link for DGPS because of its interactive two-way communication capability and well-constructed network infra. The user with his own mobile communication device doesn't necessarily get equipped with the other specific data link for DGPS This paper will show that how the Internet based DGPS system could be constructed on the computer network in real time, Its performance is demonstrated by the field experiments. Comparing to the DGPS system with the conventional data Links, Like beacon and FM DARC, the Internet based DGPS could provide us a convenient and cost effect DGPS system.

  • PDF

안드로이드 기반의 블루투스 디바이스 응용 설계 및 구현 (The Android-based Bluetooth Device Application Design and Implementation)

  • 조효성;이혁준
    • 한국ITS학회 논문지
    • /
    • 제11권1호
    • /
    • pp.72-85
    • /
    • 2012
  • 현재, 차량 내에서 사용하는 대부분의 블루투스 핸즈프리 디바이스는 음성 통화, 발신자 식별번호 표시 및 SMS 메시지 표시 등의 전화 서비스 기능을 제공하고 있지만 인터넷 기반의 텍스트 데이터 디스플레이 기능은 지원하지 않고 있다. 최근 들어 차량에서도 SNS와 같은 인터넷 서비스 이용에 대한 요구가 증가하고 있어, 기존의 핸즈프리 기능 이외에도 인터넷 기반의 텍스트 데이터를 표시하는 기능의 개발이 필요하다. 제안하는 블루투스 디바이스 응용은 SNS 메시지 및 이메일 도착 알림 표시 등의 향상된 기능을 포함하며, 구현 플랫폼으로는 대부분의 SNS 응용 프로그램의 동작이 가능하고 소형 임베디드 디바이스에 탑재가 용이한 안드로이드 플랫폼을 사용한다. 제안하는 블루투스 디바이스와 연결되는 스마트폰 또는 태블릿 PC 역시 안드로이드 플랫폼 기반의 단말기이며, 단말 탑재 기능 모듈인 오디오-텍스트 게이트웨이는 안드로이드 앱 형태로 설계된다. 오디오-텍스트 게이트웨이 앱은 SNS 텍스트 데이터 수신시, 메시지 헤더 정보에서 제목, 발신자 정보 등을 추출하여 텍스트 데이터 형태로 ACL(Asynchronous Connection-Oriented) 링크를 통해 블루투스 디바이스로 전송하여 화면에 표시되도록 한다. 일반적으로 안드로이드 플랫폼에 탑재된 블루투스 핸즈프리 또는 헤드셋 프로파일은 오디오 게이트웨이의 기능만을 포함하고 있기 때문에 안드로이드 기반의 블루투스 디바이스에서는 음성 데이터의 스피커 출력이 불가능하다. 따라서 제안하는 블루투스 디바이스 응용은 블루투스 헤드셋 프로파일에서 일반적으로 사용되는 SCO(Synchronous Connection-Oriented) 링크를 통한 음성 데이터 전송 방식 대신에 ACL 링크를 통한 스트리밍 방식을 적용한다.

Enhancing Security in Mobile IPv6

  • Modares, Hero;Moravejosharieh, Amirhossein;Salleh, Rosli Bin;Lloret, Jaime
    • ETRI Journal
    • /
    • 제36권1호
    • /
    • pp.51-61
    • /
    • 2014
  • In the Mobile IPv6 (MIPv6) protocol, a mobile node (MN) is a mobile device with a permanent home address (HoA) on its home link. The MN will acquire a care-of address (CoA) when it roams into a foreign link. It then sends a binding update (BU) message to the home agent (HA) and the correspondent node (CN) to inform them of its current CoA so that future data packets destined for its HoA will be forwarded to the CoA. The BU message, however, is vulnerable to different types of security attacks, such as the man-in-the-middle attack, the session hijacking attack, and the denial-of-service attack. The current security protocols in MIPv6 are not able to effectively protect the BU message against these attacks. The private-key-based BU (PKBU) protocol is proposed in this research to overcome the shortcomings of some existing MIPv6 protocols. PKBU incorporates a method to assert the address ownership of the MN, thus allowing the CN to validate that the MN is not a malicious node. The results obtained show that it addresses the security requirements while being able to check the address ownership of the MN. PKBU also incorporates a method to verify the reachability of the MN.