• Title/Summary/Keyword: Defense Information Technology

Search Result 962, Processing Time 0.032 seconds

A Methodology for SDLC of AI-based Defense Information System (AI 기반 국방정보시스템 개발 생명주기 단계별 보안 활동 수행 방안)

  • Gyu-do Park;Young-ran Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.577-589
    • /
    • 2023
  • Ministry of National Defense plans to harness AI as a key technology to bolster overall defense capability for cultivation of an advanced strong military based on science and technology based on Defense Innovation 4.0 Plan. However, security threats due to the characteristics of AI can be a real threat to AI-based defense information system. In order to solve them, systematic security activities must be carried out from the development stage. This paper proposes security activities and considerations that must be carried out at each stage of AI-based defense information system. Through this, It is expected to contribute to preventing security threats caused by the application of AI technology to the defense field and securing the safety and reliability of defense information system.

Defense Informationization Outlook and Emerging Defense Information Technologies (국방정보화 전망과 미래 유망 국방정보기술 발굴)

  • Seo, Min-Woo;Gwan, Gyoung-Yong
    • Journal of Technology Innovation
    • /
    • v.19 no.2
    • /
    • pp.77-97
    • /
    • 2011
  • Information technologies are changing rapidly in recent years because of the latest IT development and technology convergence. Therefore, government tries to choose technologies required to achieve mid and long-term strategic technical development target and present technology road map. We established national defense scientific technology plan process for weapon systems. However, national defense IT plan process has not been established yet. Accordingly, in this paper, we suggested outlook of future national defense informationization through national defense Information Technology environment analysis, and discovered future potential Information Technology for national defense through methodology of investigation and analysis and suggested Defense IT Planning development.

  • PDF

A Study on the Information Security Technical Architecture focusing on the Primary Defense Information Infrastructure (국방주요정보통신기반시설 중심의 정보보호기술구조 연구)

  • Choi, Ji-Na;Nam, Kil-Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.9 no.1 s.24
    • /
    • pp.80-88
    • /
    • 2006
  • The purpose of this thesis is to research and propose a practical Information Security Technical Architecture on Primary Defense Information Infrastructure with regard to requirement of information security. The scope of this research is limited to national defense information master plan & security rule, and U.S. DoD's IATF is used to plan a detailed structure. The result of this research can be used as a guide book for providing security for Army IT infrastructure now and in the future as well as to devise a plan for research and development in information protection technology.

A Study on General-Standard Conformance Test Framework and Methodology of Defense Information Technical Standard (국방정보기술표준 일반 표준적합성시험 프레임워크 및 방법론 연구)

  • Seo, Minwoo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.6
    • /
    • pp.744-751
    • /
    • 2016
  • Interoperability tests are required to determine whether network-based defense systems successfully share and exchange certain services, information, and data. We must examine various aspects of interoperability. The DITA (Defense Information Technical stAndard) is the basis for interoperability. However, DITA is being applied to the defense system in a state that the standard test methods and procedures are not established. And there is no test method and procedure of the DITA well applicable to military weapons systems or information systems. Therefore, in this paper, we propose a framework that includes procedures, methodologies, so as to test whether a standard is applied to the DITA in terms of Standard Conformance Test.

A Study on the Investigation and Analysis of Defense Information Technical Standard Application (국방정보기술표준 적용실태 조사 분석에 관한 연구)

  • Kim, Hye-Lyeong;Choi, Sang-Yeong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.3
    • /
    • pp.325-332
    • /
    • 2009
  • This study is aimed to investigate the application of DITA(Defense Information Technical stAndard) on the weapon information systems and defense management information systems in order not only to update the current DITA version 4.0, but also to develop SoS(System of systems) interoperability policy in the armed forces of Korea. For this study, 18 information systems were considered, their development products(System/Sub-system Specification, Technical architecture View, System Interoperability Test and Evaluation products) were reviewed and analysed. As a result of the investigation and analysis, it was found that the 44% of the DITA standard profiles were used for the development of the defense information systems. We conclude that DITA should be updated to be a minimal set so that all the defense information systems should be DITA-compliant. And it should be reviewed periodically to reflect the new information technology.

A Study on the Implementation of Defense Technology Master Data Management System for Defense Technology Security (방산기술보호를 위한 방산기술 마스터 데이터 관리 체계 구현 방안)

  • Park, Heungsoon;Kim, Seyong;Kwon, Hyukjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.111-122
    • /
    • 2021
  • With the spread of technology in the 4th Industrial Revolution, the defense industry in South Korea is getting developed into an industrial structure in which high-tech technologies are concentrated. As the importance of defense technology has gradually increased, the government has enacted the Defense Technology Security Act and required to build a protection system for institutions that possess or manage defense technology. In order for the target institution to introduce a protection system, it is necessary to identify the defense technologies that are protected and to ensure systematic data management. In order to cope with this, we derived master data items for data management and analyzed the implementation types of defense technology master data system suitable for the defense industry environments. The derived method identified the defense technology master data, such as primary and secondary master data, and through AHP analysis, Co-existence type was suitable as the target model for the master data management system. We expect that stronger defense technology security policy will be implemented through the defense technology MDM system.

A Participation Scheme of the Central Region Research Institute related to National Defense Information Security Industry (국방정보보호산업 관련 중부권 연구기관 활용방안)

  • Eom, Jung-Ho
    • Journal of National Security and Military Science
    • /
    • s.9
    • /
    • pp.191-206
    • /
    • 2011
  • This study is presented a scheme that information security research institutions located within the central area can be participated actively m national defense information security industry. The many of information security company are located in the central region(Daejeon) and there are many research institutes. However, the participation rate of the Defense Information Security Industry is not high compared to other provinces. Although a variety of reasons, there are no the Defense Privacy Office that could have a role in protocol and the information about the industry. In addition, the Department of Defense related to national defense information security industry have not information about research institutions in the central region and are not well to identify the characteristics of institutional technology and research. So in this paper we presented some of the alternatives. 1) Building Pool involved in information security research according to the characteristics of each agency 2) Constitute the research community between Research institutions and the company 3) Build the technology cooperation between research institutions and the defense research institutes 4) Utilization of industry/university/research institutes related to Information Security Industry 5) Make strategic alliances among research institutes based on technical expertise.

  • PDF

A Prediction-based Energy-conserving Approximate Storage and Query Processing Schema in Object-Tracking Sensor Networks

  • Xie, Yi;Xiao, Weidong;Tang, Daquan;Tang, Jiuyang;Tang, Guoming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.5
    • /
    • pp.909-937
    • /
    • 2011
  • Energy efficiency is one of the most critical issues in the design of wireless sensor networks. In object-tracking sensor networks, the data storage and query processing should be energy-conserving by decreasing the message complexity. In this paper, a Prediction-based Energy-conserving Approximate StoragE schema (P-EASE) is proposed, which can reduce the query error of EASE by changing its approximate area and adopting predicting model without increasing the cost. In addition, focusing on reducing the unnecessary querying messages, P-EASE enables an optimal query algorithm to taking into consideration to query the proper storage node, i.e., the nearer storage node of the centric storage node and local storage node. The theoretical analysis illuminates the correctness and efficiency of the P-EASE. Simulation experiments are conducted under semi-random walk and random waypoint mobility. Compared to EASE, P-EASE performs better at the query error, message complexity, total energy consumption and hotspot energy consumption. Results have shown that P-EASE is more energy-conserving and has higher location precision than EASE.

A Study on Implementation of the advance Defense Technology inforMation Service (차세대 국방기술정보통합서비스 구축에 관한 연구)

  • Kim, Mi-Jeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.6
    • /
    • pp.636-645
    • /
    • 2017
  • An information system for defense technology information management should assist the user's work and manager's decision-making by managing and timely providing data held by defense-related organizations. This paper proposes a plan for constructing an advance defense technology information service. DTiMS concentrates on the collection and management of defense science technology information but not its distribution. Therefore, it is important that the advanced distribution service model be established on the concept of total life cycle management that utilizes user information, so that it can provide proper information to each user in the defense field who require the information processed by their roles. This study examined the management of information and operation method through advanced case analysis. In addition, the analysis of existing services revealed improvements in the management of an information standard, the trace ability of information and usability, and improved user-interface. The proposed development direction was implemented by deploying the advanced DTiMS. Therefore, it is expected that the proposed methodology will contribute to the weapon system total life cycle, and will support defense technology planning, and R&D decisions.

A depth-based Multi-view Super-Resolution Method Using Image Fusion and Blind Deblurring

  • Fan, Jun;Zeng, Xiangrong;Huangpeng, Qizi;Liu, Yan;Long, Xin;Feng, Jing;Zhou, Jinglun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.5129-5152
    • /
    • 2016
  • Multi-view super-resolution (MVSR) aims to estimate a high-resolution (HR) image from a set of low-resolution (LR) images that are captured from different viewpoints (typically by different cameras). MVSR is usually applied in camera array imaging. Given that MVSR is an ill-posed problem and is typically computationally costly, we super-resolve multi-view LR images of the original scene via image fusion (IF) and blind deblurring (BD). First, we reformulate the MVSR problem into two easier problems: an IF problem and a BD problem. We further solve the IF problem on the premise of calculating the depth map of the desired image ahead, and then solve the BD problem, in which the optimization problems with respect to the desired image and with respect to the unknown blur are efficiently addressed by the alternating direction method of multipliers (ADMM). Our approach bridges the gap between MVSR and BD, taking advantages of existing BD methods to address MVSR. Thus, this approach is appropriate for camera array imaging because the blur kernel is typically unknown in practice. Corresponding experimental results using real and synthetic images demonstrate the effectiveness of the proposed method.