• 제목/요약/키워드: Information Centric Network

Search Result 347, Processing Time 0.023 seconds

Artificial Intelligence based Threat Assessment Study of Uncertain Ground Targets (불확실 지상 표적의 인공지능 기반 위협도 평가 연구)

  • Jin, Seung-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.305-313
    • /
    • 2021
  • The upcoming warfare will be network-centric warfare with the acquiring and sharing of information on the battlefield through the connection of the entire weapon system. Therefore, the amount of information generated increases, but the technology of evaluating the information is insufficient. Threat assessment is a technology that supports a quick decision, but the information has many uncertainties and is difficult to apply to an advanced battlefield. This paper proposes a threat assessment based on artificial intelligence while removing the target uncertainty. The artificial intelligence system used was a fuzzy inference system and a multi-layer perceptron. The target was classified by inputting the unique characteristics of the target into the fuzzy inference system, and the classified target information was input into the multi-layer perceptron to calculate the appropriate threat value. The validity of the proposed technique was verified with the threat value calculated by inputting the uncertain target to the trained artificial neural network.

A Combat Effectiveness Evaluation Algorithm Considering Technical and Human Factors in C4I System (NCW 환경에서 C4I 체계 전투력 상승효과 평가 알고리즘 : 기술 및 인적 요소 고려)

  • Jung, Whan-Sik;Park, Gun-Woo;Lee, Jae-Yeong;Lee, Sang-Hoon
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.2
    • /
    • pp.55-72
    • /
    • 2010
  • Recently, the battlefield environment has changed from platform-centric warfare(PCW) which focuses on maneuvering forces into network-centric warfare(NCW) which is based on the connectivity of each asset through the warfare information system as information technology increases. In particular, C4I(Command, Control, Communication, Computer and Intelligence) system can be an important factor in achieving NCW. It is generally used to provide direction across distributed forces and status feedback from thoseforces. It can provide the important information, more quickly and in the correct format to the friendly units. And it can achieve the information superiority through SA(Situational Awareness). Most of the advanced countries have been developed and already applied these systems in military operations. Therefore, ROK forces also have been developing C4I systems such as KJCCS(Korea Joint Command Control System). And, ours are increasing the budgets in the establishment of warfare information systems. However, it is difficult to evaluate the C4I effectiveness properly by deficiency of methods. We need to develop a new combat effectiveness evaluation method that is suitable for NCW. Existing evaluation methods lay disproportionate emphasis on technical factors with leaving something to be desired in human factors. Therefore, it is necessary to consider technical and human factors to evaluate combat effectiveness. In this study, we proposed a new Combat Effectiveness evaluation algorithm called E-TechMan(A Combat Effectiveness Evaluation Algorithm Considering Technical and Human Factors in C4I System). This algorithm uses the rule of Newton's second law($F=(m{\Delta}{\upsilon})/{\Delta}t{\Rightarrow}\frac{V{\upsilon}I}{T}{\times}C$). Five factors considered in combat effectiveness evaluation are network power(M), movement velocity(v), information accuracy(I), command and control time(T) and collaboration level(C). Previous researches did not consider the value of the node and arc in evaluating the network power after the C4I system has been established. In addition, collaboration level which could be a major factor in combat effectiveness was not considered. E-TechMan algorithm is applied to JFOS-K(Joint Fire Operating System-Korea) system that can connect KJCCS of Korea armed forces with JADOCS(Joint Automated Deep Operations Coordination System) of U.S. armed forces and achieve sensor to shooter system in real time in JCS(Joint Chiefs of Staff) level. We compared the result of evaluation of Combat Effectiveness by E-TechMan with those by other algorithms(e.g., C2 Theory, Newton's second Law). We can evaluate combat effectiveness more effectively and substantially by E-TechMan algorithm. This study is meaningful because we improved the description level of reality in calculation of combat effectiveness in C4I system. Part 2 will describe the changes of war paradigm and the previous combat effectiveness evaluation methods such as C2 theory while Part 3 will explain E-TechMan algorithm specifically. Part 4 will present the application to JFOS-K and analyze the result with other algorithms. Part 5 is the conclusions provided in the final part.

Techniques study of IMS/SIP based Lawful Interception in 3G networks (3G 네트워크에서의 IMS/SIP 기반 합법적 감청 기법)

  • Lee, Myoung-rak;Pyo, Sang-Ho;In, Hoh Peter
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1411-1420
    • /
    • 2015
  • Lawful interception(LI) standard of telephone networks has technical limitations to lawfully intercept IMS/SIP-based mobile communication network subscriber who using Android and iPhone device. In addition, the technical standards related to legal interception of the IMS/SIP of the wireless network is insufficient compared to the systematic study of the development of a wireless network infrastructure. The architecture proposed in the standard of ETSI(European Telecommunications Standards Institute) for the seamless LI is insufficient to overcome the limitations of traditional voice-centric LI techniques. This paper proposes an IMS/SIP-based architecture to perform LI under 3G networks that focuses on mobility-supported environments with merging cellular networks and the Internet. We implemented the simulation to verify the efficiency of the proposed architecture, and the experimental results show that our method achieves higher lawful interception rate than that of existing interception methods.

An Adaptive Neighbor Discovery for Tactical Airborne Networks with Directional Antenna (지향성 안테나 기반 공중전술네트워크를 위한 적응적 이웃노드 탐색기법)

  • Lee, Sung-Won;Yoon, Sun-Joong;Ko, Young-Bae
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.1
    • /
    • pp.1-7
    • /
    • 2010
  • Network Centric Warfare(NCW) is becoming a prominent concept in the current trend of warfare. To support high quality communication between strategic/tactical units in the concept of NCW, Tactical Airborne Networks are likely to be constructed in the near future to take part in the NCW. In these Tactical Airborne Networks with dynamic topology variations due to very high mobility of participants nodes, more efficient and reliable neighbor discovery protocols are needed. This paper presents the adaptive HELLO message scheduling algorithm for Tactical Airborne Network using directional antennas. The purposed algorithm can reduce the overhead of periodic HELLO message transfer, while guaranteeing successful data transmission. We concluded a mathematical analysis and simulation studies using Qualnet 4.5 for evaluation the performance and efficiency of the proposed scheme.

Optimal Location Selection Algorithm of MSAP for Tactical Communication Networks (전술통신 환경 구축을 위한 MSAP의 최적위치 선정 알고리즘)

  • Cho, Sang-Mok;Kang, Jung-Ho;Kim, Jae-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1736-1743
    • /
    • 2011
  • In Network Centric Warfare (NCW) environment, having a tactical communication network which provides high data exchange rate is very important. In the process, Korean Army developed Mobile Subscriber Access Point (MSAP) which is based on the commercial Wireless BroadBand (Wibro). MSAP is a vehicle attached base station which provide high data exchange communication environment in a given area. Thus MSAP can provide high data exchange rate and mobility to accomplish missions in the battlefield more effectively. In this paper, we propose an operational strategy of using MSAP to provide tactical communication network in the battlefield. The idea is to find the optimal location point of the MSAP in the operational area where all the troops in the operational area can be supported by the MSAP with a minimum number of MSAP. Since the current Korean Army's basic idea of using MSAP is just distribute this MSAP to each troop, so by applying our strategy we can save MSAP devices for more flexible operation. We will show our strategy's benefits through the mathematical model and the algorithm of the presented problem.

Investigation on Key Success Factors for Future Broadcasting and Telecom Convergence Service Using AHP Method (계층적분석방법을 이용한 차세대 방통융합서비스의 핵심 경쟁 요인에 관한 연구)

  • Yoo, Jae-Heung;Choi, Mun-Kee;Kim, Sun-Joong;Cho, Ki-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.6B
    • /
    • pp.650-662
    • /
    • 2011
  • The competition among companies in converged market of broadcasting and telecommunications has become severe. Companies in this market have vertically integrated critical resources by acquiring or strategically allying with relevant companies. However, the expansion of business territory accompanies financial, organizational, and technological risks. As such, it is important to identify critical success factors that highly affect the company's competency. This study is aimed at delivering strategic implications for firms playing in the converged market of broadcasting and telecommunications by drawing the priorities of competitive resources to acquire. To do this, we selected four teen specific core resources on CPNT (content- platform - network - terminal) value chain. Then, we conducted an Analytic Hierarchical Process (AHP) using data from experts in this industry. As a result, the priority for acquisition of competitive resources is presented as follows: broadcasting programs, implementation of TV application store, multi-platform, investment on wireless network, and diffusion of mobile devices. In addition, the result shows that the platform-centric vertical integration is the most promising strategy for competition.

A CSMA/CA with Binary Exponential Back-off based Priority MAC Protocol in Tactical Wireless Networks (전술 무선망에서 2진 지수 백오프를 사용하는 CSMA/CA 기반 우선순위 적용 MAC 프로토콜 설계)

  • Byun, Ae-Ran;Son, Woong;Jang, Youn-Seon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.12-19
    • /
    • 2015
  • In network-centric warfare, the communication network has played a significant role in defeating an enemy. Especially, the urgent and important data should be preferentially delivered in time. Thus, we proposed a priority MAC protocol based on CSMA/CA with Binary Exponential Back-off for tactical wireless networks. This MAC protocol suggested a PCW(Prioritized Contention Window) with differentiated back-off time by priority and a RBR(Repetitive Back-off Reset) to reset the remaining back-off time. The results showed that this proposed MAC has higher performance than those of DCF(Distributed Coordination Function) in the transmission success rate and the number of control packet transmission by reducing the packet collision. Thus, it produced more effective power consumption. In comparison with DCF, this proposed protocol is more suitable in high-traffic network.

Attribute-based Naming Support for Wireless Sensor Network (무선 센서 네트워크를 위한 속성 기반 네이밍 지원)

  • Seo Hanbae;Jung Euihyun;Kim Yongpyo;Park Yongjin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.478-480
    • /
    • 2005
  • 센서 네트워크는 다수의 센서 노드들이 센싱된 데이터를 보고하는 형태의 네트워크로 기존 데이터 중심(Data-centric) 통신 모델은 오버헤드와 응답 속도의 저하와 관련된 문제점을 노출하고 있으며, 이를 해결하기 위한 방안으로 속성 기반 네이밍(Attribute-based naming)이 새로운 라우팅 구조로 주목받고 있다. 본 연구에서는 가상 대응체 (Virtual Counterpart) 개념을 센서 네트워크에 적용하여 속성 기반 네이밍을 싱크 노드내의 가상 센서 노드에서 처리해주는 구조를 제안하였다. 기존의 다른 속성 기반 네이밍 연구들과 달리 리얼센서에 대응되는 가상 센서 노드를 싱크 노드에서 운용하고, 리얼 센서의 데이터를 주기적으로 업데이트한 후, 속성 기반 쿼리를 가상 센서 노드가 리얼 센서를 대행하여 처리하는 구조를 설계하였다. 이런 구조를 취함으로써 효율적인 응답 처리와 하부 네트워크에 비종속적인 속성 기반 네이밍이 가능하며, 쿼리의 확장성과 센서들의 결합을 통한 부가적인 기능을 제공할 수 있게 된다.

  • PDF

A situation-Flexible and Action-Oriented Cyber Response Mechanism against Intelligent Cyber Attack (지능형 사이버공격 대비 상황 탄력적 / 실행 중심의 사이버 대응 메커니즘)

  • Kim, Namuk;Eom, Jungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.3
    • /
    • pp.37-47
    • /
    • 2020
  • The In the 4th industrial revolution, cyber space will evolve into hyper-connectivity, super-convergence, and super-intelligence due to the development of advanced information and communication technologies, which will connect the nation's core infrastructure into a single network. As applying the 4th industrial revolution technology to the cyber attack technique, it is evolving in an intelligent and sophisticate method. In order to response intelligent cyber attacks, it is difficult to guarantee self-defense in cyberspace by policy-oriented, preplanned-centric and hierarchical cyber response strategies. Therefore, this research aims to propose a situation-flexible & action-oriented cyber response mechanism that can respond flexibly by selecting the most optimal smart security solution according to changes in the cyber attack steps. The proposed cyber response mechanism operates the smart security solutions according to the action-oriented detailed strategies. In addition, artificial intelligence-based decision-making systems are used to select the smart security technology with the best responsiveness.

A Flexible Attribute-based RBAC Model

  • Kim, Si-Myeong;Han, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.131-138
    • /
    • 2022
  • In this paper, we propose an FA-RBAC (FA-RBAC) model based on flexible properties. This model is assigned attribute-role-centric, making it easy to manage objects, as efficient as access control, and as the network environment changes, it can provide flexible access control. In addition, fine-grained permissions and simple access control can be achieved while balancing the advantages and disadvantages of the RBAC and ABAC models, reducing the number of access control rules by combining static attribute-based roles and dynamic attribute-based rules, and verifying the validity and performance benefits of the proposed model through comparison analysis and simulation.