• Title/Summary/Keyword: Information warfare

Search Result 374, Processing Time 0.03 seconds

A proposal of new MOE to assess the combat power synergistic effect of warfare information system. (전장 정보체계의 전투력 상승효과 측정을 위한 새로운 MOE 제안)

  • Lee, Yong-Bok;Kim, Yong-Heup;Lee, Jae-Yeong
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2008.10a
    • /
    • pp.104-112
    • /
    • 2008
  • In modern war information system development makes battlefield materialize, and combat factors can maximize combat power exhibition as that apply synchronization. Information system is the core of combat power operation under NCW(Network centric Warfare). This paper proposed a new MOE(Measure of Effectiveness) that can assess the combat power synergistic effect of information system at the theater joint fire operation in NCW environment. This methodology applied the rule of Newton's second law $F=(m{\Delta}{\upsilon})/t{\Rightarrow}(M{\upsilon}I)/T$) Details factor in combat power evaluation is as following. (1) M : Network power; (2) v : Movement velocity; (3) I : Information superiority; (4) T : C2(command and control) time. We applied this methodology to the "JFOS-K(Joint Fire Operating System-Korea) in Joint Chief of Staff" in the real military affair section.

  • PDF

An Analysis of Satellite Communications System structure for NCW (NCW대비 군 위성통신 구조 분석)

  • Park, Woo-Chul;Cha, Jae-Ryong;Kim, Jae-Hyun
    • Journal of Satellite, Information and Communications
    • /
    • v.4 no.1
    • /
    • pp.1-7
    • /
    • 2009
  • As the information age comes out, the aspect of future war brings about the many changes in terms of war-fighting environment. Accordingly, information superiority and intelligence-centric warfare have been important and new war-fighting concept such as NCW(network centric warfare) have been turned up. This paper proposed all-weather core-strategy communications systems guaranteeing not only the real-time transmission of the information collected in a battlefield and expansion, automation, and rapidity of a battlefield but also broadband, mobility, survivability, and flexibility. The proposed military satellite communications system is classified into wideband mass capacity link, survivability, and the system supporting OTM(on the move) communication for the real-time transmission of battlefield information. This paper analyzed the essential operation concepts and core schemes of the U.S. Army's next generation system, TSAT(Transformational Satellite Communication System). Base on the analysis results, this paper proposed that the architecture of next generation military satellite communications systems for NCW have to provide the data rate, anti-jamming capability, network control and management capability which are optimally adaptable for the wireless channel environments such as jamming and interference and to support the variety of platforms like high-speed mobile vehicles, micromini devices, super-high speed unmanned aerial vehicles. Finally, this paper also proposed that next generation military satellite communications systems need the technologies such as the adaptable multi-antenna, laser link, and next-generation anti-jamming waveform.

  • PDF

A Kernel Density Signal Grouping Based on Radar Frequency Distribution (레이더 주파수 분포 기반 커널 밀도 신호 그룹화 기법)

  • Lee, Dong-Weon;Han, Jin-Woo;Lee, Won-Don
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.48 no.6
    • /
    • pp.124-132
    • /
    • 2011
  • In a modern electronic warfare, radar signal environments become more denser and complex. Therefor the capability of reliable signal analysis techniques is required for ES(Electronic warfare Support) system to identify and analysis individual emitter signals from received signals. In this paper, we propose the new signal grouping algorithm to ensure the reliable signal analysis and to reduce the cost of the signal processing steps in the ES. The proposed grouping algorithm uses KDE(Kernel Density Estimator) and its CDF(Cumulative Distribution Function) to compose windows considering the statistical distribution characteristics based on the radar frequency modulation type. Simulation results show the good performance of the proposed technique in the signal grouping.

The Applied Status and Improvement of the Integrated Communication System for Naval Ship (함정용 통합통신체계의 적용현황 및 발전방향)

  • Lee, Chae-Dong;Shin, Woo-Seop;Kim, Suk-Chan
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.34 no.1
    • /
    • pp.116-124
    • /
    • 2010
  • The future warfare is changing to the NCW(Network Centric Warfare) from the platform-based warfare. Korea navy has been developing the KNCCS (Korea Naval Command and Control System) and the KNTDS (Korea Naval Tactical Data System) to prepare the NCW. Also, Korea navy has been using the ICS (Integraed Communication System) to transfer the command, control and tactical information on the naval ship. There is a lack of a systematic research and a reference material, although the ICS is a very important network on the naval ship. This paper is described the naval ICS. Also, a direction of the next Korea naval ICS is proposed.

Transmission Modeling and Verification for the Inverse Estimation of Electronic Warfare Threats (전자전 위협체 역추적을 위한 송수신 모델링 및 검증)

  • Park, So Ryoung;Jeong, Hoe Chang;Kwon, Jae Wan;Noh, Sanguk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.4
    • /
    • pp.112-123
    • /
    • 2017
  • Research for the inverse estimation of RF threats and the efficient electronic attack based on the parameters of the electronic information has been active in the electronic warfare (EW) situations. In this paper, an EW transmission simulator is constructed from the modeling of radar threats, EW receivers, and propagation environments with the collected electronic information in order to verify the performance of the inverse estimation algorithm in various and practical EW situations. In simulation results, we show that the range tracking error and angle tracking error are produced within ten meters and one degree, respectively. And also, we show that the changing relations between the angle tracking error and the parameters of the monopulse angle tracking radar such as the beamwidth and squint angle in simulation results correspond with those in the theoretical modeling. Accordingly, the constructed EW simulator can be used to observe the modifying characteristics of the electronic information in transmission environments, and then, to evaluate the performance of the inverse estimation system in various EW situations.

Design and Implementation of Cyber Warfare Training Data Set Generation Method based on Traffic Distribution Plan (트래픽 유통계획 기반 사이버전 훈련데이터셋 생성방법 설계 및 구현)

  • Kim, Yong Hyun;Ahn, Myung Kil
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.71-80
    • /
    • 2020
  • In order to provide realistic traffic to the cyber warfare training system, it is necessary to prepare a traffic distribution plan in advance and to create a training data set using normal/threat data sets. This paper presents the design and implementation results of a method for creating a traffic distribution plan and a training data set to provide background traffic like a real environment to a cyber warfare training system. We propose a method of a traffic distribution plan by using the network topology of the training environment to distribute traffic and the traffic attribute information collected in real and simulated environments. We propose a method of generating a training data set according to a traffic distribution plan using a unit traffic and a mixed traffic method using the ratio of the protocol. Using the implemented tool, a traffic distribution plan was created, and the training data set creation result according to the distribution plan was confirmed.

Cyber threats: taxonomy, impact, policies, and way forward

  • Malik, Annas W.;Abid, Adnan;Farooq, Shoaib;Abid, Irfan;Nawaz, Naeem A.;Ishaq, Kashif
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2425-2458
    • /
    • 2022
  • The continuous evolution and proliferation of computer technology and our increasing dependence on computer technology have created a new class of threats: "cyber threats." These threats can be defined as activities that can undermine a society's ability to maintain internal or external order while using information technology. Cyber threats can be mainly divided into two categories, namely cyber-terrorism and cyber-warfare. A variety of malware programs are often used as a primary weapon in these cyber threats. A significant amount of research work has been published covering different aspects of cyber threats, their countermeasures, and the policy-making for cyber laws. This article aims to review the research conducted in various important aspects of cyber threats and provides synthesized information regarding the fundamentals of cyber threats; discusses the countermeasures for such threats; provides relevant details of high-profile cyber-attacks; discusses the developments in global policy-making for cyber laws, and lastly presents promising future directions in this area.

Development of Stream Cipher using the AES (AES를 이용한 스트림 암호 개발)

  • Kim, Sung-Gi;Kim, Gil-Ho;Cho, Gyeong-Yeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.972-981
    • /
    • 2013
  • Future aspects of the has turned into a network centric warfare(NCW). Organically combined wired and wireless networks in a variety of cross-of-the-art combat power factor utilization of information and communication technology is a key element of NCW implementation. At used various information in the NCW must be the confidentiality and integrity excellent then quick situation assessment through reliability the real-time processing, which is the core of winning the war. In this paper, NCW is one of the key technologies of the implementation of 128-bit output stream cipher algorithm is proposed. AES-based stream cipher developed by applying modified OFB mode the confidentiality and integrity as well as hardware implementation to the security and real-time processing is superior.

An Efficient Data Traffic Estimation Technique in Defense Information Network through Network Simulation (네트워크 시뮬레이션을 통한 군 통신 정보유통량의 효율적 예측 기법)

  • An, Eun-Kyung;Lee, Seung-Jong
    • Journal of the military operations research society of Korea
    • /
    • v.32 no.1
    • /
    • pp.133-158
    • /
    • 2006
  • The change of information and communications technology affects into many parts of military battlefield as the future warfare will be information-oriented warfare, relying on information technology. The more IT-based military systems are deployed the more multimedia data traffic increase. To accommodate such user's requirements the bandwidth capacity of military communications network must be upgraded. The cost of upgrading network capacity is increasing as well. But there has no systematic estimation approach to analyze the amount of data traffic in the military network. In this paper we suggest an efficient data traffic estimation technique using network simulation with the respect of Input and output, scenario, toolset and technique, and experimental environments.

A P2P Based Tactical Information Sharing System for Mobile Nodes (P2P 기반의 모바일 노드간의 전술 정보 공유 시스템)

  • Lee, Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.4
    • /
    • pp.501-509
    • /
    • 2014
  • In NCW(Network Centric Warfare) environment, mobile nodes communicate through wireless link. But wireless link provides limited networking performance due to signal interferences or mobility of nodes. So it is quite challenge to acquire enough networking resources and use the resources efficiently. In this paper, we have proposed a P2P based tactical information sharing system which provides satisfactory visual information playout for mobile nodes(i.e., military personnel, vehicle,..) in NCW environment. Our proposed system consists of two components. One is caching-enabled switch which stores tactical information segments at its internal storage and then transports them to mobile nodes when require. Another is centralized scheduling algorithm which exploits networking resources more efficiently. To validate performance of proposed system, we performed series of experiments in wireless network testbed. Results show improved performance in terms of segment-missing ratio, networking resources usage, sharing time, and number of simultaneous playout mobile nodes with acceptable playout continuity(i.e., over 95%).