• Title/Summary/Keyword: Military Networks

Search Result 272, Processing Time 0.021 seconds

A Distributed Dynamic Address Assignment for Tactical Mobile Ad-hoc Networks (전술 MANET에서 그룹 단위 분산된 동적 주소 할당 기법)

  • Park, Mun-Young;Lee, Jong-Kwan;Baek, Ho-Ki;Kim, Du-Hwan;Lim, Jae-Sung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.3
    • /
    • pp.327-335
    • /
    • 2014
  • In this paper, we propose a group distributed dynamic address assignment scheme suitable for tactical mobile ad hoc networks(MANET). Efficient address assignment is an important issue in the MANET because a node may frequently leave the current network and join another network owing to the mobility of the node. The conventional schemes do not consider the features of the tactical networks: existence of a leader node and network activity on a group basis. Thus, they may not be suitable for military operations. In our proposed scheme, called grouped units dynamic address assignment protocol(G-DAAP), a leader node maintains the address information for the members in the network and any of the nodes can exploit the information for the assignment or request of the IP address by a simple message exchange procedure. This leads to fast address assignment with small overheads. In addition, G-DAAP based on the modified IEEE 802.11e Enhanced Distributed Channel Access(EDCA) can assign addresses more quickly. We describe the delay performance of the G-DAAP and compare it with conventional schemes by numerical analysis and computer simulations. The results show that the G-DAAP significantly improves the delay performance as compared with the conventional schemes.

Dynamic Slot Re-assignment Scheme for Network Merge in Swarming Drone Networks (군집 드론 네트워크에서 네트워크 결합을 위한 동적 슬롯 재할당 기법)

  • Lee, Jong-Kwan;Lee, Minwoo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.156-164
    • /
    • 2019
  • In this paper, we propose an efficient dynamic slot re-assignment scheme for swarming drone networks in which networks members merged and split frequently. The leader drone of each network recognizes the slot allocation information of neighbor networks by periodic information exchange among between the drones. Using the information, the leader drone makes a decision how to reallocate the slots between members in case of network merge. The non-competitive method in the proposed scheme can re-assign the slots without any slot collision and shows always superior performance than competitive scheme. The competitive method in the proposed scheme reduces the number of slots that should be re-assigned in case of network merge. The experimental performance analysis shows that the proposed scheme performs better or at least equal to the performance of the competitive scheme in a swarming drone network.

The Modified Backoff Algorithm to reduce the number of collisions in the IEEE 802.11 Networks

  • Nam, Jae-Hyun
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.2
    • /
    • pp.228-232
    • /
    • 2008
  • In recent years, wireless ad hoc networks have become increasingly popular in both military and civilian applications due to their capability of building networks without the need for a pre-existing infrastructure. Recently, IEEE 802.11 Task Group e has been working on a new mechanism, the Enhanced Distributed Coordination Function (EDCF), to enhance the performance of 802.11 DCF. However, EDCF only reduces the internal collisions within a station, and external collisions between stations remain high in ad-hoc networks. In this paper, we propose to adopt an adaptive backoff window control technique, based on a dynamic value of the initial value of the range in which the backoff is chosen, so the backoff timer is randomly chosen in the range (InitRng, CW-1). We use ns-2 simulation to evaluate the throughput of our scheme. Results show that the throughput is improved for our scheme compared to the original DCF due to the reduced the number of collisions.

CLSR: Cognitive Link State Routing for CR-based Tactical Ad Hoc Networks

  • Ahn, Hyochun;Kim, Jaebeom;Ko, Young-Bae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.50-67
    • /
    • 2015
  • The Cognitive Radio (CR) paradigm in tactical ad hoc networks is an important element of future military communications for network-centric warfare. This paper presents a novel Cognitive Link State Routing protocol for CR-based tactical ad hoc networks. The proposed scheme provides prompt and reliable routes for Primary User (PU) activity through procedures that incorporate two main functions: PU-aware power adaptation and channel switching. For the PU-aware power adaptation, closer multipoint relay nodes are selected to prevent network partition and ensure successful PU communication. The PU-aware channel switching is proactively conducted using control messages to switch to a new available channel based on a common channel list. Our simulation study based on the ns-3 simulator demonstrates that the proposed routing scheme delivers significantly improved performance in terms of average end-to-end delay, jitter, and packet delivery ratio.

A Scalable Video Coding(SVC) and Balanced Selection Algorithm based P2P Streaming Technique for Efficient Military Video Information Transmission (효율적인 국방 영상정보 전송을 위한 확장비디오코딩(SVC) 및 균형선택 알고리즘 기반의 피투피(P2P) 비디오 스트리밍 기법 연구)

  • Shin, Kyuyong;Kim, Kyoung Min;Lee, Jongkwan
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.87-96
    • /
    • 2019
  • Recently, with the rapid development of video equipment and technology, tremendous video information is produced and utilized in military domain to acquire battlefield information or for effective command control. Note that the video playback devices currently used in the military domain ranges from low-performance tactical multi-functional terminals (TMFT) to high-performance video servers and the networks where the video information is transmitted also range from the low speed tactical information and communication network (TICN) to ultra-high speed defense broadband converged networks such as M-BcN. Therefore, there is a need for an efficient streaming technique that can efficiently transmit defense video information in heterogeneous communication equipment and network environments. To solve the problem, this paper proposes a Scalable Video Coding (SVC) and balanced selection algorithm based Peer-to-Peer (P2P) streaming technique and the feasibility of the proposed technique is verified by simulations. The simulation results based on our BitTorrent simulator show that the proposed balanced selection scheme outperforms the sequential or rarest selection algorithm.

Study on Cognitive Engine Platform Based on the Spectrum Sharing for the Military Tactical Communications (군 전술 통신에서의 주파수 공동사용 기반 인지엔진 플랫폼 연구)

  • Choi, Joo-Pyoung;Lee, Won-Cheol
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.7
    • /
    • pp.599-611
    • /
    • 2016
  • This paper proposes a cognitive engine platform that enables dynamic spectrum access(DSA) based on a spectrum sharing system for the military tactical network environment. The current military tactical wireless communication system is increasing need to secure a supplementary wireless spectrum to ensure that multiple wireless networks for different weapon systems co-exist, so that tactical wireless communication between the same or different systems can be operated effectively. This paper examined policy development and research activities engaged by the U.S. and European countries on wireless spectrum sharing to secure more spectrum. It also introduces the current status of cognitive engine development, which is the core technology of tactical wireless communication for DSA. In addition, based on the investigation performed into the latest trends, we propose a platform structure for a cognitive engine based on a spectrum sharing method where more frequencies can be added for tactical radio communication, so that DSA can be realized, and wireless networks of different weapon systems can co-exist.

The Study on the Sustainable Sharing Plans of Military Installations for a Civil Military Co-existence (민군상생을 위한 지속가능한 군사시설 공유방안 연구)

  • Park, Young Jun;Son, Kiyoung
    • Korean Journal of Construction Engineering and Management
    • /
    • v.17 no.2
    • /
    • pp.110-117
    • /
    • 2016
  • This paper shows procedure and strategies to improve military facilities and local residents' welfare through a civil-military sustainable cooperation project. Military installations tend to impede urban developments, so that a few civil compliant have been often filed. Meanwhile, it is sometimes impossible to relocate military units due to their own unique purpose, even though they belong to core sites of civil developments, which are generally indispensible due to urban expansion, magnified road networks and so on. The solution to offset these conflicts between civil and military demands, which are associated with military units and urbanization surrounding them, is to establish sustainable strategies which enable both civil and military be beneficial. In this study, it is described, decision making procedure to make some facilities of a military unit be better as well as promote local residents' welfare through securing high-quality sports facilities. Delphi-technique and Paired Comparison Method are used to collect civil and military opinions regarding sustainable agreements. As a case study, a civil military cooperation project between a military unit and a local government is introduced. With successful projects, it is expected that the better installations could lead positive images of a military unit, provide advanced athletic environments for both local residents and military personnels, and lessen defense cost to maintain them. Moreover, this project will go down as a paragon of civil military sustainable cooperation.

Measures to Prevent the Leakage of Military Internal Information through the Analysis of Military Secret Leakage Cases: Focusing on Insider Behaviors (군사기밀 유출 사례 분석을 통한 군 내부정보 유출 방지 방안 : 내부자 행위 중심으로)

  • Eom, Jung-Ho;Kim, Nam-Uk
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.85-92
    • /
    • 2020
  • None of the recent cases of military secret leakages have leaked internal information using networks. This is because the Internet and the Intranet are physically separated, and has a difficult process when transmitting and receiving data through the Internet. Therefore, most of the leaked paths are to copy and hand over secrets, shoot and send them with a smartphone, or disclose after remembering them. So, the technology of blocking and detecting military secret leakages through the network is not effective. The purpose of this research is to propose a method to prevent information leakage by focusing on the insider behaviors, the subject of leakage, rather than the military secret. The first is a preventive measure to prevent the leakage behavior of military secrets, the second is to block suspicious access to the military secret data, and the last is to detect the leakage behavior by insiders.

Timestamps based sequential Localization for Linear Wireless Sensor Networks (선형 무선 센서 네트워크를 위한 시각소인 기반의 순차적 거리측정 기법)

  • Park, Sangjun;Kang, Jungho;Kim, Yongchul;Kim, Young-Joo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.10
    • /
    • pp.1840-1848
    • /
    • 2017
  • Linear wireless sensor networks typically construct a network topology with a high reliability through sequential 1:1 mapping among sensor nodes, so that they are used in various surveillance applications of major national infrastructures. Most existing techniques for identifying sensor nodes in those networks are using GPS, AOA, and RSSI mechanisms. However, GPS or AOA based node identification techniques affect the size or production cost of the nodes so that it is not easy to construct practical sensor networks. RSSI based techniques may have a high deviation regrading location identification according to propagation environments and equipment quality so that complexity of error correction algorithm may increase. We propose a timestamps based sequential localization algorithm that uses transmit and receive timestamps in a message between sensor nodes without using GPS, AOA, and RSSI techniques. The algorithms for distance measurement between each node are expected to measure distance within up to 1 meter in case of an crystal oscillator of 300MHz or more.

Soft Fault Detection Using an Improved Mechanism in Wireless Sensor Networks

  • Montazeri, Mojtaba;Kiani, Rasoul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.4774-4796
    • /
    • 2018
  • Wireless sensor networks are composed of a large number of inexpensive and tiny sensors used in different areas including military, industry, agriculture, space, and environment. Fault tolerance, which is considered a challenging task in these networks, is defined as the ability of the system to offer an appropriate level of functionality in the event of failures. The present study proposed an intelligent throughput descent and distributed energy-efficient mechanism in order to improve fault tolerance of the system against soft and permanent faults. This mechanism includes determining the intelligent neighborhood radius threshold, the intelligent neighborhood nodes number threshold, customizing the base paper algorithm for distributed systems, redefining the base paper scenarios for failure detection procedure to predict network behavior when running into soft and permanent faults, and some cases have been described for handling failure exception procedures. The experimental results from simulation indicate that the proposed mechanism was able to improve network throughput, fault detection accuracy, reliability, and network lifetime with respect to the base paper.