• Title/Summary/Keyword: Network Centric Operation

Search Result 54, Processing Time 0.022 seconds

A Study on the Net Centric Entity Interoperability Layer (NCEI레이어 모델에 관한연구)

  • Son, Hyun-Sik;Lee, Tae-Gong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4B
    • /
    • pp.269-277
    • /
    • 2012
  • The future battlefield environment has changed platform centric warfare into a network centric warfare. The NCO is a operational concept to improve combat power through information sharing, shared situational awareness, decision making and synchronized action based on powerful network grid. In addition, these operational environment is composed of physical, information, cognitive and social domains. The platform environment system is associated with the OSI 7 layer. However, OSI 7 layer is limited to express NCW environment including cognitive and social domains. Therefore, we requires a new model for expressing cognitive and social domains. After we developed a new model, this model applied to the NCW architecture taxonomy.

A Concept Study on Efficiently Improving Performance for Korean MBT (한국형 전차의 효율적인 성능개량 개념)

  • Kim, Seok;Son, Seung-Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.6
    • /
    • pp.14-20
    • /
    • 2008
  • A battle management system should be introduced to improve mission success capabilities and accommodate integrated combat capabilities through increasing SA(Situation Awareness), or spatiotemporal synchronization of military operation in battle field environment. Conventional Korean Main Battle Tanks(Korean MBTs), which have been operated without digital network, were developed for 1980s. Korean new MBTs, which are mounted the battle management system, will be fielded soon. Therefore, old Korean MBT is needed to improve performances for co-operation with new one. This paper is reviewed each improved MBTs of world countries and domestic maintenance facilities. And this study suggests some processing methods which might be applicable to improve information network performance of old Korean MBTs.

Efficient Contents Verification Scheme for Contents-Centric-Networking (콘텐츠 중심 네트워킹을 위한 콘텐츠 인증 기술)

  • Kim, DaeYoub;Park, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.234-241
    • /
    • 2014
  • xTo improve network inefficiency caused by network congestion around a content-source, content-centric networking (CCN) allows network nodes transmitting contents to temporarily cache received contents and then send back the cached contents if the nodes receive relevant request messages without forwarding the request messages to content-sources. However, because nodes receiving requested contents through CCN cannot recognize real senders of the received contents, the receivers need to verify each received contents before using them. But such a verification procedure can cause long service/operation delay. Hence, in this paper, we review the problem of contents verification, propose an improved verification procedure and evaluate its performance.

A Framework for Trustworthy Open Shared Authentication Protocol (신뢰적인 개방형 공유 인증 프로토콜 프레임워크)

  • Park, Seung-Chul
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.389-396
    • /
    • 2011
  • Recently, researches on the shared authentication based on single sign-on have been actively performed so as to solve the problems of current service provider-centric and isolated Internet authentications, including low usability, high cost structure, and difficulty in privacy protection. In order for the shared authentication model, where the authentications of an authentication provider are shared by several Internet service providers, to be accepted in real Internet environment, trustworthiness among users, service providers, and authentication providers on the level of authentication assurance and the level of authentication information protection is necessarily required. This paper proposes a framework for trustworthy and privacy-protected shared authentication protocol based on the user-centric operation and open trust provider network. The proposed framework is differentiated from previous works in the points that it is able to provide interoperable shared authentication services on the basis of open trust infrastructure.

An Energy Efficient Data-Centric Probing Priority Determination Method for Mobile Sinks in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율을 고려한 모바일 싱크의 데이터 중심 탐색 우선순위결정 기법)

  • Seong, Dong-Ook;Lee, Ji-Hee;Yeo, Myung-Ho;Yoo, Jae-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.5
    • /
    • pp.561-565
    • /
    • 2010
  • Many methods have been researched to prolong sensor network lifetime using mobile technologies. In the mobile sink research, there are the track based methods and the anchor points based methods as representative operation methods for mobile sinks. However, the existing methods decrease Quality of Service (QoS) and lead the routing hotspot in the vicinity of the mobile sink. The reason is that they use static mobile paths that are not concerned about the network environments such as the query position and the data priority. In this paper, we propose the novel mobile sink operation method that solves the problems of the existing methods. In our method, the probing priority of the mobile sink is determined with the data priorities for increasing the QoS and the mobile features are used for reducing the routing hotspot. The experimental results show that the proposed method reduces query response time and improves network lifetime over the existing methods.

Development of Information Technology for Smart Defense (Smart Defense 를 위한 IT 기술 개발)

  • Chung, Kyo-Il;Lee, So Yeon;Park, Sangjoon;Park, Jonghyun;Han, Sang-Cheol
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.38 no.3
    • /
    • pp.323-328
    • /
    • 2014
  • Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication & Computer, Intelligence), ISR(Intelligence, Surveillance & Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

Analysis of the Operation of China Air Defense Identification Zone (CADIZ) corresponding to the PRC's maritime strategy and the ROK's response measures (중국의 해양전략과 연계한 중국방공식별구역(CADIZ) 운영 분석과 우리의 대응방안)

  • Kim, Dongsoo;Chong, Mangseok;Hong, Sungpyo
    • Journal of Aerospace System Engineering
    • /
    • v.11 no.2
    • /
    • pp.35-42
    • /
    • 2017
  • This paper analyzes the intention of the PRC (People's Republic of China) to establish and operate CADIZ to implement the government's maritime policy and strategy and to project its air power in preparation for maritime provocation and contingency, especially over the area where East Asia countries have claimed to have maritime jurisdiction over one another. This paper is also intended to guide the Republic of Korea's response measures for coping with the maritime intention and threat of China by such measures as reinforcing military power, constructing the strategic air base in Jeju, and expanding the present KADIZ.

Understanding of OT-OCN(Operation Technology - Operation Contents Network) (OT-OCN 기술의 이해)

  • Park, Jae-Kyung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.303-304
    • /
    • 2016
  • 본 논문에서는 기존의 TCP/IP 체계에서 탈피하여 보안 및 성능을 개선하기 위한 방안으로 콘텐트를 기반으로 한 네트워크 체계에 대해서 소개한다. OT-OCN은 기존의 CCN(Contents Centric Network)을 기반으로 컨텐츠의 기능을 추가하여 이를 바탕으로 자율성을 부여한 새로운 개념의 패러다임이다. 이러한 OT-OCN의 개발사는 미국의 CAT, Inc.(Cyber Advanced Technology)라는 회사로 이 기술은 보안뿐만 아니라 CCN을 통한 통신의 효율성을 극대화하고 또한 사물인터넷(IoT) 등에 활용 가능한 최적의 메커니즘이다. 본 논문에서는 이 기술의 기본적인 매커니즘에 대한 간략한 소개를 통해 차세대보안의 개념을 설명하고자 한다.

  • PDF

Intermediate Node Mobility Management Technique by Real-Time Monitoring in CCN Environment (CCN 환경에서 실시간 모니터링에 의한 중간노드 이동성 관리 기법)

  • Ko, Seung-Beom;Kwon, Tae-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.5
    • /
    • pp.783-790
    • /
    • 2022
  • The development of SNS and video platforms provided an opportunity to explode the activation of content production and consumption. However, in the legacy system, due to the host-based location-oriented data transmission, there are inherent limitations in efficient operation and management. As an alternative to this, a Contents Centric Network (CCN) was studied. In this paper, when intermediate nodes located between the information provider and the information requester between the real-time streaming services in the CCN environment move or restrict their use, failure through monitoring of wireless reception strength to solve problems like disconnection of transmission quality at the information consumer. We propose a stable intermediate node management mechanism through active response before occurrence.

A Methodology for the Development of NCO Effectiveness Analysis Model based on the Reference Model (참조모델기반 NCO 효과분석모델 개발방법)

  • Lim, Nam-Kyu;Lee, Tae-Gong;Son, Hyun-Sik;Park, Ji-Hyeon;Kim, Jae-Won
    • Journal of the military operations research society of Korea
    • /
    • v.36 no.3
    • /
    • pp.95-111
    • /
    • 2010
  • The NCO effectiveness analysis related elements and their relationship are more complicated than the PCW. However, Effectiveness analysis models provide single effectiveness element centric effective analysis method so far. Therefore, A model to provide unified view and common language about NCO effectiveness is required. EA use reference model as a common language to control complexity and change. The objective of this study is presenting a methodology to develop NCO effectiveness analysis model based on reference model and implementation model concept. To do this, First, the concept of EA based reference and implementation model is studied, Second, we study related effectiveness analysis method and model component and their relationship identification methodology, third, we propose methodology to develop NCO effectiveness analysis model. Finally, we prove the effectiveness of the methodology using case study.