• Title/Summary/Keyword: Network-centric Warfare

Search Result 146, Processing Time 0.024 seconds

A Study on Efficient Friendly Forces Location Data Sharing on Battalion and Below

  • Kim, Hyung-Seok;Shin, Sang-Heon;Kim, Yong-Cheol;Lee, Jeong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.95-101
    • /
    • 2018
  • In this paper, we propose an efficient friendly forces location data sharing algorithm in a troops using a low bandwidth radio. The future battlefield is a 'Network Centric Warfare' with a concept of identifying the position and power of the enemy and friendly forces and leading the battlefield to victory through proper links at the time of our need. One of the basic elements in the 'Network Centric Warfare' is to share friendly forces location data. The bandwidth and transmission rates of radio used in battalion are low. Nevertheless, we should share our locations data almost in real time for effective fighting in a war situation. This paper describes the efficient method of friendly forces location data sharing based on low bandwidth radio. In particular, the concept of 'network-centered warfare' is reflected in the troop below the battalion to present an integrated and efficient way to shared location data of friendly forces.

A Node Management Scheme in Tactical Data Link Network (전술데이터링크 네트워크에서의 노드 이탈 관리 기법)

  • Ahn, Kwang-Ho;Lee, Ju-Hyung;Cho, Joon-Young;Oh, Hyuk-Jun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4B
    • /
    • pp.386-390
    • /
    • 2011
  • Modem warfares have changed from PCW (platform Centric Warfare) to NCW (Network Centric Warfare). Therefore, it is more important to operate and manage the network. This paper proposed a node management scheme in military wireless networks. In military wireless networks, nodes can join and leave the networks easily. It causes a degradation of network capacity. This paper figured out a problem caused by node which is leaving the network. This paper proposed a RSSI based method of estimating and detecting the leaving nodes in the networks. Finally, an experimental result was demonstrated to show the efficiency of the proposed method.

Aspects of Warfare in the Information Age - NCW Concerning (정보화 시대의 전쟁양상 - Network Centric Warfare(네트워크 중심 전쟁)을 중심으로)

  • Woo, Hee-Choul
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.4
    • /
    • pp.45-50
    • /
    • 2016
  • This research suggests a method to contribute to the perfect execution of duty in prospective information warfare by inspecting network-based warfare, in which its basic concepts and efficient management plans are provided; it is especially important, due to growing focus on information warfare caused by sudden improvements on information technology which affects not only civil matters but international military affairs as well. For this purpose, this research scrutinizes on the chronological organization of warfare traits during the information age, and information-warfare execution, as well as its effects, thereby providing proper management plans for network-based warfare.

A Study on the direction of implementing the Defence Logistics Supproting System for Network Centric Warfare (미래 네트워크중심전쟁에 부합하는 네트워크화 군수지원시스템 구축 방향)

  • Choi, S.Y.;Kang, S.J.;Park, K.W.
    • Journal of the military operations research society of Korea
    • /
    • v.32 no.2
    • /
    • pp.165-187
    • /
    • 2006
  • The aim of this study is to suggest the direction of implementing the new defense logistics systems for the network centric warfare in the future. For this purpose, we reviewed SARL(Sense and Response Logistics) which receives great attention from the U.S. Department of Defence as the future logistic concept of network centric warfare, coupled with recent development in information technologies which give technical revolution in the future logistics information system. Also, we analyzed problems underlying logistics information system currently used in the Korean Armed Forces. Finally, we suggested the direction of implementing the new logistics information system for the network centric warfare, expecting to reduce total logistics cost, speed up logistics velocity, and enhance the efficiency of the combat support.

A Study on the Network Centric Warfare Information Security for Ubiquitous Network Computing (유비쿼터스 환경에서의 NCW 정보보호 대책)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.15-22
    • /
    • 2010
  • Information security is a critical issue for network centric warfare(NCW). This paper provides defense information security guidelines for NCW, especially for ubiquitous network computing environment. For this purpose, this paper identified changes of battle aspect of tactical level and characteristics of information threats, and finally, the research suggested several information security guidelines for NCW. This paper is to intended to help military organization's planners determine practical and implemental plans in the near future.

Design of the Agent-based Network-Centric Warfare Modeling System (에이전트 기반의 NCW 전투모델링 시스템 설계)

  • Park, Se-Youn;Shin, Ha-Yong;Lee, Tae-Sik;Choi, Bong-Wan
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.271-280
    • /
    • 2010
  • While the future warfare is expected to be appeared as network-centric, effect-based, and coordinated cooperative, most current M&S systems reflect only the unit behaviors and interactions of each weapon system. There are limitations to analyze the behaviors of managing weapons cooperatively and sharing the situational awareness over the networks of distributed sensors, C2, and shooters using them. Therefore, we introduce the new design of the networkcentric warfare modeling system using the agent-based modeling and simulation approach. We have developed a system for engagement-level warfare models and tested with multi-platform battleship warfare. In this paper, we propose the method to design battle agents, environments, and networks for network centric warfare modeling.

A Study on Evaluation Criteria for M&S Analysis of Command and Control Effectiveness in Joint Operations (합동작전 지휘통제 효과도 모의분석을 위한 평가기준 연구)

  • Sohn, Young-Hwan;Kim, Weon-Bae
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.4
    • /
    • pp.167-175
    • /
    • 2011
  • Concerning the effectiveness of command and control is increasing worldwide as future warfare is changing into Network Centric Warfare (NCW). Unlike the old attrition warfare that depends mainly on mobility and strike assets, the modern warfare is based on information and network which regards acquisition and circulation of information as important. Therefore, there's no room for rediscussion that C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance) system will play an important role in warfare. In spite of this fact, there isn't any way to explain clearly how to measure the effectiveness of command and control system in a battle and to reflect it systematically in a system effectiveness. In this study, we examined NCO-CF (Network Centric Operations-Conceptual Framework), developed by the Department of Defense (DOD), which can conceptually explain the increment of effectiveness of C4ISR system that is the basis of NCO. And we suggested methodology based on NCO-CF to establish the evaluation criteria for M&S analysis of command and control effectiveness. As a case study we derived the evaluation criteria for the command and control system in joint operations by applying the suggested methodology.

A Study on Application of u-Learning System in Network Centric Warfare Environment (네트워크중심전 환경에서의 u-러닝 시스템 적용방안에 관한 연구)

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.43-49
    • /
    • 2010
  • With the development of information and communications technology(ICT), the concept of ubiquitous that we can communicate regardless of time and place appears. Due to the development of the technology delivering information, current society is called intellectualization society developed from informatization society. The intellectualization society is based on knowledge accumulated by processing information. The education methods are also developed into a concept of u-Learning applying the concept of ubiquitous from the concept of e-Learning using a computer. The military also points out education as a key policy. The aspect of war is changing to NCW(Network Centric Warfare) from platform centric warfare. Therefore, collecting and managing the war situations in real time is a key to controlling command. To this end, it needs to maximize individuals and groups' ability to cultivate the military with cutting-edge knowledge. Therefore, this study aims to look into methods to apply u-learning system in training and military actions according to changes in war environments and ICT.

A Study on the Defense Information System Security Guideline for Network Centric Warfare (네트워크 중심전(NCW)하의 국방정보체계 제대별/기능별 정보보호지침 연구)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.9-18
    • /
    • 2008
  • Information security is a critical issue for network centric warfare(NCW). This paper provides defense information system security guidelines for NCW, which is a result of the research through a group decision making process. The purpose of the research is to intended to help military officers establish information system security measures within their organization.

  • PDF

The Development Option for Korea Air Defense Identification Zone(KADIZ) (한국방공식별구역(KADIZ) 발전방안)

  • Kim, Dongsoo;Hong, Sungpyo;Chong, Mangseok
    • Journal of Aerospace System Engineering
    • /
    • v.10 no.1
    • /
    • pp.127-132
    • /
    • 2016
  • Recently, China & Japan have expanded their responding ADIZ(Air Defence Identification Zone) to implement each Government's maritime policy and to project their Air Power in preparation for maritime provocation & contingency, especially over the piled area where East Asia countries have claimed to have maritime jurisdiction one another. So this is to guide the Development Option for Korea Air Defence Identification Zone to cope with the maritime intentions of the neighboring countries, considering the international law for ADIZ, the maritime policy and the maritime sovereign & jurisdiction area of the Republic of Korea, etc.