• Title/Summary/Keyword: Network-centric Warfare

Search Result 146, Processing Time 0.022 seconds

Implementation and Performance Analysis of Partition-based Secure Real-Time Operating System (파티션 기반 보안 실시간 운영체제의 구현 및 성능 분석)

  • Kyungdeok Seo;Woojin Lee;Byeongmin Chae;Hoonkyu Kim;Sanghoon Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.99-111
    • /
    • 2022
  • With current battlefield environment relying heavily on Network Centric Warfare(NCW), existing weaponary systems are evolving into a new concept that converges IT technology. Majority of the weaponary systems are implemented with numerous embedded softwares which makes such softwares a key factor influencing the performance of such systems. Furthermore, due to the advancements in both IoT technoogies and embedded softwares cyber threats are targeting various embedded systems as their scope of application expands in the real world. Weaponary systems have been developed in various forms from single systems to interlocking networks. hence, system level cyber security is more favorable compared to application level cyber security. In this paper, a secure real-time operating system has been designed, implemented and measured to protect embedded softwares used in weaponary systems from unknown cyber threats at the operating system level.

A Study on Non-participating TDL Message Analyzer (비가입형 TDL 메시지 분석기에 관한 연구)

  • Hwang, Byoung-Han;Lee, Jung-Woong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.3
    • /
    • pp.290-294
    • /
    • 2018
  • Modern warfare exhibit a NCW (Network Centric Warfare) aspect through quick situation awareness and Command and Control. And Tactical messages operate on various tactical data links (TDLs). For monitoring TDL messages processed by data link processor(DLP), message analysers are generally developed as a component during system development. In addition, in order to forward TDL messages processed by DLP to the message anayzer, the interface messages between DLP and message analysers should be defined interface control document(ICD). We propose the methods using UDP or TCP packets provided by TDL layers that are delivered to DLP without communicating directly with DLP. Depending on TDL message standards and Interface Control Documents(ICDs), we design the message analyzer which communicates with data link processor using internal messages. Using known header field information from the TDL application standard such as JREAP-C, we can quickly filter candidate packets against collected packets and use the full data size information contained in the headers to verify the completed message. Because the methods proposed in this paper do not communicate directly with DLP, the methods proposed in this paper are enable to analyze the TDL application messages such as JREAP-C or Link-K without constraints in existing methods that should be reflected in the system configuration and ICD.

Structure of Data Fusion and Nonlinear Statistical Track Data Fusion in Cooperative Engagement Capability (협동교전능력을 위한 자료융합 구조와 비선형 통계적 트랙 융합 기법)

  • Jung, Hyoyoung;Byun, Jaeuk;Lee, Saewoom;Kim, Gi-Sung;Kim, Kiseon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.1
    • /
    • pp.17-27
    • /
    • 2014
  • As the importance of Cooperative Engagement Capability and network-centric warfare has been dramatically increasing, it is necessary to develop distributed tracking systems. Under the development of distributed tracking systems, it requires tracking filters and data fusion theory for nonlinear systems. Therefore, in this paper, the problem of nonlinear track fusion, which is suitable for distributed networks, is formulated, four algorithms to solve the problem of nonlinear track fusion are introduced, and performance of introduced algorithms are analyzed. It is a main problem of nonlinear track fusion that cross-covarinaces among multiple platforms are unknown. Thus, in order to solve the problem, two techniques are introduced; a simplification technique and a approximation technique. The simplification technique that help to ignore cross-covariances includes two algorithms, i.e. the sample mean algorithm and the Millman formula algorithm, and the approximation technique to obtain approximated cross-covariances utilizes two approaches, by using analytical linearization and statistical linearization based on the sigma point approach. In simulations, BCS fusion is the most efficient scheme because it reduces RMSE by approximating cross-covariances with low complexity.

The LVC Linkage for the Interoperability of the Battle Lab (Battle Lab에서의 상호운용성을 위한 LVC 연동방안)

  • Yun, Keun-Ho;Shim, Shin-Woo;Lee, Dong-Joon
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.1
    • /
    • pp.81-88
    • /
    • 2012
  • In the M&S filed, The Battle Lab is available for acquisition, design, development tool, validation test, and training in the weapon system of development process. Recently, the Battle Lab in the military of Korea is still in an early stage, in spite of importance of battle lab construction. In the environment of network centric warfare, a practical use of the M&S which is connecting live, virtual and constructive model can be applied to all field of System Engineering process. It is necessary thar the Battle Lab is not restricted by time and space, and is possible for the technical implementation. In this paper, to guarantee the interoperability of live and virtual simulation, virtual simulators connect live simulators by using the tactical data link. To guarantee the interoperability of virtual and constructive simulation, both virtual simulators and constructive simulators use the RTI which is the standard tool of M&S. We propose the System that constructed the Air Defence Battle Lab. In case of the approach of target tracks, The Air Defence Battle Lab is the system for the engagement based on a command of an upper system in the engagement weapon system. Constructive simulators which are target track, missile, radar, and launcher simulator connect virtual simulators which are MCRC, battalion, and fire control center simulators using the RPR-FOM 1.0 that is a kind of RTI FOM. The interoperability of virtual simulators and live simulators can be guaranteed by the connection of the tactical data links which are Link-11B and ATDL-1.

On Software Reliability Engineering Process for Weapon Systems (무기체계를 위한 소프트웨어의 신뢰성 공학 프로세스)

  • Kim, Ghi-Back;Lee, Jae-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4B
    • /
    • pp.332-345
    • /
    • 2011
  • As weapon systems are evolving into more advanced and complex ones, the role of the software is becoming heavily significant in their developments. Particularly in the war field of today as represented by the network centric warfare(NCW), the reliability of weapon systems is definitely crucial. In this context, it is inevitable to develop software reliably enough to make the weapon systems operate robustly in the combat field. The reliability engineering activities performed to develop software in the domestic area seem to be limited to the software reliability estimations for some projects. To ensure that the target reliability of software be maintained through the system's development period, a more systematic approach to performing software reliability engineering activities are necessary from the beginning of the development period. In this paper, we consider the software reliability in terms of the development of a weapon system as a whole. Thus, from the systems engineering point of view, we analyze the models and methods that are related to software reliability and a variety of associated activities. As a result, a process is developed, which can be called the software reliability engineering process for weapon systems (SREP-WS), The developed SREP-WS can be used in the development of a weapon system to meet a target reliability throughout its life-cycle. Based on the SREP-WS, the software reliability could also be managed quantitatively.

A Case of Developing Performance Evaluation Model for Korean Defense Informatization (국방정보화 수준평가 모델 개발 사례)

  • Gyoo Gun Lim;Dae Chul Lee;Hyuk Jin Kwon;Sung Rim Cho
    • Information Systems Review
    • /
    • v.19 no.3
    • /
    • pp.23-45
    • /
    • 2017
  • The ROK military is making a great effort and investment in establishing network-centric warfare, a future battlefield concept, as a major step in the establishment of a basic plan for military innovation. In the military organization level, an advanced process is introduced to shorten the command control time of the military and the business process is improved to shorten the decision time. In the information system dimension, an efficient resource management is achieved by establishing an automated command control system and a resource management information system by using the battle management information system. However, despite these efforts, we must evaluate the present level of informatization in an objective manner and assess the current progress toward the future goal of the military by using objective indicators. In promoting informatization, we must systematically identify the correct areas of improvement and identify policy directions to supplement in the future. Therefore, by analyzing preliminary research, workshops, and expert discussions on the major informatization level evaluation models at home and abroad, this study develops an evaluation model and several indicators that systematically reflect the characteristics of military organizations. The developed informatization level evaluation model is verified by conducting a feasibility test for the troops of the operation class or higher. We expect that this model will be able to objectively diagnose the level of informatization of the ROK military by putting budget and resources into the right place at the right time and to rapidly improve the vulnerability of the information sector.