• Title/Summary/Keyword: Tactical Information Communication Network

Search Result 108, Processing Time 0.027 seconds

A Study on the Army Tactical C4I System Information Security Plan for Future Information Warfare (미래 정보전에 대비한 육군전술지휘정보체계(C4I) 정보보호대책 연구)

  • Woo, Hee-Choul
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.1-13
    • /
    • 2012
  • This study aims to analyze actual conditions of the present national defense information network operation, the structure and management of the system, communication lines, security equipments for the lines, the management of network and software, stored data and transferred data and even general vulnerable factors of our army tactical C4I system. Out of them, by carrying out an extensive analysis of the army tactical C4I system, likely to be the core of future information warfare, this study suggested plans adaptive to better information security, based on the vulnerable factors provided. Firstly, by suggesting various information security factor technologies, such as VPN (virtual private network), IPDS (intrusion prevention & detection system) and firewall system against virus and malicious software as well as security operation systems and validation programs, this study provided plans to improve the network, hardware (computer security), communication lines (communication security). Secondly, to prepare against hacking warfare which has been a social issue recently, this study suggested plans to establish countermeasures to increase the efficiency of the army tactical C4I system by investigating possible threats through an analysis of hacking techniques. Thirdly, to establish a more rational and efficient national defense information security system, this study provided a foundation by suggesting several priority factors, such as information security-related institutions and regulations and organization alignment and supplementation. On the basis of the results above, this study came to the following conclusion. To establish a successful information security system, it is essential to compose and operate an efficient 'Integrated Security System' that can detect and promptly cope with intrusion behaviors in real time through various different-type security systems and sustain the component information properly by analyzing intrusion-related information.

Analysis of Routing Protocol for Tactical Backbone of TICN (TICN 전술백본망을 위한 라우팅 프로토콜 분석)

  • Jang, Dong-Ki;Kwon, Tae-Wook
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.4
    • /
    • pp.650-658
    • /
    • 2010
  • Recently Korea Army developed the TICN which is the next army tactical communication system. The TICN will support ability from under environment, strategy maneuver communication system of integrated army dimension overcome and NCW. If the IER(Information Exchange Requirement) phases 3 of the future application system, the analysis that a transmission ability of the TICN is the uncapable is govern. The TICN tactical backbone's ability is very important. Therefore, network efficiency index in application and analysis of the standard protocol for the data transmission guarantee are obliged. For the TICN tactical backbone, this paper analyzes of routing protocol efficiency index and compares to superiority of the OSPF(v2) and integrated IS-IS protocols in the tactical environment. Conclusively we proposed that integrated IS-IS protocol is more suitable for TICN backbone routing protocol.

Caching Strategies of Content-Centric Networking for the Performance of TICN Backbone (TICN 백본망 성능향상을 위한 CCN 적용 캐싱전략)

  • Park, Heungsoon;Kwon, Taewook
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.5
    • /
    • pp.637-642
    • /
    • 2014
  • Military communications have limited resources such as poor bandwidth and insufficient link capacity. Numerous hosts in conventional IP networks, including the Tactical Information Communication Network (TICN), the tactical communication system of the Army, focus heavy traffic on a single server via end-to-end connections and in which data delivery latency is caused by exchanging routing information. Content-Centric Networking (CCN), one framework of Information-Centric Networking (ICN), is a novel Internet paradigm in which data can be accessed by the name of the content instead of the location information. This paper provides content caching strategies for applying CCN to military tactical IP networks based on TICN environment.

Rapid Self-Configuration and Optimization of Mobile Communication Network Base Station using Artificial Intelligent and SON Technology (인공지능과 자율운용 기술을 이용한 긴급형 이동통신 기지국 자율설정 및 최적화)

  • Kim, Jaejeong;Lee, Heejun;Ji, Seunghwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.9
    • /
    • pp.1357-1366
    • /
    • 2022
  • It is important to quickly and accurately build a disaster network or tactical mobile communication network adapting to the field. In configuring the traditional wireless communication systems, the parameters of the base station are set through cell planning. However, for cell planning, information on the environment must be established in advance. If parameters which are not appropriate for the field are used, because they are not reflected in cell planning, additional optimization must be carried out to solve problems and improve performance after network construction. In this paper, we present a rapid mobile communication network construction and optimization method using artificial intelligence and SON technologies in mobile communication base stations. After automatically setting the base station parameters using the CNN model that classifies the terrain with path loss prediction through the DNN model from the location of the base station and the measurement information, the path loss model enables continuous overage/capacity optimization.

A Study on HCI Design based on Tactical Data Link integrated in KDDX Combat Management System for Korean-Type Mobile Fleet Control (차기구축함 전투관리체계에 통합된 전술데이터링크 기반의 한국형 기동함대 통제 HCI 설계에 관한 연구)

  • Song, Ha-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.5
    • /
    • pp.482-492
    • /
    • 2019
  • The naval ship consists of a variety of classes, including patrol, frigate, destroyer and landing ship. There are various means of communication between combat ships belonging to the mobile fleet, including voice network, text message network and tactical data link. The operation at the existing mobile fleet level was conducted mainly on voice and text message, and tactical data link were used mainly to share tactical information between combat ships. This study intended to design HCI for commander like as KDDX of fleet level based on tactical data link, a means of communication between ships, to secure operational control of the mobile fleet. Recently, naval ships have been developed in the organization of various sensors, weapons and tactical data links integrated into the combat management system, and this study also designed the HCI based on the tactical data links integrated in the combat management system. The purpose of this study was to secure the operational efficiency of the tactical data link based on the combat management system in operation of the mobile fleet, and to improve the capability of the fleet commander to recognize the battlefield situation awareness.

A Study on the Expansion and Improvement of the Tactical Data Link Processing Structure for Link-22 SNC Interface (Link-22 SNC 연동을 위한 전술데이터링크 처리 구조 확장 개선 연구)

  • Jung, Suk-Ho;Hwang, Jung-Eun;Lee, Youn-Jeong;Park, Ji-Hyeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1045-1052
    • /
    • 2021
  • Modern Warfare is transforming into a Network Centric Warfare(NCW) where surveillance systems, command control systems and strike systems are interconnected with advanced IT technologies to share battlefield situations. The South Korean military is using the various tactical data links(TDL) such as Link-K, Link-16, Link-11 and KVMF depending on each military's battlefield situation. Joint Tactical Data Link System(JTDLS) is a system thar shares tactical information in near-real time between army/navy/air joint forces and additionally establishes Link-22 in Link-K, Link-16 and KVMF. In this paper, we propose the Link-22 system structure, Link-22 message analysis and the interface structure between the tactical data link processor and Link-22 to apply Link-22 to the JTDLS.

A Concept Study on Improving Command Post Vehicles for Operating Battle Management System (전장관리체계 운용을 위한 전투지휘용 차량의 성능개량 개념)

  • Park, Seung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.2
    • /
    • pp.16-22
    • /
    • 2008
  • So far, Korean command post vehicles(CPs) have used voice-only radio communication among the mechanized troop units such MBTs and IFVs, etc. But digital data communication technology should be introduced to improve mission success capabilities and accommodate integrated combat capabilities through increasing SA(situation Awareness), or spatiotemporal synchronization of military operation in battle field environment. Therefore, conventional CPs, which have been operated without digital network, urgently needs to mount a battle management system which furnish with tactical information network, considering that korean new MBTs or new IFVs will be fielded soon. This study suggests some performance enhancement method which might be applicable to CPs which have a role of connecting Battalion unit to Brigade C4I system.

Scenario-based Future Infantry Brigade Information Distribution Capability Analysis (시나리오 기반의 미래 보병여단 정보유통능력 분석 연구)

  • Junseob Kim;Sangjun Park;Yiju You;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.139-145
    • /
    • 2023
  • The ROK Army is promoting cutting-edge, future-oriented military development such as a mobile, intelligent, and hyper-connected Army TIGER system. The future infantry brigade plans to increase mobility with squad-level tactical vehicles to enable combat in multi-domain operations and to deploy various weapon systems such as surveillance and reconnaissance drones. In addition, it will be developed into an intelligent unit that transmits and receives data collected through the weapon system through a hyper-connected network. Accordingly, the future infantry brigade will transmit and receive more data. However, the Army's tactical information communication system has limitations in operating as a tactical communication system for future units, such as low transmission speed and bandwidth and restrictions on communication support. Therefore, in this paper, the information distribution capability of the future infantry brigade is presented through the offensive operation scenario and M&S.

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.