• Title/Summary/Keyword: Tactical Information Communication Network

Search Result 108, Processing Time 0.023 seconds

A Study on the Operation of Multi-Beam Antenna for Airborne Relay UAV considering the Characteristics of Aircraft (비행체의 특징을 고려한 공중중계 무인기 다중빔 안테나 운용 방안)

  • Park, Sangjun;Lee, Wonwoo;Kim, Yongchul;Kim, Junseob;Jo, Ohyun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.4
    • /
    • pp.26-34
    • /
    • 2021
  • In the era of the Fourth Industrial Revolution, the future battlefield will carry out multi-area operations with hyper-connected, high-speed and mobile systems. In order to prepare for changes in the future, the Korean military intends to develop various weapons systems and form a multi-layer tactical network to support On The Move communication. However, current tactical networks are limited in support of On The Move communications. In other words, the operation of multi-beam antennas is necessary to efficiently construct a multi-layer tactical network in future warfare. Therefore, in this paper, we look at the need for multi-beam antennas through the operational scenario of a multi-layer tactical network. In addition, based on development consideration factors, features of rotary-wing and fixed-wing aircraft, we present the location and operation of airborne relay drone installations of multi-beam antennas.

The Analysis of Crypto Communication Relay Effect in the Security Framework Technique of Network Centric Warfare Environment (NCW환경의 보안 프레임워크 기술에서 암호통신 중계영향 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.788-794
    • /
    • 2007
  • The policy of US DoD is moving towards implementation of Network Centric Warfare(NCW) concepts. NCW is commonly described as the integration and synchronization of four key interdependent elements such as command and control, sensor system, engagement systems and the network. Therefore the military policy of Korea military is needed to access and examine the policy of NCW communication environment and crypto communication, which is able to apply it. In this case study, We are reviewed the security framework of the concept of network centric warfare in the centering around the US. It is introduced the core technology in the network centric warfare, and it is reviewed the security framework such as, the requirements of security, the characteristics security of global information grid, joint tactical radion system, net centric enterprise services, transformational communication satellite, in the basis of core technology, and analysis the effect of crypto communication relay between command node and surbornate node in NCW environment. This report support the assistance, which is considered the elements of surrounding effects in the varied crypto communication research area of NCW.

  • PDF

An Intrusion Detection Technique Suitable for TICN (전술정보통신체계(TICN)에 적합한 침입탐지 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1097-1106
    • /
    • 2011
  • Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.

A Study on modifying OSPF protocol for wireless tactical backbone networks (무선 전술 백본망을 위한 OSPF 프로토콜 수정 방안)

  • Yoon-Young Sung;Sung-Sook Kook;Moon-Jeong Chang;Mee-Jeong Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1336-1339
    • /
    • 2008
  • 최근, 우리 군에서는 무선을 기반으로 하는 차세대 전술통신 체계인 전술 종합 정보 통신 체계 (TICN: Tactical Information Communication Network) 구축 사업을 진행하고 있다. 이 시스템의 백본 역할을 수행하는 TICN 전달망에서의 라우팅 알고리즘은 기존 인터넷에서 사용 중인 표준 라우팅 알고리즘과는 다른 특성이 요구된다. 즉 무선전송 링크의 특성 및 재밍 등의 영향으로 링크 상태가 불안정한 상황에서도 생존성과 안정성이 요구되는 군 전술망 환경에 적합하여야 하며, TICN 전달망의 자원 효율성도 최대화할 수 있어야 한다. 그러므로 본 논문에서는 기존의 인터넷 표준 라우팅 프로토콜들 중에서 네트워크 상태변화에 신속하게 대처할 수 있으며, 이미 널리 사용되고 있는 OSPF 프로토콜을 TICN 전달망에 적합한 라우팅 프로토콜이 되도록 수정하고자 한다. 이를 위해 라우팅 프로토콜의 대상 네트워크가 유선망에서 무선 전술 백본망으로 변경됨에 따라 튜닝될 필요가 있는 프로토콜 파라미터들을 추출하고, 시뮬레이션을 통해 추출한 파라미터들의 값들을 튜닝 하고자 한다.

A Hybrid Authentication Scheme for Wireless MSAP Mesh Networks in the Next-Generation TMCS (차세대 전술이동통신체계 무선 MSAP 메쉬망을 위한 혼합형 인증기법)

  • Bae, Byoung-Gu;Yoon, Sun-Joong;Ko, Young-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1011-1019
    • /
    • 2012
  • This paper presents a novel hybrid authentication scheme in the next-generation Tactical Mobile Communication Systems(TMCS) with wireless MSAP mesh networks. The existing centralized and distributed authentication methods for security between MSAPs may have their pros and cons. The centralized authentication method induces overhead from frequent MSAP association which leads to long authentication delay. On the other hand, the distributed authentication method requires initial sharing of the authentication information. Therefore, a more efficient authentication scheme is needed to protect the network from malicious MSAPs and also maximize efficiency of the network security. The proposed scheme provides a hybrid method of efficiently managing the authentication keys in the wireless MSAP mesh network to reduce the induced authentication message exchange overhead. Also, as the authentication method between MSAP and TMFT is different, a method of utilizing the ACR for handling the EAP packets is proposed. In overall, the proposed scheme provides efficient mutual authentication between MSAPs especially for tactical environments and is analyzed through performance evaluation to prove its superiority.

An Efficient Detection and Management Technique of Misbehavior nodes in Ad-hoc Networks (Ad-hoc 네트워크에서의 효율적인 비정상행위 노드 탐지 및 관리 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.71-80
    • /
    • 2009
  • Ad-hoc network consists f mobile nodes, which they are together in the communication. However, if some misbehaving nodes are in network, it is faced to many threats. Therefore, detection and management of misbehaving node are necessary to make confident in Ad-hoc networks. To solve this problem, we use Node Weight Management Server(NWMS), which it manage each node's weight in local area. When NWMS detect misbehaving node, it adds the node's weight and if the node's weight exceeds threshold then NWMS broadcasts the node's information to isolate in network. These mechanisms show that they are highly effective and can reliably detect a multitude of misbehaving node.

A Study on Non-participating TDL Message Analyzer (비가입형 TDL 메시지 분석기에 관한 연구)

  • Hwang, Byoung-Han;Lee, Jung-Woong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.3
    • /
    • pp.290-294
    • /
    • 2018
  • Modern warfare exhibit a NCW (Network Centric Warfare) aspect through quick situation awareness and Command and Control. And Tactical messages operate on various tactical data links (TDLs). For monitoring TDL messages processed by data link processor(DLP), message analysers are generally developed as a component during system development. In addition, in order to forward TDL messages processed by DLP to the message anayzer, the interface messages between DLP and message analysers should be defined interface control document(ICD). We propose the methods using UDP or TCP packets provided by TDL layers that are delivered to DLP without communicating directly with DLP. Depending on TDL message standards and Interface Control Documents(ICDs), we design the message analyzer which communicates with data link processor using internal messages. Using known header field information from the TDL application standard such as JREAP-C, we can quickly filter candidate packets against collected packets and use the full data size information contained in the headers to verify the completed message. Because the methods proposed in this paper do not communicate directly with DLP, the methods proposed in this paper are enable to analyze the TDL application messages such as JREAP-C or Link-K without constraints in existing methods that should be reflected in the system configuration and ICD.

A CSMA/CA with Binary Exponential Back-off based Priority MAC Protocol in Tactical Wireless Networks (전술 무선망에서 2진 지수 백오프를 사용하는 CSMA/CA 기반 우선순위 적용 MAC 프로토콜 설계)

  • Byun, Ae-Ran;Son, Woong;Jang, Youn-Seon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.12-19
    • /
    • 2015
  • In network-centric warfare, the communication network has played a significant role in defeating an enemy. Especially, the urgent and important data should be preferentially delivered in time. Thus, we proposed a priority MAC protocol based on CSMA/CA with Binary Exponential Back-off for tactical wireless networks. This MAC protocol suggested a PCW(Prioritized Contention Window) with differentiated back-off time by priority and a RBR(Repetitive Back-off Reset) to reset the remaining back-off time. The results showed that this proposed MAC has higher performance than those of DCF(Distributed Coordination Function) in the transmission success rate and the number of control packet transmission by reducing the packet collision. Thus, it produced more effective power consumption. In comparison with DCF, this proposed protocol is more suitable in high-traffic network.

A Two-Way Authentication Protocol Based on Hash Collision for Unmanned Systems in Tactical Wireless Networks (전술 무선 네트워크에서 무인체계를 위한 해시 충돌 기반의 양방향 인증 프로토콜)

  • Lee, Jong-kwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.729-738
    • /
    • 2019
  • In this paper, we propose two-way authentication protocol between unmanned systems in tactical wireless networks in which long distance communications are not guaranteed due to a poor channel conditions. It is assumed that every unmanned systems have same random data set before they put into combat. The proposed protocol generates authentication code(AC) using random data that causes hash collision. The requester for authentication encrypts the materials such as their identifier, time-stamp, authentication code with the secret key. After then the requester transmits the encrypted message to the receiver. The receiver authenticates the requester by verifying the authentication code included in the request message. The performance analysis of the proposed protocol shows that it guarantees the security for various attack scenarios and efficiency in terms of communication overhead and computational cost. Furthermore, we analyzed the effect of the parameter values of the proposed protocol on the performance and suggest appropriate parameter value selection guide according to the level of security requirement.

Group Key Management Scheme for Survelliance and Reconnaissance Sensor Networks based on Probabilistic Key Sharing (확률론적 키 공유를 통한 감시정찰 센서네트워크에서의 그룹 키 관리 기법)

  • Bae, Si-Hyun;Lee, Soo-Jin
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.29-41
    • /
    • 2010
  • Survelliance and Reconnaissance Sensor Network(SRSN) which can collect various tactical information within battlefield in real time plays an important role in NCW environment, of sensor to shooter architecture. However, due to the resource-limited characteristics of sensor nodes and the intrinsic attributes of sensor network such as wireless communication, the SRSN may be vulnerable to various attacks compared to traditional networks. Therefore, in this paper, we propose a new group key management scheme to guarantee confidentiality, integrity, availability, and authentication during the operation of the SRSN. Proposed scheme generates and distributes the group key based on the topological characteristic of the SRSN and the probabilistic key sharing. The communication cost for distributing the group key is O(logn).