• Title/Summary/Keyword: Tactical Message

Search Result 58, Processing Time 0.029 seconds

k-hop Flooding-based Multicast Considering the Limited Mobility of Mobile Nodes and Intermittent Disconnection (노드의 제한적 이동성과 간헐적인 연결 단절을 고려한 k-홉 플러딩 기반 멀티캐스트)

  • Im, Kwang-Bin;Kang, Kyung-Ran;Cho, Young-Jong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6A
    • /
    • pp.600-610
    • /
    • 2010
  • In this paper, a multicast mechanism is proposed for intermittently disconnected networks where the nodes move forward in formation or within a limited area. The proposed scheme extends the well-known tree-based multicast routing mechanism called MAODV by modifying the tree construction and data delivery scheme. Especially, an algorithm is introduced which determines the flooding hop count k estimating the degree of the movement of children in the tree. The performance evaluation was done by the simulation and the proposed scheme was compared with MAODV and two multicast routing schemes for DTN (Disruption Tolerant Network) including the Epidemic routing and ST-multicast. The evaluation results show that our scheme improves the original MAODV from the aspect of tree reconstruction events and message delivery ratio. Compared with the Epidemic routing scheme, our scheme achieves 85% message delivery ratio with less than 50% message delivery overhead.

A Study on Effective Emergency Message Transmission in Combat Radio Network (전투무선망에서의 효과적인 긴급 메시지 전송 방안에 대한 연구)

  • Kim, Hyung-Seok;Shin, Sang-Heon;Lee, Jeong-Min
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.285-286
    • /
    • 2019
  • 본 논문에서는 전투무선망에서 효과적인 긴급 메시지 전송 방안에 대한 방안을 제시한다. NCW 환경에서 대대급 이하 전투부대들은 전투무전기와 전술단말기를 활용하여 아군, 적군 위치와 속성정보, 활동 정보 등을 상호간 공유하여 통합적이고 효율적인 전투를 수행해야 하지만, 낮은 대역폭과 낮은 전송속도를 사용할 수밖에 없는 전투무선망을 활용하고 있으므로, 각 노드별 메시지 전송 전송성공률을 높이기 위해 전투무선망의 특성을 반영해야 한다. 이에 본 논문에서는 전투무선망에서의 긴급 메시지(적 발견 보고, 화생방 보고 등) 전송 시 부대 운용구조를 활용하여 모든 노드에 데이터가 효과적으로 전달될 수 있는 방안을 제시한다.

  • PDF

A Hybrid Authentication Scheme for Wireless MSAP Mesh Networks in the Next-Generation TMCS (차세대 전술이동통신체계 무선 MSAP 메쉬망을 위한 혼합형 인증기법)

  • Bae, Byoung-Gu;Yoon, Sun-Joong;Ko, Young-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1011-1019
    • /
    • 2012
  • This paper presents a novel hybrid authentication scheme in the next-generation Tactical Mobile Communication Systems(TMCS) with wireless MSAP mesh networks. The existing centralized and distributed authentication methods for security between MSAPs may have their pros and cons. The centralized authentication method induces overhead from frequent MSAP association which leads to long authentication delay. On the other hand, the distributed authentication method requires initial sharing of the authentication information. Therefore, a more efficient authentication scheme is needed to protect the network from malicious MSAPs and also maximize efficiency of the network security. The proposed scheme provides a hybrid method of efficiently managing the authentication keys in the wireless MSAP mesh network to reduce the induced authentication message exchange overhead. Also, as the authentication method between MSAP and TMFT is different, a method of utilizing the ACR for handling the EAP packets is proposed. In overall, the proposed scheme provides efficient mutual authentication between MSAPs especially for tactical environments and is analyzed through performance evaluation to prove its superiority.

Epidemic Reliable Multicast by Peer Collaborations in Wireless Tactical Networks (무선 전술 네트워크에서 단말의 협력을 통한 전염 기반의 신뢰성 있는 멀티캐스트)

  • Hong, Min-Ki;Kang, Kyung-Ran;Cho, Young-Jong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10B
    • /
    • pp.865-875
    • /
    • 2008
  • In this paper, we propose a reliable multicast scheme for the tactical wireless ad hoc network where the members share the situation and operation data. Our scheme consists of two phases to guarantee the reliability. During the dissemination phase, we utilizes an epidemic approach similar to gossip-based ad hoc routing. Then the group members interchange the message reception state information periodically so that they are able to recover missing packets from the other members. We evaluate the performance of our scheme through extensive simulations using the network simulator in comparison with other existing reliable multicast schemes in mobile ad hoc network. Our scheme shows higher packet delivery ratio regardless of the mobility and imposes much lower control overhead to the non-group members compared with the existing schemes.

Improved AODV Routing Protocol Considering the Link Quality of Wireless Transmission Environments (무선 전송환경의 링크품질을 고려한 개선된 AODV 라우팅프로토콜)

  • Lee, Tae-Hoon;Jeun, Sung-Woo;Kim, Young-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1903-1911
    • /
    • 2016
  • As interest in MANET is increasing nowadays, research upon an efficient MANET routing protocol is actively under way. A LQA(Link Qualty Aware)-AODV routing protocol to deal with frequent changes of topology and wireless link variations under tactical operating conditions is proposed in this paper. The suggested LQA-AODV takes into account the channel capacity of each hop during the route request process of the traditional AODV protocol. In detail, LQA-AODV adds a channel capacity cost value to the RREQ message format that occurs during the routing process of the existing AODV Routing Protocol causing the accumulated channel capacity cost values of each sections to be compared before establishing a route. To verify the performance of LQA-AODV, NS2.35 was utilized and the Link-Quality Model was applied in order to reflect the tactical wireless environment. The simulation compares and analyzes LQA-AODV and the existing AODV, showing a large improvement over the traditional AODV in regards to the Packet Delivery Ratio, and End-to-End Delay.

$M^2$ MAC: MAC protocol for Real Time Robot Control System based on Underwater Acoustic Communication ($M^2$ MAC(Message Merging): 수중음파통신 기반의 실시간 로봇 제어 시스템을 위한 MAC 프로토콜)

  • Kim, Yung-Pyo;Park, Soo-Hyun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.6
    • /
    • pp.88-96
    • /
    • 2011
  • Underwater acoustic communication is applicable in various areas, such as ocean data collection, undersea exploration and development, tactical surveillance, etc. Thus, robot control system construction used for underwater-robot like AUV or ROV is essential in these areas. In this paper, we propose the Message Merging MAC($M^2$-MAC) protocol, which is suitable for real time robot control system, considering energy efficiency in important parts of underwater acoustic sensor network constitution. In this proposed MAC protocol, gateway node receives the data from robot nodes according to the time slots that were allotted previously. And messages delivered from base-station are generated to one MAC frame by buffering process. Finally, generated MAC frames are broadcasted to all robot nodes in the cluster. Our suggested MAC protocol can also be hybrid MAC protocol, which is successful blend of contention based and contention-free based protocol through relevant procedure with Maintenance&Sleep (M&S) period, when new nodes join and leave as an orphan. We propose mathematical analysis model concerned about End-to-End delay and energy consumption, which is important factor in constructing real-time robot control system. We also verify the excellence of performance according to comparison of existing MAC protocols with our scheme.

Design of TM/TC data protocol of Military Unmanned Aerial Vehicles (군용 무인기의 TM/TC 데이터 프로토콜 설계)

  • Hong, Su-woon;Kim, Young-kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.506-512
    • /
    • 2018
  • Unmanned aerial vehicles(UAVs) operating in the military for various purposes are designed to transmit information collected according to the purpose to GCS(Ground Control System), and to transmit/receive the vehicle's operational control and status information using wireless communication(or datalink). Currently, the military UAV systems in operation in Korea use unique communication methods, protocols, and message structures for each system. Among these, the Division UAV is designed to transmit fixed size TM/TC data repeatedly and the Corps UAV is designed to transmit aperiodic TM/TC data to the variable length of the message-based. In this paper, we analyze the TM/TC data protocol of existing military UAV systems and present data protocol design method which is considered to be more efficient in wireless communication environment applied to equipment under development. And we will discuss issues to be considered for standardization of technology for ensuring interoperability with many UAVs or newly introduced UAV systems.

A Study on the Estimation of Required Communication Capacity for Link-16 Based Tactical Networks (Link-16 기반 전술 네트워크를 위한 요구통신용량 산출에 관한 연구)

  • Kim, Young-Beom
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.1
    • /
    • pp.105-111
    • /
    • 2012
  • In this paper, we investigate the most commonly adopted networking technology for Network Centric Warfar (NCW), namely Link-16 in the perspectives of physical, data link, and network layers (specifically, strategic message exchanges) and derive its merits with some constraints therein. Furthermore, we perform a quantitative evaluation on its communication capacity, focusing on whether Link-16 can indeed meet the capacity requirements for major operations, based on the time slot structure, NPG, and multi-netting concepts.

GPS Jamming Resilient Location-based Routing for Unmanned Ground Vehicle Networks (무인 지상 차량 네트워크에서 GPS 재밍에 강인한 위치기반 라우팅)

  • Lee, Jinwoo;Jung, Woo-Sung;Kim, Yong-joo;Ko, Young-Bae;Ham, Jae-Hyun;Choi, Jeung-Won
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.4
    • /
    • pp.432-440
    • /
    • 2015
  • UGVs(Unmanned Ground Vehicles) are robots that can substitute humans in reconnaissance operations of potentially dangerous and contaminated sites. Currently, there have been active research on utilizing UGVs in military environments. Much resrach has been focused on exploiting the weakness of topology-based routing and instead utilize location-based routing for the networking of UGVs. It is generally assumed that location-based routing methods can fully utilize the location information gained from GPS. However, this may not be possible in tactical environments due to enemy GPS jamming and LOS(Line of Sight) limitations. To solve this problem, we propose a location-based routing scheme utilizing low control message that can calibrate the location information using GPS information as well as location of neighboring UGV, movement direct and speed information. Also utilizing topology-based routing scheme to solve incorrect location information in GPS jamming region.

Study of the Bomb Hit Indication of Moving Target Using Weapon Data Link Message (무장데이터링크 메시지를 이용한 기동표적 타격평가 연구)

  • Baek, Inhye;Woo, Sang Hyo;Kim, Ki Bum
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.2
    • /
    • pp.187-196
    • /
    • 2021
  • The Network-Centric warfare over weapon data link networks has been developed for the recent decade. Since the US navy had begun to develop tactical digital information chain, it has gradually transformed into weapon data link technology. As data link network system and its protocol have been advanced into high-technology, focusing and targeting on moving targets become possible in net-enabled environments. However, it is difficult to identify the primary information from numerous battlefields and understanding approaches to damage a target in a timely manner. In this paper, to better understand the targeting assessment, we suggest a specific solution: Bomb Hit Indication(BHI) using information in weapon data link messages. In order to prove our suggestion, we implement the BHI solution and apply it into the weapon data link integrating system.