• Title/Summary/Keyword: Tactical Wireless Network

Search Result 67, Processing Time 0.019 seconds

The Investigation of the Leased Line Modem Usability in the Wireless Internet Protocol Network (무선 IP 네트워크에서 전용선 모뎀 사용가능성 검증)

  • PARK, MINHO;Baek, Hae Hyeon;Kum, Dong Won;Choi, Hyungseok;Lee, Jong Sung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.4
    • /
    • pp.423-431
    • /
    • 2015
  • A leased line modem usability was evaluated and investigated in the wireless internet protocol(IP) network. The signal of the modem in the circuit switching network was translated to IP packet by using several voice codecs (PCM, G.711A, $G.711{\mu}$, and etc.) and transmitted through the wireless IP network. The wireless IP network was simulated by the Tactical information and communication network Modeling and simulation Software(TMS). The performance and usability of the leased line modem are simulated using the system-in-the-loop(SITL) function of TMS with respect to packet delay, jitter, packet discard ratio, codecs, and wireless link BER.

A Study on OSPF for Active Routing in Wireless Tactical Communication Network (전술통신망에서 능동적 라우팅을 위한 OSPF에 대한 연구)

  • Lee, Seung-Hwan;Lee, Jong-Heon;Lee, Hoon-Seop;Rhee, Seung-Hyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12B
    • /
    • pp.1211-1218
    • /
    • 2010
  • OSPF is the optimized routing protocol in wired network and considered as a tactical routing protocol in wireless tactical communication network. However because it is designed basically based on wired environment, it runs inadequately in wireless tactical environment: noise and jamming signal. So, we proposed new OSPF cost function to develop active routing protocol in wireless tactical communication network. In redefined cost function, there are four parameters that are relative transmission speed, link weight, router utilization, link average BER(Bit Error Rate). These parameters reflect wireless tactical characters. Also, we remodel the option field in Hello packet. It can help user to periodically check the link state. From the simulation result, it is shown that proposed OSPF is better than OSPF in jamming situation and has accumulative delay gain with dispersion of traffic load in entire network.

A Searching Technique of the Weak Connectivity Boundary using Small Unmanned Aerial Vehicle in Wireless Tactical Data Networks (무선 전술 데이터 네트워크에서 소형 무안항공기를 이용한 연결성 약화 지역 탐색 기법)

  • Li, Jin;Song, Ju-Bin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1C
    • /
    • pp.89-96
    • /
    • 2012
  • Since tactical robots are going to be grown and tactical data communications will be more network-centric, the reliability of wireless tactical data networks is going to be very important in the future. However, the connectivity of such wireless tactical data networks can be extremely uncertain in practical circumstances. In this paper, we propose a searching technique to find out the weak boundary area of the network connectivity using a small UAV(unmanned aerial vehicle) which has a simple polling access function to wireless nodes on the ground in wireless tactical data networks. The UA V calculates the network topology of the wireless tactical data networks and coverts it to the Lapalcian matrix. In the proposed algorithm, we iteratively search the eigenvalues and find a minimum cut in the network resulting in finding the weak boundary of the connectivity for the wireless tactical data networks. If a UAV works as a relay nodes for the weak area, we evaluate that the throughput performance of the proposed algorithm outperforms star connection method and MST(minimum Spanning Tree) connection method. The proposed algorithm can be applied for recovering the connectivity of wireless tactical data networks.

Implementation of Automatic Control Function of Tactical Communication Equipment to Wireless Communication Network Survivability Improvement (무선통신망 생존성 향상을 위한 전술 통신 장비 자동 제어 기능 구현 방안)

  • Park, Chang-Soo;Kim, Jong-Hyoun;Park, Chun-Seon;Nam, Duk-Hee;Kim, Jung-Eun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.467-469
    • /
    • 2018
  • Tactical wireless communications often suffer from communication problems such as channel interference and communication disconnection due to the variability of the network topology and poor communication environment. Therefore, it is very important to overcome the problem of communication failure of the wireless communication network caused by the poor tactical environment and to improve the survivability. This paper describes the automatic control methodology of wireless communication equipment to identify and distinguish the situation of communication failure without user intervention and to implement more effective solution.

  • PDF

Study of applicable security tunneling technique for military wireless network (군 무선네트워크 환경에서 적용 가능한 보안 터널링 기법 연구)

  • Kim, Yun-young;Namkung, Seung-Pil
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.107-112
    • /
    • 2015
  • Due to the rapid development of wireless communication technology, foundation system of military communication that is based on the daily use technology has been changed in to wireless system. However, military communication contains clssified information, and it is expected to have increase amount of enemy's there in such a imperfect security system. The next generation of tactical network communication system is expected to adopt All IP based wireless system. This research studies expected threatening factor on the wireless environment, and find the appropriate tunneling techniques.

Frequency Assignment Method using NFD and Graph Coloring for Backbone Wireless Links of Tactical Communications Network (통합 필터 변별도와 그래프 컬러링을 이용한 전술통신망 백본 무선 링크의 주파수 지정 방법)

  • Ham, Jae-Hyun;Park, Hwi-Sung;Lee, Eun-Hyoung;Choi, Jeung-Won
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.4
    • /
    • pp.441-450
    • /
    • 2015
  • The tactical communications network has to be deployed rapidly at military operation area and support the communications between the military command systems and the weapon systems. For that, the frequency assignment is required for backbone wireless links of tactical communications network without frequency interferences. In this paper, we propose a frequency assignment method using net filter discrimination (NFD) and graph coloring to avoid frequency interferences. The proposed method presents frequency assignment problem of tactical communications network as vertex graph coloring problem of a weighted graph. And it makes frequency assignment sequences and assigns center frequencies to communication links according to the priority of communication links and graph coloring. The evaluation shows that this method can assign center frequencies to backbone communication links without frequency interferences. It also shows that the method can improve the frequency utilization in comparison with HTZ-warfare that is currently used by Korean Army.

An Efficient Key Management Scheme in Tactical Ad-Hoc Network (전술 Ad-hoc 네트워크에서의 효율적인 키 관리 기법)

  • Kim, Eun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.3
    • /
    • pp.317-324
    • /
    • 2009
  • Tactical Information Communication Network(TICN) uses both a wireless and wired network. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. However, Ad-hoc network is faced to many security threats due to its intrinsic characteristics. Therefore, to apply the Ad-hoc networking technology to battlefield environments and TICN, an intensive study on security countermeasure must go side by side with the development of enabling technology. In this paper, we suggest an efficient key management scheme for TICN of which the Ad-hoc networking technology is applied.

A Routing Protocol for Improving Node Survivability in Tactical Ad-hoc Network (전술 Ad-hoc 네트워크에서 노드 생존성 향상을 위한 프로토콜 설계)

  • Kim, Young-An;Park, Gun-Woo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.1
    • /
    • pp.56-64
    • /
    • 2013
  • TICN, a next-generation tactical communication network based on a wireless network, acts as the backbone of the whole network. TICN requires the routing which takes both survivability of passage, reliability, and safety of wireless link into consideration. A tactical network like TICN may maintain the passage for just a short period of time due to topology's frequent changes; In this process all nodes, dependent on batteries for their necessary energy, are restricted by batteries' durability in due course. To overcome this shortcoming, the up-to-date protocols consider only either of diminishing or balancing out energy consumptions. Thus there was a limitation to enhancing both throughput and energy efficiency. The thesis proposes a protocol which regards both throughput and energy efficiency, and enhances node survivability by means of minimizing and balancing energy consumption of the whole network. The protocol brings out an improvement in throughput and makes each node's energy usage more effective.

A Location Dependent Group Key Management Scheme for High Confidential Information in Tactical Wireless Networks (전술 무선 네트워크에서 고비밀성 정보 공유를 위한 위치 종속적 그룹키 관리 기법)

  • Lee, Jong-Kwan;Shin, Kyuyong;Kim, Kyung-Min
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.5
    • /
    • pp.658-664
    • /
    • 2018
  • In this paper, we propose a group key management scheme for very high confidential information in tactical wireless networks. For the proposed scheme, we consider the tactical networks that has a hierarchical topology and the nature of high confidential information. The leader node, which may have higher probability of good channel state than others, provides some data to all the network member in order to generate a geographical group key and it transmits the encrypted information with minimum transmission power level to others. By this scheme, the security and reliability for sharing confidential information is ensured. The performance of the proposed scheme is validated by mathematical analysis. It shows that the proposed scheme makes nodes to share a high confidential information securely if the proper parameters for network design are selected.

Study on Cognitive Engine Platform Based on the Spectrum Sharing for the Military Tactical Communications (군 전술 통신에서의 주파수 공동사용 기반 인지엔진 플랫폼 연구)

  • Choi, Joo-Pyoung;Lee, Won-Cheol
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.7
    • /
    • pp.599-611
    • /
    • 2016
  • This paper proposes a cognitive engine platform that enables dynamic spectrum access(DSA) based on a spectrum sharing system for the military tactical network environment. The current military tactical wireless communication system is increasing need to secure a supplementary wireless spectrum to ensure that multiple wireless networks for different weapon systems co-exist, so that tactical wireless communication between the same or different systems can be operated effectively. This paper examined policy development and research activities engaged by the U.S. and European countries on wireless spectrum sharing to secure more spectrum. It also introduces the current status of cognitive engine development, which is the core technology of tactical wireless communication for DSA. In addition, based on the investigation performed into the latest trends, we propose a platform structure for a cognitive engine based on a spectrum sharing method where more frequencies can be added for tactical radio communication, so that DSA can be realized, and wireless networks of different weapon systems can co-exist.