• Title/Summary/Keyword: Tactical Wireless Networks

Search Result 41, Processing Time 0.034 seconds

Environment Monitoring System Using RF Sensor (RF 센서를 이용한 해양 환경 관리 시스템)

  • Cha, Jin-Man;Park, Yeoun-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.896-898
    • /
    • 2012
  • Recently, many countries are making efforts for the development of ocean resources because the necessity and importance of the ocean resources are increased. Underwater sensor networks have emerged as a very powerful technique for many applications, including monitoring, measurement, surveillance and control and envisioned to enable applications for oceanographic data collection, ocean sampling, environmental and pollution monitoring, offshore exploration, disaster prevention, tsunami and seaquake warning, assisted navigation, distributed tactical surveillance, and mine reconnaissance. The idea of applying sensor networks into underwater environments (i.e., forming underwater sensor networks) has received increasing interests in monitoring aquatic environments for scientific, environmental, commercial, safety, and military reasons. The data obtained by observing around the environment are wireless-transmitted by a radio set with various waves. According to the technical development of the medium set, some parameters restricted in observing the ocean have been gradually developed with the solution of power, distance, and corrosion and watertight by the seawater. The actual matters such as variety of required data, real-time observation, and data transmission, however, have not enough been improved just as various telecommunication systems on the land. In this paper, a wireless management system will be studied through a setup of wireless network available at fishery around the coast, real-time environmental observation with RF sensor, and data collection by a sensing device at the coastal areas.

  • PDF

A Study on modifying OSPF protocol for wireless tactical backbone networks (무선 전술 백본망을 위한 OSPF 프로토콜 수정 방안)

  • Yoon-Young Sung;Sung-Sook Kook;Moon-Jeong Chang;Mee-Jeong Lee
    • Annual Conference of KIPS
    • /
    • 2008.11a
    • /
    • pp.1336-1339
    • /
    • 2008
  • 최근, 우리 군에서는 무선을 기반으로 하는 차세대 전술통신 체계인 전술 종합 정보 통신 체계 (TICN: Tactical Information Communication Network) 구축 사업을 진행하고 있다. 이 시스템의 백본 역할을 수행하는 TICN 전달망에서의 라우팅 알고리즘은 기존 인터넷에서 사용 중인 표준 라우팅 알고리즘과는 다른 특성이 요구된다. 즉 무선전송 링크의 특성 및 재밍 등의 영향으로 링크 상태가 불안정한 상황에서도 생존성과 안정성이 요구되는 군 전술망 환경에 적합하여야 하며, TICN 전달망의 자원 효율성도 최대화할 수 있어야 한다. 그러므로 본 논문에서는 기존의 인터넷 표준 라우팅 프로토콜들 중에서 네트워크 상태변화에 신속하게 대처할 수 있으며, 이미 널리 사용되고 있는 OSPF 프로토콜을 TICN 전달망에 적합한 라우팅 프로토콜이 되도록 수정하고자 한다. 이를 위해 라우팅 프로토콜의 대상 네트워크가 유선망에서 무선 전술 백본망으로 변경됨에 따라 튜닝될 필요가 있는 프로토콜 파라미터들을 추출하고, 시뮬레이션을 통해 추출한 파라미터들의 값들을 튜닝 하고자 한다.

Channel-Hopping Scheme for Enhancing Fairness Performance under Smart Jammer Attacks in Tactical WLANs (전술 무선랜 재밍 환경에서의 형평성 성능 향상을 위한 채널도약 기법)

  • Kim, Yongchul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.11
    • /
    • pp.2188-2195
    • /
    • 2015
  • In tactical wireless local area networks, jamming attack can easily occur by sending out continuous radio signals. The damage will be serious when the channel frequency is identical. Since wireless channel environment is open to everyone, the perfect solution for jamming attack does not exist. However, a channel-hopping scheme is well known for mitigating those jamming attacks. In this paper, I consider various channel-hopping schemes in order to analyze the throughput and fairness performance under smart jammer attack. Also an analytical model is introduced to evaluate the throughput performances of channel-hopping schemes. After analyzing well known channel-hopping schemes, I propose a simple channel-hopping scheme that can enhance fairness significantly at minimal throughput degradation expense.

Epidemic Reliable Multicast by Peer Collaborations in Wireless Tactical Networks (무선 전술 네트워크에서 단말의 협력을 통한 전염 기반의 신뢰성 있는 멀티캐스트)

  • Hong, Min-Ki;Kang, Kyung-Ran;Cho, Young-Jong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10B
    • /
    • pp.865-875
    • /
    • 2008
  • In this paper, we propose a reliable multicast scheme for the tactical wireless ad hoc network where the members share the situation and operation data. Our scheme consists of two phases to guarantee the reliability. During the dissemination phase, we utilizes an epidemic approach similar to gossip-based ad hoc routing. Then the group members interchange the message reception state information periodically so that they are able to recover missing packets from the other members. We evaluate the performance of our scheme through extensive simulations using the network simulator in comparison with other existing reliable multicast schemes in mobile ad hoc network. Our scheme shows higher packet delivery ratio regardless of the mobility and imposes much lower control overhead to the non-group members compared with the existing schemes.

An Intrusion Detection Technique Suitable for TICN (전술정보통신체계(TICN)에 적합한 침입탐지 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1097-1106
    • /
    • 2011
  • Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.

Group Key Management Scheme for Survelliance and Reconnaissance Sensor Networks based on Probabilistic Key Sharing (확률론적 키 공유를 통한 감시정찰 센서네트워크에서의 그룹 키 관리 기법)

  • Bae, Si-Hyun;Lee, Soo-Jin
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.29-41
    • /
    • 2010
  • Survelliance and Reconnaissance Sensor Network(SRSN) which can collect various tactical information within battlefield in real time plays an important role in NCW environment, of sensor to shooter architecture. However, due to the resource-limited characteristics of sensor nodes and the intrinsic attributes of sensor network such as wireless communication, the SRSN may be vulnerable to various attacks compared to traditional networks. Therefore, in this paper, we propose a new group key management scheme to guarantee confidentiality, integrity, availability, and authentication during the operation of the SRSN. Proposed scheme generates and distributes the group key based on the topological characteristic of the SRSN and the probabilistic key sharing. The communication cost for distributing the group key is O(logn).

A Proposal on Cryptographic Synchronization for T4 Link Encryption (T4급 링크 암호에 적합한 암호 동기방식 제안)

  • Lee, HoonJae;Kim, KiHwan;Kang, YongJin;Lee, Sang-Gon;Ryu, Young-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.202-210
    • /
    • 2018
  • The modern battlefield is being developed as a network-centric warfare where priority is given to rapid status grasp and power deployment through scientification and modernization. Therefore, tactical data link has been continuously improving the network speed, and recently, security technology is required for wireless communication with the UAV and various devices for reconnaissance. In addition, the future information warfare will utilize advanced IT technology positively. Efforts are needed to integrate various systems and networks. However, these efforts are meaningful only when they can assume sufficient security in a newly changing information and communication environment. In this paper, we propose a new cryptographic synchronization for link encryption suitable for tactical data links. The proposed cryptographic synchronization is useful for T4 UAV link encryption, and it is also adaptable for lower BER, then we analyze the performances analysis of that.

Policy-based Dynamic Channel Selection Architecture for Cognitive Radio Tactical Wireless Networks (인지 전투무선망에서 정책기반 동적 채널 선택 구조에 대한 연구)

  • Kim, Jong-Yon;Kwon, Se-Hoon;Kim, Eun-Ho;Roh, Byeong-Hee;Choi, Geun-Kyung;Shin, Bong-Jhin;Park, Soo-Bum
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.72-74
    • /
    • 2012
  • 본 논문은 미래 군에서 CR (Cognitive Radio) 기술을 적용한 전투무선망에서의 효율적인 주파수 사용을 위한 정책기반 동적 채널 선정 구조를 제안한다. 전투무선망에서는 상용의 기지국과 같은 Coordinator가 존재하지 않기 때문에 효율적인 채널 사용을 위해서 각 상황마다 어떻게 대응할 것인가에 대한 고려사항이 있다. 이에 대한 해결책으로 정책기반의 동적 채널 선택 구조를 제안하며, 이는 각 상황에 따른 규칙이나 행동을 사전에 정책으로 정의하여 특정 Coordinator가 없더라도 해당 상황이 발생하면 사전 정의된 정책에 의해서 동적 채널 선택을 하는 것이다. 즉, 전투무선망에서 작전상황이나 전술통신환경의 변화에 따라 PU (Primary User)나 SU (Secondary User)를 동적으로 할당하는 것을 의미한다. 모의 실험결과 별도의 정책 없이 Random하게 동적 채널을 선택하는 기존기법보다 정책기반의 기법이 월등한 성능향상을 보였다.

Efficient Data Storage & Query Processing Methods in Military Ubiquitous Sensor Networks (군 USN 환경에서 효율적인 데이터 저장 및 질의 처리 방법 연구)

  • Kwon, Young-Mo;Choi, Hyun-Sik;Chung, Yon-Dohn
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.5
    • /
    • pp.875-885
    • /
    • 2010
  • Recently, the role of Ubiquitous Sensor Network(USN) has been considered to be essential for supporting the near future Network Centric Warfare(NCW) and Tactical Information Communication Network(TICN). In this paper, we explore a set of data storage methods(external storage, local storage and data storage) and query processing methods in WSN. In particular, we focus on analyzing a novel data structure for supporting the local storage method, named the partial ordered tree(POT). The main idea behind POT is that sensor readings are usually correlated with the physical spatial domain. With the help of POT, only a small portion of sensor nodes participate in query processing tasks, and thus network lifetime is greatly increased. Through a series of simulation experiments, we demonstrate that the POT based local storage method clearly outperforms the existing data storage methods in terms of the energy-efficiency, which directly affects the network lifetime, for processing exact match queries, range queries and top-k queries.

Resource Reservation Based Image Data Transmission Scheme for Surveillance Sensor Networks (감시정찰 센서 네트워크를 위한 자원예약 기반 이미지 데이터 전송 기법)

  • Song, Woon-Seop;Jung, Woo-Sung;Ko, Young-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1104-1113
    • /
    • 2014
  • Future combat systems can be represented as the NCW (Network Centric Warefare), which is based on the concept of Sensor-to-Shooter. A wireless video sensor networking technology, one of the core components of NCW, has been actively applied for the purpose of tactical surveillance. In such a surveillance sensor network, multi-composite sensors, especially consisting of image sensors are utilized to improve reliability for intrusion detection and enemy tracing. However, these sensors may cause a problem of requiring very high network capacity and energy consumption. In order to alleviate this problem, this paper proposes an image data transmission scheme based on resource reservation. The proposed scheme can make it possible to have more reliable image data transmission by choosing proper multiple interfaces, while trying to control resolution and compression quality of image data based on network resource availability. By the performance analysis using NS-3 simulation, we have confirmed the transmission reliability as well as energy efficiency of the proposed scheme.