• Title/Summary/Keyword: Tactical communication

Search Result 194, Processing Time 0.03 seconds

Analysis of TM/TC data protocol of Military Unmanned Aerial Vehicles (군용 무인항공기의 TM/TC 데이터 프로토콜 분석)

  • Hong, Su-woon;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.391-393
    • /
    • 2017
  • Unmanned aerial vehicles(UAVs) operating in the military for various purposes are designed to transmit information collected according to the purpose to GCS(Ground Control System), and to transmit/receive the vehicle's operational control and status information using wireless communication(or datalink). Currently, the military UAV systems in operation in Korea use unique communication methods, protocols, and message structures for each system. In this paper, we analyze the TM/TC data protocol of two types of military UAV systems currently under development and propose a more efficient TM/TC message design scheme in wireless communication(or datalink) environment. And we will discuss issues to be considered for standardization of technology for ensuring interoperability with many UAVs or newly introduced UAV systems.

  • PDF

An Intrusion Detection Technique Suitable for TICN (전술정보통신체계(TICN)에 적합한 침입탐지 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1097-1106
    • /
    • 2011
  • Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.

Study of consideration for future tactical communication system development (미래 전술통신체계개발을 위한 고려사항 연구)

  • Byun, Jongsin;Park, Sangjun;Kim, Yongchul
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.35-41
    • /
    • 2018
  • The Army has developed the concept of terrestrial warfare in conjunction with the Joint Concept and has introduced TICN as the base communication system to support it. TICN has been used to improve the transmission speed and to increase the coverage distance. Through this, TICN is making efforts to create network-centered operation environment so that information can be distributed in real time or near real time from the monitoring system to the hitting system. However, TICN is not enough to overcome the network limitations that may arise from various contingencies in battlefield situations. Therefore, in this paper, we investigated the limitations of communication according to the situations that can occur in the battlefield situation and studied the considerations to overcome them.

  • PDF

A Study on the effect of high-performance frequency hopping radio system to next-generation aircraft and improvement Anti-jamming communication (고성능 주파수 도약 공지통신 무전기의 차세대 항공기 적용과 항공기 항재밍 통신장비 개량에 따른 효과 연구)

  • Lee, Kwangyull;Yong, Taeho;Ahn, Seungbeom;An, Kyeongsoo;Jang, Indong;Han, Chulhee
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.113-124
    • /
    • 2022
  • In wartime conditions, the communication system of military aircraft is exposed to jamming, and it is necessary to mount communication equipment with high anti-jamming performance in order to perform air operations smoothly even in an environment where jamming attempts are made. In this paper, we check in detail the jamming and anti-jamming technology that can be applied to wireless communication, and the data disclosed on the difference in specifications of the next-generation anti-jamming radio with frequency hopping method and the improvement of anti-jamming performance according to these changes. It was briefly analyzed within the scope. In addition, the points to be considered when designing a new domestic aircraft and the possibility of installing the next-generation anti-jamming communication equipment on the currently operating aircraft were confirmed, and the tactical usefulness of improving the anti-jamming capability of the next-generation anti-jamming communication equipment was confirmed.

QoS Enhancement Based on Link Quality in Tactical Data Link of KVMF (KVMF 전술네트워크에서 링크 품질에 기반한 QoS 향상 방안)

  • Kwon, Koo-Hyung;Jeong, Hyun-Sook;Lim, Won-Gi;Yoon, Young-Deuk;Kim, Sang-Soo;Lee, Sang-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.2
    • /
    • pp.139-150
    • /
    • 2014
  • This paper suggests an algorithm to improve QoS by using DTR bit employed in the MIL-STD-188-220 protocol, when there is a multi-path between source and destination in the environment of KVMF tactical network supporting NCW. The MIL-STD-188-220 protocol can evaluate the link quality relatively but it cannot support optimal path selection for QoS. In order to solve this problem, we design an algorithm for selecting path using topology table which reflects measured DTR of path after the completion of transmission. The performance of the proposed algorithm has been evaluated by OPNET simulator. As a result of the simulation, it is found that QoS of proposed algorithm is enhanced higher than that of the MIL-STD-188-220 in the aggravated communication environment.

The Multi-Net Performance Evaluation of Link-16 in the L-Band Sharing with Radars (L-대역 내 레이더 주파수 공동사용 환경에서 멀티넷을 통한 Link-16 운용 가능성 성능 평가)

  • Choi, Seonjoo;Yu, Jepung;Lim, Jaesung;Baek, Hoki;Kim, Jaewon;Choi, Hyogi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.7
    • /
    • pp.738-746
    • /
    • 2016
  • As the trend of future war has been changed to network centric warfare, tactical data link should be needed for fast and accurate situation awareness. Nowadays, Korean air force conducts military operations by using aircrafts equipped with Link-16. The Link-16 can conduct multiple mission at the same time because it supports multi-net capability. Due to lack of frequency resource, the way to share the frequency with other systems has been studied and using L band with radar is considered as one of the candidates bands. However, the data link can be affected by the interference from radars when it shares the L-band because the L-band in Korea is already assigned to long-range detection radars. In this paper, we evaluate operational possibilities of tactical data link in the L-band based on Link-16.

A Hybrid Authentication Scheme for Wireless MSAP Mesh Networks in the Next-Generation TMCS (차세대 전술이동통신체계 무선 MSAP 메쉬망을 위한 혼합형 인증기법)

  • Bae, Byoung-Gu;Yoon, Sun-Joong;Ko, Young-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1011-1019
    • /
    • 2012
  • This paper presents a novel hybrid authentication scheme in the next-generation Tactical Mobile Communication Systems(TMCS) with wireless MSAP mesh networks. The existing centralized and distributed authentication methods for security between MSAPs may have their pros and cons. The centralized authentication method induces overhead from frequent MSAP association which leads to long authentication delay. On the other hand, the distributed authentication method requires initial sharing of the authentication information. Therefore, a more efficient authentication scheme is needed to protect the network from malicious MSAPs and also maximize efficiency of the network security. The proposed scheme provides a hybrid method of efficiently managing the authentication keys in the wireless MSAP mesh network to reduce the induced authentication message exchange overhead. Also, as the authentication method between MSAP and TMFT is different, a method of utilizing the ACR for handling the EAP packets is proposed. In overall, the proposed scheme provides efficient mutual authentication between MSAPs especially for tactical environments and is analyzed through performance evaluation to prove its superiority.

Improved AODV Routing Protocol Considering the Link Quality of Wireless Transmission Environments (무선 전송환경의 링크품질을 고려한 개선된 AODV 라우팅프로토콜)

  • Lee, Tae-Hoon;Jeun, Sung-Woo;Kim, Young-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1903-1911
    • /
    • 2016
  • As interest in MANET is increasing nowadays, research upon an efficient MANET routing protocol is actively under way. A LQA(Link Qualty Aware)-AODV routing protocol to deal with frequent changes of topology and wireless link variations under tactical operating conditions is proposed in this paper. The suggested LQA-AODV takes into account the channel capacity of each hop during the route request process of the traditional AODV protocol. In detail, LQA-AODV adds a channel capacity cost value to the RREQ message format that occurs during the routing process of the existing AODV Routing Protocol causing the accumulated channel capacity cost values of each sections to be compared before establishing a route. To verify the performance of LQA-AODV, NS2.35 was utilized and the Link-Quality Model was applied in order to reflect the tactical wireless environment. The simulation compares and analyzes LQA-AODV and the existing AODV, showing a large improvement over the traditional AODV in regards to the Packet Delivery Ratio, and End-to-End Delay.

High Power Amplifier Design and Fabrication for Tactical Data Link (전술데이터링크용 고출력증폭기 설계 및 제작)

  • Kim, Jong-Sung;Bae, Moon-Kwan;Kim, Joo-Yeon
    • Journal of IKEEE
    • /
    • v.21 no.4
    • /
    • pp.338-347
    • /
    • 2017
  • This paper describes the design and fabrication of a high power amplifier which is a component of TDL(Tactical Data Link) aircraft terminal. We applied high-speed frequency hopping technology, cognitive radio technology, and receive filter bank technology to efficiently use limited frequency resources with radar and other communication equipment using the same frequency band. The high-power amplifier is physically composed of a transmitter, a receiver, a mechanical part, and a cable assembly, and is designed to meet temperature characteristics and electrical characteristics such as maximum transmission distance and reception sensitivity. Modeling and simulator were used to satisfy the requirement of high power amplifier. The transmit power and the noise figure were measured at 50.02dBm and 2.682dB, respectively. It was confirmed that all the required specifications were satisfied in the electrical characteristics test and the environmental characteristic test.

A CSMA/CA with Binary Exponential Back-off based Priority MAC Protocol in Tactical Wireless Networks (전술 무선망에서 2진 지수 백오프를 사용하는 CSMA/CA 기반 우선순위 적용 MAC 프로토콜 설계)

  • Byun, Ae-Ran;Son, Woong;Jang, Youn-Seon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.12-19
    • /
    • 2015
  • In network-centric warfare, the communication network has played a significant role in defeating an enemy. Especially, the urgent and important data should be preferentially delivered in time. Thus, we proposed a priority MAC protocol based on CSMA/CA with Binary Exponential Back-off for tactical wireless networks. This MAC protocol suggested a PCW(Prioritized Contention Window) with differentiated back-off time by priority and a RBR(Repetitive Back-off Reset) to reset the remaining back-off time. The results showed that this proposed MAC has higher performance than those of DCF(Distributed Coordination Function) in the transmission success rate and the number of control packet transmission by reducing the packet collision. Thus, it produced more effective power consumption. In comparison with DCF, this proposed protocol is more suitable in high-traffic network.