• Title/Summary/Keyword: Weapon Control Software

Search Result 23, Processing Time 0.026 seconds

The development standard research for railway safety software (철도 안전 소프트웨어를 위한 개발 기준 연구)

  • Lee, Young-Jun;Kim, Jang-Yoel;Cha, Kyung-Ho;Cheon, Se-Woo;Lee, Jang-Soo;Kwon, Ki-Choon;Jung, Ui-Jin
    • Proceedings of the KSR Conference
    • /
    • 2007.05a
    • /
    • pp.968-973
    • /
    • 2007
  • The systems such as the railway control system, satellite control system and nuclear power plant control system are the safety critical systems because the failure of them could lead to risk significant events. These softwares of digital systems must follow the life cycle process from the beginning of software development to guarantee their safety and reliability. The NRC(Nuclear Regulatory Commission) Reg Guide of nuclear fields, the RTCA/DO-178B standard which is used to acquire the certification for software in industrial aero field in European Union and United State, the DEF STAN 00-55 standard for the safety of electronic weapon in England, the IEC 601-1-4 for medical equipment and the IEC 62279 for railway system recommended the development life cycle. This paper introduces the development process and compares each other. Also it indicates applicable development criteria for the software of systems related to railway fields and describes the detailed procedure of development criteria. We describe the procedure to make the software development criteria in nuclear filed. For the software development related to railways, the process from plan phase to maintenance phase must be satisfied. The safety and reliability is guaranteed through these standards.

  • PDF

Development of Operational Flight Program for Avionic System Computer (항공전자시스템컴퓨터 탑재소프트웨어 개발)

  • Kim, Young-Il;Kim, Sang-Hwan;Lim, Heung-Sik;Lee, Sung-Soo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.33 no.9
    • /
    • pp.104-112
    • /
    • 2005
  • This paper presents the technique to develop an operational flight program(OFP) of avionic system computer(ASC) which integrates the avionics control, navigation and fire control and provides informations for flight, navigation and weapon aiming missions. For the development of the OFP of ASC, two i960KB chips are used as central processing units board and standard computer interface library(SCIL) which is built in house is used. The Irvine compiler corporation(ICC) integrated development environment(IDE) and the programming language Ada95 are used for the OFP development. We designed the OFP to a computer software configuration item(CSCI) which consists of to three parts for independency of software modules. The OFP has been verified through a series of flight tests. The relevant tests also have been rigorously conducted on the OFP such as software integrated test, and ground functional test.

Suggestions for IT Convergence on Defense in the IT Firm's Perspective (IT기업 관점에서의 국방IT융합 추진방향)

  • Lee, Dong Hoon;Lee, Sangho
    • Journal of Information Technology Services
    • /
    • v.13 no.1
    • /
    • pp.57-69
    • /
    • 2014
  • IT convergence technology can boost the advancement of weapon systems and efficient operation for the military reformation in Korea. This study investigated IT firms' concern about the defense acquisition process for IT-convergent systems and the role of IT firms in the process with Focus Group Interview and in-depth interview on executives of IT firms, and classified the concern to three major issues. They are the clarification of IT firms' role in the defense IT-convergent efforts, the establishment of the control tower for defense IT convergence, and reasonable estimation of software development cost in the defense acquisition process.

A Model-based Test Approach and Case Study for Weapon Control System (모델기반 테스트 기법 및 무장통제장치 적용 사례)

  • Bae, Jung Ho;Jang, Bucheol;Koo, Bongjoo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.5
    • /
    • pp.688-699
    • /
    • 2017
  • Model-based test, a well-known method of the black box tests, is consisted of the following four steps : model construction using requirement, test case generation from the model, execution of a SUT (software under test) and detection failures. Among models constructed in the first step, state-based models such as UML standard State Machine are commonly used to design event-based embedded systems (e.g., weapon control systems). To generate test cases from state-based models in the next step, coverage-based techniques such as state coverage and transition coverage are used. Round-trip path coverage technique using W-Method, one of coverage-based techniques, is known as more effective method than others. However it has a limitation of low failure observability because the W-Method technique terminates a testing process when arrivals meet states already visited and it is hard to decide the current state is completely same or not with the previous in the case like the GUI environment. In other words, there can exist unrevealed faults. Therefore, this study suggests a Extended W-Method. The Extended W-Method extends the round-trip path to a final state to improve failure observability. In this paper, we compare effectiveness and efficiency with requirement-item-based technique, W-Method and our Extended W-Method. The result shows that our technique can detect five and two more faults respectively and has the performance of 28 % and 42 % higher failure detection probability than the requirement-item-based and W-Method techniques, respectively.

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.

A Reconfigurable Integration Test and Simulation Bed for Engagement Control Using Virtualization (가상화 기반의 재구성 용이한 교전통제 통합시험시뮬레이션 베드)

  • Kilseok Cho;Ohkyun Jeong;Moonhyung Yoon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.1
    • /
    • pp.91-101
    • /
    • 2023
  • Modeling and Simulation(M&S) technology has been widely used to solve constraints such as time, space, safety, and cost when we implement the same development and test environments as real warfare environments to develop, test, and evaluate weapon systems for the last several decades. The integration and test environments employed for development and test & evaluation are required to provide Live Virtual Construction(LVC) simulation environments for carrying out requirement analysis, design, integration, test and verification. Additionally, they are needed to provide computing environments which are possible to reconfigure computing resources and software components easily according to test configuration changes, and to run legacy software components independently on specific hardware and software environments. In this paper, an Integration Test and Simulation for Engagement Control(ITSEC) bed using a bare-metal virtualization mechanism is proposed to meet the above test and simulation requirements, and it is applied and implemented for an air missile defense system. The engagement simulation experiment results conducted on air and missile defense environments demonstrate that the proposed bed is a sufficiently cost-effective and feasible solution to reconfigure and expand application software and computing resources in accordance with various integration and test environments.

An Effective ESICD Verification Strategy: A case study of Military Satellite Communications System II

  • Lee, Kee-Sung;Choi, Jun-Ho;Shin, Jeong-Jin;Yoon, Hye-Jin;Kim, Seung-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.105-114
    • /
    • 2021
  • ESICD(Electrical Signal Interface Control Document) refers to a document that describes protocols and data for communication between components consist of a system. Each component developer gathers at a specific place to conduct an integrated test for ESICD verification. In this case, it often happens that the integration test is delayed due to a simple mistake of software developers. There are two reasons for this situation: First, software developers do not perform sufficient verification because it is difficult to configure the system environment in a Lab, and second, they do not immediately find the cause of errors occurred during integration tests. Therefore, in this paper, we propose a strategy to effectively perform ESICD verification, which takes a lot of time between the production and implementation stage of the weapon system development stage and the system integration test stage.

Analysis of Improving Requirement on Military Security Regulations for Future Command Control System (미래 지휘통제체계를 위한 보안 규정 개선 요구사항 분석)

  • Kang, Jiwon;Moon, Jae Woong;Lee, Sang Hoon
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.69-75
    • /
    • 2020
  • The command control system, like the human brain and nervous system, is a linker that connects the Precision Guided Missile(PGR) in information surveillance and reconnaissance (ISR) and is the center of combat power. In establishing the future command and control system, the ROK military should consider not only technical but also institutional issues. The US Department of Defense establishes security policies, refines them, and organizes them into architectural documents prior to the development of the command and control system. This study examines the security architecture applied to the US military command control system and analyzes the current ROK military-related policies (regulations) to identify security requirements for the future control system. By grouping the identified security requirements, this study identifies and presents field-specific enhancements to existing security regulations.

An Enterprise Repository System : Architecture and ERP Repositiory Case (기업 리파지토리 시스템 : 아키텍쳐 및 ERP 리파지토리 사례)

  • 이희석;서우종;김태훈;이충석;손명호;백종명;손주찬;박성진
    • The Journal of Information Technology and Database
    • /
    • v.7 no.1
    • /
    • pp.1-15
    • /
    • 2000
  • A repository has been conceived as a critical weapon for managing organizational information resources. The system can help control the heterogeneous data in a variety of CASE (Computer-Aided Software Engineering) tools. However, current repository systems have limitation in creating a synergetic effect by integrating information resources. Therefore, it is important to develop an integrative repository system, called Enterprise Repository System (ERS). This paper (i) defines ERS on the basis of a framework for repository systems, and (ii) suggests an ERS architecture and its detailed components. Finally, a real-life case of developing ERP repository system is illustrated according to the proposed architecture and components. This illustration may demonstrate the usefulness of this research for help developing an advanced repository system.

  • PDF

Design and Implementation of Fault-tolerant Communication Middleware for a High-reliable Launch Control System (고신뢰성 발사통제시스템을 위한 고장허용 통신 미들웨어 설계 및 구현)

  • Song, Dae-Ki;Jang, Bu-Cheol;Lee, Cheol-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.8
    • /
    • pp.37-46
    • /
    • 2008
  • Launch control system controls the sequence for launching missile in weapon systems. This system have to generate the engagement plan, input information and launch the missile in timeliness requirement. Such a system may fail to operate correctly either due to errors in hardware and software or due to violation of timing constraints. We presented fault-tolerant ethernet for embedded real-time system like launch control system. This approach is designed to handle network faults using dual commercial-off-the-shelf(COTS) network devices. To support fault-tolerant ethernet each node is composed dual channel ethernet and designed the communication middleware for network fault detect and recovery. Especially for time-critical system, the middleware is being developed to achieve that no point of network failure shall take down or cause loss of communication to network nodes.