• Title/Summary/Keyword: tactical network

Search Result 219, Processing Time 0.022 seconds

The Analysis of Crypto Communication Relay Effect in the Security Framework Technique of Network Centric Warfare Environment (NCW환경의 보안 프레임워크 기술에서 암호통신 중계영향 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.788-794
    • /
    • 2007
  • The policy of US DoD is moving towards implementation of Network Centric Warfare(NCW) concepts. NCW is commonly described as the integration and synchronization of four key interdependent elements such as command and control, sensor system, engagement systems and the network. Therefore the military policy of Korea military is needed to access and examine the policy of NCW communication environment and crypto communication, which is able to apply it. In this case study, We are reviewed the security framework of the concept of network centric warfare in the centering around the US. It is introduced the core technology in the network centric warfare, and it is reviewed the security framework such as, the requirements of security, the characteristics security of global information grid, joint tactical radion system, net centric enterprise services, transformational communication satellite, in the basis of core technology, and analysis the effect of crypto communication relay between command node and surbornate node in NCW environment. This report support the assistance, which is considered the elements of surrounding effects in the varied crypto communication research area of NCW.

  • PDF

Study on Trends and Strategies for Defense Blockchain and ICT Technologies (국방 블록체인 기술 동향 및 국방 ICT 융합 전략 연구)

  • Lee, K.Hyu;Park, H.Sook
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.1
    • /
    • pp.12-24
    • /
    • 2020
  • To keep pace with other powerful nations in this era of the era of digitalization and to emerge stronger in the world, the defense forces of South Korea aim to innovate and prepare themselves for digital battlefields of possible wars in the future. The resources in the defense sector, which is the core of defense intelligence, is based on an intelligent mission collaboration tactical network system via cyber, command, control, communication, and computer (C4), and military and non-human weapons. Defense intelligence depends on the degree of the convergence of advanced Information and communication technologies (ICTs). Considering this aspect of defense intelligence, We plan to determine the application status of defense blockchain technology and examine the feasibility of applying blockchain technology and the core of applied technology. Generally, a key feature of blockchain technology is its data integrity in untrusted environments. There are various types of core technologies for the blockchain depending on the target areas of application in the defense sector, and it is also essential to derive new application strategies for core technologies that are applied in combination with other ICT technologies. We plan to demonstrate new defense ICT converged technologies (DNAB2: Data, Network, AI, BigData, Blockchain) and DNAB2-As-Services in the defense strategy.

A Study on the Estimation of Required Communication Capacity for Link-16 Based Tactical Networks (Link-16 기반 전술 네트워크를 위한 요구통신용량 산출에 관한 연구)

  • Kim, Young-Beom
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.1
    • /
    • pp.105-111
    • /
    • 2012
  • In this paper, we investigate the most commonly adopted networking technology for Network Centric Warfar (NCW), namely Link-16 in the perspectives of physical, data link, and network layers (specifically, strategic message exchanges) and derive its merits with some constraints therein. Furthermore, we perform a quantitative evaluation on its communication capacity, focusing on whether Link-16 can indeed meet the capacity requirements for major operations, based on the time slot structure, NPG, and multi-netting concepts.

Reality and Improvement Plan of Information-Oriented Age Conscription Administration and Barracks informationization (정보화시대 병무행정과 병영정보화의 실태와 발전 방안)

  • Kim, Doo-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.109-112
    • /
    • 2014
  • Korean informationization technology development speed is growing fastly and IT technology become world-class. Especially, by grafting IT technology to war commanding system, built an network center operational environment. However, conscription administration and the barracks informationization have inadequate points, to provide the people who have a duty of military service and parents with benefits and develop conscription administration and the barracks informationization base system conformed to IT age include using online system to guarantee military personnel's studying environment, writer proposed an improvement plan.

Study of consideration for future tactical communication system development (미래 전술통신체계개발을 위한 고려사항 연구)

  • Byun, Jongsin;Park, Sangjun;Kim, Yongchul
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.35-41
    • /
    • 2018
  • The Army has developed the concept of terrestrial warfare in conjunction with the Joint Concept and has introduced TICN as the base communication system to support it. TICN has been used to improve the transmission speed and to increase the coverage distance. Through this, TICN is making efforts to create network-centered operation environment so that information can be distributed in real time or near real time from the monitoring system to the hitting system. However, TICN is not enough to overcome the network limitations that may arise from various contingencies in battlefield situations. Therefore, in this paper, we investigated the limitations of communication according to the situations that can occur in the battlefield situation and studied the considerations to overcome them.

  • PDF

Systematic Approach to Involving the Tools of Digital Marketing as a Guarantee of the International Business Development

  • Chernenko, Oksana;Kovalchuk, Svitlana;Perevozova, Iryna;Fayvishenko, Diana;Zaburmekha, Yevgena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.311-317
    • /
    • 2022
  • The research is devoted to the substantiation of the system approach to the involvement of digital marketing tools as a guarantee of international business development. It is proved that digital marketing, as a type of marketing based on the use of digital technologies allows to make a profit, to promote the brand, as well as goods and services in the market. The digital marketing toolkit system is a set of elements with existing relationships that ensure the effectiveness of the entire digital marketing, which in total is greater than its individual components. The implementation of a systems approach involves the implementation of the philosophy of digital marketing in general, its functions in the form of systems analysis, formation of strategic development goals and entry and promotion in the international market, preparation and implementation of tactical and strategic development plans.The use of such digital marketing tools as: content marketing, social media marketing, Email-marketing, targeted advertising, contextual advertising, media advertising, Search Engine Optimization, affiliate programs and the company's website is analyzed in detail.

Mobile WiMAX 기반의 전술이동통신체계 테스트베드 성능분석

  • Yu, Jeong-Hun;Jo, Jeong-Ho;Gwon, O-Ju;Park, Gwi-Sun
    • Information and Communications Magazine
    • /
    • v.26 no.3
    • /
    • pp.9-15
    • /
    • 2009
  • 전쟁양상이 네트워크 중심 전으로 발전되기 위해서는 기동중에도 멀티미디어 등 대용량의 정보를 실시간으로 소통할 수 있는 정보통신기반체계가 필수적으로 요구된다. 이러한 기반을 구축하기 위해 개발 중인 전술정보통신체계(TICN: Tactical Information and Communication Network)의 부체계 중 하나인 전술이동통신체계는 이동하는 전장가입자에게 음성서비스이외 전장상황 공유를 위한 대용량의 데이터 서비스를 제공해야 하므로, 주파수 효율성이 좋은 Mobile WiMAX 기술을 기반으로 구현되었다. 구현된 장비는 전장 환경과 비슷한 산악지형의 테스트베드에 설치되어서 운용 가능성을 검증하였다. 본고에서는 Mobile WiMAX기반의 전술이동통신체계의 가용성을 확인하기 위해 수행한 이론적인 분석과 테스트베드에서 확인한 성능에 대해 소개한다.

Method of Format Conversion Between Link-K and KMTF Messages (Link-K와 KMTF 메시지 간 포맷 변환 방법)

  • Kim, Wan-Sik;Lee, Min-Sik;Kim, Sang-Jun;Park, Ji-Hyeon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.2
    • /
    • pp.264-271
    • /
    • 2017
  • Link-K message is the Tactical Data Link message standard developed by the Agency for Defense Development which is optimized for the Joint Operation of ROK Armed Force. KMTF message is the standard message format of Battle Management Information System. Interconversion and propagation between these messages are definitely needed to have efficient warfare such as situation data propagation using network, the convergence of collected situation data, common situational awareness, cooperative engagement. Therefore, this study suggests a way of rule and process for format conversion between Link-K and KMTF messages.

Method for Position Estimation of Network Entry Terminal based on DTDMA(Dynamic Time Division Multiple Access) (DTDMA 기반 초기 망가입 단말의 효율적 위치 추정 방법)

  • Seo, Nan Sol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.5
    • /
    • pp.623-629
    • /
    • 2012
  • In this paper, we analysis the performance of position estimation when adopting Dynamic TDMA(DTDMA) in JTIDS RelNav. JTIDS RelNav is widely understood as a new navigation solution possibly capable to support or take cover of the role of conventional systems including INS or GPS no matter if they are working well or not. By maximizing the efficiency of radio resource management in MAC(Medium Access Control) layer we enhance the system performance without any replacement of hardware.

Public Key Authentication using Newton Interpolation Polynomials and Secret Sharing Scheme in Tactical Ad-hoc Network (전술 Ad-hoc 네트워크에서 Newton의 보간 다항식과 비밀분산기법을 이용한 공개키 인증)

  • So, Jin-Seok;Lee, Soo-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06c
    • /
    • pp.236-238
    • /
    • 2012
  • Ad-hoc 네트워크에서 각 노드는 분산 및 협동을 통해 자체적으로 이웃노드와 무선네트워크를 구축하고 주고받게 된다. 그러나 Ad-hoc 네트워크에서 하위노드의 제한적인 저장/통신/계산 능력, 상호인증의 어려움 등으로 기존의 보안대책을 그대로 적용할 수 없어 Ad-hoc 네트워크 특성에 맞는 새로운 보안대책이 필요하다. 이를 위해 비밀분산기법 중의 일종인 (t,n) 임계치 기법을 통해 노드를 인증하는 방식이 제안되기도 하였으나, 이는 고정된 t개 노드의 분산정보가 모여야만 원래의 비밀을 복원할 수 있는 것으로 주로 적대적 환경에 배치되어야 하는 전술 Ad-hoc 네트워크의 요구사항과는 부합하지 않는다. 따라서, 본 논문에서는 기존의 (t,n) 임계치 기법에 Newton의 보간 다항식을 최초로 적용하여 임계값 t를 동적으로 변경할 수 있는 공개키 인증방식을 제안하고, 그 유효성을 증명하고자 한다.