• Title/Summary/Keyword: warfare information system

Search Result 205, Processing Time 0.023 seconds

Development of a Command and Control System Based on Network Emulator (네트워크 에뮬레이터기반 지휘통제시스템의 개발)

  • Kim, Donghyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.125-130
    • /
    • 2015
  • In this paper, a command and control (C2) system development using a network emulator is treated. Due to the development of information and communication technologies enabling reinforcement of information exchange and computational capability, an operational concept network centric warfare (NCW) was introduced. In here, it summarizes a developmental test environment build based on dummynet, one of the software based network emulator, and an operational concept of target command and control system. Moreover, I explain command and control system developmental test cases and results, and suggest an operational concept to overcome limitations of target communication system. I expect this concept will reduce data traffic of proposed C2 system especially plot messages which is distributed same data with short interval.

A Study on the Framework for Analyzing the Effectiveness of Cyber Weapon Systems Associated with Cyberspace and Physical Space (사이버 공간과 물리 공간이 연계된 사이버 무기체계의 효과성 분석 프레임워크 연구)

  • Jang, Ji-su;Kim, Kook-jin;Yoon, Suk-joon;Park, Min-seo;Ahn, Myung-Kil;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.111-126
    • /
    • 2022
  • As operations that were only conducted in physical space in the past change to operations that include cyberspace, it is necessary to analyze how cyber attacks affect weapon systems using cyber systems. For this purpose, it would be meaningful to analyze a tool that analyzes the effects of physical weapon systems in connection with cyber. The ROK military has secured and is operating the US JMEM, which contains the results of analyzing the effects of physical weapon systems. JMEM is applied only to conventional weapon systems, so it is impossible to analyze the impact of cyber weapon systems. In this study, based on the previously conducted cyber attack damage assessment framework, a framework for analyzing the impact of cyber attacks on physical missions was presented. To this end, based on the MOE and MOP of physical warfare, a cyber index for the analysis of cyber weapon system effectiveness was calculated. In addition, in conjunction with JMEM, which is used as a weapon system effect manual in physical operations, a framework was designed and tested to determine the mission impact by comparing and analyzing the results of the battle in cyberspace with the effects of physical operations. In order to prove the proposed framework, we analyzed and designed operational scenarios through domestic and foreign military manuals and previous studies, defined assets, and conducted experiments. As a result of the experiment, the larger the decrease in the cyber mission effect value, the greater the effect on physical operations. It can be used to predict the impact of physical operations caused by cyber attacks in various operations, and it will help the battlefield commander to make quick decisions.

A Concept Study on Efficiently Improving Performance for Korean MBT (한국형 전차의 효율적인 성능개량 개념)

  • Kim, Seok;Son, Seung-Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.6
    • /
    • pp.14-20
    • /
    • 2008
  • A battle management system should be introduced to improve mission success capabilities and accommodate integrated combat capabilities through increasing SA(Situation Awareness), or spatiotemporal synchronization of military operation in battle field environment. Conventional Korean Main Battle Tanks(Korean MBTs), which have been operated without digital network, were developed for 1980s. Korean new MBTs, which are mounted the battle management system, will be fielded soon. Therefore, old Korean MBT is needed to improve performances for co-operation with new one. This paper is reviewed each improved MBTs of world countries and domestic maintenance facilities. And this study suggests some processing methods which might be applicable to improve information network performance of old Korean MBTs.

Method of Format Conversion Between Link-K and KMTF Messages (Link-K와 KMTF 메시지 간 포맷 변환 방법)

  • Kim, Wan-Sik;Lee, Min-Sik;Kim, Sang-Jun;Park, Ji-Hyeon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.2
    • /
    • pp.264-271
    • /
    • 2017
  • Link-K message is the Tactical Data Link message standard developed by the Agency for Defense Development which is optimized for the Joint Operation of ROK Armed Force. KMTF message is the standard message format of Battle Management Information System. Interconversion and propagation between these messages are definitely needed to have efficient warfare such as situation data propagation using network, the convergence of collected situation data, common situational awareness, cooperative engagement. Therefore, this study suggests a way of rule and process for format conversion between Link-K and KMTF messages.

Novel Radar Signal Blanking Method for Electronic warfare Support (전자전지원을 위한 새로운 레이더 신호 수신 블랭킹 기법)

  • Song, Kyu-Ha;Lee, Dong-Weon;Han, Jin-Woo;Lyu, Si-Chan
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.335-336
    • /
    • 2007
  • The blanking interface between an ES system and a radar system on the same platform cause the unwanted radar signal separation in the process of the signal measurement of the ES system. In this paper, we propose the novel radar signal blanking method for ES. The proposed method extracts a standard of judgement which we can decide whether a radar signal is separated by the blanking interface and presents how to merge the separated signals. Test result is presented to show the performance of the proposed method.

  • PDF

A study on the development directions of a smart counter-drone defense system based on the future technological environment

  • Jindong Kim;Jonggeun Choi;Hyukjin Kwon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.7
    • /
    • pp.1929-1952
    • /
    • 2024
  • The development of drones is transforming society as a whole and playing a game-changing role in warfare. However, numerous problems pose threats to the lives and safety of people, and the counter-drone system lags behind the rapid development of drones. Most countries, including South Korea, have not established a reliable counter-drone system in response to the threat posed by numerous drones. Due to budget constraints in each country, an Analytic Hierarchy Process (AHP) analysis was conducted among a group of experts who have been involved in policymaking and research and development related to counter-drone systems. This analysis aimed to determine the priority of building a counter-drone system. Based on various research data, the counter-drone system was analyzed in three stages: detection/identification, governance, and response. The hierarchical design mapped out the existing researched counter-drone technology into a hierarchical model consisting of 31 evaluation criteria. The conclusion provided a roadmap for establishing a counter-drone system based on the prioritization of each element and considering factors such as technological advancement, outlining directions for development in each field.

A Study on Maturity Model for the Assessment of Cyber Resilience Level in the Defence Information System (국방정보시스템 사이버복원력 수준 평가를 위한 성숙도모델에 관한 연구)

  • Choi, Jae-hyeok;Kim, Wan-ju;Lim, Jae-sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1153-1165
    • /
    • 2019
  • Recently, threats of hacking have been increasing on the national intelligence service network and key infrastructure, including the defense field. The defense information system responds to threats from the outside through the network separation, but if the defense information system is hacked, it has a serious impact on the operations of wartime or peacetime military forces. Today, cyberattacks and threats are rising to unpredictable levels and making it practically impossible to completely block and prevent hacking threats completly. So, in this study proposed a maturity model to assess the level of cyber-resilience, which is the ability to ensure the system's viability and maintain continuity through rapid response and recovery if signs of cyberattacks by the defense information system are expected or occurred. The proposed maturity model is expected to contribute to improving the cyber security level of the defense information system by assessing the level of cyber resilience of the defense information system and identifying and supplementing fields that are lacking.

A Study on the Concept of Social Engineering Based Cyber Operations (사회공학 사이버작전 개념정립 연구)

  • Shin, Kyuyong;Kang, Jungho;Yoo, Jincheol;Kim, Jeewon;Kang, Sungrok;Lim, Hyunmyung;Kim, Yongju
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.707-716
    • /
    • 2018
  • Recently, instead of technical cyber operations that directly attack the target information system by using cyber attack techniques, social engineering techniques that indirectly invade the system by exploiting the vulnerabilities of persons who manage the system are being watched. Despite this trend, there is a lot of confusion because there is no clear concept about the relationship between cyber operations and social engineering techniques. Therefore, this paper aims at establishing a clear concept of a social engineering cyber operation, helping future researchers in this literature.

A Novel Algorithm for Deinterleaving of D&S PRI and Stagger PRI Signals from the EP Radar (EP 레이더의 D&S PRI와 Stagger PRI 신호식별 알고리즘)

  • Lim, Joong-Soog;Chae, Gyoo-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.11
    • /
    • pp.5372-5378
    • /
    • 2012
  • In this paper, we propose a new method to quickly deinterleave the stagger PRI signals and D&S(Dwell and Switch) PRI signals from the EP radar using the electronic warfare system. While former algorithms were based on stochastic methods only using the first deviation of the TOA of radar signals, this paper uses the first and the second deviation of the TOA of radar signals to deinterleave multiple PRIs of EP radars. When we simulate multiple PRIs of EP radars and test the simulated radar signals using the proposed algorithm, various PRI signals such as fixed, jitter, D&S and stagger PRI are well deinterleaved in a short time. This algorithm is found to be very useful for electronic warfare systems.

Classification of Traffic Classes for Application Services in Military Communication Networks (군 통신망 응용서비스를 위한 트래픽 클래스 분류 방법)

  • Choi, Geun-Kyung;Kim, Bo-Sung;Roh, Byeong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1C
    • /
    • pp.76-88
    • /
    • 2012
  • Traffic classification for application services in military communication networks is one of the core requirements to provide efficient resource management for NCW operations. Though several standards and organizations provided their own traffic classification methods, the methods have been mainly focused on commercial services, but not reflected military specifics. In addition, though various military application services have been emerged, some of those services have been classified into different traffic classes due to implicit criteria for the classification among organizations. In this paper, we propose a methodology to classify traffic classes and to determine delivery requirements for military application services based on various standards by DoD as well as several commercial standards based on Y.1541. The validation of the proposed methodology was carried out by comparing the results by proposed one with the traffic classification suggestions by existing commercial standards, DoD and FCS. We expect that the proposed methodology can contribute to achieve efficient operations of limited military network resources, since the proposed method can provide systematic and consistent way to assign traffic classes for new and existing military applications services.