• Title/Summary/Keyword: warfare information system

Search Result 205, Processing Time 0.02 seconds

Implementation of VGPO/VGPI Velocity Deception Jamming Technique using Phase Sampled DRFM (위상 샘플방식 DRFM을 이용한 VGPO/VGPI 속도기만 재밍기법 구현)

  • Kim, Yo-Han;Moon, Byung-Jin;Hong, Sang-Guen;Sung, Ki-Min;Jeon, Young-Il;Na, In-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.955-961
    • /
    • 2021
  • In modern warfare, the importance of electronic warfare, which carries out a mission that using radio wave to find out enemy information or to protect ally information, has increased. Radar jamming technique is one of the most representative techniques of EA(Electronic Attack), it disturbs and deceives enemy radar system in order to secure ally location information. Velocity deception jamming technique, which is one of the radar jamming techniques, generally operate against pulse-doppler radar which use doppler effect in order to track target's velocity and location. Velocity Deception Jamming Technique can be implemented using DRFM(Digital Radio Frequency Memory) that performs Frequency Modulation. In this paper, I describe implementation method of VGPO/VGPI(Velocity Gate Pull-Off/Pull-In) velocity deception jamming technique using phase-sampled DRFM, and verify the operation of VGPO/VGPI velocity deception jamming technique with board test under signal injection condition.

A Study on Battle Damage Assessment of Electronic Warfare associated with Cyber Warfare (사이버전 연계 전자전 전투피해평가 지표 산출을 위한 연구)

  • Choi, Seungcheol;Cho, Joonhyung;Kwon, Oh-Jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.201-210
    • /
    • 2020
  • This paper proposes a framework for the battle damage assessment (BDA) of electronic warfare linked to cyber warfare. Thanks to the rapid development of information and communication technology, the importance of cyber warfare and electronic warfare in cyberspace is increasing. Therefore, the BDA for cyber warfare and its associated electronic warfare in cyberspace is an important factor that affects the success or failure of military operations. In this paper, we propose a method to calculate measure of performance and measure of effectiveness by classifying the electronic warfare system into large / medium / small classes according to the type of electronic warfare. By setting up a hypothetical scenario, we show the effectiveness of the proposed framework.

A Search Band Implementation Considering the Receivers of the Electronic Warfare Support System (전자전 ES 시스템의 수신기를 고려한 탐색대역 생성)

  • Yoon, In-Bok;Jeong, Chang-Min
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1091-1096
    • /
    • 2011
  • The main factors of radar signals used in electronic warfare are Radio Frequency(RF), Pulse Repetition Interval(PRI), Pulse Width(PW), Scan Parameter(SP) and so on. This radar signals may have some important information for the electronic warfare. So, there is a necessity for making a threat database to decide whether the radar signal is a threat or not. When the electronic support system collects some threat radar signals, it needs the search band to control the receivers and filter banks of the system. In this paper we propose search band implementation considering the type and center frequency of the receivers of the electronic support system.

A Study on Evaluation Criteria for M&S Analysis of Command and Control Effectiveness in Joint Operations (합동작전 지휘통제 효과도 모의분석을 위한 평가기준 연구)

  • Sohn, Young-Hwan;Kim, Weon-Bae
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.4
    • /
    • pp.167-175
    • /
    • 2011
  • Concerning the effectiveness of command and control is increasing worldwide as future warfare is changing into Network Centric Warfare (NCW). Unlike the old attrition warfare that depends mainly on mobility and strike assets, the modern warfare is based on information and network which regards acquisition and circulation of information as important. Therefore, there's no room for rediscussion that C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance) system will play an important role in warfare. In spite of this fact, there isn't any way to explain clearly how to measure the effectiveness of command and control system in a battle and to reflect it systematically in a system effectiveness. In this study, we examined NCO-CF (Network Centric Operations-Conceptual Framework), developed by the Department of Defense (DOD), which can conceptually explain the increment of effectiveness of C4ISR system that is the basis of NCO. And we suggested methodology based on NCO-CF to establish the evaluation criteria for M&S analysis of command and control effectiveness. As a case study we derived the evaluation criteria for the command and control system in joint operations by applying the suggested methodology.

A Study on Development Direction of Navigation System for NAVWAR (항법전에 대응한 항법시스템 발전방향에 관한 연구)

  • Choi, Chang-Mook;Ko, Kwang-Soob
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.3
    • /
    • pp.756-763
    • /
    • 2015
  • NAVWAR (NAVigation WARfare) such as an integral part of EW (Electronic Warfare) for making navigation systems malfunctioning expands rapidly in the future military warfare. First of all, Navigation systems of ground radio and satellite were investigated. And the definition of NAVWAR and vulnerability related to GNSS were analyzed. As a result, we propose the development direction for future navigation system such as constructing eLoran system, developing an integrated receiver, establishing alert steps of watch system, and so on.

Comparison Study between the Cyber Weapon System and the Conventional Weapons Systems on Their Core Technologies Levels and Features (국방 사이버 무기체계와 기존 재래식 무기체계의 핵심기술 수준 및 특성 비교 연구)

  • Lee, Ho-gyun;Lim, Jong-in;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.985-994
    • /
    • 2016
  • Since the inauguration of Defense Acquisition Program Administration(DAPA) in 2006, the national defense core technology research & development business has not only pertained to the weapons systems development but also to the improvement of the national science & technology capability via the acquisition of cutting-edge technologies. Furthermore, it has been closely related to the promotion of the defense industry and the mutual improvements of defense and civil technologies. The cyber warfare weapon system, a newly added national defense weapon system field since 2015, has become a promising weapon system branch for improving the national defense power as well as the national defense industry as shown in the case of Israel. By utilizing the existing result of the national defense core technology level, in order to establish the direction of technology planning of the cyber warfare weapon system, this paper analyzes the technology level and features of the cyber warfare weapon system in various aspects via comparisons with other weapons systems. The result of these analyses shows that the cyber warfare weapon system possesses a relatively high technology level due to the technology accumulation in the civilian sector while the relatively slow inclusion to the national weapons systems and the lack of the correspondence case regarding aggressive cyber responses in the defense sector yields a relatively low national rank. However, the technological gap between South Korea and the most advanced country in the field of cyber warfare technology is analyzed to be among the lowest, which indicates that with efficient and effective pursuits in terms of pthe weapons systems acquisitions as well as the core technologies research & development business, an outstanding cyber warfare capacity can be obtained in a short time.

Research on System Architecture and Methodology based on MITRE ATT&CK for Experiment Analysis on Cyber Warfare Simulation

  • Ahn, Myung Kil;Lee, Jung-Ryun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.31-37
    • /
    • 2020
  • In this paper, we propose a system architecture and methodology based on cyber kill chain and MITRE ATT&CK for experiment analysis on cyber warfare simulation. Threat analysis is possible by applying various attacks that have actually occurred with continuous updates to reflect newly emerging attacks. In terms of cyber attack and defense, the current system(AS-IS) and the new system(TO-BE) are analyzed for effectiveness and quantitative results are presented. It can be used to establish proactive cyber COA(Course of Action) strategy, and also for strategic decision making. Through a case study, we presented the usability of the system architecture and methodology proposed in this paper. The proposed method will contribute to strengthening cyber warfare capabilities by increasing the level of technology for cyber warfare experiments.

A Study on the Preparation of National Cyber Warfare (국가 사이버전 대비방안 연구)

  • J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.141-151
    • /
    • 2006
  • The destructive power of cyber threat arrived to until the phase which it threatens to direct and seriously in national security undergoes an important national institutuin hacking event of 2004 and Internet paralysis accidents of 2003. 1. 25. So Cyber terror and Cyber warfare is not the hypothetical enemy situation. It is more actual security situation and identify as magnification of warfare concept of incapacitation national important ability include military command system of the adversary, communication, energy, finance and transportation system. consequently, with the progress of cyber threat, it is necessary that looking at a number of general plan to make up for the weak points in cyber warfare operation system. Thus, the focus of this study is to examine new ways of developing a comprehensive cyber security management system.

  • PDF

A System Design Method of Mine Warfare Using Information for SONAR and MDV (소나와 무인기뢰처리기 정보를 활용한 기뢰전 체계 설계 방안)

  • Kim, Jun-Young;Shin, Chang-Hong;Kim, Kyung-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.12
    • /
    • pp.1243-1249
    • /
    • 2014
  • The naval mine is the explosives that are installed in the water in order to attack surface ships or submarines. So mine warfare is a very important component of naval operations. In this paper, first, understanding of the general concept about mine warfare. Second, introduce the mine hunting progress and mine sweeping progress. And then, suggest the system design method of mine counter measure warfare using several functions. The functions are mine area detection algorithm for side scan sonar image using Adaboost algorithm, and calculation to mine hunting progress rate and mine sweeping progress rate. And techniques that lead the mine disposal vehicle(MDV) to mine.

A Study on Human Resource Management for Information Security in the Age of Information Warfare (사이버테러정보전 전문인력 양성 및 관리 방향에 대한 연구)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.43-57
    • /
    • 2005
  • This paper is about a study on human resource management for information security in the age of information warfare. this study reviewed the current status of human security resource forces for information warfare and derived problems of current practices of various organizations. Based on the analysis of the current practices the author suggested several ideas for solving the problems various. The suggestions include 1) establishment of security manpower concept, 2) set-up of manpower requirement, ideas, 3) establishment of systematic educational system, 4) standardization, etc.

  • PDF