Development direction for information security in network-centric warfare

Ho Kyung Yang, Jin Mook Kim, Hwang Bin Ryou, Jong Hyuk Park

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

As IT advances, warfare undergoing a paradigm shifts. It is going from a type that is weapon-based-making heavy use of conventional weapons-to one that is network-based, a type of warfare called network-centric warfare (NCW). In NCW, sharing of information can be guaranteed using communication technologies of the network. As the members that take part in missions can exchange and collaborate with other, they can be completed more successfully and efficiently, increasing the military might. Amid advancements being made in IT, the Korea military is also doing research for conducting more effective warfare, which it aims to do by connecting each of the entities together and sharing battlefield resources. This paper examines threats to information security in NCW, as well as requirements for information security. Furthermore, a development direction for information security is proposed.

Original languageEnglish
Title of host publicationComputer Science and Its Applications, CSA 2012
Pages813-818
Number of pages6
DOIs
StatePublished - 2012
Event4th FTRA International Conference on Computer Science and Its Applications, CSA 2012 - Jeju Island, Korea, Republic of
Duration: 22 Nov 201225 Nov 2012

Publication series

NameLecture Notes in Electrical Engineering
Volume203 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference4th FTRA International Conference on Computer Science and Its Applications, CSA 2012
Country/TerritoryKorea, Republic of
CityJeju Island
Period22/11/1225/11/12

Keywords

  • Information security
  • NCW
  • Network security
  • TICN

Fingerprint

Dive into the research topics of 'Development direction for information security in network-centric warfare'. Together they form a unique fingerprint.

Cite this