원문정보
초록
영어
Development with IT technology has wide effect for military sector. For this reasons, the important sources is ‘First see, and first determine, and first attack’ in modern and future warfare. And there are also importance with patriot robot such as drone for understand the movement pattern with enemy. Therefore, in develop country; they process with sensor system, delicate attack system, informationization and identification proactively. For now, the connection between equipment is essential in the war environment, so the secure with these things is important. But this is planned with using network structure based on TCP/IP, So there is a raised problem that plan which I mentioned has difficult to deal with attack from using structural weakness. In this paper, the attack type which is possible in the Airborne Network is made an inquiry and it analyze.
목차
1. Introduction
2. Weak Point with Airborne Network
2.1. Limited Identifier Structure
2.2. Support Mobility According with Center Concentration Ways
2.3. Vertical Host Base Protocol
3. Type of Attack
3.1. Attack which has Center of Data Forgery and Alteration
3.2. Evil Twin Attack which Interfere with Reception Service
4. The Weakness Classification
5. Each Area Security Method and Connection
6. The Security Structure According to the System of Aviation
6.1. ACARS System
6.2. ATN (CLIP) System
6.3. IP Near Term System
6.4. IP Long Term System
7. Conclusions
References
