15
Army Netcentric Warfare U.S. Army Research Laboratory Dr John W. Gowens II Director Computational and Information Sciences Directorate

Army Netcentric Warfare Army Netcentric Warfare U.S. Army Research Laboratory Dr John W. Gowens II Director Computational and Information Sciences Directorate

Embed Size (px)

Citation preview

ArmyNetcentric

Warfare

ArmyNetcentric

Warfare

U.S. Army Research Laboratory

Dr John W. Gowens IIDirector

Computational and Information SciencesDirectorate

Best global knowledge Worst local knowledge

Best local knowledge Worst global knowledge

XX

X

XXX

XXXX

Currently provides limited reporting capability from the soldier in the field

ES2Every Soldier is a Sensor

New technologies are needed to enable information exchange between the local and global worlds

• Global/Local Interactions

• Cross-Domain Tactical Gateway

• Distributed Dynamic Processing

• Signal Processingfor Communications

• Secure Networking

• Sensor Communications

• Global assets tipping local assets

• Local Assets filling in the gaps for global assets

• Local/Global monitoring to detect plan/operation deviation

• Refining Global information to relevant local events

• Inferencing behaviors to provide explanation and assessment through narratives

• Pusher and Catcher on each side of the Cross Domain Solution

Local/Global Interactions

IMINT SIGINT HUMINT

Global ServicesLocal Services

Multi-mediaReports

Sensors

Visualization

Intelligent Filters

Transformation

MASINTLanguageTranslation

Limited BandwidthTime Critical

CorrelationPrediction

Fusion

Reliable NetworkReasonable Bandwidth

Time Sensitivity

Visualization

CorrelationPrediction

Fusion

CDIX

UA/UE OrganicTheater/National

FCS/DCGS-A

C2

Fusion Node

Organic Sensors

Organic Sensors

Fusion Node

Soldiers

Soldiers

LOCAL / LOCALFUSION

LOCAL / GLOBALFUSION

LOCALFUSION

GLOBAL / LOCALFUSION

Global FusionLocal (Dismounted) Fusion• Global node supports the

pull of information relevant to the needs of the local node to complete analysis

• Global node fuses filtered information coming up from local node into its own information base

• Local node pulls information from global node to help plan next mission

• Local node fuses global pull with their organic sensors to develop better Sit Awareness

• Local node pushes critical information to global node

• Local node has similarinteractions with adjacent local nodes

Protecting the force from imminent threats through interactive and automated fusion of networked local and global information sources

Cross-domain Tactical Gateway Innovative Cross Domain Solution (Unclassified to Secret - IATO Approval)

Human in the loop (Secret to Unclassified)

Pusher and Catcher on each side of the Cross Domain SIPRNET

Sec

ret

TG

Pro

ce

ssin

g

Cat

ch

er

Tactical Gateway

Un

cla

ssi

fie

d T

G P

roc

ess

ing

Pu

sh

er

Tactical Secure Mobile

Network

Local Fusion

Services

Soldiers

Sensors

GlobalFusion

Services

Long HaulNetwork

VSAT Terminal

Classified EnvironmentUnclassified Environment

CD

IX S

olu

tio

n/D

ata

Dio

de

ARL’s CDIX SolutionUNCLASSIFIED to SECRET

Detect and reject malicious code1 Detect and screen mobile code2 Apply meta tags 3 Digitally sign using unclass DoD PKI cert4 Store for unclassified use 5 Verify unclass digital signature 6 Transfer across boundary7 Detect and reject malicious code 8 Detect and screen mobile code 9 Verify meta tags 10 Digitally sign using SIPRNET PKI cert11 Verify SIPRNET digital signature12 Store data for secret use 13 Provide data to SIPRNET via Web Services 14

Distributed Dynamic Processing

Distributed Dynamic Processing

Managing the collection, flow and

processing of battlefield information

across a dynamic, unreliable,

intermittent, and limited bandwidth

tactical network

• Automated Discovery and Multiple Protocol Support (TCP UDP RUDP)

• Bandwidth Management

• Adaptive Quality of Service

• Tactical Network Resiliency

– Topological Changes

– Intermittent Connectivity

– Availability

• Connectivity Maintenance and Visualization

• Web Services where Appropriate

– Periphery of System

– Bridge to Reliable Commercial Network Infrastructure

Intermittent

Reliable

Unreliable

Secure Networking

Signal Processingfor Communications

Tactical Communications and NetworksTactical Communications and NetworksSelf-configuring wireless network technologies that enable secure, scalable, energy-efficient, and survivable mobile and sensor networks.

Sensor Communications

• Multi-Input Multi-Output (MIMO)

• Multi-Carrier Waveforms

• Ultra Wideband Communications

• Cross-Layer Designs

• Non-Cooperative Signal Processing

• Intrusion Detection for MANETs

• Secure Network Emulation and Performance Analysis

• Mobile Ad Hoc (MANET) Routing

• Autoconfiguring Networks

• The Blue Radio, energy-efficient communications for unattended sensor nodes

• Low Power RF and Fast Acquisition Modem

• Energy-Efficient, Secure Ad Hoc Routing

• Energy-Efficient Medium Access Control Protocols

Wireless NetworkTestbed

Mobile Ad Hoc NetworksMobile Ad Hoc Networks

Approach

Challenges

Secure NetworkingSecure NetworkingMobile tactical networks that are highly mobile, efficient, self-configuring, survivable, and secure.

• Mobile ad hoc (MANET) networking and autoconfiguration protocols

• Intrusion detection/localization for network infrastructure protocols

• Emulation environment where performance characteristics of secure networking is assessed in realistic mobile scenarios

• Highly dynamicnetworks with mobile nodes and mobile networking infrastructure

• Limited bandwidth and resources

• No concentration points where traffic can be analyzed

• Cannot rely on centralized network or security services

• Intermittent connectivity, noisy wireless channels, congestion

Intrusion DetectionIntrusion DetectionINFORMATION ASSURANCE

Challenges

• Lack of single good location to monitor network traffic- topology changes, broadcast nature of wireless

• Wireless medium unreliable- intermittent connectivity, packets loss, noise

• Limited bandwidth –cannot exchange large volumes of intrusion detection data over many hops

• Commercial wired network detection technology won’t work

Approach

• Initial focus on Cooperative Intrusion Detection Hierarchy Technique

• Each node has basic capability to detect and report on any unusual network activity.

• Next higher level node aggregates data from multiple nodes to confirm unusual activity and passes findings on.

• Nodes higher in hierarchy further aggregate data, determine if activity crosses threshold, and disseminate compromised node ID.

• Evolve with network protocol upgrades, OLSR, to HSLS, to MALSR

Sensor NetworksSensor Networks

Approach

Survivable and energy-efficient communications for distributed, unattended sensor nodes.

• Extreme bandwidth, power, energy, and computational constraints

• Severe near-earth propagation effects

• Self-organization under a variety of delivery mechanisms

• Duty-cycling operations to extend battery life

• Jam-resistant

• Low cost

• Duty cycling to conserve energy

• Robust, high processing gain waveforms that are fast-acquisition to allow duty cycling

• Low overhead, reactive/proactive ad hoc routing

• Energy-efficient Medium Access Control (MAC) including duty cycling, power control, and multi-user detection

• Leveraging commercial wireless radio components

• Application specific routing and scheduling

Challenges

MODEM

RF BOARD

Sensor CommunicationsSensor Communications

Blue Radio

Ultra Wideband Communications and Geolocation

Multi-Carrier Waveforms

Multi-Input Multi-Output

(MIMO)

Approach

Challenges

Signal Processingfor CommunicationsSignal Processingfor CommunicationsSignal processing techniques that enable high data-rate, covert, on-the-move communications in dynamic and hostile environments

• Highly diverse dynamic channels and network topologies

• LPD/LPI/Anti-Jam under mobile conditions

• Non-contiguous spectrum and coexistence

• Low complexity transceiver design

• Bandwidth, spectrum, and energy constraints

• Co-site interference

• Multi-Input Multi-Output (MIMO) multiple antenna systems for high data-rate communications

• Multi-Carrier waveforms to exploit available spectrum and to combat fading

• Ultra Wideband communications and geolocation for dense urban terrain

• Cross-Layer techniques for improved energy consumption and performance

• Non-cooperative signal processing

Free-Space Laser Communication

Free-Space Laser Communication

Develop adaptive laser communication systems that are robust, light-weight, secure, and operate at high data rates for advanced communications and information distribution technologies

Army netcentricwarfare depends on MANET technologyfor connectivity

Army netcentricwarfare depends on MANET technologyfor connectivity