Upload
toby-gallagher
View
223
Download
0
Tags:
Embed Size (px)
Citation preview
ArmyNetcentric
Warfare
ArmyNetcentric
Warfare
U.S. Army Research Laboratory
Dr John W. Gowens IIDirector
Computational and Information SciencesDirectorate
Best global knowledge Worst local knowledge
Best local knowledge Worst global knowledge
XX
X
XXX
XXXX
Currently provides limited reporting capability from the soldier in the field
ES2Every Soldier is a Sensor
New technologies are needed to enable information exchange between the local and global worlds
• Global/Local Interactions
• Cross-Domain Tactical Gateway
• Distributed Dynamic Processing
• Signal Processingfor Communications
• Secure Networking
• Sensor Communications
• Global assets tipping local assets
• Local Assets filling in the gaps for global assets
• Local/Global monitoring to detect plan/operation deviation
• Refining Global information to relevant local events
• Inferencing behaviors to provide explanation and assessment through narratives
• Pusher and Catcher on each side of the Cross Domain Solution
Local/Global Interactions
IMINT SIGINT HUMINT
Global ServicesLocal Services
Multi-mediaReports
Sensors
Visualization
Intelligent Filters
Transformation
MASINTLanguageTranslation
Limited BandwidthTime Critical
CorrelationPrediction
Fusion
Reliable NetworkReasonable Bandwidth
Time Sensitivity
Visualization
CorrelationPrediction
Fusion
CDIX
UA/UE OrganicTheater/National
FCS/DCGS-A
C2
Fusion Node
Organic Sensors
Organic Sensors
Fusion Node
Soldiers
Soldiers
LOCAL / LOCALFUSION
LOCAL / GLOBALFUSION
LOCALFUSION
GLOBAL / LOCALFUSION
Global FusionLocal (Dismounted) Fusion• Global node supports the
pull of information relevant to the needs of the local node to complete analysis
• Global node fuses filtered information coming up from local node into its own information base
• Local node pulls information from global node to help plan next mission
• Local node fuses global pull with their organic sensors to develop better Sit Awareness
• Local node pushes critical information to global node
• Local node has similarinteractions with adjacent local nodes
Protecting the force from imminent threats through interactive and automated fusion of networked local and global information sources
Cross-domain Tactical Gateway Innovative Cross Domain Solution (Unclassified to Secret - IATO Approval)
Human in the loop (Secret to Unclassified)
Pusher and Catcher on each side of the Cross Domain SIPRNET
Sec
ret
TG
Pro
ce
ssin
g
Cat
ch
er
Tactical Gateway
Un
cla
ssi
fie
d T
G P
roc
ess
ing
Pu
sh
er
Tactical Secure Mobile
Network
Local Fusion
Services
Soldiers
Sensors
GlobalFusion
Services
Long HaulNetwork
VSAT Terminal
Classified EnvironmentUnclassified Environment
CD
IX S
olu
tio
n/D
ata
Dio
de
ARL’s CDIX SolutionUNCLASSIFIED to SECRET
Detect and reject malicious code1 Detect and screen mobile code2 Apply meta tags 3 Digitally sign using unclass DoD PKI cert4 Store for unclassified use 5 Verify unclass digital signature 6 Transfer across boundary7 Detect and reject malicious code 8 Detect and screen mobile code 9 Verify meta tags 10 Digitally sign using SIPRNET PKI cert11 Verify SIPRNET digital signature12 Store data for secret use 13 Provide data to SIPRNET via Web Services 14
Distributed Dynamic Processing
Distributed Dynamic Processing
Managing the collection, flow and
processing of battlefield information
across a dynamic, unreliable,
intermittent, and limited bandwidth
tactical network
• Automated Discovery and Multiple Protocol Support (TCP UDP RUDP)
• Bandwidth Management
• Adaptive Quality of Service
• Tactical Network Resiliency
– Topological Changes
– Intermittent Connectivity
– Availability
• Connectivity Maintenance and Visualization
• Web Services where Appropriate
– Periphery of System
– Bridge to Reliable Commercial Network Infrastructure
Intermittent
Reliable
Unreliable
Secure Networking
Signal Processingfor Communications
Tactical Communications and NetworksTactical Communications and NetworksSelf-configuring wireless network technologies that enable secure, scalable, energy-efficient, and survivable mobile and sensor networks.
Sensor Communications
• Multi-Input Multi-Output (MIMO)
• Multi-Carrier Waveforms
• Ultra Wideband Communications
• Cross-Layer Designs
• Non-Cooperative Signal Processing
• Intrusion Detection for MANETs
• Secure Network Emulation and Performance Analysis
• Mobile Ad Hoc (MANET) Routing
• Autoconfiguring Networks
• The Blue Radio, energy-efficient communications for unattended sensor nodes
• Low Power RF and Fast Acquisition Modem
• Energy-Efficient, Secure Ad Hoc Routing
• Energy-Efficient Medium Access Control Protocols
Wireless NetworkTestbed
Approach
Challenges
Secure NetworkingSecure NetworkingMobile tactical networks that are highly mobile, efficient, self-configuring, survivable, and secure.
• Mobile ad hoc (MANET) networking and autoconfiguration protocols
• Intrusion detection/localization for network infrastructure protocols
• Emulation environment where performance characteristics of secure networking is assessed in realistic mobile scenarios
• Highly dynamicnetworks with mobile nodes and mobile networking infrastructure
• Limited bandwidth and resources
• No concentration points where traffic can be analyzed
• Cannot rely on centralized network or security services
• Intermittent connectivity, noisy wireless channels, congestion
Intrusion DetectionIntrusion DetectionINFORMATION ASSURANCE
Challenges
• Lack of single good location to monitor network traffic- topology changes, broadcast nature of wireless
• Wireless medium unreliable- intermittent connectivity, packets loss, noise
• Limited bandwidth –cannot exchange large volumes of intrusion detection data over many hops
• Commercial wired network detection technology won’t work
Approach
• Initial focus on Cooperative Intrusion Detection Hierarchy Technique
• Each node has basic capability to detect and report on any unusual network activity.
• Next higher level node aggregates data from multiple nodes to confirm unusual activity and passes findings on.
• Nodes higher in hierarchy further aggregate data, determine if activity crosses threshold, and disseminate compromised node ID.
• Evolve with network protocol upgrades, OLSR, to HSLS, to MALSR
Approach
Survivable and energy-efficient communications for distributed, unattended sensor nodes.
• Extreme bandwidth, power, energy, and computational constraints
• Severe near-earth propagation effects
• Self-organization under a variety of delivery mechanisms
• Duty-cycling operations to extend battery life
• Jam-resistant
• Low cost
• Duty cycling to conserve energy
• Robust, high processing gain waveforms that are fast-acquisition to allow duty cycling
• Low overhead, reactive/proactive ad hoc routing
• Energy-efficient Medium Access Control (MAC) including duty cycling, power control, and multi-user detection
• Leveraging commercial wireless radio components
• Application specific routing and scheduling
Challenges
MODEM
RF BOARD
Sensor CommunicationsSensor Communications
Blue Radio
Ultra Wideband Communications and Geolocation
Multi-Carrier Waveforms
Multi-Input Multi-Output
(MIMO)
Approach
Challenges
Signal Processingfor CommunicationsSignal Processingfor CommunicationsSignal processing techniques that enable high data-rate, covert, on-the-move communications in dynamic and hostile environments
• Highly diverse dynamic channels and network topologies
• LPD/LPI/Anti-Jam under mobile conditions
• Non-contiguous spectrum and coexistence
• Low complexity transceiver design
• Bandwidth, spectrum, and energy constraints
• Co-site interference
• Multi-Input Multi-Output (MIMO) multiple antenna systems for high data-rate communications
• Multi-Carrier waveforms to exploit available spectrum and to combat fading
• Ultra Wideband communications and geolocation for dense urban terrain
• Cross-Layer techniques for improved energy consumption and performance
• Non-cooperative signal processing
Free-Space Laser Communication
Free-Space Laser Communication
Develop adaptive laser communication systems that are robust, light-weight, secure, and operate at high data rates for advanced communications and information distribution technologies