Upload
emmy
View
38
Download
0
Tags:
Embed Size (px)
DESCRIPTION
The International Technology Alliance: Collaborative Research in Network & Information Sciences. John Ibbotson Emerging Technology Services IBM United Kingdom Ltd [email protected] 18th April 2007. Agenda. ITA Overview Technical Areas Network Theory - PowerPoint PPT Presentation
Citation preview
The International Technology Alliance: The International Technology Alliance: Collaborative Research in Network & Collaborative Research in Network &
Information SciencesInformation SciencesJohn Ibbotson
Emerging Technology ServicesIBM United Kingdom Ltd
18th April 2007
ITA Overview
Technical Areas
1. Network Theory
2. Security Across a System-of-Systems
3. Sensor Information Processing/Delivery
4. Distributed Coalition Planning/Decision-Making
Three Themes
1. Information Flows
2. Dynamic Communities
3. Trust and Risk
Scenarios
1. Dirty Bomb
2. Search and Rescue in Urban Areas
3. Tracking Insurgents
4. Natural Disasers
Events and Information
AgendaAgendaAgendaAgenda
The ITA VisionThe ITA VisionThe ITA VisionThe ITA Vision
Creating an international collaborative research culture Academia, Industry, Government in US and UK Innovative multidisciplinary approaches
Developing ground-breaking fundamental science Empower innovators in an open (unclassified) framework Develop understanding of the root cause of military technical challenges
Making an impact on coalition military effectiveness Focus on key problems with a critical mass of researchers Gain synergies from UK/US alignment Innovative transition model to bring research to market
A US/UK Alliance focused on enhancing distributed, secure, and flexible decision-making to improve coalition operations by:
What Makes the ITA Different?What Makes the ITA Different? What Makes the ITA Different?What Makes the ITA Different? All parties fully engaged
Fully collaborative Alliance of US/UK academia, industry, government Trust, shared understanding and deep collaboration enabled by
interchanges/staff rotations New collaborations --- peer-to-peer, mentorships, partnerships
Jointly address major research challenges Networking – Security – Sensor Processing – Decision Making Critical mass focused on key technical challenges
Full spectrum research efforts Fundamental research concurrent with pull-through of concepts/principles
and rapid/affordable transitions of technology into systems
Focus on coalition operations Complex operations where military operations take place in the midst of a
civilian population engaged in daily life
U.S.Gov.
Industry
Academia
U.K.Gov.
INDUSTRY9. BBNT Solutions LLC
10.The Boeing Corporation
11.Honeywell Aerospace Electronic Systems
12. IBM Research
13.Klein Associates
ACADEMIA1. Carnegie Mellon University
2. City University of New York
3. Columbia University
4. Pennsylvania State University
5. Rensselaer Polytechnic Institute
6. University of California Los Angeles
7. University of Maryland
8. University of Massachusetts
INDUSTRY 8. IBM UK
9. LogicaCMG
10.Roke Manor Research Ltd.
11.Systems Engineering& Assessment Ltd.
ACADEMIA1. Cranfield University, Royal Military
College of Science, Shrivenham
2. Imperial College, London
3. Royal Holloway University of London
4. University of Aberdeen
5. University of Cambridge
6. University of Southampton
7. University of York
7
10
6
42
853
1
9
1312
11
123
4
5
6
7
8 91011
Team OverviewTeam Overview
International Technology Alliance in International Technology Alliance in Network and Information SciencesNetwork and Information Sciences
Collaborative Alliance Managers/Consortium Managers Jay Gowens (ARL) Jack Lemon (MoD) Dinesh Verma (IBM) Dave Watson (IBM-UK)
International Technology Alliance in International Technology Alliance in Network and Information SciencesNetwork and Information Sciences
Collaborative Alliance Managers/Consortium Managers Jay Gowens (ARL) Jack Lemon (MoD) Dinesh Verma (IBM) Dave Watson (IBM-UK)
Security Across a Security Across a System-of-SystemsSystem-of-Systems
Trevor Benjamin (Dstl)Trevor Benjamin (Dstl)Greg Cirincione (ARL)Greg Cirincione (ARL)
John McDermid (York U)John McDermid (York U)
Security Across a Security Across a System-of-SystemsSystem-of-Systems
Trevor Benjamin (Dstl)Trevor Benjamin (Dstl)Greg Cirincione (ARL)Greg Cirincione (ARL)
John McDermid (York U)John McDermid (York U)
Network TheoryNetwork Theory
Ananthram Swami (ARL)Ananthram Swami (ARL)Tom McCutcheon (Dstl)Tom McCutcheon (Dstl)Don Towsley (U Mass)Don Towsley (U Mass)
Network TheoryNetwork Theory
Ananthram Swami (ARL)Ananthram Swami (ARL)Tom McCutcheon (Dstl)Tom McCutcheon (Dstl)Don Towsley (U Mass)Don Towsley (U Mass)
Sensor Information Sensor Information Processing and Processing and
DeliveryDeliveryTien Pham (ARL)Tien Pham (ARL)
Gavin Pearson (Dstl)Gavin Pearson (Dstl)Thomas La Porta (PSU)Thomas La Porta (PSU)
Sensor Information Sensor Information Processing and Processing and
DeliveryDeliveryTien Pham (ARL)Tien Pham (ARL)
Gavin Pearson (Dstl)Gavin Pearson (Dstl)Thomas La Porta (PSU)Thomas La Porta (PSU)
Distributed Coalition Distributed Coalition Planning and Planning and
Decision-MakingDecision-Making Jitu Patel (Dstl)Jitu Patel (Dstl)Mike Strub (ARL)Mike Strub (ARL)
Nigel Shadbolt (U of S)Nigel Shadbolt (U of S)
Distributed Coalition Distributed Coalition Planning and Planning and
Decision-MakingDecision-Making Jitu Patel (Dstl)Jitu Patel (Dstl)Mike Strub (ARL)Mike Strub (ARL)
Nigel Shadbolt (U of S)Nigel Shadbolt (U of S)
Policy Based Security Management
Markham, HoneywellMarkham, Honeywell
Policy Based Security Management
Markham, HoneywellMarkham, Honeywell
Energy Efficient Security
Architectures and Infrastructures
Paterson, Royal Paterson, Royal HollowayHolloway
Energy Efficient Security
Architectures and Infrastructures
Paterson, Royal Paterson, Royal HollowayHolloway
Trust and Risk Management in
Dynamic Coalition Environments
McDermid, YorkMcDermid, York
Trust and Risk Management in
Dynamic Coalition Environments
McDermid, YorkMcDermid, York
Theoretical Foundations for
Analysis/Design of Wireless and Sensor
Networks
Towsley, U MassTowsley, U Mass
Theoretical Foundations for
Analysis/Design of Wireless and Sensor
Networks
Towsley, U MassTowsley, U Mass
Interoperability of Wireless Networks
and Systems
Lee, IBMLee, IBM
Interoperability of Wireless Networks
and Systems
Lee, IBMLee, IBM
Biologically-Inspired Self-Organization in
Networks
Lio, CambridgeLio, Cambridge
Biologically-Inspired Self-Organization in
Networks
Lio, CambridgeLio, Cambridge
Quality of Information of Sensor Data
Thomas, HoneywellThomas, Honeywell
Quality of Information of Sensor Data
Thomas, HoneywellThomas, Honeywell
Task-Oriented Deployment of Sensor Data
Infrastructures
La Porta, Penn StateLa Porta, Penn State
Task-Oriented Deployment of Sensor Data
Infrastructures
La Porta, Penn StateLa Porta, Penn State
Complexity Management of
Sensor Data Infrastructures
Szymanski, RPISzymanski, RPI
Complexity Management of
Sensor Data Infrastructures
Szymanski, RPISzymanski, RPI
Mission Adaptive Collaborations
Poltrock, BoeingPoltrock, Boeing
Mission Adaptive Collaborations
Poltrock, BoeingPoltrock, Boeing
Command Process Transformation and
Analysis
Sieck, Klein AssocSieck, Klein Assoc
Command Process Transformation and
Analysis
Sieck, Klein AssocSieck, Klein Assoc
Shared Situational Awareness and the
Semantic Battlespace Infosphere
Shadbolt, SouthhamptonShadbolt, Southhampton
Shared Situational Awareness and the
Semantic Battlespace Infosphere
Shadbolt, SouthhamptonShadbolt, Southhampton
ITA OutcomesITA OutcomesITA OutcomesITA Outcomes
Peer reviewed research that advances the state-of-the-art in network and information sciences
Documented in published papers, presentations, patents Emphasis on collaborative research resulting in jointly authored
publications and presentations
Concepts and principles that enable flexible, dependable and accreditable coalition interoperability
Socio-technical concepts and principles to enable the doctrine of network-enabled/centric coalition operations
Research results that transition directly into key applied research or technology demonstration programmes
Concepts and results that impact acquisition channels
Frequent spin-off of research results into current needs
A portfolio of:
Technical Areas – The Big PictureTechnical Areas – The Big PictureTechnical Areas – The Big PictureTechnical Areas – The Big Picture
Wireless Communications Infrastructure
Individual Actorse
nsor
Information Security Management System, including risk, trust mngt
Operations Management and Decision Making
Ops Policy Mngt ( infosec)
Information Security Technologies
Joint Task Force:Operations Management, Decision Making
Including risk, trust mngt in infn, comms, actors
Performance Assessment
Node Tech
Operational Policies, Strategy, Tactics
Performance Assessment
( operations)
sens
or
s ens
or
0126
006
Sensor networkso Operationalo Internal system
Actor network:o own actorso Coalition actorso Adversarieso neutrals
Information Security Management Concept
Info
rma
tion
ga
the
ring
, pro
cess
ing
, co m
mun
ica
tion
, p
rese
nta
tion
Com
man
d c
omm
unic
atio
nW
hile
mai
nta
inin
g in
form
atio
n s
ecu
rity
at a
ccep
tabl
e r
isk
leve
ls
EffectorsReal World
Phenomena
Join
t Tas
k F
orc
e O
pera
tions
M
anag
emen
t
Tech Area 3
Tech Area 4
Tech Area 1
Te
ch A
rea
2
TA1 - Network TheoryTA1 - Network TheoryTA1 - Network TheoryTA1 - Network Theory
Fundamental underpinnings for adaptive networking to support complex system-of-systems and ad hoc coalition teams
• Theoretical foundations for design of wireless and sensor networks (Towsley, U. Mass)
• Interoperability of wireless networks and systems (Hancock, RMR/Lee IBM-US)
• Biologically-Inspired self-organization in networks (Lio Cambridge/Pappas IBM-US)
Finding hidden community structure and motifs in networks
Simple biological network
LethalSlow-growth
Non-lethalUnknown
• Mathematical models of interoperation to enable design of coalition networks
• Analysis of community patterns in biological networks and their applications to wireless systems.
• Models analyzing MANETs and performance of protocols
Years 2 - 3 Objectives
TA2 - Security Across a System-of-SystemsTA2 - Security Across a System-of-SystemsTA2 - Security Across a System-of-SystemsTA2 - Security Across a System-of-Systems
Fundamental underpinnings for adaptive security to support complex system-of-systems and ad hoc coalition teams
• Policy based security management (Calo, IBM-US)
• Energy efficient security architectures and infrastructures (Paterson, Royal Holloway)
• Trust and risk management in dynamic coalition environments (Clark, York)
• Fixed infrastructure free security mechanism
• Enablement of secure dynamic communities of interest
• Identity based trust management systems for MANETs
Years 2 - 3 Objectives
Special-purpose Modeling Notations
State Machines, ACLs, Other ConfigLanguages
Natural Language Vocabulary
Battle Space Ontologies
Natural Language
Specifications
Abstract Policies
Cross-cutting Interaction
Models
Platform-specific
Configurations
Policy Specification
Layer
Abstract PolicyLayer
Concrete PolicyLayer
Implementation and Configuration
Layer
Real-time Updates
TA3 - Sensor Information Processing/DeliveryTA3 - Sensor Information Processing/DeliveryTA3 - Sensor Information Processing/DeliveryTA3 - Sensor Information Processing/Delivery
Sensor information processing and delivery from distributed multi-modal sensor systems within adaptive sensor networks• Quality of Information of sensor data
(Bisdikian, IBM-US)
• Task-oriented deployment of sensor data infrastructure (La Porta, Penn State)
• Complexity management of sensor data infrastructure (Szymanski, RPI)
• Quality of information representations to enable fusion at multiple levels
• Adaptive data infrastructures based on mission requirements and sensor-mission matching algorithms
• Information overload reduction techniques for military sensor networks
Years 2 – 3 Objectives
Service Oriented Architecture for Sensor Networks
TA3 - Sensor Information Processing/DeliveryTA3 - Sensor Information Processing/DeliveryTA3 - Sensor Information Processing/DeliveryTA3 - Sensor Information Processing/Delivery
Sensors as a DistributedDatabase
Brig. HQBrig. HQ
Div HQ
SOA
BG HQ
Co. com.Co. com.
Airborne sensorsystem network
Vehicle network
UGS network
Small UAVs
DynamicSOA
Analysis team(s)
Missions
Missions
Missions
Missions
Have missions & tasksthat need INT and info
Resources & Data, INT an info providers
Mar
ket
-ba
sed
Sen
sor
Net
wor
k ta
skin
g
Dynamic assignment of resources to missions
Sensor mission matching (inc.
positioning)
Mission(s) & resources
Direction &Dissemination
Push/Pull
Push
Push/Pull
Push/Pull
Tools and Techniques
Mission specific Network
Configuration
TA4 - Distributed Coalition Planning/Decision-MakingTA4 - Distributed Coalition Planning/Decision-Making TA4 - Distributed Coalition Planning/Decision-MakingTA4 - Distributed Coalition Planning/Decision-Making
Planning and decision-making that takes into consideration the human, social, and technical interactions anticipated in distributed coalition teams• Mission adaptive collaborations
(Poltrock, Boeing)
• Cultural analysis (Sieck, Klein Assoc)
• Shared situational awareness/ Semantic Battlespace Infosphere (Waggett, IBM-UK)
• Improved understanding of multinational planning and decision making
• Agile, adaptive collaboration among humans and software agents engaged in collaborative decision-making
• Ontologies to support meaning-preserving modes of information exchange and information fusion
Years 2 - 3 Objectives
TA4 – Collaboration across TasksTA4 – Collaboration across Tasks TA4 – Collaboration across TasksTA4 – Collaboration across Tasks
Plan Representation
Analyzing Culturally Dependent
Communication Patterns
Interpretation of human activity
Information Flow Analysis
Interpretation of human activity
Computer Mediated Social Interactions
Cultural Modelling of
Planning and Intent
Battlefield IIWest Point/Shrivenham
Semantic Integration and Coalition Knowledge Networks
Agent Support for ad-hoc Adaptive Teamwork
P 11
P 12
P 10
ITA ThemesITA ThemesITA ThemesITA Themes• Objectives
– To encourage more cross-technical area communication and collaboration
– A mechanism for promoting the ITA to a non-technical audience• Topics
– Information Flows– Dynamic Communities– Trust and Risk
• Outcomes– Related to the scenario and its vignettes– Outcomes of Tasks promoted in the context of the scenario
through:• Story board• Papers• Presentations• .....
Theme 1 – Information FlowsTheme 1 – Information FlowsTheme 1 – Information FlowsTheme 1 – Information Flows
• Information sharing– Key component of Network Centric Operations– Providing both the right information to the right users at the right
time and also the means for users to share and use information
• For the soldier on the ground this is a hard problem– Dependent upon ad-hoc mobile communications networks– Part of a coalition force with national differences in equipment,
security policies and culture
• Many Information Sources– Sensors, humans, data bases and automated systems.– Must take into account both the security and network
constraints.– Recognise the human dimension
• Which information will be easiest for the user to understand and use
Theme 2 – Dynamic CommunitiesTheme 2 – Dynamic CommunitiesTheme 2 – Dynamic CommunitiesTheme 2 – Dynamic Communities• Dynamic Mission-Driven Communities of Interest
– A sub-group of a coalition, formed dynamically to support agile forces to address a mission in a very short amount of time
– Require dynamic and static networks with certain properties:• Robustness• Small world characteristics• Security• Bandwidth efficiency• .....
• Multiple and competing missions can take place in same area– Issues of collaboration and concurrency– Dynamic allocation of resources– Local autonomy of resources
• Involves networks from physical to social, applied holistically
Theme 3 – Trust and RiskTheme 3 – Trust and RiskTheme 3 – Trust and RiskTheme 3 – Trust and Risk
• What does this mean to the commander and the soldier on the ground ?– Trust in the information, Risk in the decision
you will make
• Sources of the data– SIGINT, HUMINT, Profiling
• Timing constraints– Non-Constrained
• Information on a potential suicide attack
– Constrained• Suicide attack – Vehicle or person(s)
The Holistan ScenariosThe Holistan ScenariosThe Holistan ScenariosThe Holistan Scenarios• Search & Rescue in Urban Terrain
– Downed helicopter – crew moving to an ERV• Dynamic resourcing of assets & personnel• Exploitation of existing communications network• Establishment and exploitation of data sensor network• Establishing ad hoc secure communications network• Cultural issues
• Dirty Bomb (WME)– Plot to plant a device with some nuclear capability in capital city
• Provenance of Intelligence• Dynamic deployment of ad hoc sensor network• Dynamic deployment of communications network• Dynamic deployment of assets & personnel• Coalition interoperability• Intelligence communities interoperability
• Tracking Insurgents– Destabilising operation by insurgents
• Establish communications network• Covert insertion of HUMINT assets• Establish data sensor network• Military/Intelligence co-operation
• Natural Disaster– Primary roles for non-military participants (NGOs and Government Agencies)
• Establish logistics network• Establish communications network• Establish geo-sensorrnetworks• Provenance of ground truth
Future Events and InformationFuture Events and InformationFuture Events and InformationFuture Events and Information
Events– Annual Conference
• September 25-27 2007, University of Maryland
• Website– http://www.usukita.org
• Any Questions ?– [email protected]