army netcentric warfare

15
Army Netcentric Warfare U.S. Army Research Laboratory Dr John W. Gowens II Director Computational and Information Sciences Directorate

Upload: palila

Post on 06-Jan-2016

55 views

Category:

Documents


0 download

DESCRIPTION

U.S. Army Research Laboratory. Army Netcentric Warfare. Dr John W. Gowens II Director Computational and Information Sciences Directorate. XXXX. XXX. XX. X. Best global knowledge Worst local knowledge. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Army Netcentric Warfare

ArmyNetcentric

Warfare

ArmyNetcentric

Warfare

U.S. Army Research Laboratory

Dr John W. Gowens IIDirector

Computational and Information SciencesDirectorate

Page 2: Army Netcentric Warfare

Best global knowledge Worst local knowledge

Best local knowledge Worst global knowledge

XX

X

XXX

XXXX

Currently provides limited reporting capability from the soldier in the field

ES2Every Soldier is a Sensor

New technologies are needed to enable information exchange between the local and global worlds

• Global/Local Interactions

• Cross-Domain Tactical Gateway

• Distributed Dynamic Processing

• Signal Processingfor Communications

• Secure Networking

• Sensor Communications

Page 3: Army Netcentric Warfare

• Global assets tipping local assets

• Local Assets filling in the gaps for global assets

• Local/Global monitoring to detect plan/operation deviation

• Refining Global information to relevant local events

• Inferencing behaviors to provide explanation and assessment through narratives

• Pusher and Catcher on each side of the Cross Domain Solution

Local/Global Interactions

IMINT SIGINT HUMINT

Global ServicesLocal Services

Multi-mediaReports

Sensors

Visualization

Intelligent Filters

Transformation

MASINTLanguageTranslation

Limited BandwidthTime Critical

CorrelationPrediction

Fusion

Reliable NetworkReasonable Bandwidth

Time Sensitivity

Visualization

CorrelationPrediction

Fusion

CDIX

Page 4: Army Netcentric Warfare

UA/UE OrganicTheater/National

FCS/DCGS-A

C2

Fusion Node

Organic Sensors

Organic Sensors

Fusion Node

Soldiers

Soldiers

LOCAL / LOCALFUSION

LOCAL / GLOBALFUSION

LOCALFUSION

GLOBAL / LOCALFUSION

Global FusionLocal (Dismounted) Fusion• Global node supports the

pull of information relevant to the needs of the local node to complete analysis

• Global node fuses filtered information coming up from local node into its own information base

• Local node pulls information from global node to help plan next mission

• Local node fuses global pull with their organic sensors to develop better Sit Awareness

• Local node pushes critical information to global node

• Local node has similarinteractions with adjacent local nodes

Protecting the force from imminent threats through interactive and automated fusion of networked local and global information sources

Page 5: Army Netcentric Warfare

Cross-domain Tactical Gateway Innovative Cross Domain Solution (Unclassified to Secret - IATO Approval)

Human in the loop (Secret to Unclassified)

Pusher and Catcher on each side of the Cross Domain SIPRNET

Sec

ret

TG

Pro

ce

ssin

g

Cat

ch

er

Tactical Gateway

Un

cla

ssi

fie

d T

G P

roc

ess

ing

Pu

sh

er

Tactical Secure Mobile

Network

Local Fusion

Services

Soldiers

Sensors

GlobalFusion

Services

Long HaulNetwork

VSAT Terminal

Classified EnvironmentUnclassified Environment

CD

IX S

olu

tio

n/D

ata

Dio

de

ARL’s CDIX SolutionUNCLASSIFIED to SECRET

Detect and reject malicious code1 Detect and screen mobile code2 Apply meta tags 3 Digitally sign using unclass DoD PKI cert4 Store for unclassified use 5 Verify unclass digital signature 6 Transfer across boundary7 Detect and reject malicious code 8 Detect and screen mobile code 9 Verify meta tags 10 Digitally sign using SIPRNET PKI cert11 Verify SIPRNET digital signature12 Store data for secret use 13 Provide data to SIPRNET via Web Services 14

Page 6: Army Netcentric Warfare

Distributed Dynamic Processing

Distributed Dynamic Processing

Managing the collection, flow and

processing of battlefield information

across a dynamic, unreliable,

intermittent, and limited bandwidth

tactical network

• Automated Discovery and Multiple Protocol Support (TCP UDP RUDP)

• Bandwidth Management

• Adaptive Quality of Service

• Tactical Network Resiliency

– Topological Changes

– Intermittent Connectivity

– Availability

• Connectivity Maintenance and Visualization

• Web Services where Appropriate

– Periphery of System

– Bridge to Reliable Commercial Network Infrastructure

Intermittent

Reliable

Unreliable

Page 7: Army Netcentric Warfare

Secure Networking

Signal Processingfor Communications

Tactical Communications and NetworksTactical Communications and NetworksSelf-configuring wireless network technologies that enable secure, scalable, energy-efficient, and survivable mobile and sensor networks.

Sensor Communications

• Multi-Input Multi-Output (MIMO)

• Multi-Carrier Waveforms

• Ultra Wideband Communications

• Cross-Layer Designs

• Non-Cooperative Signal Processing

• Intrusion Detection for MANETs

• Secure Network Emulation and Performance Analysis

• Mobile Ad Hoc (MANET) Routing

• Autoconfiguring Networks

• The Blue Radio, energy-efficient communications for unattended sensor nodes

• Low Power RF and Fast Acquisition Modem

• Energy-Efficient, Secure Ad Hoc Routing

• Energy-Efficient Medium Access Control Protocols

Wireless NetworkTestbed

Page 8: Army Netcentric Warfare

Mobile Ad Hoc NetworksMobile Ad Hoc Networks

Page 9: Army Netcentric Warfare

Approach

Challenges

Secure NetworkingSecure NetworkingMobile tactical networks that are highly mobile, efficient, self-configuring, survivable, and secure.

• Mobile ad hoc (MANET) networking and autoconfiguration protocols

• Intrusion detection/localization for network infrastructure protocols

• Emulation environment where performance characteristics of secure networking is assessed in realistic mobile scenarios

• Highly dynamicnetworks with mobile nodes and mobile networking infrastructure

• Limited bandwidth and resources

• No concentration points where traffic can be analyzed

• Cannot rely on centralized network or security services

• Intermittent connectivity, noisy wireless channels, congestion

Page 10: Army Netcentric Warfare

Intrusion DetectionIntrusion DetectionINFORMATION ASSURANCE

Challenges

• Lack of single good location to monitor network traffic- topology changes, broadcast nature of wireless

• Wireless medium unreliable- intermittent connectivity, packets loss, noise

• Limited bandwidth –cannot exchange large volumes of intrusion detection data over many hops

• Commercial wired network detection technology won’t work

Approach

• Initial focus on Cooperative Intrusion Detection Hierarchy Technique

• Each node has basic capability to detect and report on any unusual network activity.

• Next higher level node aggregates data from multiple nodes to confirm unusual activity and passes findings on.

• Nodes higher in hierarchy further aggregate data, determine if activity crosses threshold, and disseminate compromised node ID.

• Evolve with network protocol upgrades, OLSR, to HSLS, to MALSR

Page 11: Army Netcentric Warfare

Sensor NetworksSensor Networks

Page 12: Army Netcentric Warfare

Approach

Survivable and energy-efficient communications for distributed, unattended sensor nodes.

• Extreme bandwidth, power, energy, and computational constraints

• Severe near-earth propagation effects

• Self-organization under a variety of delivery mechanisms

• Duty-cycling operations to extend battery life

• Jam-resistant

• Low cost

• Duty cycling to conserve energy

• Robust, high processing gain waveforms that are fast-acquisition to allow duty cycling

• Low overhead, reactive/proactive ad hoc routing

• Energy-efficient Medium Access Control (MAC) including duty cycling, power control, and multi-user detection

• Leveraging commercial wireless radio components

• Application specific routing and scheduling

Challenges

MODEM

RF BOARD

Sensor CommunicationsSensor Communications

Blue Radio

Page 13: Army Netcentric Warfare

Ultra Wideband Communications and Geolocation

Multi-Carrier Waveforms

Multi-Input Multi-Output

(MIMO)

Approach

Challenges

Signal Processingfor CommunicationsSignal Processingfor CommunicationsSignal processing techniques that enable high data-rate, covert, on-the-move communications in dynamic and hostile environments

• Highly diverse dynamic channels and network topologies

• LPD/LPI/Anti-Jam under mobile conditions

• Non-contiguous spectrum and coexistence

• Low complexity transceiver design

• Bandwidth, spectrum, and energy constraints

• Co-site interference

• Multi-Input Multi-Output (MIMO) multiple antenna systems for high data-rate communications

• Multi-Carrier waveforms to exploit available spectrum and to combat fading

• Ultra Wideband communications and geolocation for dense urban terrain

• Cross-Layer techniques for improved energy consumption and performance

• Non-cooperative signal processing

Page 14: Army Netcentric Warfare

Free-Space Laser Communication

Free-Space Laser Communication

Develop adaptive laser communication systems that are robust, light-weight, secure, and operate at high data rates for advanced communications and information distribution technologies

Page 15: Army Netcentric Warfare

Army netcentricwarfare depends on MANET technologyfor connectivity

Army netcentricwarfare depends on MANET technologyfor connectivity