1 / 20

The International Technology Alliance: Collaborative Research in Network & Information Sciences

The International Technology Alliance: Collaborative Research in Network & Information Sciences. John Ibbotson Emerging Technology Services IBM United Kingdom Ltd john_ibbotson@uk.ibm.com 18th April 2007. Agenda. ITA Overview Technical Areas Network Theory

emmy
Télécharger la présentation

The International Technology Alliance: Collaborative Research in Network & Information Sciences

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The International Technology Alliance: Collaborative Research in Network & Information Sciences John Ibbotson Emerging Technology Services IBM United Kingdom Ltd john_ibbotson@uk.ibm.com 18th April 2007

  2. Agenda • ITA Overview • Technical Areas • Network Theory • Security Across a System-of-Systems • Sensor Information Processing/Delivery • Distributed Coalition Planning/Decision-Making • Three Themes • Information Flows • Dynamic Communities • Trust and Risk • Scenarios • Dirty Bomb • Search and Rescue in Urban Areas • Tracking Insurgents • Natural Disasers • Events and Information

  3. The ITA Vision A US/UK Alliance focused on enhancing distributed, secure, and flexible decision-making to improve coalition operations by: • Creating an international collaborative research culture • Academia, Industry, Government in US and UK • Innovative multidisciplinary approaches • Developing ground-breaking fundamental science • Empower innovators in an open (unclassified) framework • Develop understanding of the root cause of military technical challenges • Making an impact on coalition military effectiveness • Focus on key problems with a critical mass of researchers • Gain synergies from UK/US alignment • Innovative transition model to bring research to market

  4. What Makes the ITA Different? • All parties fully engaged • Fully collaborative Alliance of US/UK academia, industry, government • Trust, shared understanding and deep collaboration enabled by interchanges/staff rotations • New collaborations --- peer-to-peer, mentorships, partnerships • Jointly address major research challenges • Networking – Security – Sensor Processing – Decision Making • Critical mass focused on key technical challenges • Full spectrum research efforts • Fundamental research concurrent with pull-through of concepts/principles and rapid/affordable transitions of technology into systems • Focus on coalition operations • Complex operations where military operations take place in the midst of a civilian population engaged in daily life

  5. Team Overview 10 11 12 13 11 10 Academia U.S. Gov. U.K. Gov. 2 3 5 9 3 6 8 2 8 9 5 1 4 1 4 7 7 6 Industry • ACADEMIA • Carnegie Mellon University • City University of New York • Columbia University • Pennsylvania State University • Rensselaer Polytechnic Institute • University of California Los Angeles • University of Maryland • University of Massachusetts • ACADEMIA • Cranfield University, Royal Military College of Science, Shrivenham • Imperial College, London • Royal Holloway University of London • University of Aberdeen • University of Cambridge • University of Southampton • University of York • INDUSTRY • IBM UK • LogicaCMG • Roke Manor Research Ltd. • Systems Engineering • & Assessment Ltd. • INDUSTRY • BBNT Solutions LLC • The Boeing Corporation • Honeywell Aerospace Electronic Systems • IBM Research • Klein Associates

  6. International Technology Alliance in Network and Information Sciences Collaborative Alliance Managers/Consortium Managers Jay Gowens (ARL) Jack Lemon (MoD) Dinesh Verma (IBM) Dave Watson (IBM-UK) Network Theory Ananthram Swami (ARL) Tom McCutcheon (Dstl) Don Towsley (U Mass) Security Across a System-of-Systems Trevor Benjamin (Dstl) Greg Cirincione (ARL) John McDermid (York U) Sensor Information Processing and Delivery Tien Pham (ARL) Gavin Pearson (Dstl) Thomas La Porta (PSU) Distributed Coalition Planning and Decision-Making Jitu Patel (Dstl) Mike Strub (ARL) Nigel Shadbolt (U of S) Theoretical Foundations for Analysis/Design of Wireless and Sensor Networks Towsley, U Mass Policy Based Security Management Markham, Honeywell Mission Adaptive Collaborations Poltrock, Boeing Quality of Information of Sensor Data Thomas, Honeywell Command Process Transformation and Analysis Sieck, Klein Assoc Interoperability of Wireless Networks and Systems Lee, IBM Energy Efficient Security Architectures and Infrastructures Paterson, Royal Holloway Task-Oriented Deployment of Sensor Data Infrastructures La Porta, Penn State Trust and Risk Management in Dynamic Coalition Environments McDermid, York Biologically-Inspired Self-Organization in Networks Lio, Cambridge Complexity Management of Sensor Data Infrastructures Szymanski, RPI Shared Situational Awareness and the Semantic Battlespace Infosphere Shadbolt, Southhampton

  7. ITA Outcomes A portfolio of: • Peer reviewed research that advances the state-of-the-art in network and information sciences • Documented in published papers, presentations, patents • Emphasis on collaborative research resulting in jointly authored publications and presentations • Concepts and principles that enable flexible, dependable and accreditable coalition interoperability • Socio-technical concepts and principles to enable the doctrine of network-enabled/centric coalition operations • Research results that transition directly into key applied research or technology demonstration programmes • Concepts and results that impact acquisition channels • Frequent spin-off of research results into current needs

  8. Technical Areas – The Big Picture Operations Management and Decision Making Joint Task Force : Operations Management , Decision Making Including risk , trust mngt in infn , comms , actors Performance Operational Policies , Assessment Strategy , Tactics ( operations ) Information Security Management Concept , n o Information Security Management System , i t a c including risk , trust mngt i n u m m o c Performance Ops Policy Mngt , g Assessment ( infosec ) n n i s o s i t e a t c o n r e p s e , r g p n i r e m h Information Security Technologies t o a C g n o Wireless Communications Infrastructure i t a m r o f n I Node Tech r r r o o o s s s n n n Individual e e e s s s Actor 6 0 0 Actor network : 6 Sensor networks 2 own actors o 1 0 Operational o Coalition actors o Internal system o Adversaries o neutrals o s n o i t a r e t p Tech Area 4 n e O m e e c r g o a F n a k M s a T t n i o J k s i r e l b a t p e c 2 c a a n t e o a r i t y A a t i c r i h u n c c u e e m s s T l m n e o o v i c e t l a d m n r a o m f n i g n i n i a t n i a m Tech Area 1 e l i h W Real World Effectors Phenomena Tech Area 3

  9. TA1 - Network Theory Simple biological network Finding hidden community structure and motifs in networks Lethal Slow-growth Non-lethal Unknown Fundamental underpinnings for adaptive networking to support complex system-of-systems and ad hoc coalition teams • Theoretical foundations for design of wireless and sensor networks (Towsley, U. Mass) • Interoperability of wireless networks and systems (Hancock, RMR/Lee IBM-US) • Biologically-Inspired self-organization in networks (Lio Cambridge/Pappas IBM-US) Years 2 - 3 Objectives • Mathematical models of interoperation to enable design of coalition networks • Analysis of community patterns in biological networks and their applications to wireless systems. • Models analyzing MANETs and performance of protocols

  10. TA2 - Security Across a System-of-Systems Natural Language Vocabulary Policy SpecificationLayer Natural Language Specifications Battle Space Ontologies Abstract PolicyLayer Abstract Policies Special-purpose Modeling Notations Concrete PolicyLayer Cross-cutting Interaction Models Real-time Updates State Machines, ACLs, Other ConfigLanguages Implementation and ConfigurationLayer Platform-specific Configurations Fundamental underpinnings for adaptive security to support complex system-of-systems and ad hoc coalition teams • Policy based security management (Calo, IBM-US) • Energy efficient security architectures and infrastructures (Paterson, Royal Holloway) • Trust and risk management in dynamic coalition environments (Clark, York) Years 2 - 3 Objectives • Fixed infrastructure free security mechanism • Enablement of secure dynamic communities of interest • Identity based trust management systems for MANETs

  11. TA3 - Sensor Information Processing/Delivery Sensor information processing and delivery from distributed multi-modal sensor systems within adaptive sensor networks • Quality of Information of sensor data (Bisdikian, IBM-US) • Task-oriented deployment of sensor data infrastructure (La Porta, Penn State) • Complexity management of sensor data infrastructure (Szymanski, RPI) Years 2 – 3 Objectives • Quality of information representations to enable fusion at multiple levels • Adaptive data infrastructures based on mission requirements and sensor-mission matching algorithms • Information overload reduction techniques for military sensor networks Service Oriented Architecture for Sensor Networks

  12. TA3 - Sensor Information Processing/Delivery Missions Airborne sensor Div HQ system network Dynamic assignment of Push/Pull resources to missions Sensors as a Distributed Database Brig. HQ Brig. HQ Missions Analysis team(s ) ) & Mission(s Push based Sensor Direction & resources Dissemination Network tasking Sensor mission - matching (inc. SOA positioning) Small UAVs Market Push/Pull Missions BG HQ Vehicle network Mission Missions Dynamic SOA specific Network Push/Pull Configuration Co. com. Co. com. UGS network Have missions & tasks that need INT and info Resources & Data, INT an info providers Tools and Techniques

  13. TA4 - Distributed Coalition Planning/Decision-Making Planning and decision-making that takes into consideration the human, social, and technical interactions anticipated in distributed coalition teams • Mission adaptive collaborations (Poltrock, Boeing) • Cultural analysis (Sieck, Klein Assoc) • Shared situational awareness/ Semantic Battlespace Infosphere (Waggett, IBM-UK) Years 2 - 3 Objectives • Improved understanding of multinational planning and decision making • Agile, adaptive collaboration among humans and software agents engaged in collaborative decision-making • Ontologies to support meaning-preserving modes of information exchange and information fusion

  14. TA4 – Collaboration across Tasks Computer Mediated Social Interactions Interpretation of human activity Information Flow Analysis Interpretation of human activity Cultural Modelling of Planning and Intent P 10 Plan Representation P 11 P 12 Semantic Integration and Coalition Knowledge Networks Analyzing Culturally Dependent Communication Patterns Battlefield II West Point/Shrivenham Agent Support for ad-hoc Adaptive Teamwork

  15. ITA Themes Objectives To encourage more cross-technical area communication and collaboration A mechanism for promoting the ITA to a non-technical audience Topics Information Flows Dynamic Communities Trust and Risk Outcomes Related to the scenario and its vignettes Outcomes of Tasks promoted in the context of the scenario through: Story board Papers Presentations .....

  16. Theme 1 – Information Flows Information sharing Key component of Network Centric Operations Providing both the right information to the right users at the right time and also the means for users to share and use information For the soldier on the ground this is a hard problem Dependent upon ad-hoc mobile communications networks Part of a coalition force with national differences in equipment, security policies and culture Many Information Sources Sensors, humans, data bases and automated systems. Must take into account both the security and network constraints. Recognise the human dimension Which information will be easiest for the user to understand and use

  17. Theme 2 – Dynamic Communities Dynamic Mission-Driven Communities of Interest A sub-group of a coalition, formed dynamically to support agile forces to address a mission in a very short amount of time Require dynamic and static networks with certain properties: Robustness Small world characteristics Security Bandwidth efficiency ..... Multiple and competing missions can take place in same area Issues of collaboration and concurrency Dynamic allocation of resources Local autonomy of resources Involves networks from physical to social, applied holistically

  18. Theme 3 – Trust and Risk What does this mean to the commander and the soldier on the ground ? Trust in the information, Risk in the decision you will make Sources of the data SIGINT, HUMINT, Profiling Timing constraints Non-Constrained Information on a potential suicide attack Constrained Suicide attack – Vehicle or person(s)

  19. The Holistan Scenarios Search & Rescue in Urban Terrain Downed helicopter – crew moving to an ERV Dynamic resourcing of assets & personnel Exploitation of existing communications network Establishment and exploitation of data sensor network Establishing ad hoc secure communications network Cultural issues Dirty Bomb (WME) Plot to plant a device with some nuclear capability in capital city Provenance of Intelligence Dynamic deployment of ad hoc sensor network Dynamic deployment of communications network Dynamic deployment of assets & personnel Coalition interoperability Intelligence communities interoperability Tracking Insurgents Destabilising operation by insurgents Establish communications network Covert insertion of HUMINT assets Establish data sensor network Military/Intelligence co-operation Natural Disaster Primary roles for non-military participants (NGOs and Government Agencies) Establish logistics network Establish communications network Establish geo-sensorrnetworks Provenance of ground truth

  20. Future Events and Information Events Annual Conference September 25-27 2007, University of Maryland Website http://www.usukita.org Any Questions ? john_ibbotson@uk.ibm.com

More Related