1 / 15

Army Netcentric Warfare

U.S. Army Research Laboratory. Army Netcentric Warfare. Dr John W. Gowens II Director Computational and Information Sciences Directorate. XXXX. XXX. XX. X. Best global knowledge Worst local knowledge.

palila
Télécharger la présentation

Army Netcentric Warfare

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. U.S. Army Research Laboratory Army Netcentric Warfare Dr John W. Gowens II Director Computational and Information Sciences Directorate

  2. XXXX XXX XX X Best global knowledge Worst local knowledge New technologies are needed to enable information exchange between the local and global worlds ES2 Every Soldier is a Sensor Currently provides limited reporting capability from the soldier in the field • Global/Local Interactions • Cross-Domain Tactical Gateway • Distributed Dynamic Processing • Signal Processingfor Communications • Secure Networking • Sensor Communications Best local knowledge Worst global knowledge

  3. Language Translation Multi-media Reports IMINT SIGINT MASINT HUMINT Sensors Intelligent Filters Reliable Network Reasonable Bandwidth Time Sensitivity Limited Bandwidth Time Critical Global Services Local Services Transformation Correlation Prediction Visualization Fusion Visualization Correlation Prediction Fusion CDIX Local/Global Interactions • Global assets tipping local assets • Local Assets filling in the gaps for global assets • Local/Global monitoring to detect plan/operation deviation • Refining Global information to relevant local events • Inferencing behaviors to provide explanation and assessment through narratives • Pusher and Catcher on each side of the Cross Domain Solution

  4. Local (Dismounted) Fusion Global Fusion • Local node pulls information from global node to help plan next mission • Local node fuses global pull with their organic sensors to develop better Sit Awareness • Local node pushes critical information to global node • Local node has similarinteractions with adjacent local nodes • Global node supports the pull of information relevant to the needs of the local node to complete analysis • Global node fuses filtered information coming up from local node into its own information base Organic Sensors Soldiers LOCAL FUSION GLOBAL / LOCAL FUSION Fusion Node FCS/DCGS-A LOCAL / LOCAL FUSION LOCAL / GLOBAL FUSION Soldiers Fusion Node UA/UE Organic Theater/National C2 Organic Sensors Protecting the force from imminent threatsthrough interactive and automated fusion of networked local and global information sources

  5. 14 3 13 12 11 8 9 10 7 6 5 4 1 2 Digitally sign using unclass DoD PKI cert Provide data to SIPRNET via Web Services Detect and reject malicious code Detect and screen mobile code Apply meta tags Store data for secret use Verify meta tags Verify unclass digital signature Verify SIPRNET digital signature Store for unclassified use Transfer across boundary Detect and reject malicious code Digitally sign using SIPRNET PKI cert Detect and screen mobile code Cross-domain Tactical Gateway • Innovative Cross Domain Solution (Unclassified to Secret - IATO Approval) • Human in the loop (Secret to Unclassified) • Pusher and Catcher on each side of the Cross Domain SIPRNET ARL’s CDIX SolutionUNCLASSIFIED to SECRET Global Fusion Services Long Haul Network Soldiers Tactical Secure Mobile Network Local Fusion Services Secret TG Processing Catcher Pusher Unclassified TG Processing CDIX Solution/Data Diode VSAT Terminal Tactical Gateway Sensors Unclassified Environment Classified Environment

  6. Unreliable Intermittent Reliable • Automated Discovery and Multiple Protocol Support (TCP UDP RUDP) • Bandwidth Management • Adaptive Quality of Service • Tactical Network Resiliency • Topological Changes • Intermittent Connectivity • Availability • Connectivity Maintenance and Visualization • Web Services where Appropriate • Periphery of System • Bridge to Reliable Commercial Network Infrastructure Distributed Dynamic Processing Managing the collection, flow and processing of battlefield information across a dynamic, unreliable, intermittent, and limited bandwidth tactical network

  7. Tactical Communications and Networks Self-configuring wireless network technologies that enable secure, scalable, energy-efficient, and survivable mobile and sensor networks. Wireless Network Testbed Signal Processingfor Communications • Multi-Input Multi-Output (MIMO) • Multi-Carrier Waveforms • Ultra Wideband Communications • Cross-Layer Designs • Non-Cooperative Signal Processing Secure Networking • Intrusion Detection for MANETs • Secure Network Emulation and Performance Analysis • Mobile Ad Hoc (MANET) Routing • Autoconfiguring Networks Sensor Communications • The Blue Radio, energy-efficient communications for unattended sensor nodes • Low Power RF and Fast Acquisition Modem • Energy-Efficient, Secure Ad Hoc Routing • Energy-Efficient Medium Access Control Protocols

  8. Mobile Ad Hoc Networks

  9. Secure Networking Mobile tactical networks that are highly mobile, efficient, self-configuring, survivable, and secure. Challenges • Highly dynamicnetworks with mobile nodes and mobile networking infrastructure • Limited bandwidth and resources • No concentration points where traffic can be analyzed • Cannot rely on centralized network or security services • Intermittent connectivity, noisy wireless channels, congestion Approach • Mobile ad hoc (MANET) networking and autoconfiguration protocols • Intrusion detection/localization for network infrastructure protocols • Emulation environment where performance characteristics of secure networking is assessed in realistic mobile scenarios

  10. INFORMATION ASSURANCE Intrusion Detection • Challenges • Lack of single good location to monitor network traffic- topology changes, broadcast nature of wireless • Wireless medium unreliable- intermittent connectivity, packets loss, noise • Limited bandwidth –cannot exchange large volumes of intrusion detection data over many hops • Commercial wired network detection technology won’t work • Approach • Initial focus on Cooperative Intrusion Detection Hierarchy Technique • Each node has basic capability to detect and report on any unusual network activity. • Next higher level node aggregates data from multiple nodes to confirm unusual activity and passes findings on. • Nodes higher in hierarchy further aggregate data, determine if activity crosses threshold, and disseminate compromised node ID. • Evolve with network protocol upgrades, OLSR, to HSLS, to MALSR

  11. Sensor Networks

  12. MODEM RF BOARD Sensor Communications Survivable and energy-efficient communications for distributed, unattended sensor nodes. Challenges • Extreme bandwidth, power, energy, and computational constraints • Severe near-earth propagation effects • Self-organization under a variety of delivery mechanisms • Duty-cycling operations to extend battery life • Jam-resistant • Low cost Approach Blue Radio • Duty cycling to conserve energy • Robust, high processing gain waveforms that are fast-acquisition to allow duty cycling • Low overhead, reactive/proactive ad hoc routing • Energy-efficient Medium Access Control (MAC) including duty cycling, power control, and multi-user detection • Leveraging commercial wireless radio components • Application specific routing and scheduling

  13. Ultra Wideband Communications and Geolocation Multi-Input Multi-Output (MIMO) Multi-Carrier Waveforms Signal Processing for Communications Signal processing techniques that enable high data-rate, covert, on-the-move communications in dynamic and hostile environments Challenges • Highly diverse dynamic channels and network topologies • LPD/LPI/Anti-Jam under mobile conditions • Non-contiguous spectrum and coexistence • Low complexity transceiver design • Bandwidth, spectrum, and energy constraints • Co-site interference Approach • Multi-Input Multi-Output (MIMO) multiple antenna systems for high data-rate communications • Multi-Carrier waveforms to exploit available spectrum and to combat fading • Ultra Wideband communications and geolocation for dense urban terrain • Cross-Layer techniques for improved energy consumption and performance • Non-cooperative signal processing

  14. Free-Space Laser Communication Develop adaptive laser communication systems that are robust, light-weight, secure, and operate at high data rates for advanced communications and information distribution technologies

  15. Army netcentric warfare depends on MANET technology for connectivity

More Related