DARPA releases network security solicitation to operate through bad wireless nodes
ARLINGTON, Va. 31 March 2013. Military communications experts at the U.S. Defense Advanced Research Projects Agency (DARPA) in Arlington, Va., have released a formal solicitation for a wireless network security program to help voice and data wireless networks continue to function if the network has bad wireless nodes.
DARPA has released a broad agency announcement (DARPA-BAA-13-30) for the Wireless Network Defense program to ensure reliable wireless communications in areas lacking a trustworthy communications infrastructure. The agency will brief industry on the program tomorrow, 1 April 2013 in Arlington, Va.
In areas lacking trustworthy communications infrastructure, military forces rely on wireless networks with nodes that coordinate among themselves to manage resources, such as spectrum and power, and determine the best configurations to enable sharing of information, DARPA officials explain.
Typically these networks trust all information they share about the security and status of each node and the network as a whole. As a result, inaccurate information can bring the network down quickly. The DARPA Wireless Network Defense program aims to develop new protocols that enable military wireless networks to remain operational despite inadvertent misconfigurations or malicious compromise of individual nodes.
“Current security efforts focus on individual radios or nodes, rather than the network, so a single misconfigured or compromised radio could debilitate an entire network,” says Wayne Phoel, manager of the Wireless Network Defense program.
“We need to change how we control wireless networks by developing a network-based solution for current and future systems that acknowledges there will be bad nodes and enables the network to operate around them,” Phoel says.
The program will develop protocols that determine the viability and trustworthiness of neighboring nodes and adapt the network automatically to operate through problems.
“Credit card companies use various indicators for trying to determine if someone has stolen your credit card and is posing as you,” Phoel says. “Unexpected purchase locations, amounts and other factors could raise an alert.”
The first phase of the Wireless Network Defense program has three technical areas: wireless network vulnerability assessment; information reliability estimation; and robust network control.
Companies interested should submit proposals no later than 11 Sept. 2013, but DARPA is encouraging proposals by 8 May 2013 for the best chances at funding.
For questions, concerns, and for information on how to submit a proposal, email DARPA at [email protected].
More information is online at https://www.fbo.gov/spg/ODA/DARPA/CMO/DARPA-BAA-13-30/listing.html.
John Keller | Editor
John Keller is editor-in-chief of Military & Aerospace Electronics magazine, which provides extensive coverage and analysis of enabling electronic and optoelectronic technologies in military, space, and commercial aviation applications. A member of the Military & Aerospace Electronics staff since the magazine's founding in 1989, Mr. Keller took over as chief editor in 1995.