A Cost Effective High Assurance Layered Solution for MLS Test Training and LVC

Size: px
Start display at page:

Download "A Cost Effective High Assurance Layered Solution for MLS Test Training and LVC"

Transcription

1 A Cost Effective High Assurance Layered Solution for MLS Test Training and LVC 2014 Layered Assurance Workshop 8-Dec, 2014 James Marek 2014 Rockwell 2014 Collins. Rockwell Collins.

2 Introduction Solution space to address modern test and training and LVC interoperability issues is an ideal application of layered assurance Significant security-related scope as well as safety issues High assurance/robustness is critical to address these issues Cost and schedule viability are a serious consideration This presentation describes a solution which is based on the principles of layered assurance and composability at multiple levels in the architecture All of the elements described herein have completed their individual certification efforts (e.g. NSA Type 1, Common Criteria, etc.) The system-level solution is rapidly maturing and is in the process of completing accreditation as part of its fielding 2

3 Overview of Problem Space Testing Modern military ranges testing platforms that can each host and share information at a wide range of classification / caveat / compartment levels Training 3rd, 4th, and 5th gen platforms & UAS, Weapon/Threat sims with different security levels and requirements for exchange Coalition partners Current environment results in reduced training effectiveness Common Problem Need for security enforcing MLS information exchange solution Enables effective/efficient testing and training to be performed Affordably control the flow of timely information exchange Low impact scalable solution that supports System-high (at a single-level) through certified MLS operation 3

4 Elements of the solution Modular building blocks for layered solution Composibility at the component and system levels Mobile/Airborne based elements MLS Participant Interface Module (PIM) Multi-Channel MLS NSA Type 1 End Cryptographic Unit (ECU) High-Throughput Data-Link (HT-DL) High Accuracy Time Space Position Information (HA-TSPI) User Interface (UI) with high capacity Data Recorder Device (UI-DRD) Ground based elements Multi-Channel MLS Mission/Debriefing Room Cross Domain Guard (MMMDR- CDG) Multi-Channel MLS NSA Type 1 End Cryptographic Unit (ECU) Data Link Controller (DLC) System Controller Workstation (SCW) Mission/Debrief Room Workstation (MDRW) Portable Test Set (PTS) Remote Ground System (RGS) Range Gateways 4

5 MLS Participant Interface Module (PIM) Multi-Level MILS processing environment Configurable at boot time Works synergistically with ECU & MMMDR-CDG Configurable interfaces Fibre Channel, 1553, Ethernet, Serial CC EAL6+ MILS RTOS Hosts Multiple SL enclaves & CDG TS-U info processing, MAC, & flow control System-high (single or multiple channels) & MLS operation Modular NSA-evaluated CDG Flexible user generated rules e.g. C2, BIT, Status, RTKN NSA-evaluated Labeler ( L ) Bind & check packet labels Composed security policy SK + FE + Labeler 1.5 x 3.5 x 6.4 package for easy embedment Demonstrating that MLS can be packaged in a constrained pkg 5

6 Multi-Channel MLS NSA Type 1 End Cryptographic Unit (ECU) MILS-based multi-channel MLS ECU 4 red traffic channels (TS-U), 1 Ctl (U) 3 black traffic channels (U) MILS SK hosts KM & control IP/Ethernet I/O abstracts encryption from red & black sides Datalink-agnostic encryption Data-In-Transit encryption for off board communication Data-At-Rest encryption for on board storage of mission data Classification level packet label checking on each channel Classification levels configurable based on boot load Key and Algorithm agility per channel Leverages NSA Type 1 certified Janus cryptographic engine 1.5 x 3.5 x 6.4 package 6

7 Multi-Channel MLS Mission/Debriefing Room Cross Domain Guard (MMMDR-CDG) Based on PIM processor Significant SW reuse Scalable, rack mounted version of the PIM Cfg d to filter for mission & exercise debriefing Currently on class level / caveat and mission # Open/Modularity supports direct connection of PIM and MMMDR-CDG Ease system integration, testing, and debug Isolation from ECU s, datalinks, infrastructure Note: ECU s can also be directly connected Isolation from the datalinks, infrastructure 7

8 Participant Sub-System 8

9 Ground Control System Guard ECU SCW DataLink UI-DRD UI-DRD UI-DRD Mission/Debrief Mission/Debrief Rm(s) Room 9

10 Typical Application Virt1 Virt2 Const 10

11 Summary Presented solution for modern test/training/lvc MLS needs Applies layering and abstraction Focus on modularity and composability MILS building blocks to reduce C&A cost, schedule, and risk Enables cost effective implementation for range of applications Supports several modes of operation as needed by users (e.g. system-high, MSL, MLS) Not simply a proposed concept but is Founded on Technology Readiness Level (TRL) 6+ certified products and technologies Currently finishing accreditation through deployment for both domestic and international applications to solve MLS test, training, and LVC challenges 11

12 Backup These elements are included in the paper and have a limited role in the layered assurance. However, due to time constraints they are not covered in the main brief 2014 Rockwell 2014 Collins. Rockwell Collins. 12

13 Participant Elements 2014 Rockwell 2014 Collins. Rockwell Collins.

14 High-Throughput Data-Link (HT-DL) Employs uplink, downlink, and peer-peer crosslink services with packet rates roughly 4 to 5 times greater than legacy podbased range instrumentation Relay routes are self-forming, out to 4 hops Manual routing can be managed between user-selected nodes Datalink range for a single-hop route is 100 nmi air-air, and 130 nmi air-ground. 6.6 lbs. is miniaturized to roughly half the weight of existing equipment Partitioned into a Transceiver Modem (TRM) module (6.6 ) and a Power Amplifier (PA) module (11 ), each having a 3.5 x 1.4 cross section Selectable to use built-in Type 3 encryption Type 1 encryption is provided external to the datalink to enable more modularity and support alternate datalinks easy datalink upgrade without NSA recertification

15 High Accuracy Time Space Position Information (HA-TSPI) Critical element of any test/training system Feeds testing exercises as well as on-board weapon and threat simulations Enhanced system modularity and composibility due to independent isolated TSPI function Leverages the Rockwell Collins high accuracy miniature Selective Availability Anti-Spoofing Module (SAASM) GPS Includes state-of-the-art Inertial Measurement Unit (IMU) technology Tightly coupled together to provide: Real-Time Horizontal (x, y) and Vertical (z) position accuracy of 0.5 meters RMS Real-Time Horizontal (x, y) and Vertical (z) velocity accuracy of 0.03 m/sec RMS Real-Time Attitude accuracy of 0.1 degrees RMS 15

16 User Interface (UI) with high capacity Data Recorder Device (UI-DRD) Modular User Interface to support: Remote key loading and zeroization for encryption and GPS Hosts user removable solid state storage media for mission data recording Storage media is also able to store configuration data and files Supports over-the-air configuration/loading option 16

17 Ground Elements 2014 Rockwell 2014 Collins. Rockwell Collins.

18 Data Link Controller (DLC) Commercial computing platform Hosting management software for Ground-based and participant package datalink modules Datalink network Information flow to and from ground and airborne nodes Hosts an EAL4 certified OS and conforms to DISA STIG guidelines for cyber security 18

19 System Controller Workstation (SCW) Commercial computing platform Hosting mission and participant management software Supports configuration for ground and airborne elements, as well as key distribution Hosts an EAL4 certified OS and conforms to DISA STIG guidelines for cyber security Allocated a port on the MMMDR-CDG which filters range traffic to and from the SCW Operates in a blind administration mode Not typically accessing range participant traffic, but primarily focused on command and control functions that manage the range assets participating in exercises Plays a part in the layered security architecture Managing encryption keys Cfg and control functions for airborne/mobile/ground elements 19

20 Mission/Debrief Room Workstation (MDRW) Commercial computing platform Hosting mission management and debrief application software Hosts an EAL4 certified OS and conforms to DISA STIG guidelines for cyber security Allocated a port on the MMMDR-CDG which filters range traffic (live, recorded playback or a hybrid) Functionality reuse from the SCW Uses isolation and independent configuration & management with respect to the other elements of the system for added layer of security 20

21 Portable Test Set (PTS) Man-portable miniature ground sub-system Capable of being carried around the range to support wired remote operations Also supports configuration, test, and debug of airborne equipment spread across the range locale Each PTS includes a ruggedized laptop computer that hosts an EAL4 certified OS and conforms to DISA STIG guidelines for cyber security Leverages some common software from the SCW and MDRW 21

22 Remote Ground System (RGS) Includes Datalink Optional weather sensor Ability to remotely power manage the RGS elements One or more RGS datalinks are used to provide area coverage (diversity) for the ground-based DLC (Data Link Controller) They can also support extended range for airborne platforms through relay functionality The weather sensor augments accuracy when operating an RGS in a GPS-denied mode 22

23 Range Gateways A variety of flexible computing and networking equipment and associated protocol translation and formatting software & firmware are also key elements of the range system to enable inter/intra-range operability and bridging to legacy systems 23

SESSION G.1 CONVERGING LIVE AND VIRTUAL ARCHITECTURES FOR TRAINING, TEST AND EVALUATION

SESSION G.1 CONVERGING LIVE AND VIRTUAL ARCHITECTURES FOR TRAINING, TEST AND EVALUATION SESSION G.1 CONVERGING LIVE AND VIRTUAL ARCHITECTURES FOR TRAINING, TEST AND EVALUATION Common Open Architecture for Test and Training Airborne Instrumentation Packages Presenter: Rob Scott OBJECTIVE Compare

More information

TacNet Tactical Radio (TTR) Overview

TacNet Tactical Radio (TTR) Overview TacNet Tactical Radio (TTR) Overview 1 Topics Data Link Solutions Overview Why Small Form Factors Advantages of Small Form Factors Key Performance Characteristics Small Form Factor Interoperability Ease

More information

Inmarsat Global Xpress. Global, Mobile, Trusted.

Inmarsat Global Xpress. Global, Mobile, Trusted. Inmarsat Global Xpress Global, Mobile, Trusted. The New Standard in Mobile Satellite Communications Global Xpress Changes Everything: Worldwide wideband coverage Seamless mobile roaming Interoperable with

More information

A Data-Centric Approach for Modular Assurance Abstract. Keywords: 1 Introduction

A Data-Centric Approach for Modular Assurance Abstract. Keywords: 1 Introduction A Data-Centric Approach for Modular Assurance Gabriela F. Ciocarlie, Heidi Schubert and Rose Wahlin Real-Time Innovations, Inc. {gabriela, heidi, rose}@rti.com Abstract. A mixed-criticality system is one

More information

The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems

The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems Kevin Buesing Objective Interface Systems Field Applications Engineer kevin.buesing@ois.com Jeff Chilton Objective

More information

MILS Multiple Independent Levels of Security. Carol Taylor & Jim Alves-Foss University of Idaho Moscow, Idaho

MILS Multiple Independent Levels of Security. Carol Taylor & Jim Alves-Foss University of Idaho Moscow, Idaho MILS Multiple Independent Levels of Security Carol Taylor & Jim Alves-Foss University of Idaho Moscow, Idaho United states December 8, 2005 Taylor, ACSAC Presentation 2 Outline Introduction and Motivation

More information

MILS Middleware: High Assurance Security for Real-time, Distributed Systems

MILS Middleware: High Assurance Security for Real-time, Distributed Systems 2001 Objective Interface Systems, Inc. MILS Middleware: High Assurance Security for Real-time, Distributed Systems Bill Beckwith bill.beckwith@ois.com Objective Interface Systems, Inc. 13873 Park Center

More information

Quicker response through increased collaboration

Quicker response through increased collaboration Quicker response through increased collaboration www.chemringts.com No two incidents are the same Yet there is one certainty; lives are saved when first responders and security organisations get the right

More information

Multiple Independent Layers of Security (MILS) Network Subsystem Protection Profile (MNSPP) An Approach to High Assurance Networking Rationale

Multiple Independent Layers of Security (MILS) Network Subsystem Protection Profile (MNSPP) An Approach to High Assurance Networking Rationale Multiple Independent Layers of Security (MILS) Subsystem Protection Profile (MNSPP) An Approach to High Assurance ing Rationale 1 2008 Wind River Systems, Inc. The MILS Subsystem (MNS) is A class of subsystem

More information

Data-Centric Architecture for Space Systems

Data-Centric Architecture for Space Systems Data-Centric Architecture for Space Systems 3 rd Annual Workshop on Flight Software, Nov 5, 2009 The Real-Time Middleware Experts Rajive Joshi, Ph.D. Real-Time Innovations Our goals are the same but not

More information

MLS for Tactical Soldier, Sensor and Munitions Networks September 10, 2003

MLS for Tactical Soldier, Sensor and Munitions Networks September 10, 2003 MLS for Tactical Soldier, Sensor and Munitions Networks September 10, 2003 2 Outline 0 Purpose / Background 0 Statement of the Challenge 0 Additional Security Discussion 0 Emerging Communication Network

More information

Inmarsat Global Xpress Global, Mobile, Trusted. U.S. Government > Services > Global Xpress

Inmarsat Global Xpress Global, Mobile, Trusted. U.S. Government > Services > Global Xpress Inmarsat Global Xpress Global, Mobile, Trusted. U.S. Government > Services > Global Xpress The New Standard in Mobile Satellite Communications As a long-trusted partner of the U.S. government sector, we

More information

Integrated C4isr and Cyber Solutions

Integrated C4isr and Cyber Solutions Integrated C4isr and Cyber Solutions When Performance Matters L3 Communication Systems-East provides solutions in the C4ISR and cyber markets that support mission-critical operations worldwide. With a

More information

Over 70% of servers within a data center are not connected to Fibre Channel SANs for any of the following reasons:

Over 70% of servers within a data center are not connected to Fibre Channel SANs for any of the following reasons: Overview The provides modular multi-protocol SAN designs with increased scalability, stability and ROI on storage infrastructure. Over 70% of servers within a data center are not connected to Fibre Channel

More information

From Terminals to Teleports to All the Tools in Between. Aerospace Broadcast Government Infrastructure. datapath.com

From Terminals to Teleports to All the Tools in Between. Aerospace Broadcast Government Infrastructure. datapath.com From Terminals to Teleports to All the Tools in Between Aerospace Broadcast Government Infrastructure datapath.com High Definition Communications in Even the Most Remote Locations For operations in remote,

More information

The Perfect Storm Cyber RDT&E

The Perfect Storm Cyber RDT&E The Perfect Storm Cyber RDT&E NAVAIR Public Release 2015-87 Approved for public release; distribution unlimited Presented to: ITEA Cyber Workshop 25 February 2015 Presented by: John Ross NAVAIR 5.4H Cyberwarfare

More information

High Assurance Platform (HAP) High Assurance Challenges. Rob Dobry Trusted Computing NSA Commercial Solutions Center 04 & 05 August 2009

High Assurance Platform (HAP) High Assurance Challenges. Rob Dobry Trusted Computing NSA Commercial Solutions Center 04 & 05 August 2009 High Assurance Platform (HAP) High Assurance Challenges Rob Dobry Trusted Computing NSA Commercial Solutions Center 04 & 05 August 2009 What is HAP? HAP is being developed to provide users with two primary

More information

Securing the End Node in a Cloud World

Securing the End Node in a Cloud World Securing the End Node in a Cloud World Approved for Public Release: RY-11-0022, 88 ABW-11-0375 Lt Col Ken Edge, PhD Electronic & Net-Centric Warfare Division Air Force Research Laboratory Of Clouds and

More information

The ZigBee Architecture An Introduction

The ZigBee Architecture An Introduction The ZigBee Architecture An Introduction May 18 th, 2011 Session I Introduction & Architecture I, 1 Contents Outline 1. Architectural Overview 2. Market Positioning 3. Convergence 4. Summary 2 ch.1: IEEE802.15.4

More information

JOINT MISSION ENVIRONMENT TEST CAPABILITY (JMETC)

JOINT MISSION ENVIRONMENT TEST CAPABILITY (JMETC) JOINT MISSION ENVIRONMENT TEST CAPABILITY (JMETC) Cyber T&E Initiatives AJ Pathmanathan JMETC Deputy PM for Engineering NCR Technical Director November 14, 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE

More information

Exploring the ISA100.11a Standard. Exploring the ISA100.11a Standard. William (Bill) Ayers America s OneWireless Consultant.

Exploring the ISA100.11a Standard. Exploring the ISA100.11a Standard. William (Bill) Ayers America s OneWireless Consultant. Exploring the ISA100.11a Standard March 2012 William (Bill) Ayers America s OneWireless Consultant Exploring the ISA100.11a Standard WHY Standards World Leader SolutionsFocused Greatest Flexibility International

More information

Hose-McCann Communications

Hose-McCann Communications Hose-McCann Communications THE NEXT GENERATION COMMUNICATION SYSTEM Hose-McCann Communications is a leader in marine communication products. From our beginnings in 1923, pioneering Sound Powered Telephone

More information

Bringing Core-Level Data Protection Solutions to the Tactical Field. January 2018

Bringing Core-Level Data Protection Solutions to the Tactical Field. January 2018 Bringing Core-Level Data Protection Solutions to the Tactical Field January 2018 1 Core-level Security Extended to the Tactical Field Trusted, U.S. based source for tactical cyber security solutions from

More information

Inmarsat Global Xpress Global. Mobile. Trusted. U.S. Government > Services > Global Xpress

Inmarsat Global Xpress Global. Mobile. Trusted. U.S. Government > Services > Global Xpress Inmarsat Global Xpress Global. Mobile. Trusted. U.S. Government > Services > Global Xpress Delivering seamless connectivity worldwide Through Global Xpress, the first and only end-to-end high-throughput

More information

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the

More information

Open Standards in Aircraft Instrumentation

Open Standards in Aircraft Instrumentation Open Standards in Aircraft Instrumentation Robert Hill Eglin AFB, FL 96 th Test Wing 96 th Range Group 896 th Test Support Squadron Outline Background Challenges Why Standards? What Standards are Needed?

More information

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based

More information

A Standards-Based Integration Platform for Reconfigurable Unmanned Aircraft Systems

A Standards-Based Integration Platform for Reconfigurable Unmanned Aircraft Systems June 2011 A Standards-Based Integration Platform for Reconfigurable Unmanned Aircraft Systems Edwin de Jong, Ph.D. US HEADQUARTERS Real-Time Innovations, Inc. 385 Moffett Park Drive Sunnyvale, CA 94089

More information

Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications

Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications Infineon Network Use Case Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications Providing Infineon customers with an easy path to integrating TPM support into their products and systems

More information

PassTorrent. Pass your actual test with our latest and valid practice torrent at once

PassTorrent.   Pass your actual test with our latest and valid practice torrent at once PassTorrent http://www.passtorrent.com Pass your actual test with our latest and valid practice torrent at once Exam : 352-011 Title : Cisco Certified Design Expert Practical Exam Vendor : Cisco Version

More information

Federated Mission Networking

Federated Mission Networking Federated Mission Networking Learning & Applying the Lessons John Palfreyman, IBM V4; 20 Mar 14 Agenda Future Mission Networking - Context Effective Coalitions through OPEN Integration Save money through

More information

Using the Network to Optimize a Virtualized Data Center

Using the Network to Optimize a Virtualized Data Center Using the Network to Optimize a Virtualized Data Center Contents Section I: Introduction The Rise of Virtual Computing. 1 Section II: The Role of the Network. 3 Section III: Network Requirements of the

More information

SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS

SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS David Murotake, (SCA Technica, Inc. Nashua NH, USA; david.murotak@scatechnica.com) Antonio Martin (SCA Technica, Inc., Nashua NH, USA;

More information

Applying MILS to multicore avionics systems

Applying MILS to multicore avionics systems Applying MILS to multicore avionics systems Eur Ing Paul Parkinson FIET Principal Systems Architect, A&D EuroMILS Workshop, Prague, 19 th January 2016 2016 Wind River. All Rights Reserved. Agenda A Brief

More information

Rapidly deployable secure cellular comms

Rapidly deployable secure cellular comms Rapidly deployable secure cellular comms Delivering global protection CAPABILITY OVERVIEW SMARTLINK is a rapidly deployable, scalable, low size, weight and power (SWAP) cellular network-in-a-box for demanding

More information

UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT

UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT 2018 Viasat White Paper August 27, 2018 UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT With Hybrid Adaptive Networking By Craig Miller Vice President, Chief Technical Officer

More information

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES CASE STUDY Application of High-Assurance Network Encryption Sector : Use Case: Solution: CCTV security HD video Layer 2 network architecture A Major

More information

Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development

Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat

More information

National Policy Governing the Use of High Assurance Internet Protocol Encryptor (HAIPE) Products

National Policy Governing the Use of High Assurance Internet Protocol Encryptor (HAIPE) Products Committee on National Security Systems CNSS Policy No. 19 February 2007 National Policy Governing the Use of High Assurance Internet Protocol Encryptor (HAIPE) Products This document prescribes minimum

More information

GSAW Information Assurance in Government Space Systems: From Art to Engineering

GSAW Information Assurance in Government Space Systems: From Art to Engineering GSAW 2006 Information Assurance in Government Space Systems: From Art to Engineering Charles Lavine The Aerospace Corporation 310-336-1595 lavine@aero.org 1 Toward the Global Information Grid Toward the

More information

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN Cato Cloud Software-defined and Cloud-based Secure Enterprise Network Solution Brief NETWORK + SECURITY IS SIMPLE AGAIN Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The

More information

MANAGING THE COMPLEXITY.

MANAGING THE COMPLEXITY. AS A SERVICE MANAGING THE COMPLEXITY. HOW WILL YOU SIMPLIFY ESN MIGRATION? Control room IT solutions play a vital role in incident management. Technologies such as Integrated Communications Control Systems

More information

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1. Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change

More information

INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK

INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK CASE STUDY Application of High-Assurance Network Encryption Sector: Use Case: Solution: Government CCTV security Real-time HD video transmission across Layer

More information

Satellite Technology Trends - A perspective from Intelsat

Satellite Technology Trends - A perspective from Intelsat Satellite Technology Trends - A perspective from Intelsat Gonzalo de Dios ITU International Satellite Symposium 2017 May 29, 2017 2 Building Blocks of Transformation of the Satellite Industry - A Renaissance

More information

C UAxS Workshop conclusions Old Dominion University, Norfolk, 11 Dec 14

C UAxS Workshop conclusions Old Dominion University, Norfolk, 11 Dec 14 Supreme Allied Commander Transformation C UAxS Workshop conclusions Old Dominion University, Norfolk, 11 Dec 14 Major Jean-Claude Deskeuvre, BEL A CUAxS PM 5-Feb-15 1 Outline Reminder of the objectives

More information

HAMES Review at SRI, 7 October 2008 partly based on Layered Assurance Workshop 13, 14 August 2008, BWI Hilton and based on Open Group, 23 July 2008,

HAMES Review at SRI, 7 October 2008 partly based on Layered Assurance Workshop 13, 14 August 2008, BWI Hilton and based on Open Group, 23 July 2008, HAMES Review at SRI, 7 October 2008 partly based on Layered Assurance Workshop 13, 14 August 2008, BWI Hilton and based on Open Group, 23 July 2008, Chicago Component Security Integration John Rushby Computer

More information

Securing your Virtualized Datacenter. Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008

Securing your Virtualized Datacenter. Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008 Securing your Virtualized Datacenter Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008 Agenda VMware Virtualization Technology How Virtualization Affects Datacenter Security Keys to

More information

Understanding Data Link Gateway Challenges

Understanding Data Link Gateway Challenges Understanding Data Link Gateway Challenges TDL Summit November 2018 Introduction Technology improvements allow new technology radios to be deployed in shorter periods of time than past history Gateway

More information

Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang

Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang University of Wisconsin - Madison 1 Wireless Access in Vehicles Wireless network in public vehicles use existing infrastructure

More information

Technical Brief Distributed Trusted Computing

Technical Brief Distributed Trusted Computing Technical Brief Distributed Trusted Computing Josh Wood Look inside to learn about Distributed Trusted Computing in Tectonic Enterprise, an industry-first set of technologies that cryptographically verify,

More information

Retrofitting Ground Systems to improve Cyber Security

Retrofitting Ground Systems to improve Cyber Security Retrofitting Ground Systems to improve Cyber Security Michael Worden Security Engineer 25 February 2014 Copyright 2014 Raytheon Company. Published by The Aerospace Corporation with permission.. Customer

More information

The Open Application Platform for Secure Elements.

The Open Application Platform for Secure Elements. The Open Application Platform for Secure Elements. Java Card enables secure elements, such as smart cards and other tamper-resistant security chips, to host applications, called applets, which employ Java

More information

KPIT S Connected Vehicle Practice

KPIT S Connected Vehicle Practice KPIT S Connected Vehicle Practice Vehicle Telematics Vehicle-to-Anything (V2X) Cybersecurity With an intent to shape up the futuristic Internet-of-Vehicles era, KPIT offers Vehicle-to-anything (V2X) solutions

More information

ARC VIEW. Leveraging New Automation Approaches Across the Plant Lifecycle. Keywords. Summary. By Larry O Brien

ARC VIEW. Leveraging New Automation Approaches Across the Plant Lifecycle. Keywords. Summary. By Larry O Brien ARC VIEW JUNE 22, 2017 Leveraging New Automation Approaches Across the Plant Lifecycle By Larry O Brien Keywords Operational Excellence, Cloud, Virtualization, Operations Management, Field Commissioning,

More information

Rapidly deployable secure cellular comms

Rapidly deployable secure cellular comms Rapidly deployable secure cellular comms Delivering global protection Capability Overview SMARTLINK is a rapidly deployable, scalable, low size, weight and power (SWAP) cellular network-in-a-box for demanding

More information

SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS

SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS Tactical Communications & Networking Wireless / wired networks Full spectrum of tactical communications Tactical datalinks Radio ancillaries and accessories

More information

Building High-Assurance Systems out of Software Components of Lesser Assurance Using Middleware Security Gateways

Building High-Assurance Systems out of Software Components of Lesser Assurance Using Middleware Security Gateways Building High-Assurance Systems out of Software Components of Lesser Assurance Using Middleware Security Gateways A PrismTech Product Line OMG's First Software Assurance Workshop: Working Together for

More information

Cybersecurity Overview

Cybersecurity Overview Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where

More information

Critical networking using mesh Wi-SUN technology Dr Simon Dunkley

Critical networking using mesh Wi-SUN technology Dr Simon Dunkley Critical networking using mesh Wi-SUN technology Dr Simon Dunkley 1 Content Critical infrastructure requirements Wi-SUN Mesh architecture Wi-SUN technology Case studies 2 Critical infrastructure requirements

More information

OSIsoft Technologies for the Industrial IoT and Industry 4.0

OSIsoft Technologies for the Industrial IoT and Industry 4.0 OSIsoft Technologies for the Industrial IoT and Industry 4. Dan Lopez, Senior Systems Engineer Wednesday November 27 Industry 4. and Industrial IoT The Development of Industry 4. Industry. Industry 2.

More information

Naval Surface Warfare Center,

Naval Surface Warfare Center, CAPT Brian R. Durant Commander NSWCDD Technical Director - (540) 653-8103 Dennis M. McLaughlin Technical Director Naval Surface Warfare Center, Dahlgren Naval Undersea DivisionWarfare Center The The Leader

More information

E3-E4 (CM MODULE) WiMAX OVERVIEW & BSNL WiMAX PROJECT

E3-E4 (CM MODULE) WiMAX OVERVIEW & BSNL WiMAX PROJECT E3-E4 (CM MODULE) WiMAX OVERVIEW & BSNL WiMAX PROJECT WELCOME This is a presentation for the E3-E4 Technical (CM- Module) for the Topic: WiMAX Overview & BSNL WiMAX Project Eligibility: Those who have

More information

Providing Cybersecurity Inventory, Compliance Tracking, and C2 in a Heterogeneous Tool Environment

Providing Cybersecurity Inventory, Compliance Tracking, and C2 in a Heterogeneous Tool Environment Providing Cybersecurity Inventory, Compliance Tracking, and C2 in a Heterogeneous Tool Environment Joseph L. Wolfkiel Secure Configuration Management Lead Engineer May 2018 1 Disclaimer The information

More information

TECHNOLOGY BRIEF. 10 Gigabit Ethernet Technology Brief

TECHNOLOGY BRIEF. 10 Gigabit Ethernet Technology Brief TECHNOLOGY BRIEF 10 Gigabit Ethernet Technology Brief The 10 Gigabit Ethernet Standard In June 2002, the IEEE standard for 10 Gigabit Ethernet, IEEE Std 802.3ae- 2002, was unanimously approved by the IEEE

More information

SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE

SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE March 2018 Table of Contents Introduction...1 Design...2 Use Cases...2 Underlay...3 Overlay...3 Dynamic Segmentation...3 Non-Stop Networking...4 Summary...5

More information

Dynamic WAN Selection

Dynamic WAN Selection KNOW YOUR NETWORK DATA SHEET Dynamic WAN Selection Overview Ipanema s Dynamic WAN Selection (DWS) is a core component of Ipanema SD-WAN and provides user-centric, dynamic path selection. It automatically

More information

FeliCa Approval for Security and Trust (FAST) Overview. Copyright 2018 FeliCa Networks, Inc.

FeliCa Approval for Security and Trust (FAST) Overview. Copyright 2018 FeliCa Networks, Inc. FeliCa Approval for Security and Trust (FAST) Overview Introduction The security certification scheme called FeliCa Approval for Security and Trust (FAST) has been set up to enable the evaluation and certification

More information

mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017

mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017 mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE

UNCLASSIFIED R-1 ITEM NOMENCLATURE Exhibit R-2, RDT&E Budget Item Justification: PB 2014 Air Force DATE: April 2013 COST ($ in Millions) # ## FY 2015 FY 2016 FY 2017 FY 2018 Program Element - 0.000 0.000 5.853-5.853 5.961 6.181 6.290 6.404

More information

Security: The Key to Affordable Unmanned Aircraft Systems

Security: The Key to Affordable Unmanned Aircraft Systems AN INTEL COMPANY Security: The Key to Affordable Unmanned Aircraft Systems By Alex Wilson, Director of Business Development, Aerospace and Defense WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY

More information

GREEN HILLS SOFTWARE: EAL6+ SECURITY FOR MISSION CRITICAL APPLICATIONS

GREEN HILLS SOFTWARE: EAL6+ SECURITY FOR MISSION CRITICAL APPLICATIONS GREEN HILLS SOFTWARE: EAL6+ SECURITY FOR MISSION CRITICAL APPLICATIONS 15 December 2008: EAL6+ Security for Mission Critical Applications INTERVIEWEE. DAVID KLEIDERMACHER CHIEF TECHNOLOGY OFFICER TEL.

More information

Integrated and Separate?

Integrated and Separate? Integrated and Separate? A document to aid the demonstration of Independence between Control & Safety by The 61508 Association Overriding key principle...it must be safe! DISCLAIMER: Whilst every effort

More information

Global Xpress. 10 things you need to know about GX. GLOBAL GOVERNMENT > Solution > GX 10 things

Global Xpress. 10 things you need to know about GX. GLOBAL GOVERNMENT > Solution > GX 10 things Global Xpress 10 things you need to know about GX GLOBAL GOVERNMENT > Solution > GX 10 things What does GX mean for Governments? The Global Xpress service complements Inmarsat s existing L-Band network

More information

Gen-Z Overview. 1. Introduction. 2. Background. 3. A better way to access data. 4. Why a memory-semantic fabric

Gen-Z Overview. 1. Introduction. 2. Background. 3. A better way to access data. 4. Why a memory-semantic fabric Gen-Z Overview 1. Introduction Gen-Z is a new data access technology that will allow business and technology leaders, to overcome current challenges with the existing computer architecture and provide

More information

Advanced Mobile Computing and Networking - CS 560. Wireless Technologies. Bluetooth. Bluetooth. Bluetooth. Bluetooth 7/3/2014.

Advanced Mobile Computing and Networking - CS 560. Wireless Technologies. Bluetooth. Bluetooth. Bluetooth. Bluetooth 7/3/2014. Advanced Mobile Computing and Networking - CS 560 Assessment CA 40% - Assignment 20% - 2 Tests 10% each Exam 60% Wireless Technologies, Infrared Data Association (),, and Institute of Electrical and Electronic

More information

Product Brochure Secure Connectivity for Critical Infrastructure

Product Brochure Secure Connectivity for Critical Infrastructure Device Secure Channel HIPswitch -200 Shared HIPswitch Secure Channel -100 Device 100SNR1.0 / Page 1 Product Overview The Tempered s product line provides a centrally managed security appliance solution

More information

Storage Networking Strategy for the Next Five Years

Storage Networking Strategy for the Next Five Years White Paper Storage Networking Strategy for the Next Five Years 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Top considerations for storage

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

FPGAs: High Assurance through Model Based Design

FPGAs: High Assurance through Model Based Design FPGAs: High Assurance through Based Design AADL Workshop 24 January 2007 9:30 10:00 Yves LaCerte Rockwell Collins Advanced Technology Center 400 Collins Road N.E. Cedar Rapids, IA 52498 ylacerte@rockwellcollins.cm

More information

Joint Mission Environment Test Capability (JMETC)

Joint Mission Environment Test Capability (JMETC) Joint Mission Environment Test Capability (JMETC) Distributed Testing for Cyber Security Marty Arnwine JMETC, Deputy for Plans and Operations February 26, 2015 Agenda JMETC Overview JMETC Networks National

More information

TASMUS.

TASMUS. TASMUS www.aselsan.com.tr TACTICAL AREA COMMUNICATIONS SYSTEM TASMUS Tactical Area Communications System TASMUS, Tactical Area Communications System, is a network centric communication infrastructure that

More information

Hybrid Mesh Networking for Distributed Operations

Hybrid Mesh Networking for Distributed Operations Hybrid Mesh Networking for Distributed Operations LT M.S. Maupin, USN OpTech East Tokyo, Japan 01 December 2015 Overview Distributed Operations Motivation Dispersed littoral operations Distributed mesh

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete Total Cost Total Program Element - - 38.094-38.094 38.503 39.587 40.754 41.292 Continuing Continuing

More information

Simple IoT connectivity. Product Overview: Vodafone USB Connect

Simple IoT connectivity. Product Overview: Vodafone USB Connect Simple IoT connectivity Product Overview: Vodafone USB Connect Contents Part of Integrated Terminals 2 Product overview: Vodafone USB Connect Part of Integrated Terminals Part of Integrated Terminals Are

More information

This presentation provides an overview of Gen Z architecture and its application in multiple use cases.

This presentation provides an overview of Gen Z architecture and its application in multiple use cases. This presentation provides an overview of Gen Z architecture and its application in multiple use cases. 1 2 Despite numerous advances in data storage and computation, data access complexity continues to

More information

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008 Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal

More information

Lora-A Revolutionary Technology for IOT LPWAN. Tony Li Vice President of China Sales and Marketing, Semtech Corporation

Lora-A Revolutionary Technology for IOT LPWAN. Tony Li Vice President of China Sales and Marketing, Semtech Corporation Lora-A Revolutionary Technology for IOT LPWAN Tony Li Vice President of China Sales and Marketing, Semtech Corporation IoT Connected Device Opportunity Ericsson Gartner 28B 21B Source:Ericsson. Ericsson

More information

Make Networks Work. Network simulation emulation software for: Development Analysis Testing Cyber Assessment DATASHEET

Make Networks Work. Network simulation emulation software for: Development Analysis Testing Cyber Assessment DATASHEET DATASHEET Make Networks Work Network simulation emulation software for: Development Analysis Testing Cyber Assessment The EXata Simulation Emulation Platform The EXata software (EXata) provides ultra high-fidelity

More information

Cloud-Enable Your District s Network For Digital Learning

Cloud-Enable Your District s Network For Digital Learning Cloud-Enable Your District s Network For Digital Learning Session B40 BrainStorm 17.0 Gavin Lee Education Business Development Manager Juniper Networks gavinl@juniper.net Juniper Innovations for Mission

More information

Online Services Security v2.1

Online Services Security v2.1 Online Services Security v2.1 Contents 1 Introduction... 2 2... 2 2.1... 2 2.2... 2 2.3... 3 3... 4 3.1... 4 3.2... 5 3.3... 6 4... 7 4.1... 7 4.2... 7 4.3... 7 4.4... 7 4.5... 8 4.6... 8 1 Introduction

More information

Weapon Systems Open Architecture Overview

Weapon Systems Open Architecture Overview Weapon Systems Open Architecture Overview OMG Real-Time and Embedded Distributed Object Computing Workshop July 24-27, 2000 . Vision for Joint Theater Operations Joint Joint Forces Forces Global Global

More information

AT Ground Surveillance System (GSS)

AT Ground Surveillance System (GSS) AT Ground Surveillance System (GSS) AT Ground Surveillance System (GSS) AT Ground Security Sensors The AT Ground Surveillance System (GSS) is integrated network of sensors, cameras and mesh radio network

More information

Command and Control for Security, Port Operations, and IT Considerations for Planning and Implementation

Command and Control for Security, Port Operations, and IT Considerations for Planning and Implementation Command and Control for Security, Port Operations, and IT Considerations for Planning and Implementation Port Operations, Safety and Information Technology Seminar Gary Hicks, Science Applications International

More information

<Insert Picture Here> Enterprise Data Management using Grid Technology

<Insert Picture Here> Enterprise Data Management using Grid Technology Enterprise Data using Grid Technology Kriangsak Tiawsirisup Sales Consulting Manager Oracle Corporation (Thailand) 3 Related Data Centre Trends. Service Oriented Architecture Flexibility

More information

INTRODUCTION. BridgeWay. Headquarters

INTRODUCTION. BridgeWay. Headquarters MILITARY PRODUCTS INTRODUCTION Voiceboard Corporation s MediaPro products provide enhanced communications capabilities for military applications. State of the art technology, including redundant networking,

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Network Security Design The steps for security design are: 1. Identify

More information

Aided-inertial for GPS-denied Navigation and Mapping

Aided-inertial for GPS-denied Navigation and Mapping Aided-inertial for GPS-denied Navigation and Mapping Erik Lithopoulos Applanix Corporation 85 Leek Crescent, Richmond Ontario, Canada L4B 3B3 elithopoulos@applanix.com ABSTRACT This paper describes the

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) COST ($ in Millions)

More information

Perspective Sensing for Inertial Stabilization

Perspective Sensing for Inertial Stabilization Perspective Sensing for Inertial Stabilization Dr. Bernard A. Schnaufer Jeremy Nadke Advanced Technology Center Rockwell Collins, Inc. Cedar Rapids, IA Agenda Rockwell Collins & the Advanced Technology

More information