UAS Operation in National Air Space (NAS) Secure UAS Command and Control

Similar documents
UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

Integrated C4isr and Cyber Solutions

UAVs as Communications Routing Nodes in Network-Centric Warfare

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP)

SAPR platforms and EW multifunctional technology needs. Sergio Attilio Jesi 18 of June 2015, Rome

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #18

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE. FY 2014 FY 2014 OCO ## Total FY 2015 FY 2016 FY 2017 FY 2018

UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT

Multi-Band (Ku, C, Wideband - Satcom, Narrowband Satcom) Telemetry Test System for UAV Application

Cybersecurity of Space Missions

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

Sensor Fusion: Potential, Challenges and Applications. Presented by KVH Industries and Geodetics, Inc. December 2016

Space Cyber: An Aerospace Perspective

AFRL UAS Initiatives. Air Force Research Laboratory. 15 Aug Dr. Reid Melville. Air Force Research Laboratory. Integrity Service Excellence

RDT&E BUDGET ITEM JUSTIFICATION SHEET (R-2 Exhibit) February 2000

Strategies for Maritime Cyber Security Leveraging the Other Modes

Cybersecurity and Commercial Aviation

2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat

The Next-Gen ISR Conference brought to you by:

AC2 CTC Investment Strategy. Capt Brandon Keller, AFRL/RIS Acting CTC Lead

ACARE WG 4 Security Overview

Next Generation Networks Powering 5G and the Industrial Internet of Things

thalesgroup.com NETWORK & INFRASTRUCTURE SYSTEMS NEXIUM SAT Your battlefield-proven partner Anytime, anywhere

FAR M RE THAN SATELLITE BANDWIDTH

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 8 R-1 Line #192

The University of Queensland

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation

CYBER SECURITY AIR TRANSPORT IT SUMMIT

CND Exam Blueprint v2.0

Aviation & Airspace Solutions MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING PERFORMANCE

Trends in Cybersecurity in the Water Industry A Strategic Approach to Mitigate Control System Risk

Air Force Test Center

Department of Defense Emerging Needs for Standardization

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

Innovation policy for Industry 4.0

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

Trusted. Core to Edge.

Avionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

Summary of Cyber Security Issues in the Electric Power Sector

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager

Security by Default: Enabling Transformation Through Cyber Resilience

TECHNOLOGY FOR A SAFER WORLD

The Modern Manufacturer s Guide to. Industrial Wireless Cisco and/or its affiliates. All rights reserved.

Internet of Things (IoT) Securing the Connected Ecosystem

Global Satellite Communications For The World s Militaries

Covering North America

Federal Mobility: A Year in Review

Air Force Test Center

ICAS Workshop 3rd October 2005 Single European Sky Implementation Plan - SESAME

Cybersecurity and Examinations

Information Warfare Industry Day

FAA Cybersecurity Test Facility (CyTF) By: Enterprise Information Security Team ANG-B31 Patrick Hyle, William J Hughes Technical Center

A Security Model for Space Based Communication. Thom Stone Computer Sciences Corporation

High-Assurance Cyber Space Systems (HACSS) for Small Satellite Mission Integrity

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology

EFFECTIVE DEFENCE In a connected world. Philippe COTELLE, Airbus Defence and Space 2016, Nov 4th

SOLUTIONS BRIEF GOGO AIRBORNE SECURITY SUMMARY 2017 Q3 RELEASE

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 5 R-1 Line #193

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

The Perfect Storm Cyber RDT&E

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

UNCLASSIFIED. R-1 Program Element (Number/Name) PE D8Z / Software Engineering Institute (SEI) Applied Research. Prior Years FY 2013 FY 2014

Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment

Principles for a National Space Industry Policy

Providing Trusted and Secure Satellite Solutions, Globally

Cybersecurity, safety and resilience - Airline perspective

An Arduino-Based System for Controlling UAVs through GSM

DIMETRA X CORE DATA SHEET DIMETRA X CORE

Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

High-Speed Satellite-Terrestrial Hybrid Communications enabling the Next Generation Connected Cars

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Joint Tactical Information Distribution System (JTIDS) FY 2013 OCO

Architecting OneWeb s Massive Satellite Constellation Ground System

Cyber Resilience. Think18. Felicity March IBM Corporation

Secure Development Lifecycle

Mission Aware Cybersecurity

Cyber Security on Commercial Airplanes

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

align security instill confidence

National Policy and Guiding Principles

An Architecture for Seamless Integration of UAS-based Wildfire Monitoring Missions

French-American Foundation Conference on cyber issues. Opening remarks. 25 October 2017

Inmarsat Global Xpress Global. Mobile. Trusted. U.S. Government > Services > Global Xpress

Quicker response through increased collaboration

Case Studies for Additive Manufacturing Designs

Introducing Cyber Resiliency Concerns Into Engineering Education

Inmarsat Global Xpress Global, Mobile, Trusted. U.S. Government > Services > Global Xpress

Data and Decision Analytics

Mission Critical MPLS in Utilities

DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP

Chapter X Security Performance Metrics

BUSINESS CONTINUITY MANAGEMENT

From Terminals to Teleports to All the Tools in Between. Aerospace Broadcast Government Infrastructure. datapath.com

Inmarsat Global Xpress. Global, Mobile, Trusted.

Transcription:

UAS Operation in National Air Space (NAS) Secure UAS Command and Control Dr. Randal Sylvester Division Chief Technologist L3 CSW 26 October 2015 This information consists of L-3 Communications Corporation, Communication Systems-West Division general capabilities information that does not contain controlled technical data as defined within the International Traffic in Arms Regulations (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. 1

Examples of L3 CSW UAS Communication Programs Communications for over 650 UAVs 3.7+ million flight hours (on just three of the larger platforms) 2

Unique Characteristics of UAVs Small, hand-carried and/or handlaunched systems (e.g., the Raven) utilize LOS communications, while large aircraft (e.g., the Predator, Reaper, Gray Eagle, and Global Hawk) utilize both LOS and BLOS communications Small UAS (< 20 lbs) communication utilize the Armydeveloped digital data link (DDL) system. The DDL design incorporates aspects of a software-defined radio with the ability to field-select the frequency band in which to operate, the channel frequency within that band, the bandwidth of each channel, and the radiated power level. Larger UAS operating LOS incorporate the common data link (CDL) that has been mandated for use in ISR platforms. * *Unmanned Systems Integrated Roadmap FY2011-2036 3

Command and Control Methods Remotely piloted Line-of-Sight (LOS) Beyond Line-of-Sight (BLOS) Automatically piloted Automatic take off and landing Most of the current inventory of DoD unmanned aircraft land themselves with very limited human interaction while still operating under the control of a human and perform this function with greater accuracy, fewer accidents, and less training than a humanintensive process Programmed flight pattern Autonomous flight control (able to make decisions and react without human intervention) Hybrid Mix of remote piloting and automatic control 4

Major Themes Convergence Collaboration Cybersecurity Convergence of Government, Defense and Commercial Needs How will commercial innovation efforts collaborate with the Government? Does Massive Scale = Massive Vulnerability? from MITRE 5

FAA: Integration of Civil Unmanned Aircraft Systems (UAS) in the National Airspace System (NAS) Roadmap* Goals No reduction in current capacity No decrease in safety No negative impact to current operators No increase in risk to airspace users or persons and property on the ground Proposed Applications Security awareness Disaster response, including rescue support Communications and broadcast Cargo transport Spectral and thermal analysis Critical infrastructure monitoring (power plants, ports, pipelines, etc.) Commercial photography, aerial mapping and charting, advertising National Security Issues Security vetting for UAS-related personnel Cyber and communications vulnerabilities Maintain/enhance air defense and air domain awareness *First Edition 2013 FAA 6

UAS : Unmanned Systems Integrated Roadmap FY2013-2038 Five of the many unmanned issues that required departmental consideration include: Autonomy Make decisions and react without human intervention Data protection Encryption of UAS C2 and data links is critical for protecting UAS operations, ISR, and other communicated information Future encryption solutions will contain products that have a quicker time to market, greater coalition interoperability, and improved key management. Data exploitation Selective innovation Innovation must continue Manned-Unmanned System Teaming (MUM-T) 7

Similar roadmap goals/challenges FAA DoD Development of an appropriate C2 link between the UAS and the control station Ensure that the pilot always maintains a threshold level of control of the aircraft Determine values for latency, availability, integrity, continuity, etc. Spectrum identification requires global coordination Protection against intended and unintended jamming, RF interference, link take over and spoofing Frequency management Modeling and Simulation Validate current mitigation proposals Establish a baseline of end-to-end UAS performance measures Establish thresholds for safe and efficient introduction of UAS into the NAS Unmanned systems must Be more survivable with improved and resilient communications, development for antipermissive environments, and more security from tampering. Be more effective through greater automation and greater performance. (Autonomy/Cognitive Behavior) Provide capabilities more efficiently through modularity and interoperability. Challenges: Communication link security Radio frequency spectrum availability Deconfliction of frequencies and bandwidth Network infrastructure Link ranges 8

Remotely Piloted UAS C2 Threat Space Data Monitoring / Detection BLOS Forward Link Jamming Data Interception / Detection BLOS Return Link Jamming GPS Denial / Spoofing Cyber Attack (Satellite) Launch & Recovery Denial Cyber Attack (UAS) LOS Jamming Malware Kinetic Attack * Derived from The Future of MILSATCOM, pg 13. Todd Harrison, Center for Strategic and Budgetary Assessments, July 2013 9

Convergence The trends commoditizing wireless are also converging defense-specific and commercial architectures Cost, Coverage, Capacity The more modular and abstracted the HW/SW interfaces, the easier to adapt it for military operations Added security, jamming resistance, detection resistance, etc The military will become increasingly selective as to where it deploys unique communications assets Convergence goes in both directions witness the increased interest in UAV-based internet 10

Cyber NAS Problem Set Strategic ENDS: Protect Air Traffic Control (ATC) information systems and C2 Secure aircraft avionics used to guide aircraft MEANS: Balance cyber investment Defend critical computing systems Integrate security controls Secure communication channels WAYS: Defense-in-depth concept that evolves as new capabilities and mediums enter cyberspace 11

Potential Areas for Collaboration Communication architecture Spectrum sharing/usage Waveform Reliability Security Identity Navigation availability and reliability (need for true location) GPS compromised detection/adaptation GPS denied adaptation Cyber Security Development and verification of autonomy algorithms Test and Evaluation: As unmanned systems become more complicated, more integrated, more collaborative, and more autonomous, establishing test-driven development constructs and infrastructure for supporting early-onset test and evaluation (T&E) and life-cycle 12

Complex Network System Test and Evaluation Communication Network Effects Simulator (CNES) Hardware-in-the-Loop Simulation Allows Verification and Post Analysis 13

Examples of Existing and Emerging Technology Communication architecture Spectrum sharing/usage: wide band multi-directional antennas, frequency agile RF front ends, spectrum sensing, dynamic spectrum access, higher frequencies, optical Waveform: adaptive modulation and coding, bandwidth efficient, LPD, AJ Reliability: redundancy, ad-hoc networking, disruption tolerant networking, dynamic network management Security: encryption, key management, trusted sources Identity: verification strategies Navigation availability and reliability (need for true location) GPS compromised detection/adaptation: alternate geolocation methods, ultra-cold atom interferometers, precision INS, SAASM GPS GPS denied adaptation: alternate geo-location methods 14

Contact information: Dr. Randy Sylvester Division Chief Technologist L3 Communication Systems West Randal.R.Sylvester@L-3Com.com 15

NAS Cyber Problem Set Defense in Depth Active defense in depth requires an effective mix of redundancy, diversity, and fractionation (i.e., distributed functionality) Minimize system risk by reducing attack surfaces, segregation of critical mission systems, and attack containment Establish autonomous compromise detection and repair (self healing) and real-time response to threats Integrate rapid cyber maneuver enabled by dynamic, randomizable, reconfigurable architectures 16