In areas lacking trustworthy communications infrastructure, deployed servicemembers rely on wireless devices to perform double duty: they not only provide access to the network; they are the network. Protocols for these networks require nodes to coordinate among themselves to manage resources, such as spectrum and power, and determine the best configurations to enable sharing of information. A problem with these protocols is that they implicitly trust all information shared about the security and operational state of each node, and the network as a whole. Consequently, inaccurate control or security information can quickly render the network unusable. This shortcoming could put productivity and mission success at risk as use of military wireless systems increases.
To help address these issues, DARPA has created the Wireless Network Defense program. The program aims to develop new protocols that enable military wireless networks to remain operational despite inadvertent misconfigurations or malicious compromise of individual nodes.
“Current security efforts focus on individual radios or nodes, rather than the network, so a single misconfigured or compromised radio could debilitate an entire network,” said Wayne Phoel, DARPA program manager. “We need to change how we control wireless networks by developing a network-based solution for current and future systems that acknowledges there will be bad nodes and enables the network to operate around them.”
A key objective of the program is to develop protocols that determine the viability and trustworthiness of neighboring nodes and automatically adapt the network to operate through problems. Similar to a neighborhood watch program – where neighbors know each other and can identify suspicious or unusual behavior on their street – the protocols must help identify unusual activity that may indicate a problem on the network.
Inspiration for addressing these challenges could come from economic and social networks.
“Credit card companies use various indicators for trying to determine if someone has stolen your credit card and is posing as you,” Phoel said. “Unexpected purchase locations, amounts and other factors could raise an alert. Online social sites for buying and selling personal items use seller ratings to help you decide the trustworthiness of someone before you make a purchase. Similar concepts of reliability estimation and control methods could be applied to wireless military networks by calling out specific areas of the network that may have untrustworthy nodes.”
Wireless Network Defense is specifically not a new waveform or radio program. Phoel seeks solutions that make existing and future wireless networks more robust and resilient to compromise, regardless of specific radio node hardware or software.
DARPA will host a Proposers’ Day on April 1, 2013, in Arlington, Va. For details visit: http://go.usa.gov/2nuR . The Broad Agency Announcement solicitation may be viewed here: http://go.usa.gov/2drY.
Phoel believes expertise in the following areas may likely contribute to the success of the program: military and commercial wireless network system design and operation, wireless network security protocols, distributed control theory, and economic and social networking structural analysis.
You are now leaving the DARPA.mil website that is under the control and
management of DARPA. The appearance of hyperlinks does not constitute
endorsement by DARPA of non-U.S. Government sites or the information,
products, or services contained therein. Although DARPA may or may not
use these sites as additional distribution channels for Department of
Defense information, it does not exercise editorial control over all of
the information that you may find at these locations. Such links are
provided consistent with the stated purpose of this website.
After reading this message, click to continue