Defense Advanced Research Projects AgencyTagged Content List

Resilience and Robustness

Enabling technologies and systems to preserve effectiveness despite damage or other challenging conditions

Showing 74 results for Resilience RSS
The continued growth in unmanned, sensor, and networked devices is expected to drive the need for larger, more capable and more diverse communications systems. Among other enhancements, these systems must improve jam-resistance and low probability of detection to keep pace with adversaries’ growing electronic sophistication and must adapt to fast-changing operational environments. By contrast, today’s military communications architectures are static and inflexible.
Defense forces rely on electromagnetic dominance for command, control, intelligence, surveillance, reconnaissance, and related applications that use the electromagnetic spectrum. Similarly, spectrum use by our adversaries, coupled with extensive commercial use, yields an increasingly congested space, time and frequency environment.
Commercial Test and Measurement equipment has advanced greatly with the emergence of sophisticated cellular and wireless local area network technology and can be used to intercept, analyze and exploit our military communications signals.
The Cross-Domain Maritime Surveillance and Targeting (CDMaST) program seeks to identify and implement architectures consisting of novel combinations of manned and unmanned systems to deny ocean environments to adversaries as a means of projecting power. By exploiting promising new developments in unmanned systems along with emerging long-range weapon systems, the program aims to develop an advanced, integrated undersea and above-sea warfighting capability able to execute long-range attacks against submarines and ships over large contested maritime areas.
The rapid pace of innovation in software and hardware over the past three decades has produced computational systems that, despite security improvements, remain stubbornly vulnerable to attack. Although clean-sheet design can produce fundamental security improvements that gradually diffuse into the installed base, this process can take years.