Secure Executable Storage and Networking for Distributed Weapon Systems
Small Business Information
STREAMLINE AUTOMATION, LLC
1109 Chesterfield Road, Huntsville, AL, 35803
Alton Reich, PE
Project Manager, Member
Project Manager, Member
AbstractStreamline Automation, LLC, with the support of United Defense, L.P. will develop tools for protecting software executables, and secure inter-unit networking. Modern weapon systems, such as Future Combat System (FCS) rely on a distributed network ofsensors, command elements and weapon platforms. Successful operation will require secure networking between them. In addition, the trend toward the use of COTS hardware makes software the discriminator between commercial and military systems. Thesoftware executables must be protected against reverse engineering.During Phase 1, Streamline Automation will design an integrated security system that is tailored to the unique requirements of a distributed weapon system. Issues that will need to be addressed are encryption key management / storage, authentication, andencryption algorithm efficiency. The basic system operation will be demonstrated using prototype hardware. The data taken during testing will be used to estimate the system performance that can be achieved in Phase 2. Additionally, network securityexperts will perform a vulnerability assessment based on the security system design.During Phase 2, Streamline Automation will work with United Defense to develop a full prototype system that can be tested to determine system capabilities when used in the Future Combat System. The tools developed under this SBIR will assist the developers of weapon systems like FCS and THAAD to incorporate secure network communications between distributed system elements. In addition, an efficient system for handling encrypted executablesoftware in weapon systems will provide a tool for meeting the requirements to protect critical information of DoD Directive 5200.1-M.Additional commercial applications include the protection of application software that contains proprietary information and needs to be protected from reverse engineering. There is also a need to provide better security for networks in place forelectric power generation and distribution.
* information listed above is at the time of submission.