Secure Executable Storage and Networking for Distributed Weapon Systems

Award Information
Department of Defense
Missile Defense Agency
Award Year:
Phase I
Award Id:
Agency Tracking Number:
Solicitation Year:
Solicitation Topic Code:
Solicitation Number:
Small Business Information
1109 Chesterfield Road, Huntsville, AL, 35803
Hubzone Owned:
Minority Owned:
Woman Owned:
Principal Investigator:
Jeremy Dover
Lead Cryptographer
(256) 694-5063
Business Contact:
Alton Reich, PE
Project Manager, Member
(256) 694-5063
Research Institution:
Streamline Automation, LLC, with the support of United Defense, L.P. will develop tools for protecting software executables, and secure inter-unit networking. Modern weapon systems, such as Future Combat System (FCS) rely on a distributed network ofsensors, command elements and weapon platforms. Successful operation will require secure networking between them. In addition, the trend toward the use of COTS hardware makes software the discriminator between commercial and military systems. Thesoftware executables must be protected against reverse engineering.During Phase 1, Streamline Automation will design an integrated security system that is tailored to the unique requirements of a distributed weapon system. Issues that will need to be addressed are encryption key management / storage, authentication, andencryption algorithm efficiency. The basic system operation will be demonstrated using prototype hardware. The data taken during testing will be used to estimate the system performance that can be achieved in Phase 2. Additionally, network securityexperts will perform a vulnerability assessment based on the security system design.During Phase 2, Streamline Automation will work with United Defense to develop a full prototype system that can be tested to determine system capabilities when used in the Future Combat System. The tools developed under this SBIR will assist the developers of weapon systems like FCS and THAAD to incorporate secure network communications between distributed system elements. In addition, an efficient system for handling encrypted executablesoftware in weapon systems will provide a tool for meeting the requirements to protect critical information of DoD Directive 5200.1-M.Additional commercial applications include the protection of application software that contains proprietary information and needs to be protected from reverse engineering. There is also a need to provide better security for networks in place forelectric power generation and distribution.

* information listed above is at the time of submission.

Agency Micro-sites

SBA logo

Department of Agriculture logo

Department of Commerce logo

Department of Defense logo

Department of Education logo

Department of Energy logo

Department of Health and Human Services logo

Department of Homeland Security logo

Department of Transportation logo

Enviromental Protection Agency logo

National Aeronautics and Space Administration logo

National Science Foundation logo
US Flag An Official Website of the United States Government