Cyber Superiority for Air Force Combatant Commanders: Integrated Air/Space/C2/Cyber Dynamic Spectrum Exploitation for Enhanced Situational Awareness

Award Information
Department of Defense
Air Force
Award Year:
Phase II
Agency Tracking Number:
Solicitation Year:
Solicitation Topic Code:
Solicitation Number:
Small Business Information
ANDRO Computational Solutions, LLC
Beeches Technical Campus, 7902 Turin Road, Ste. 2-1, Rome, NY, 13440-
Hubzone Owned:
Socially and Economically Disadvantaged:
Woman Owned:
Principal Investigator
 Andrew Drozd
 President/Chief Research Scientist
 (315) 334-1163
Business Contact
 Arnold Kloven
Title: Director of Contracts
Phone: (315) 334-1163
Research Institution
 Syracuse University
 Stuart Taub
 Office of Sponsored Programs
113 Browne Hall
Syracuse, NY, 13244-
 (315) 443-9356
 Nonprofit college or university
ABSTRACT: This effort is to investigate advanced cyberspace capabilities that can integrate global and theater resources in support of the combatant commander in order to provide operators with robust situational awareness, control of the electromagnetic (EM) spectrum, and maneuverability in cyberspace. A prototype spectrum exploitation/control and cyber security capability will be developed for installation on net-centric architectures and info-structures. The goal of this research is to demonstrate a capability that will assure information access and sharing across a network of authorized users and to ensure that unauthorized access or malicious attacks are quickly detected, localized and disabled to preclude compromising network integrity and security. The network will consider various sense, adapt, attack, and pre-emption strategies in the context of a Cognitive Radio Network (CRN) that includes a fusion center (FC) for decision making and assignment tasking. Immediate applications of interest include warfighting in the cyberspace domain and applied cognitive task analysis for the understanding of cognitive task demands in the presence of malicious sensors or primary user emulator attackers who attempt to mimic the good sensors. This can result in false alarms at the FC or catastrophic disruption of the network. Attackers may include eavesdroppers and/or jammers. Potential methods to circumvent malicious attacks involve applying distributed detection and localization to study the behavior of such sensors and to adapt operational states as needed, as well as apply physical layer encryption to minimize deleterious impacts on the network. A dynamic EM spectrum exploitation (sense and adapt) approach is used to secure our info-structure capabilities, thwart cyber attacks, and maintain our freedom to operate dynamically in the cyberspace domain. This is used to determine wireless access to critical info-structures by both authorized users and cyber intruders. The objective is to achieve intrusion detection, prevention, and response at the physical (PHY) layer, thus providing a novel kind of cyber defense shield. This is considered a new area of research, as most of the existing info-structure security work mainly focuses on higher (data, MAC, network) layers. Because knowledge of security appliques at the physical layer is lacking and not well understood, the advances in intrusion detection and access control technologies at the higher layers will be leveraged; however, even those technologies are not sufficient and fully robust, as the physical layer has its unique characteristics. The end product will consist of software algorithms and codes that can be used to analyze various network configurations and attack strategies to determine and assign a transmission plan that will allow the network to operate through and self-manage gracefully amidst unauthorized users (malicious sensors, emulators, eavesdroppers, or jammers). BENEFIT: CyberSE technologies are considered to have a very high commercialization potential. A multi-stage commercialization strategy is envisioned that will benefit both the commercial and government market sectors. The customer base will initially be military product centers and DoD contractors. The prototype capability is expected to first be fielded within the Net-Centric Operational Environment and the DoD Joint Net-Centric Operations Campaign Plan for programs such as the Airborne Network and the successor programs to the Objective Gateway and supporting Enterprise Architecture acquisitions. This will include programs concerned with surveillance and unattended sensor platforms used in sensor networks and dynamic airborne networks. This also includes advancing the goal of the DoD"s GEMSIS vision of achieving adaptive spectrum control and cognitive spectrum use under sense and adapt schemes in the presence of cyber attacks. Additionally, CyberSE technologies will assist in advancing the capabilities of the Coalition Joint Spectrum Management Planning Tools (CJSMPT). The results of the research will also have application to commercial computer networks, airline operations, air traffic control, and telecommunication systems. The resulting technologies will benefit civilian law enforcement and public safety, first responders and the identification of illegal activities in support of homeland defense. The commercialization potential will continue to increase as concerns over maintaining information dominance, cyber maneuverability and enhanced security heighten within the dual use market sectors. Marketing campaigns will help convince commercial companies to embed CyberSE technologies within their proprietary networks and environments, and to demonstrate how the technologies will provide value added process improvements, and help to promote company competition and productivity in the marketplace.

* information listed above is at the time of submission.

Agency Micro-sites

US Flag An Official Website of the United States Government