Advanced Software Defined Radio Capabilities and Information Dominance - Applying ANDRO"s Transmission Cyberspace Solution

Award Information
Agency: Department of Defense
Branch: Navy
Contract: N66001-13-P-5103
Agency Tracking Number: N122-150-0575
Amount: $149,964.00
Phase: Phase I
Program: SBIR
Awards Year: 2013
Solicitation Year: 2012
Solicitation Topic Code: N122-150
Solicitation Number: 2012.2
Small Business Information
Beeches Technical Campus, 7902 Turin Road, Ste. 2-1, Rome, NY, -
DUNS: 883336190
HUBZone Owned: N
Woman Owned: N
Socially and Economically Disadvantaged: N
Principal Investigator
 Andrew Drozd
 Chief Scientist
 (315) 334-1163
Business Contact
 Thomas Benjamin
Title: Director of Business Oper
Phone: (315) 334-1163
Research Institution
This proposed research is to investigate and validate Software Defined Radio (SDR) based, multi-function portable network sensing and intrusion detection algorithms suitable for small dismounted radio platforms used to support Command and Control (C2) standard sensor interfaces carried in the field and for sensor data exfiltration. A new capability called Transmission Cyberspace is proposed that will enable DoD military SDRs in the battlefield that are in close proximity to hostile foreign networks to be cognizant of their surrounding radio frequency (RF) environment. A novel and robust network discovery capability will be developed to rapidly assess the potential for RF intrusion, cyber attacks or other unauthorized access to SDRs and Cognitive Radio and Sensor Networks (CRSNs) along with implementing effective defense strategies. This will be accomplished through the application of a suite of algorithms that fundamentally exploit the multidimensional and joint orthogonal nature of the RF signal space. A hybrid class of algorithms and techniques will be used, namely: multiobjective optimization, game theory, spectrum sense and adapt, distributed detection, joint cognitive routing and spread-spectrum channelization, and automated modulation classification. A unique physical (PHY) layer protection scheme is then used to thwart attacks and to augment upper layer (data, MAC, network) multi-level security methods to deny cyber attacks and to ensure secure communications and trusted network routing. These algorithms will leverage the SDR"s ability to sense the presence of other wireless networks, monitor those networks and detect when and where hostile intrusion attempts might arise.

* Information listed above is at the time of submission. *

Agency Micro-sites

SBA logo
Department of Agriculture logo
Department of Commerce logo
Department of Defense logo
Department of Education logo
Department of Energy logo
Department of Health and Human Services logo
Department of Homeland Security logo
Department of Transportation logo
Environmental Protection Agency logo
National Aeronautics and Space Administration logo
National Science Foundation logo
US Flag An Official Website of the United States Government