Air force 7. Small Business Innovation Research (sbir) Phase I proposal Submission Instructions



Yüklə 1,01 Mb.
səhifə11/30
tarix26.07.2018
ölçüsü1,01 Mb.
#59007
1   ...   7   8   9   10   11   12   13   14   ...   30

PHASE III DUAL USE APPLICATIONS: Analytics that provide increased situational awareness into cyber defensive posture or insight into performance issues within AF networks will be of use to the larger Joint community. Analytic algorithms can be applied to all DoD and government networks.

REFERENCES:

1.  "Big Data Analytics", http://www-01.ibm.com/software/data/infosphere/hadoop/what-is-big-data-analytics.html, retrieved 8 April 2016, webpage.

2.  "By 2016, 25 Percent of Large Global Companies Will Have Adopted Big Data Analytics For At Least One Security or Fraud Detection Use Case", http://www.gartner.com/newsroom/id/2663015, retrieved 8 April 2016, webpage.

3. "Leveraging Big Data for Security Analytics", http://hortonworks.com/blog/leveraging-big-data-for-security-analytics/, retrieved 8 April 2016, webpage.

4.  "Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)"; DISA; Daniel V. Bart; DISA Infrastructure Development, Cyber Situational Awareness and Analytics; http://www.disa.mil/~/media/Files/DISA/News/Conference/2016/AFCEA

KEYWORDS: Cyber, Big Data, Threats, Analytics, Anomalies, Exploitation, Detection




AF171-043

TITLE: Mobile User Objective System (MUOS) for Moderate Data Rate Communications (MMDR)

TECHNOLOGY AREA(S): Battlespace, Electronics, Sensors

The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with section 5.4.c.(8) of the solicitation and within the AF Component-specific instructions. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws. Please direct questions to the AF SBIR/STTR Contracting Officer, Ms. Gail Nyikon, gail.nyikon@us.af.mil.

OBJECTIVE: Provide means to port MUOS waveform for receive only and transmit-receive in multiple aerial platforms; develop/modify BMC2 and SA applications to support employment by strategic and tactical users.

DESCRIPTION: MUOS is the cross-over replacement and enhancement to the legacy UHF Follow-On (UFO) SATCOM system constellation. MUOS will eventually replace the 16 UFO with 5 MUOS platforms with 4 Radio Access Facility (RAF) ground entry point sites. MUOS is a JTRS waveform which recently completed the MUOS Risk Reduction Effort (MRRE) employing a C-17 and other assets, operating 1 or more of 16 satellite "beams" with data rates of 64 Kbps.

MUOS offers the war fighter greater coverage in the upper latitudes than UFO, employs significantly-faster throughput, permitting continuous access by critical users on assigned missions.

This topic seeks innovative ways to fully utilize MUOS within the aerial layer network, both as a connector and as a data transport medium to including critical C2 data within the Internet Protocol (IP) aerial layer network stream. Requires modernized Tactical Battle Management C2 (BMC2) and Situation Awareness (SA) applications to utilize the unique capabilities of MUOS, especially in high latitude navigation, reporting, and status checking.

PHASE I: Generate the design of porting a new waveform to various existing or in-development software-defined radio (SDR) devices and sharing the content with other essential elements of the IP network for situation awareness, command control, and other time-critical functions for strategic and tactical users. Investigate porting of waveform to selected current military tactical radio system(s).

PHASE II: Demonstrate porting of MUOS to a minimum of two other military radio systems using information supplied through the MUOS information repository. Demonstrate interoperability and use of all three (or more) systems in a relevant operational environment, one of which is aerial layer network platform. Develop or modify BMC2 and SA applications and user interfaces for minimal training, maximum ease of use to fit mission needs. Develop Transition Plan for fielding.

PHASE III DUAL USE APPLICATIONS: Provide approach to modification of other radio systems. Ensure rapid insertion of MUOS capability to UHF capable radios.

REFERENCES:

1. DAMIR, "Mobile User Objective System (MUOS) Selected Acquisition Report," 18 Mar 2015, Defense Acquisition Management Information Retrieval, RCS: DD-A&T(Q&A)823-345

2. US Navy, PMW-146-D-10-0041, "Mobile User Objective System (MUOS) Communications-on-the-Move (COTM): 28 April 2009.

3. Cheah, Jonathon. "Contributions to MUOS Communication Link Assessments at the Arctic Circle Locations." Proceedings - IEEE Military Communications Conference MILCOM 2015 (2015): 187-192.

4. Ramlall, Sunil. "An Automated Framework for Testing MUOS Voice Calls." AUTOTESTCON (Proceedings) 2015 (2015): 329-333.

KEYWORDS: MUOS, SATCOM, Tactical Radio, MRRE, UFO, 64kbps




AF171-044

TITLE: Mobile Authentication and Access Capability

TECHNOLOGY AREA(S): Information Systems

The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with section 5.4.c.(8) of the solicitation and within the AF Component-specific instructions. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws. Please direct questions to the AF SBIR/STTR Contracting Officer, Ms. Gail Nyikon, gail.nyikon@us.af.mil.

OBJECTIVE: To simplify and strengthen the Battlefield Airman Operations Kit authentication and authorization procedures in order to enable rapid and reliable access to combat critical information.

DESCRIPTION: The Battlefield Airman Operations Kit (BAO Kit, BAO Kit-G) is a ruggedized, wearable command and control system designed to support dismounted troops in Air Force operations. The current identification, authentication, and authorization procedures involved with the BAO Kit are manual, complex, and time consuming. More specifically, the system requires multiple manual identification and authentication steps in order for operators to gain access into the system and manage the various software applications and/or hardware interfaces. These system administrative requirements have the potential to distract operators and delay their response to time critical combat tasks. This research effort seeks to address this issue by minimizing the time and steps needed for a user to identify and authenticate with the system.

Simplified identification, authorization, and authentication technologies and methodologies are needed for the operator to perform their tasks and manage multiple hardware and software applications across a system-of-systems mobile computing and communication configuration. Additionally, a rapid response "wake up and operate" capability to mission applications is essential for special operations missions. Rapid access and use of JTAC networks are also needed. These resulting simplified procedures and improved information access capabilities will improve operator situational awareness as well as combat effectiveness while maintaining compliance with Air Force security regulations and procedures.

Battlefield Airmen need to securely access enterprise wide data sources. including multi-level security systems and environments, in order to fulfill their mission needs. New authentication technologies (some examples include: biometrics, RFID, QR codes, etc.), as well as already existing commercial and DoD applications, should be researched and evaluated for usability in a realistic battlefield environment. In addition to these authentication technologies, various authorization and access control methodologies, including, but not limited to, Role Based Access Control (RBAC), Attribute Based Access Control (ABAC), and Proximity Based Access Control (PBAC), should also be investigated and evaluated in this same type of environment.

Lastly, performers on this SBIR effort must identify their own subject matter experts in order to determine the existing and currently deployed communications architectures that are utilized by the BAO Kit. These architectures should be assumed for this project. Any solutions developed as a result of this research effort should be compatible with both cabled and wirelessly networked systems. Preferably, the solution should also be platform and operating system agnostic.

PHASE I: Investigate current BAO Kit systems and authentication mechanisms. Research and identify an optimal authentication and authorization approach that works with Android and Windows Operating systems that enables rapid and secure system access. Design a secure enterprise access capability for mobile users. Demonstrate proof of concept using simulated or material components. Document and report findings.

PHASE II: Refine the system architecture to include several users, interacting with each other, with simultaneous enterprise access and information sharing. Evaluate the scalability and system robustness to real-work communication and other real-world constraints. Demonstrate successful multi-user and multi-system network operation.

PHASE III DUAL USE APPLICATIONS: Refine design based on outcomes of tests and customer feedback in Phase II. Obtain necessary certifications and transition capability to militarily useful platforms. Provide finalized operator and maintainer manuals. Develop cost and schedule estimates for full rate production.

REFERENCES:

1.  Black Diamond Wearable Modular Tactical System Chosen by USAF for Dismounted Close Air Support,
http://soldiersystems.net/2012/07/09/black-diamond-wearable-modular-tactical-system-chosen-usaf-dismounted-close-air-support/

2. Digitally Aided Close Air Support,http://www.specops-dhp.com/interesting-post/digitally-aided-close-air-support-2/

KEYWORDS: Mobile devices, Authentication, Authorizaiton, Battlefield Management, BAOKit, Battlespace Awareness.


AF171-045

TITLE: Automatic Dependent Surveillance - Broadcast (ADS-B) and UAS operations

TECHNOLOGY AREA(S): Air Platform

The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with section 5.4.c.(8) of the solicitation and within the AF Component-specific instructions. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws. Please direct questions to the AF SBIR/STTR Contracting Officer, Ms. Gail Nyikon, gail.nyikon@us.af.mil.

OBJECTIVE: Develop a cost effective approach to enable the safe and effective incorporation of UAV operations within the National Airspace System (NAS) while leveraging advancements made under the Federal Aviation Administration's (FAA) 2020 mandate for ADS-B transmission capability.

DESCRIPTION: Aircraft must be equipped with ADS-B equipment to operate within national airspace after 2020 in the US, Europe, Canada, and Australia. The mandate which applies to US FAA for the National Airspace System (NAS) is listed in 14 Code of Federal Regulations (CFR) 91.225 [1]. The selected venders will develop a cost effective approach to facilitate viable Unmanned Aerial System operations within the mandated ADS-B environment for 2020. The solution needs to incorporate safe and effective use of UAVs within the aviation environment.

PHASE I: Analyze current technology and conduct a feasibility study for a system that will enable optimal use of UAVs within the FAA 2020 ADS-B mandated environment with a cost effective and secure solution. Result will include at a minimum completion of a top level conceptual design, defining the optimal way ahead to implement the design and submission of a complete report.

PHASE II: Implement, demonstrate, and deliver prototype system as designed in Phase I with consideration for flight safety, airworthiness and platform specifics to ensure broadest adoption within aviation community (government and commercial user bases). Use of known standards encouraged to best minimize disruption and to incorporate secure operational performance.

PHASE III DUAL USE APPLICATIONS: Integrate new technology to enable combined UAS and military aircraft while exploring the use of technology adoption for commercial aircraft fleets. Transition to provide a viable solution in the incorporation of UAVs within the 2020 ADS-B mandated environment.

REFERENCES:

1.  14 Code of Federal Regulations (CFR) 91.225 [1]

2.  An Approach to Assess the Safety of ADS-B-based Unmanned Aerial Systems: Data Integrity as a Safety Issue / Authors: Daniel Baraldi Sesso, Lucio F. Vismari, Antonio Vieira da Silva Neto, Paulo S. Cugnasca, Joao B. Camargo Jr., Published - 2014 International Conference of Unmanned Aircraft Systems. (ICUAS), IEEE, Date 21-30 May 2014 Site:http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6842311&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6842311

3.  Optimization-Based Path Planning for Separation Assurance on Small Unmanned Aircraft / Authors: Matthew Duffield, Andrew Ningy, Timothy McLainz., American Institute of Aeronautics and Astronautics


AIAA InfoTech Aerospace. San Diego, California 4-8 Ja

KEYWORDS: Air Traffic Control, Automatic Dependent Surveillance Broadcast, ADS-B, FAA, Next Gen, Air Transportation System, Unmanned Aerial Systems, aviation




AF171-046

TITLE: 3rd Party Intellectual Property (I V&V Effort)

TECHNOLOGY AREA(S): Nuclear Technology

The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with section 5.4.c.(8) of the solicitation and within the AF Component-specific instructions. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws. Please direct questions to the AF SBIR/STTR Contracting Officer, Ms. Gail Nyikon, gail.nyikon@us.af.mil.

OBJECTIVE: Prototype a 3rd Party Intellectual Property verification and validation software system against a UART or similar complexity IP block. This effort will develop and evaluate an innovative software system for the V&V of a discrete IP block.

DESCRIPTION: As the US Government upgrades its current nuclear deterrent systems, acquisition/sustainment organizations (AFNWC, SSP) increasingly employ modern microelectronics. To reduce cost, microelectronic designers procure 3rd Party Intellectual Property, often of unknown pedigree, which raises trust and reliability concerns. This SBIR will develop and evaluate an innovative software system for independent V&V that the 3rd Party IP performs as specified, with no unexpected or undesirable functionality. While a UART or similar complexity IP block is identified as a potential target, any IP block of similar complexity can be used for the development and demonstration of these techniques (see www.opencores.org). Methodologies and techniques developed should meet performance characteristics:
1) Compatibility with standard Electronic Design Automation (EDA) tools to the greatest extent possible, including:
a. Cadence "Incisive Formal Verifier"
b. Mentor Graphics "QuestaR Formal Verification Apps"
c. Synopsys "VC Formal, VC LP and Spyglass"
2) Scalable to larger, more complex IP blocks and number of IP blocks across the SoC
3. Minimization of manual analysis steps
4. Process metrics that demonstrate the depth and nature of the IP V&V process, including number or percentage of logic discrete blocks identified, number or percentage of functions mapped to identified blocks, confidence of mapping, number of percentage of unknown functions identified, etc.
Methodologies and techniques developed must comply with all 3rd Party IP terms of use.

PHASE I: Develop 3rd Party IP V&V concept design against UART or similar IP. Develop initial demonstration of new & innovative techniques for IP V&V. Focus on development of mechanisms, robustness & processes required. Performers need to consider scalability to more complex and IP blocks of varying function during initial concept phase. Initial demonstration does not need to be a fully automated process.

PHASE II: Develop automated prototype 3rd Party IP V&V software system against UART or similar IP demonstrating robustness and scalability of the solution. The PHASE I process will be refined & test cases of "modified" IP will be provided for evaluation of the evolving tool set. These test cases will represent undesirable modifications to the IP to evaluate robustness & provide the development team areas where improvement is needed. Different IP blocks will be introduced for evaluation to develop a versatile tool that will be effective for evaluation of any IP block.

PHASE III DUAL USE APPLICATIONS: US Gov't procurement organizations validate/verify that UART or similar IP do not contain malware. Development will be refined for transition to program designers & government V&V teams. This will include a user friendly GUI and evaluation of multiple IP blocks of varying complexity.

REFERENCES:

1. "Using 3rd Party IP in ASIC/Soc Design," Mohit Gupta,http://www.design-reuse.com/articles/31313/using-3rd-party-ip-in-asic-soc-design.html.

2. "Redefining Chip Complexity in the Soc Era." Ramesh Dewangan, April 3, 2014,http://www.realintent.com/real-talk/1052/redefining-chip-complexity-in-the-soc-era.

3. "Does an externally bought IP need re-verification?" Anand Shirahatti, May 2014,http://www.arrowdevices.com/blog/does-an-externally-bought-ip-need-re-verification/.

4. "Exponentially Rising Costs Will Bring Changes," Pete Singer, January 26, 2015,http://electroiq.com/petes-posts/2015/01/26/exponentially-rising-costs-will-bring-changes.

KEYWORDS: Microelectronics, 3rd Party IP, UART, IP Verification




AF171-047

TITLE: Resilient Communications for Contested Autonomous Manned/Unmanned Teaming

TECHNOLOGY AREA(S): Information Systems

The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with section 5.4.c.(8) of the solicitation and within the AF Component-specific instructions. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws. Please direct questions to the AF SBIR/STTR Contracting Officer, Ms. Gail Nyikon, gail.nyikon@us.af.mil.

OBJECTIVE: Develop communications capabilities for next generation platforms to perform manned/unmanned teaming operations with semi­ autonomous for C2, flight control, shared situational awareness, extended sensor/electronic warfare/communications, targeting, and employment of weapons.

DESCRIPTION: Unmanned operations require bandwidth that can vary for a variety of reasons, including different mission phases, different geographic locations and attenuation of signals (both intentional and unintentional). Types of information to be passed over the link will include route way points. mission objectives, targeting commands, sensor data, etc. Vehicle mission environment will be a mix of multiple manned and unmanned aircrafts.

To maximize the use of finite resources and make the systems more resilient, a communications capability that monitors behavior and dynamically allocates communication resources in a multiple UAV mission environment is needed. The solution should be designed to interface with piloted aircraft.

Current technology often builds upon basic concepts like quality of service and solutions are desired that provide more robustness, flexibility and higher performance.

Development should be focused on enabling applications to utilize existing and evolving standards for both multiple unmanned vehicle control and mission management. The desired solution should be able to automatically react to changes in connectivity by both prioritizing and optimizing the data being transmitted within the operational context of the supported unmanned vehicles. The solution should also automatically transmit previously established prioritized information in varying restricted environments. Methods could involve reduced frequency of transmission, reducing the type and/or fields of data transmitted, or other techniques that would allow reactivity to the variability of link conditions.

PHASE I: Develop an initial design and prove feasibility of a   communications capability that monitors behavior and dynamically allocates/re­allocates resources to optimize critical messages in a multiple UAV mission environment.

PHASE II: Develop a prototype based on Phase I effort using conceptual techniques and demonstrate in a relevant simulated environment.

PHASE III DUAL USE APPLICATIONS: Finalize, operationally test and transition solution to a program of record.

REFERENCES:

1. Third Offset Strategy, Deputy Secretary of Defense Bob Work, 14 Dec 15, Center for a New American Security, Washington, D.C. Retrieved   from   http://www.defense.gov/News-Article-View/Article/634115/dod-extends-technological-operational-edge-into-the­-future.


Yüklə 1,01 Mb.

Dostları ilə paylaş:
1   ...   7   8   9   10   11   12   13   14   ...   30




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin