DARPA Project Seeks More Reliable Wireless For Troops
Defense Advanced Research Projects Agency pursues new protocols that would keep military wireless networks operational even if individual nodes are compromised or misconfigured.
14 Amazing DARPA Technologies On Tap
(click image for larger view and for slideshow)
A new program is underway at the Defense Advanced Research Projects Agency (DARPA) to develop protocols to make military wireless networks more secure.
When in the field, military service members rely on their mobile devices to provide access to wireless networks in areas lacking a communications infrastructure. The protocols used for these networks determine the best configurations, and therefore trust all information shared about the security and operational state of each node. This poses a huge problem for service members.
"Current security efforts focus on individual radios or nodes, rather than the network, so a single misconfigured or compromised radio could debilitate an entire network," DARPA program manager Wayne Phoel said in a statement.
DARPA's new Wireless Network Defense program aims to change how wireless networks are controlled by developing protocols that would allow networks to stay operational even if individual nodes are compromised or misconfigured. The new protocols would determine that the nearby nodes are trustworthy and automatically adapt the network to work through problems. DARPA compared the process to a neighborhood watch, where, like attentive neighbors, the protocols would be able to identify unusual activity on the network.
DARPA will host a conference on April 1 in Arlington, Va., to discuss the program's goals. The agency is seeking proposals from companies that have expertise in military and commercial wireless network system design and operation, wireless network security protocols, distributed control theory, and economic and social networking structural analysis.
Private-sector technologies and social networking could be the answer to DARPA's challenges. Phoel gave examples of credit card companies using indicators such as unusual purchase locations to determine whether a credit card has been stolen. He also noted that social sites that buy and sell personal items use ratings to help users decide if a seller is trustworthy.
"Similar concepts of reliability estimation and control methods could be applied to wireless military networks by calling out specific areas of the network that may have untrustworthy nodes," Phoel said.
InformationWeek's 2013 Government IT Innovators program will feature the most innovative government IT organizations in the 2013 InformationWeek 500 issue and on InformationWeek.com. Does your organization have what it takes? The nomination period for 2013 Government IT Innovators closes April 12.
InformationWeek Elite 100Our data shows these innovators using digital technology in two key areas: providing better products and cutting costs. Almost half of them expect to introduce a new IT-led product this year, and 46% are using technology to make business processes more efficient.
The UC Infrastructure TrapWorries about subpar networks tanking unified communications programs could be valid: Thirty-one percent of respondents have rolled capabilities out to less than 10% of users vs. 21% delivering UC to 76% or more. Is low uptake a result of strained infrastructures delivering poor performance?