Mobile
News
3/19/2013
02:32 PM
Connect Directly
RSS
E-Mail
50%
50%

DARPA Project Seeks More Reliable Wireless For Troops

Defense Advanced Research Projects Agency pursues new protocols that would keep military wireless networks operational even if individual nodes are compromised or misconfigured.

14 Amazing DARPA Technologies On Tap
14 Amazing DARPA Technologies On Tap
(click image for larger view and for slideshow)
A new program is underway at the Defense Advanced Research Projects Agency (DARPA) to develop protocols to make military wireless networks more secure.

When in the field, military service members rely on their mobile devices to provide access to wireless networks in areas lacking a communications infrastructure. The protocols used for these networks determine the best configurations, and therefore trust all information shared about the security and operational state of each node. This poses a huge problem for service members.

"Current security efforts focus on individual radios or nodes, rather than the network, so a single misconfigured or compromised radio could debilitate an entire network," DARPA program manager Wayne Phoel said in a statement.

DARPA's new Wireless Network Defense program aims to change how wireless networks are controlled by developing protocols that would allow networks to stay operational even if individual nodes are compromised or misconfigured. The new protocols would determine that the nearby nodes are trustworthy and automatically adapt the network to work through problems. DARPA compared the process to a neighborhood watch, where, like attentive neighbors, the protocols would be able to identify unusual activity on the network.

[ The military wants to modernize its use of mobile devices and apps. For more, read Pentagon Unveils Secure Mobile Device Plan. ]

DARPA will host a conference on April 1 in Arlington, Va., to discuss the program's goals. The agency is seeking proposals from companies that have expertise in military and commercial wireless network system design and operation, wireless network security protocols, distributed control theory, and economic and social networking structural analysis.

Private-sector technologies and social networking could be the answer to DARPA's challenges. Phoel gave examples of credit card companies using indicators such as unusual purchase locations to determine whether a credit card has been stolen. He also noted that social sites that buy and sell personal items use ratings to help users decide if a seller is trustworthy.

"Similar concepts of reliability estimation and control methods could be applied to wireless military networks by calling out specific areas of the network that may have untrustworthy nodes," Phoel said.

InformationWeek's 2013 Government IT Innovators program will feature the most innovative government IT organizations in the 2013 InformationWeek 500 issue and on InformationWeek.com. Does your organization have what it takes? The nomination period for 2013 Government IT Innovators closes April 12.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Andrew Hornback
50%
50%
Andrew Hornback,
User Rank: Apprentice
3/22/2013 | 4:16:25 AM
re: DARPA Project Seeks More Reliable Wireless For Troops
Having a protocol to determine anomalous activity on a network sounds like a great opportunity for introducing some concepts around Big Data - not necessarily processing a huge aggregate of data, but being able to process a continuous stream of it at high speed in order to minimize or mitigate the risks involved of operating a network in a possibly hostile environment.

Andrew Hornback
InformationWeek Contributor
InformationWeek Elite 100
InformationWeek Elite 100
Our data shows these innovators using digital technology in two key areas: providing better products and cutting costs. Almost half of them expect to introduce a new IT-led product this year, and 46% are using technology to make business processes more efficient.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - July 22, 2014
Sophisticated attacks demand real-time risk management and continuous monitoring. Here's how federal agencies are meeting that challenge.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
A UBM Tech Radio episode on the changing economics of Flash storage used in data tiering -- sponsored by Dell.
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.