You are here

Advanced Software Defined Radio Capabilities and Information Dominance - Applying ANDRO"s Transmission Cyberspace Solution

Award Information
Agency: Department of Defense
Branch: Navy
Contract: N66001-13-P-5103
Agency Tracking Number: N122-150-0575
Amount: $149,964.00
Phase: Phase I
Program: SBIR
Solicitation Topic Code: N122-150
Solicitation Number: 2012.2
Timeline
Solicitation Year: 2012
Award Year: 2013
Award Start Date (Proposal Award Date): 2012-12-03
Award End Date (Contract End Date): 2013-06-02
Small Business Information
Beeches Technical Campus 7902 Turin Road, Ste. 2-1
Rome, NY -
United States
DUNS: 883336190
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: No
Principal Investigator
 Andrew Drozd
 Chief Scientist
 (315) 334-1163
 adrozd@androcs.com
Business Contact
 Thomas Benjamin
Title: Director of Business Oper
Phone: (315) 334-1163
Email: tbenjamin@androcs.com
Research Institution
 Stub
Abstract

This proposed research is to investigate and validate Software Defined Radio (SDR) based, multi-function portable network sensing and intrusion detection algorithms suitable for small dismounted radio platforms used to support Command and Control (C2) standard sensor interfaces carried in the field and for sensor data exfiltration. A new capability called Transmission Cyberspace is proposed that will enable DoD military SDRs in the battlefield that are in close proximity to hostile foreign networks to be cognizant of their surrounding radio frequency (RF) environment. A novel and robust network discovery capability will be developed to rapidly assess the potential for RF intrusion, cyber attacks or other unauthorized access to SDRs and Cognitive Radio and Sensor Networks (CRSNs) along with implementing effective defense strategies. This will be accomplished through the application of a suite of algorithms that fundamentally exploit the multidimensional and joint orthogonal nature of the RF signal space. A hybrid class of algorithms and techniques will be used, namely: multiobjective optimization, game theory, spectrum sense and adapt, distributed detection, joint cognitive routing and spread-spectrum channelization, and automated modulation classification. A unique physical (PHY) layer protection scheme is then used to thwart attacks and to augment upper layer (data, MAC, network) multi-level security methods to deny cyber attacks and to ensure secure communications and trusted network routing. These algorithms will leverage the SDR"s ability to sense the presence of other wireless networks, monitor those networks and detect when and where hostile intrusion attempts might arise.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government