Air force 14. 1 Small Business Innovation Research (sbir) Proposal Submission Instructions



Download 1.72 Mb.
Page8/40
Date02.02.2017
Size1.72 Mb.
#15739
1   ...   4   5   6   7   8   9   10   11   ...   40

PHASE II: The Phase II deliverable will build upon the Phase I prototype to develop, demonstrate, and validate a synthetic task environment (STE) that supports rehearsal of primary and secondary trauma assessment. The STE must include the capacity for creating and editing scenarios, and well as support interoperability with external software. The system should run on standard desktop computing software.

PHASE III DUAL USE APPLICATIONS: Can be leveraged for training interventions for trauma care that can prepare medical professionals for the unique situations and challenges associated with casualties in operational contexts. Simulations that help to prepare civilian medical professionals for the most severe cases they will see.

REFERENCES:

1. Bruce, S., Bridges, E. J., & Holcomb, J. B. (2003). Preparing to respond: Joint Trauma Training Center and USAF Nursing Warskills Simulation Laboratory. Critical Care Nursing Clinics of North America, 15, 149-162.


2. Holcomb, J. B., Dumire, R. D., Crommett, J. W., Stamateris, C. E., Fagert, M. A., Cleveland, J. A., Dorlac, G. R., Dorlac, W. C., Bonar, J. P., Hira, K., Aoki, N., & Mattox, K. L. (2002, June). Evaluation of trauma team performance using an advanced human patient simulator for resuscitation training. The of TRAUMA Injury, Infection, and Critical Care, 1078-1086.
KEYWORDS: Synthetic Task Environment, STE, Simulation, Virtual Environment, Trauma Care, Primary Assessment, Secondary Assessment

AF141-031 TITLE: Adaptive, Immersive Training to Counter Deception and Denial Tactics, Techniques and

Procedures (TTPs) for C4ISR Networks
KEY TECHNOLOGY AREA(S): Human systems
The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with section 5.4.c.(8) of the solicitation and within the AF Component-specific instructions. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws. Please direct questions to the AF SBIR/STTR Contracting Officer, Ms. Kristina Croake, kristina.croake@us.af.mil.

OBJECTIVE: Develop a cyber-training environment that represents current actual environments and can be easily adapted by the users to support different training requirements.



DESCRIPTION: Cyber warfare is no longer a nascent domain with few players and negligible consequences. In the past two decades, state and non-state actors have repeatedly demonstrated the capability and intent to exercise their influence through network operations. In addition, cyber security is recognized not only as a military domain, but as a civilian threat documented by President Obama’s 2009 Cyber Security Initiative (White House, 2009). Effective cyber security training is vital to develop the cyber force capable of protecting our interests at home and abroad.
Currently Air Force cyber training relies primarily on instructor-led classroom (stand-up) training, rudimentary exercises and scenarios conducted on previous-generation systems. Given the low level of technical complexity, current training systems are configurable by the instructors, and can be reset at will in the event of a failure or crash. These training networks are modeled after operational Air Force networks and include diverse elements such as routers, switches, Windows/Linux OSs, proxies, and firewalls through virtualization; however, they lack incorporation of the complexities of today’s real-world environments (system load, number of actors, and breadth of applications). Additionally, there is no inherent capability within current training systems to effectively model and enable pattern recognition analysis and synthesis.
The current state-of-the-art technologies are largely centered on individual subject-based learning, platforms, and scenario-based war-gaming. While there is a vast array of products on the market today (e.g., gaming) that enable/support these learning areas, there is no known single technological solution which meets the Air Force need for a virtualized network environment that will integrate realistic network analysis, and attack and defense scenarios, into a deployable, modular platform to serve as a training tool for Air Force cyber operators.
To fill the gap between the current state-of-the-art and the desired end-state, research is required to advance the science in the areas of working within highly complex virtual environments, and when fielded includes the capability to incorporate evolving cognitive science developments.
The final training system should be virtualized in a manner that is compatible with the current Air Force Net and easy to deploy and reset. The training system should closely replicate the complexities of current real-world cyber environments. The network should include realistic traffic generation that is modifiable by an instructor. The network should represent a variety of devices and protocols. The system should include network attack and defense scenarios based on present-day exploits and tactics. Scenarios should be adaptive and include multiple learning pathways for differing skill levels. Scenarios should include simulated actors performing network attack and network defense functions. Instructors should be able to efficiently author new scenarios.
The result will be the ability to effectively model and enable pattern recognition analysis and synthesis. The system should enable the development of skills to mitigate adversarial attempts at blocking access for obtaining any critical threat information (e.g., information and INTEL of operations, communication, computer networks, documents of strategy and tactics, organizational diagrams via wired or wireless). The capabilities of this product should also include allowing for forensic analysis. The system capability should include the ability to simulate the effect of a variety of denial and deception tactics including cyber-attacks, embedding viruses in networks, or emplacing adversary sensors within Blue systems to obtain intelligence information, implement denial of service attacks, damages, or complete destruction of communication and computer networks.

PHASE I: Define the system requirements. Identify appropriate components to create a system design. Analyze the software necessary to enable the system to work. Propose a design to be built and demonstrated during Phase II. Demonstration of laboratory breadboard prototype hardware during Phase I is highly desired, but not required.

PHASE II: Build and demonstrate the training system in a relevant environment. The system must meet requirements as stated in description above. Additionally, design should show significant consideration for human factors, including, but not limited to: flexibility, modularity of design, adaptive to changing environments, tailorability and inclusion of cognitive science advancements. Level of the system by the end of Phase II is TRL 6, and preferably TRL 7.

PHASE III DUAL USE APPLICATIONS: Tools and technologies for cyber defense training are marketable and sought after in both the U.S. government and private industry.

REFERENCES:

1. White House National Security Council, “The Comprehensive National Cybersecurity Initiative” (May 2009), http://www.whitehouse.gov/cybersecurity/comprehensive-national-cybersecurity-initiative.


2. Defeating Adversary Network Intelligence Efforts with Active Cyber Defense Techniques, www.dtic.mil/dtic/tr/fulltext/u2/a488411.pdf, 40K 2008-06-01.
3. Using Deception to Hide Things from Hackers: Processes, Principles, and Techniques, www.dtic.mil/dtic/tr//u2/a485003.pdf, 23k, 2011-05-14.
4. Deceiving Adversary Network Scanning Efforts Using Host-Based Deception, www.dtic.mil/dtic/tr/fulltext/u2/a502233.pdf, 50k, 2009-06-01.
KEYWORDS: virtualization, Network Defense, Network Offense, Training, Cyber, Realistic Traffic Generation, counter deception and denial, immersive training, training and rehearsal, modeling and simulation, forensic analysis.
TPOC: Lt Luis Pineiro

Phone: (937) 938-4052

Email: luis.pineiro.3@us.af.mil

AF141-032 TITLE: Sharing of Intelligence and Planning Information for Multi-Agency Coordination


KEY TECHNOLOGY AREA(S): Human systems

OBJECTIVE: Develop human-computer interfaces to enhance multi-agency collaboration in response to world situations including foreign and non-government agencies. Improve information sharing to support diplomatic, information, military, and economic efforts.



DESCRIPTION: This effort aims to improve collaborative decision making for Political, Military, Economic, Social, Infrastructure and Information systems (PMESII) and Diplomatic, Information, Military, and Economic (DIME) efforts. The technology developed on this effort will provide a human-computer interface (envisioning software only) that encapsulates information and tools needed for PMESII decision making.
It should be able to create "mission pictures" at multiple levels of abstraction for decision makers in the field, at theater levels, and at higher levels. It should be able to transform data into a meaningful story that can be understood at a glance in many cases and provide representation of information quality to gage trust.
The encapsulation of PMESII information sources may result in a common operational picture (COP) that can (1) store, aggregate, and display data; 2) be flexible, modifiable, and extensible for multiple heterogeneous information streams; (3) support third-party capability integration; and (4) be license free. The concepts of the COP and related User-Defined Operational Picture (UDOP) are described more in the reference below by Mulgund and Landsman. As this capability will support crisis situations, as well as everyday actions, it will be important to strike an optimal balance of ease- of-use, flexibility, and decision support.
In addition to workflow support, the system should also have built-in collaboration capabilities between players who have a role in decision making and planning. PMESII decisions, and the actions that follow, cannot be performed in isolation. They require input from many diverse players including military, governmental, non-governmental, and foreign. This COP may serve as a collaboration environment in itself; however, other types of collaboration tools may be developed or leveraged. Shared situation awareness and coordination of distributed decision-makers through collaborative methodologies will help to avoid misunderstanding or conflicting actions.
One customer base for this research are Air and Space Operations Centers (AOCs); however, the capability could also find its way into other agencies involved in PMESII processes. The information sources, within databases (digital) and organizations (humans), are vast, so it will be important for the contractor to specify what sources they plan to use for the demonstration system. Note that the information sources chosen are not nearly as critical as the human-centric technologies developed.
Currently, decision makers do not have a unified capability for DIME operations. Even if they would have access to the tools that are available, they probably would not have the time to learn and use them. The PRIME system described in Lowrance & Murdock (2009) aimed to "support (PMESII) analysts and strategy planners in allowing them to directly explore the full range of consequences associated with candidate courses of action (COAs)."
Also today there is significant reliance on phone calls between people with established relationships, rather than people who may be most relevant to the situation. Voice communication will continue to be critical but is not necessarily the most effective or efficient collaboration method for each phase of decision making. Joint doctrine recognizes that the “sharing of information with relevant United States government (USG) agencies, foreign governments and security forces, interorganizational partners, non-government organizations (NGOs), and members of the private sector, has proved vital in recent operations” (Joint Publication 3-0, Joint Operations, page III-14).

PHASE I: Phase I shall include a storyboard outlining the display layouts and user interactions. The emphasis in this phase is on the design and not a prototype. A good human-computer interface should focus far more on the user needs than the software implementation issues. That said, a plan to implement the concepts in Phase II including software tools needed and system integration should be provided.

PHASE II: The researcher shall design, develop, and demonstrate a prototype tool that implements the Phase I methodologies applicable to a selected operations center. The technology development shall have a goal of technology readiness level (TRL) 6 at the end of Phase II. The researcher shall also detail the plan for the Phase III effort.

PHASE III DUAL USE APPLICATIONS: A robust, off-the-shelf situation awareness tool capable of depicting information for distributed organizations, both government and non-government entities. Applicable to first responders, border protection, financial/manufacturing industries, healthcare, transportation & communications networks.

REFERENCES:

1. Lowrance, J. D. and Murdock, J. L., Political, Military, Economic, Social, Infrastructure, Information (PMESII) Effects Forecasting For Course of Action (COA) Evaluation, http://www.dtic.mil/cgibin/GetTRDoc?AD=ADA501499 (Last accessed 13 Sept 2013), June 2009.


2. Mulgund, Sandeep and Seth Landsman, “User Defined Operational Pictures for Tailored Situation Awareness,” 12th International Command and Control Research and Technology Symposium, MITRE Corp, Bedford, MA, 2007, http://www.mitre.org/work/tech_papers/tech_papers_07/07_0093/07_0093.pdf.
3. Joint Publication 3-0, Joint Operations. http://www.dtic.mil/doctrine/new_pubs/jp3_0.pdf (last accessed 11 September 2013).
4. Joint Publication 3-08, Interorganizational Coordination during Joint Operations, 24 Jun 11. http://www.dtic.mil/doctrine/new_pubs/jp3_08.pdf (last accessed 11 September 2013).
5. U.S. Department of Defense, Joint Operational Access Concept (JOAC), Version 1.0, 17 January 12. http://www.defense.gov/pubs/pdfs/joac_jan%202012_signed.pdf (last accessed 11 September 2013).
KEYWORDS: Interagency cooperation, non-governmental agencies, common operational picture, user-defined operational picture, operations center, collaboration, visualization, human-computer interfaces, human system interfaces.

AF141-035 TITLE: Expand Data Transfer Rates within Legacy Aircraft (ERLA)


KEY TECHNOLOGY AREA(S): Electronics and Electronic Warfare

OBJECTIVE: Develop the capability to grow legacy aircraft mission capabilities by increasing the intercommunications data rate within the aircraft to at least 100 Mbps without the addition of new wire or cable infrastructure.



DESCRIPTION: The intercommunication data rate (IDR) of legacy aircraft is a limiting factor for transferring data between positions on the vehicle. Current missions have not required an increase in these rates. However, future planned capabilities, such as Advanced Tactical Data Links (ATDL), are highly likely to require a significant increase in IDR. This problem will impact many legacy aircraft and will inhibit the acceptance of new technologies by the respective program offices. Retrofitting legacy aircraft with fiber optics or adding additional signal transmission channel elements (e.g., copper wires or cables) is absolutely NOT an option due to cost, depot time, and considerations of space, weight and power. Wired deterministic data on MIL-STD-1553B, the primary data bus of choice for military avionics in legacy aircraft, is 1 Mbps per bus.[1] In order to support future planned capabilities, IDR needs to be orders of magnitude higher. Non-deterministic video triax cables were designed for low-resolution sensors and displays, limiting upgrades planned for cockpit vision systems and future programs. Prior efforts have demonstrated the potential for increasing bandwidth over MS1553B cabling.[2] At least one effort has demonstrated the possibility of increasing bandwidth on legacy aircraft using power lines, as well. This topic seeks further improvements in using all physical channels, especially in concert, to increase intra-aircraft data throughput. Several worldwide consumer electronics consortia, such as the Homeplug Powerline Alliance, Multimedia over Coax Alliance, and the HomeGrid Forum, have formed over the past several years that create ever more powerful transceiver card sets and equipment to increase data transfer rates within homes and buildings and vehicles without adding any new wiring or cables.[3] Leveraging these ever-more capable commercial concepts and technologies could enable affordability, sustainability, and technology refresh at such times as a particular aircraft program office needs more bandwidth. Innovative research is needed to increase intra-aircraft data bandwidth to over 100 Mbps/channel (threshold) or over 1 Gbps/channel (objective), where the channels comprise the currently installed complement of wiring, cables, and power lines.
Phase I ground testing should be sufficient (a) to validate the technical approach and (b) to support both identification of legacy fighter/bomber program requirements that require flight testing and development of a flight test plan.
Phase II ground testing should result in prototype unit(s) that could be provided to a program office for possible flight certification. Support for "flight test" during Phase II is anticipated to include basic test of non-interference with existing aircraft systems, some reliability tests, some tests of the ease of installation, and a test of the ability to quickly shut off the system if there is a problem. This could also consist of installing the data transfer units and troubleshooting any data transfer problems as needed. It is conceivable that the government would desire to conduct these tests in conjunction with other previously scheduled flight tests of fighter/bomber aircraft. If that cannot be worked, piggy-backing on flight tests of other Air Force vehicles will be explored. As a last resort, the use of cooperative tests with civilian aircraft will be considered. If no arrangements can be made, the small business will be relieved of flight test support requirements in Phase II.

PHASE I: A high-speed interface design for installed wiring is to be designed for avionics that takes into account reliability and maintainability issues. Simulation measurements of the design should be used as much as possible to demonstrate potential data rate improvements. A roadmap is required describing the threshold and objective performance, with product spirals shown as off-ramps.

PHASE II: Prototypes demonstrating the technology are to be developed, tested and delivered along with a revised roadmap for Phase III commercialization and transition. The Phase II prototypes should be sufficient to evaluate the potential to develop products to meet the needs for bandwidth growth in a range of military and civil applications. In addition, a draft logistics plan must be delivered. Support a flight test by installing the data transfer units and being available to troubleshoot problems.

PHASE III DUAL USE APPLICATIONS: Military applications include all defense aircraft, battle tanks, and many shipboard electronics. Need an infrastructure accessible by defense integrators to obtain COTS boards. Civil applications will be developed for video distribution markets, including aircraft, trains, and homes/buildings.

REFERENCES:

1. Department of Defense Interface Standard, Digital Time Vision, Command/Response Multiplex Data Bus, MILSTD-001553B Notice 4 (15 January 1996); Changes 5 and 6 were canceled without replacement by Notice 7 (22 October 2008); details on MIL-STD-1553B are available at http://en.wikipedia.org/wiki/MIL-STD-1553.


2. Michael G. Hegarty, Data Devices Corp (DDC), "High Performance 1553," in Proc. SPIE 5801, Cockpit and Future Displays for Defense and Security, edited by Darrel G. Hopper, Eric W. Forsythe, David C. Morton, Charles E. Bradford, and Henry J. Girolamo, pp 97-104 (2005), available at http://spie.org/x648.html?product_id=613988; DDC developed its HyPer-1553 technology as an IRAD effort and successfully conducted a flight test demonstration with Boeing's F-15E1 on 17 Dec 2005.
3. (a) Homeplug Powerline Alliance, multimedia up to 500 Mbps over powerlines, http://www.homeplug.org/; (b) IEEE Standard: "IEEE 1901-2010 - IEEE Standard for Broadband over Power Line Networks: Medium Access Control and Physical Layer Specifications," http://standards.ieee.org/findstds/standard/1901-2010.html; (c) background on broadband over power line (BPL) devices is available at http://en.wikipedia.org/wiki/IEEE_1901;

(d) Multimedia over Coax Alliance (MoCA), www.mocalliance.org; (e) Entropic chipsets and associated software for broadband multimedia distribution; Entropic MoCA 2.0 is a certified reference design capable of delivering MAC throughput from 400 Mbps up to 1 Gbps over a home's existing coaxial cables; data available at www.entropic.com; (f) G.hn home network technology family of standards developed under the International Telecommunication Union Telecommunication Standards sector (ITU-T) and promoted by the HomeGrid Forum (http://www.homegridforum.org/); data available at http://en.wikipedia.org/wiki/G.hn.


KEYWORDS: Intra-aircraft data transfer rates, bandwidth, legacy aircraft, adaptive high speed interface,

MIL-STD-1553B, multi-medium transmission

AF141-036 TITLE: Logistics Data Management, Error Handling, Corrective Action Framework
KEY TECHNOLOGY AREA(S): Information Systems Technology

OBJECTIVE: Develop an architecture, technology roadmap, and working prototype that operationalizes Logistics Systems Data Error Handling, Analytics, and Corrective Action Management Activities.

DESCRIPTION: Air Force IT system modernization efforts continue to highlight the growing need for robust, standards-based, open service-oriented architectures. There is a critical need to provide a foundational approach to complex data error analysis, exception handling, and corrective action behaviors while providing reliable and consistent analytics, integration, workflow, and collaboration to support those behaviors. Multiple initiatives and programs require this type of solution within the Logistics Enterprise and by allowing each to develop their own approach to error handling and resolution, they run the risk of developing redundant, divergent, and potentially incompatible architectures that are costly to sustain.
Solution should include an extensible methodology, architecture and tool suite for identifying, resolving, reporting, and managing data exceptions and errors that can be used across the Logistics Enterprise. Solution should assume a common view of data and provide tailored information to specific user groups, including differentiation between master data and transaction layer services necessary for daily operations. Solution should include analytics that facilitate root cause analysis of data anomalies. Strategic, operational and tactical points of view must be considered in the proposed model.
This product must address the following objectives:

• Support creation of a global, enterprise-wide framework sourced from non-standard, heterogeneous, multi-organizational, distributed, centralized, and federated IT systems.

• Production of a strategic, operational, and tactical product roadmap, to include the integration with, and to, DoD and Air Force data and metadata repositories.



Download 1.72 Mb.

Share with your friends:
1   ...   4   5   6   7   8   9   10   11   ...   40




The database is protected by copyright ©ininet.org 2024
send message

    Main page