Department of the navy (don) 18. 1 Small Business Innovation Research (sbir) Proposal Submission Instructions introduction



Download 1.02 Mb.
Page18/33
Date26.04.2018
Size1.02 Mb.
#46805
1   ...   14   15   16   17   18   19   20   21   ...   33

Beyond general IMDD links, there is potential to realize performance improvement through use of optical signal distribution that may utilize optical heterodyne systems to achieve RF block down conversion or an RF tuning capability. The submarine community believes that if these systems can be enabled, they will realize significant improvements in situational awareness through opening the door for improved directional and tethered antennas. This topic addresses the optical filters necessary to enable such systems.

PHASE I: Develop a concept to fabricate an ultra-narrow tunable optical band pass filters prototype. Include modeling, analysis, and experimental laboratory verification where achievable. Demonstrate concept feasibility through modeling, experiment, or other means of an optical filter capable of meeting the requirements outlined in the description of the topic. Key technological aspects should be demonstrated theoretically and include simulations and experimental evidence where applicable. The Phase I option, if awarded, would include the initial layout and process development necessary to fabricate prototypes in Phase II. Develop a Phase II plan.

PHASE II: Based on the results of the Phase I effort and the Phase II Statement of Work (SOW), fabricate and deliver a prototype consisting of fiber coupled, packaged optical filters in a form factor consistent with commercial technology in an effort to demonstrate performance metrics outlined in the topic description. Refine the fabrication process and filter design with a focus on creating a consistent product towards aiding transition in Phase III. The company will prepare a Phase III development plan to transition the technology for Navy and potential commercial use.

PHASE III DUAL USE APPLICATIONS: Support the Navy in transitioning the optical filters to a larger optical RF signal distribution system for eventual insertion into the AN/BLQ-10B (V) program of record through PMS 435 Submarine Electromagnetic Systems Program Office.

Optical band-pass filters are used to isolate signals falling within a defined spectral range from a broader spectrum signal. Tunable band pass filters are used for dynamically selecting this spectral range allowing for channelization of the spectrum. This technology is applicable toward RF Photonic signal distribution systems associated with 5G cellular technologies. Next generation cellular architectures are investigating RF photonic solutions for long-haul signal transport.

REFERENCES:

1. Sadot, D. and Boimovich, E. “Tunable Optical Filters for dense WDM networks.” IEEE Comm. Mag. Vol.36 Issue12, pp 50-55 1998. http://ieeexplore.ieee.org/document/735877/?reload=true

2. Poulin, M., Painchaud, Y., Ayotte, S., Latrasse, C. Broucu, G., Pelletier, F., Morin, M., Guy, M. and Cliche, J-F. “Ultra-narrowband fiber Bragg gratings for laser linewidth reduction and RF filtering.” Proc. SPIE 7579, Laser Resonators and Beam Control XII, 75791C, February 17, 2010. http://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=781672

KEYWORDS: Optical Filter; Tunable Filter; Band Pass Filter; Optical Heterodyne; Fiber Bragg Grating Filter; Optical RF Down Conversion

N181-051

TITLE: Unified Cybersecurity System Modeling of Naval Control Systems

TECHNOLOGY AREA(S): Information Systems

ACQUISITION PROGRAM: PEO IWS 1.0, AEGIS and Ship Self Defense System (SSDS)

The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with section 5.4.c.(8) of the Announcement. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws.

OBJECTIVE: Develop a tool that creates a unified model for complex system of systems to enable cybersecurity analysis of Naval Control Systems (NCS).

DESCRIPTION: Naval Control Systems (NCSs) are comprised of systems of systems divided into enclaves (Hull Mechanical and Electrical, Combat System, etc.). Existing tools allow systems engineers to document and model individual or multiple attributes of an NCS (architecture, physical connections, enclaves, mission threads, cybersecurity threats, etc.) but require system engineers to work across models and other artifacts since they are not connected. Conducting systems of systems analysis across non-connected models and artifacts makes it very difficult to conduct cybersecurity analysis of a system. Currently, systems focus more on modelling of the systems and less on their cybersecurity aspect. Currently, no tools exist that can provide this type of analysis. System engineers need a tool to develop a unified cybersecurity system model that provides the capability to conduct cybersecurity analysis of an NCS.

A tool to create a unified cybersecurity system model will incorporate the key system attributes required for cybersecurity analysis of any NCS. This will require portability to any NCS. Attributes include the physical architecture (including both computing hardware and networks), data flows and their performance requirements, and deployed software components and operating environments (including product IDs, versions, etc.). It will also include mission threads executed by the system, mission thread to system component dependencies, system component partitioning (enclaves), system states and modes, system cybersecurity protections, vulnerabilities, posture (CYBERSAFE condition), threats, and penetration pathways. The tool must support the ability to make changes to key system attributes so “what-if” scenarios can be explored in near real time. For example, the model would be able to help a system engineer answer questions like “how do penetration pathways change in the system when the cybersecurity posture is changed” or “how could an emergent vulnerability affect a particular set of hosts within an NCS?” Understanding the potential impact of existing and emergent cybersecurity vulnerabilities and the impact to Navy missions if exploited will result in better system architectures and designs. Optimization of architectures will contribute to reductions in cyber related acquisition and maintenance costs because the overall system contains more efficient cyber functionality and cyber-resilient system designs. Fielding of better cyber capabilities can reduce operational impacts due to cyber attack and improved warfighter workloads system architectures and designs reduce the amount of re-work and maintenance needed after systems are deployed. Tool attributes for leveraging (importing) existing NCS artifacts (system architecture diagrams, vulnerability scan results, Ports, Protocols, Services documentation, network switch configurations, etc.) must be provided to simplify the effort required to create a unified cybersecurity system model for an existing system. Unified cybersecurity systems models created must be scalable to the size of typical combat systems (AEGIS and/or Ship Self Defense System [SSDS]). The models developed should incorporate potential reductions in system lifecycle costs through impact analysis for cybersecurity vulnerabilities, threats, etc., for effective resource prioritization. They should facilitate optimization of the cybersecurity architecture of a system prior to its development to create required Risk Management Framework artifacts. This would enable assessing the potential impact of new vulnerabilities identified.

The Phase II effort will likely require secure access, and NAVSEA will process the DD254 to support the contractor for personnel and facility certification for secure access. The Phase I effort will not require access to classified information. If need be, data of the same level of complexity as secured data will be provided to support Phase I work.

Work produced in Phase II may become classified. Note: The prospective contractor(s) must be U.S. Owned and Operated with no Foreign Influence as defined by DOD 5220.22-M, National Industrial Security Program Operating Manual, unless acceptable mitigating procedures can and have been implemented and approved by the Defense Security Service (DSS). The selected contractor and/or subcontractor must be able to acquire and maintain a secret level facility and Personnel Security Clearances, in order to perform on advanced phases of this contract as set forth by DSS and NAVSEA in order to gain access to classified information pertaining to the national defense of the United States and its allies; this will be an inherent requirement. The selected company will be required to safeguard classified material IAW DoD 5220.22-M during the advance phases of this contract.

PHASE I: Define and develop a concept for a software tool that enables the creation of a unified cybersecurity model for complex system of systems that incorporates key system aspects critical to NCS cybersecurity. The concept will show that it can feasibly address the requirements discussed in the description for meeting cybersecurity needs. Feasibility will be established through analysis and modeling. The Phase I Option, if awarded, will include the initial design specifications and capabilities description to build a prototype in Phase II. Develop a Phase II plan.

PHASE II: Based on the results of Phase I and the Phase II Statement of Work (SOW), develop and deliver a prototype of the software tool for creating a unified cybersecurity system model that enables the cybersecurity analysis of a NCS. The prototype must demonstrate the creation of a unified cybersecurity model for any Navy-specified NCS (such as an AEGIS or SSDS combat system) that incorporates the key cybersecurity-related system attributes defined in the Description section. The prototype must demonstrate that it can utilize existing Navy-specified NCS artifacts to simplify the creation of the model and that system attributes can be modified in the model to answer “what-if” questions. The demonstration will occur at a Government- or company-provided facility. Prepare a Phase III development plan to transition the technology for Navy use.

It is probable that the work under this effort will be classified under Phase II (see Description section for details).

PHASE III DUAL USE APPLICATIONS: Assist the Navy in transitioning the demonstrated technologies to allow further experimentation and refinement. The cybersecurity model should provide support for AEGIS or SSDS NCSs and the associated system engineering activities of the Program.

The technology developed has a high potential for dual use because it should be easily adapted to non-Navy Control Systems such as industrial controls system used for factory automation, power grid control, chemical process control, etc. System modeling for cybersecurity assessment is of high interest to both the DoD and private industry in protecting their networks. Any industry that uses a complicated network can use this technology.

REFERENCES:

1. Freedberg, Jr., Sydney. "Navy Rolls Out CYBERSAFE: ‘Our Operational Network Is Under Fire’.” breakingdefense.com, 20 APR 2015. http://breakingdefense.com/2015/04/navy-rolls-out-cybersafe/

2. "Risk Management Framework (RMF) Overview.” National Institute of Standards and Technology (NIST), 30 Jan. 2017. http://csrc.nist.gov/groups/SMA/fisma/framework.html

3. McDonald, Michael J. and Richardson, Bryan T. “Position Paper: Modeling and Simulation for Process Control System Cyber.” Sandia National Laboratories, 2009. http://cimic.rutgers.edu/positionPapers/MichaelMcdonald-paper.pdf

KEYWORDS: Cybersecurity Analysis of an AEGIS NCS; Risk Management Framework Artifacts; System of Systems Cybersecurity; Unified Cybersecurity System Model; Impact Analysis for Cybersecurity Vulnerabilities; CYBERSAFE Condition

N181-052

TITLE: Sea Wave Clutter Modeling for Enhanced AEGIS Combat System (ACS) Simulation

TECHNOLOGY AREA(S): Battlespace, Electronics, Sensors

ACQUISITION PROGRAM: Program Executive Office Integrated Warfare System (PEO IWS) 1.0 – AEGIS Combat System

The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with section 5.4.c.(8) of the Announcement. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws.

OBJECTIVE: Develop a software application that simulates the effects of wave clutter for the AEGIS Combat System (ACS) to enhance its design and validation of sensor detection and tracking in Anti-Surface Warfare (ASuW) and Anti-Air Warfare (AAW).

DESCRIPTION: Due to ever-evolving threats across ASuW and AAW and the manner in which they are being deployed, a software application is needed that can instantaneously determine the clutter created by sea waves and its impact on detection and/or tracking operations to improve the overall performance of ACS. This software application is necessary to assess and identify improvements in the combat system design in order to mitigate the effects of wave clutter and improve performance against existing and future threats. ACS detection and tracking utilizes track quality to establish and maintain data on valid contacts in order to optimally resource sensors. Environmental effects such as waves can cause intermittent and unpredictable false tracks that may affect track viability and management. Modeling wave characteristics is challenging due to the complexity of characterizing waveforms and their interaction with other objects. Experimental models do not accurately characterize or predict wave phenomena. They require significant processing time and hardware resources, and do not capture the fidelity required to function in test or operational environments.

A software application is needed to model wave clutter. This application will be used to assess wave clutter impacts on performance and situational awareness. Additionally, in the test and certification environment, this model will be used to optimize sensor resourcing through the reduction or elimination of false tracks that can be caused by wave clutter and reduce subsequent costs associated with testing AEGIS baseline designs. The software should accurately model wave characteristics and their interactions with surface and air objects to create a dynamic mapping capability for ship operations. The software output should simulate the clutter generated from wave effects on Radio Frequency (RF) and Infrared (IR) signature returns for the AEGIS Weapons System (AWS) sensors including the radars, illuminators, and missile seekers. It should provide instantaneous results to inform ACS detection and tracking systems in both test and operational environments. The software application will not negatively affect the speed of execution within the simulation and operations environments. This software application will need to integrate with the Combat System Test Bed (CSTB) environment to facilitate more cost-effective testing and certification of the ACS by supplementing realistic modeling and simulation for live testing to validate system performance. The software application will be required to run on LINUX-based hardware and seamlessly interface with all ACS elements to include sensors and radars, track managers, and weapons control systems. AEGIS Baseline 9 and 10 combat system configurations will be the primary focus for integration activities.

The Phase II effort will likely require secure access, and NAVSEA will process the DD254 to support the contractor for personnel and facility certification for secure access. The Phase I effort will not require access to classified information. If need be, data of the same level of complexity as secured data will be provided to support Phase I work.

Work produced in Phase II may become classified. Note: The prospective contractor(s) must be U.S. Owned and Operated with no Foreign Influence as defined by DOD 5220.22-M, National Industrial Security Program Operating Manual, unless acceptable mitigating procedures can and have been implemented and approved by the Defense Security Service (DSS). The selected contractor and/or subcontractor must be able to acquire and maintain a secret level facility and Personnel Security Clearances, in order to perform on advanced phases of this contract as set forth by DSS and NAVSEA in order to gain access to classified information pertaining to the national defense of the United States and its allies; this will be an inherent requirement. The selected company will be required to safeguard classified material IAW DoD 5220.22-M during the advance phases of this contract.

PHASE I: Develop a concept for a software application that simulates the effects of wave clutter and enhances design and validation of sensor detection and tracking in ASUW and AAW within the ACS. The concept will support the test capabilities identified in the description. Feasibility will be established by evaluation of the proposed software application to incorporate physics-based mathematical models representative of wave effects. The Phase I Option, if awarded, will include the initial design specifications and capabilities description to build a prototype in Phase II. Develop a Phase II plan.

PHASE II: Based on the results of Phase I and the Phase II Statement of Work (SOW), design, develop, and deliver a prototype wave clutter software application that demonstrates the capability to model sea wave clutter in the CSTB, which represents the combat system test environment. The sea wave clutter software application must be able to execute in the operational environment of the combat system as described in the description. The software must be evaluated against Government-provided test scenarios. The demonstration will take place at a Government- or company-provided facility. Provide software design descriptions (SDDs) and test plans/procedures to demonstrate the product meets the attributes described in the description. Prepare a Phase III development plan to transition the technology for Navy use and potential commercial use.

It is probable that the work under this effort will be classified under Phase II (see Description section for details).

PHASE III DUAL USE APPLICATIONS: Support the Navy in system integration of the prototype software application for wave clutter to allow further experimentation and refinement. The implementation will include incorporation into AEGIS baseline testing and modernization processes and demonstration that the prototype is fully functional. This will consist of integrating into a baseline definition, incorporation of the baselines existing and new threat capabilities, validation testing, and combat system certification. AEGIS Baseline 9 and 10 combat system configurations will be the primary focus for integration activities.

Commercial air traffic control operations could use a clutter reduction model to minimize effects of naturally occurring events or objects.

REFERENCES:

1. Roulette, J. and Skrivseth, K. “Coherent Data Collection and Analysis Capability for the AN/SPS-48E Radar.” Johns Hopkins APL Technical Digest, Volume 18, Number 3, January 1997, Page 397. http://www.jhuapl.edu/techdigest/TD/td1803/roul.pdf

2. Ocampo-Torres, F. and Robinson, I. “Wind Wave Directionality Effects on the Radar Imaging of Ocean Swell.” Journal of Geophysical Research, Vol. 95, No. Cll, November 15, 1990, Pages 20,347-20,362. https://www.researchgate.net/publication/252826930_Wind_wave_directionality_effects_on_the_radar_imaging_of_ocean_swell

3. Lewis, Edward V. “Principles of Naval Architecture: Volume III Motions in Waves and Controllability 2nd Edition.” Jersey City: The Society of Naval Architects & Marine Engineers, Oct. 1988.

KEYWORDS: Simulates the Effects of Wave Clutter; Intermittent and Unpredictable False Tracks; Valid Radar Contacts; Track Management Systems for Targeting; AWS Optimally Resource Sensors; Track Viability and Management for Targeting.

N181-053

TITLE: Leveraging a Robust Data Architecture for Rapid Combat System Integration, Testing, and Certification

TECHNOLOGY AREA(S): Weapons

ACQUISITION PROGRAM: PEO IWS 1.0, AEGIS INTEGRATED COMBAT SYSTEM

OBJECTIVE: Provide architecture, tools, and processes that streamline the development and integration of combat system software in order to add and update warfighting capabilities quickly.

DESCRIPTION: AEGIS combat subsystems integration is one of the most significant challenges facing Navy software engineers today. With the development of each new system or update to an existing system, there is an expanding ripple effect in the integration work which perturbs more and more of the combat system software. Unless that trend is changed, the projected “integration costs” of the updates could easily exceed the cost of the systems themselves when originally conceived. The Navy seeks automated integration of data modeled capabilities that change the speed and fidelity of integration and certification of software updates within the AEGIS combat system.

Until recently, tools, data practices, and cooperating software architectures have not existed to address combat system needs. Commercial industry organizations have developed their own private ecosystems and environments for integration. Cellular telephony infrastructures embody the level of tight integration needed for complex networks, but they lack the flexibility and critical performance attributes needed by the Navy. The Navy will be well-suited with the ability to use lessons learned from the commercial side, and bring those features to bear with seamless integration, data models, and tools that automate the process of bringing on new weapons and services needed to maintain dominance over the seas. This solution will identify, leverage, and extend data model architecture principles for rigorous, machine-leverageable documentation of data and a system’s software interfaces in order to facilitate integration and interoperability.

What is proposed is different than the Navy’s current system integration techniques that document and report data through defined message and protocol interfaces. Interface Control Documents (ICDs), are used to document each message in and out of a system, and are used to capture the syntax, structure, semantics, and behavior in prose and diagrams. The current methodology is not “machine-leverageable” and interpretation is not consistent across sub-system implementation teams. This approach does not scale as the integration effort is driven by human interpretation of the ICDs.

An effective solution will enable rapid integration and software certification updates through automated use of model content and modeled interfaces (to include syntax, semantics, and communication behavior). The modeled content should document existing interfaces and be extensible and flexible to support future systems and interfaces. The solution should meet emerging data architecture and software architecture standards such as Future Airborne Capability Environment (FACE). The FACE standard is published by the “Open Group”, and the standards mentioned here are downloadable at the URL cited in Reference 1.


Directory: osbp -> sbir -> solicitations -> sbir20181
solicitations -> Army 16. 3 Small Business Innovation Research (sbir) Proposal Submission Instructions
solicitations -> Air force 12. 1 Small Business Innovation Research (sbir) Proposal Submission Instructions
solicitations -> Army 14. 1 Small Business Innovation Research (sbir) Proposal Submission Instructions
solicitations -> Navy small business innovation research program submitting Proposals on Navy Topics
solicitations -> Navy small business innovation research program
solicitations -> Armament research, development and engineering center
solicitations -> Army 17. 1 Small Business Innovation Research (sbir) Proposal Submission Instructions
solicitations -> Navy 11. 3 Small Business Innovation Research (sbir) Proposal Submission Instructions
sbir20181 -> 18. 1 Defense logistics agency (dla) small business innovation research (sbir) program proposal Submission Instructions general
sbir20181 -> Army 18. 1 Small Business Innovation Research (sbir) Proposal Submission Instructions

Download 1.02 Mb.

Share with your friends:
1   ...   14   15   16   17   18   19   20   21   ...   33




The database is protected by copyright ©ininet.org 2024
send message

    Main page