Wireless
Network Defense program seeks to develop new technologies to help make wireless networks more resilient to unforeseen
scenarios and malicious compromise
In areas lacking trustworthy communications infrastructure, deployed service
members rely on wireless devices to perform double duty: they not only provide access to the network; they are the
network. Protocols for these networks require nodes to coordinate among themselves to manage resources, such as spectrum
and power, and determine the best configurations to enable sharing of information. A problem with these protocols
is that they implicitly trust all information shared about the security and operational state of each node, and the
network as a whole. Consequently, inaccurate control or security information can quickly render the network unusable.
This shortcoming could put productivity and mission success at risk as use of military wireless systems increases.
To help address these issues, DARPA has created the Wireless Network Defense program. The program aims to
develop new protocols that enable military wireless networks to remain operational despite inadvertent misconfigurations
or malicious compromise of individual nodes.
“Current security efforts focus on individual radios or nodes,
rather than the network, so a single misconfigured or compromised radio could debilitate an entire network,” said
Wayne Phoel, DARPA program manager. “We need to change how we control wireless networks by developing a network-based
solution for current and future systems that acknowledges there will be bad nodes and enables the network to operate
around them.”
A key objective of the program is to develop protocols that determine the viability and trustworthiness
of neighboring nodes and automatically adapt the network to operate through problems. Similar to a neighborhood watch
program – where neighbors know each other and can identify suspicious or unusual behavior on their street – the protocols
must help identify unusual activity that may indicate a problem on the network.
Inspiration for addressing
these challenges could come from economic and social networks.
“Credit card companies use various indicators
for trying to determine if someone has stolen your credit card and is posing as you,” Phoel said. “Unexpected purchase
locations, amounts and other factors could raise an alert. Online social sites for buying and selling personal items
use seller ratings to help you decide the trustworthiness of someone before you make a purchase. Similar concepts
of reliability estimation and control methods could be applied to wireless military networks by calling out specific
areas of the network that may have untrustworthy nodes.”
Wireless Network Defense is specifically not a new
waveform or radio program. Phoel seeks solutions that make existing and future wireless networks more robust and resilient
to compromise, regardless of specific radio node hardware or software.
DARPA will host a Proposers’ Day on
April 1, 2013, in Arlington, Va. For details visit:
http://go.usa.gov/2nuR
Phoel believes expertise in the following areas may likely contribute to the success of the program: military
and commercial wireless network system design and operation, wireless network security protocols, distributed control
theory, and economic and social networking structural analysis.
RF Cafe began life in 1996 as "RF Tools" in an AOL screen name web space totaling
2 MB. Its primary purpose was to provide me with ready access to commonly needed
formulas and reference material while performing my work as an RF system and circuit
design engineer. The World Wide Web (Internet) was largely an unknown entity at
the time and bandwidth was a scarce commodity. Dial-up modems blazed along at 14.4 kbps
while typing up your telephone line, and a nice lady's voice announced "You've Got
Mail" when a new message arrived...
All trademarks, copyrights, patents, and other rights of ownership to images
and text used on the RF Cafe website are hereby acknowledged.