SITIS Archives - Topic Details
Program:  SBIR
Topic Num:  N07-065 (Navy)
Title:  Multi-Level Security Smart Proxy Agent for Bandwidth and Time Constrained Users
Research & Technical Areas:  Information Systems, Ground/Sea Vehicles, Battlespace

Acquisition Program:  
 RESTRICTION ON PERFORMANCE BY FOREIGN CITIZENS (i.e., those holding non-U.S. Passports): This topic is “ITAR Restricted”. The information and materials provided pursuant to or resulting from this topic are restricted under the International Traffic in Arms Regulations (ITAR), 22 CFR Parts 120 - 130, which control the export of defense-related material and services, including the export of sensitive technical data. Foreign Citizens may perform work under an award resulting from this topic only if they hold the “Permanent Resident Card”, or are designated as “Protected Individuals” as defined by 8 U.S.C. 1324b(a)(3). If a proposal for this topic contains participation by a foreign citizen who is not in one of the above two categories, the proposal will be rejected.
  Objective:  Incorporate “smart” tools to provide the Operator prioritized information in order to optimize the submarine’s minimal bandwidth and limited access to external communications. The tool set will also allow the user to tailor the information sent to and from multiple workstations in such a way that it will minimize transmission time. This effort will result in a ForceNet compatible proxy for all classified (unclassified, secret, and top secret) enclaves.
  Description:  The submarine’s ability to send and receive the right information at the right time within the submarine’s intermittent external communication profile and bandwidth constrained environment has become more complex for the Operator (watch stander) due to increased Submarine external communications information exchange requirements (IERs). This environment is intermittent and bandwidth limited, therefore a transmission plan is necessary for the Operator to determine what information and requests should be transmitted to and from the submarine according to time, policy, mission, and size of files. The transmission plan will ensure that the information is efficiently sent to and from the submarine to meet various missions within existing bandwidth limitations. The “smart” tool or proxy needs to include FORCEnet concepts: 1) Store, catalogue and retrieve all information produced by any node on the network in a comprehensive, standard repository so that the information is readily accessible to all nodes and compatible with the forms required by any nodes, within security restrictions; 2) Meet information assurance requirements; 3) Function in multiple security domains and multiple security levels within a domain and be able to manage and access the data dynamically; 4) Allow individual nodes to function while temporarily disconnected from the network; 5) Incorporate new capabilities into the system quickly without causing undue disruption to the performance of the system; and 6) Provide decision makers the ability to make and implement good decisions quickly under conditions of uncertainty, friction, time, pressure, and other stresses. Therefore, the evaluation of IERs and the employment of creative and innovative “smart” tools must be explored based on limited bandwidth and intermittent access. The submarine shall be able to dynamically specify information to be retrieved, while end user customers shall be able to receive specific information from the submarine. Further, the Tool Set must be able to prioritize the information that is gathered and requested. Therefore, dynamic, intelligent data compression techniques for standard files types and custom compression algorithms for mission-specific data types must also be explored based on limited bandwidth and intermittent access. Design problem / risk lies in the software development, knowledge engineering and protocol limitations. The development and incorporation of these “smart” tools will aid the Operator in satisfying defined IERs across submarine Tactical and Operational decision processes.

  PHASE I: Develop and document methods and techniques to support research of innovative "smart" tools to determine information exchange requirements (IERs) (e.g., Collaboration, mission and distance support, navigation updates, Sea Warrior, Sub Broadcast) for "smart" tools to automatically prioritize information for Internet Protocol communications of multiple security level "smart" proxies. Pending this analysis; produce a "smart" tools feasibility study.
  PHASE II: Develop a "smart" tool prototype and perform initial stand-alone and integrated laboratory testing with FORCEnet compatible interfaces that support multiple-security levels. Demonstrate effectiveness and efficiency of the tool in a submarine Beta site.

  PHASE III: The tools and methods developed under Phase I and tested under Phase II will be sufficiently commercialized that they can be applied to a wide set of products and will be transitioned into the Advanced Processor Build (APB) testing process of open architecture (OA) and sea based systems on-board submarines and surface vessels.

  PRIVATE SECTOR COMMERCIAL POTENTIAL: This system could be applied to any environment that involves information exchange in a bandwidth constrained environment or external communication opportunity-constrained environment such as commercial maritime shipping, Navy surface combatants during varying MCON conditions trucking and commercial passenger air transportation.

  References:  1. Navy FORCEnet Web Site: http://forcenet.navy.mil 2. World Wide Consortium for the Grid: http://www.w2cog.org/ 3. NCES DISA public web site: http://www.disa.mil/nces/ 4. NCES Security Service Briefing: http://www.disa.mil/nces/servicesecurity.ppt 5. NCES Service Discovery Help Guide: http://www.disa.mil/nces/servicediscovery.ppt

Keywords:  bandwidth management, FORCEnet, SoA, Proxy, multi-level security, IP communications

Additional Information, Corrections, References, etc:
Ref #3 - 5: These references do a good job in providing the potential bidder an idea of the types of
technologies they need to consider for the proxy to interoperate in the
FORCEnet net-centric environment.
Ref #3 - 5: These references do a good job in providing the potential bidder an idea of the types of
technologies they need to consider for the proxy to interoperate in the
FORCEnet net-centric environment.

Questions and Answers:
Q: The SBIR title contains the phrase Multi-Level security. Does this phrase imply that the requested proxy agent simply operate in each security enclave or does it imply that the agents must interact across security boundaries?
A: It implies that the proxy agent must/shall interact across any/all security boundaries!

The agent must be able to operate in multiple security boundaries as well as interact across security boundaries.
Q: The SBIR title contains the phrase Multi-Level security. Does this phrase imply that the requested proxy agent simply operate in each security enclave or does it imply that the agents must interact across security boundaries?
A: It implies that the proxy agent must/shall interact across any/all security boundaries!

The agent must be able to operate in multiple security boundaries as well as interact across security boundaries.

Record: of