DARPA Project Seeks More Reliable Wireless For Troops - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


DARPA Project Seeks More Reliable Wireless For Troops

Defense Advanced Research Projects Agency pursues new protocols that would keep military wireless networks operational even if individual nodes are compromised or misconfigured.

14 Amazing DARPA Technologies On Tap
14 Amazing DARPA Technologies On Tap
(click image for larger view and for slideshow)
A new program is underway at the Defense Advanced Research Projects Agency (DARPA) to develop protocols to make military wireless networks more secure.

When in the field, military service members rely on their mobile devices to provide access to wireless networks in areas lacking a communications infrastructure. The protocols used for these networks determine the best configurations, and therefore trust all information shared about the security and operational state of each node. This poses a huge problem for service members.

"Current security efforts focus on individual radios or nodes, rather than the network, so a single misconfigured or compromised radio could debilitate an entire network," DARPA program manager Wayne Phoel said in a statement.

DARPA's new Wireless Network Defense program aims to change how wireless networks are controlled by developing protocols that would allow networks to stay operational even if individual nodes are compromised or misconfigured. The new protocols would determine that the nearby nodes are trustworthy and automatically adapt the network to work through problems. DARPA compared the process to a neighborhood watch, where, like attentive neighbors, the protocols would be able to identify unusual activity on the network.

[ The military wants to modernize its use of mobile devices and apps. For more, read Pentagon Unveils Secure Mobile Device Plan. ]

DARPA will host a conference on April 1 in Arlington, Va., to discuss the program's goals. The agency is seeking proposals from companies that have expertise in military and commercial wireless network system design and operation, wireless network security protocols, distributed control theory, and economic and social networking structural analysis.

Private-sector technologies and social networking could be the answer to DARPA's challenges. Phoel gave examples of credit card companies using indicators such as unusual purchase locations to determine whether a credit card has been stolen. He also noted that social sites that buy and sell personal items use ratings to help users decide if a seller is trustworthy.

"Similar concepts of reliability estimation and control methods could be applied to wireless military networks by calling out specific areas of the network that may have untrustworthy nodes," Phoel said.

InformationWeek's 2013 Government IT Innovators program will feature the most innovative government IT organizations in the 2013 InformationWeek 500 issue and on InformationWeek.com. Does your organization have what it takes? The nomination period for 2013 Government IT Innovators closes April 12.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Andrew Hornback
Andrew Hornback,
User Rank: Apprentice
3/22/2013 | 4:16:25 AM
re: DARPA Project Seeks More Reliable Wireless For Troops
Having a protocol to determine anomalous activity on a network sounds like a great opportunity for introducing some concepts around Big Data - not necessarily processing a huge aggregate of data, but being able to process a continuous stream of it at high speed in order to minimize or mitigate the risks involved of operating a network in a possibly hostile environment.

Andrew Hornback
InformationWeek Contributor
10 Ways to Prepare Your IT Organization for the Next Crisis
Cynthia Harvey, Freelance Journalist, InformationWeek,  5/20/2020
IT Spending Forecast: Unfortunately, It's Going to Hurt
Jessica Davis, Senior Editor, Enterprise Apps,  5/15/2020
Helping Developers and Enterprises Answer the Skills Dilemma
Joao-Pierre S. Ruth, Senior Writer,  5/19/2020
White Papers
Register for InformationWeek Newsletters
The State of IT & Cybersecurity Operations 2020
The State of IT & Cybersecurity Operations 2020
Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
Flash Poll