Tactical wearables and the self-organizing network

Image Gallery

August 19, 2014

DRDC is conducting a series of trials to improve the performance and security of mobile ad hoc networks which aim to enable rapid decision making for dispersed operations. The first trial tested the tracking of a target on the move.

It is clear that perfect cyber security does not exist and that centralized communications hubs can be vulnerable to attacks. But scientists have been moving closer to a potential solution while trying to answer one of nature’s riddles: "How does a school of fish defend itself from a shark attack?"

Each individual in the group only responds to their nearest neighbour.

Like many seemingly complex natural phenomena, the answer to the riddle is found in a few simple rules, most importantly that each individual in the group only responds to their nearest neighbour. Inspired by the self-organizing behaviour of animal groups such as schools of fish or flocks of birds, professor Richard Yu from Carleton University, Dr. Helen Tang from Defence Research and Development Canada (DRDC) and their graduate students have used recent advances in consensus algorithms to design a mobile network that is resilient to attacks. Consensus algorithms use distributed decision-making where all the devices in a network contribute to agree on the outcomes of calculations in a fashion similar to majority rule, rather than the traditional method of decision-making where a central authority determines which results are valid.

“Canadian soldiers operating in the dismounted role cannot be reliant on existing civilian communications infrastructure to support their scheme of manoeuvre,” said Major Cihlar of the Canadian Army’s Directorate of Land Requirements (DLR). Soldiers on the ground, called dismounted soldiers, require solutions that are adaptable to new and dynamic environments. Traditional centralized networks like cell phone towers are vulnerable to single point failures if their central server is compromised by physical damage or a cyber-attack.

“The majority of the places we are sent do not have a communications infrastructure,” said Major Cihlar.

Enter Resilient Tactical Networks (RTNs), a buzzword for advanced mobile ad hoc networks (MANETs) that are resilient against cyber-attacks and connection failures. MANETs are an emerging type of wireless networking in which mobile devices are connected on an ad hoc basis. They are self-forming and self-healing, enabling peer-to-peer communication between mobile devices without relying on centralized resources or fixed infrastructure, like cellular towers.

As soldiers move to new locations, their devices would adapt so that data could hop from one device to the next, around buildings and other obstacles.

For example, in a tactical environment without infrastructure, each dismounted soldier wearing a mobile device connected to the ad hoc network would act as a connection point, or “node”, in the network. As soldiers move to new locations, their devices would adapt so that data could hop from one device to the next, around buildings and other obstacles that would typically degrade or obstruct traditional line of sight communications. Even if one or several connected devices fail or lose reception, the remaining devices in the network can adapt, and continue to communicate to keep the network alive.

“Wireless is the future. And everything will be connected,” professor Richard Yu proclaimed at a recent workshop at Carleton University that also included academics from the University of Ontario Institute of Technology and the University of Western Ontario, military members from the Canadian Army and Defence Scientists from DRDC. Organized by DRDC, the workshop aimed to help researchers understand the Canadian Armed Forces’ needs, get input on DRDC’s research, exchange ideas and facilitate further collaborations.

But the professor also cautioned, “Security is a challenge and we need to be aware of the Army’s requirements.”

Because MANETs have no central security authority, the research teams are developing new security methods so that each device in the network knows which of the other devices can be trusted, by calculating trust values for each device and verifying their identity, amongst other techniques. To calculate trust values for each device you can monitor their activities for unusual behavior and apply consensus algorithms. And to verify a device’s identity you can analyze each device’s unique radio signature. Due to slight differences between every microchip, buried deep within the signal of each radio transmission is a unique pattern which means that each device has its own “fingerprint”.

Major Janus Cihlar discussed the Canadian Army’s requirements at the workshop in great detail. “The modern battlespace is an irregular one, against a tech-enabled enemy, within urban environments and/or complex terrain,” said Major Cihlar during his presentation.

Using numbers to overpower your adversaries and slugging it out is an outdated strategy. “The battle of the future is dispersed in time, space and purpose,” said the Major.

“Fighting smart, out-deciding the enemy is what wins battles now. Small groups will disperse and then commanders can aggregate tactical information and instruct their troops to make a unified and decisive action to deliver effect and force an outcome.”

Every fight is different, and requires adaptable capabilities. But each new capability, like the new tactical radios being developed through the Canadian Army’s Integrated Soldier System Project (ISSP), brings with it new challenges, both technical and human related.

“Fighting smart, out-deciding the enemy is what wins battles now. Small groups will disperse and then commanders can aggregate tactical information...”

 — Major Janus Cihlar

“There are only so many men and women in the Army,” said Major Cihlar. “And there are limits on what each soldier can do within a given period of time, so any new system cannot be a burden to a soldier’s cognitive load.”

Major Ryan Grant, a signals officer for the Directorate of Soldier Systems Project Management, emphasized the Canadian Army’s requirement for ease of use.

“The intent is not to have the soldier interact with the network. It’s not the soldier who enables the network, but the network that enables the soldier,” Major Grant said during his presentation. “The soldier just turns it on and starts using it.”

DRDC’s cyber operations team continues to work on the security techniques that need to be built into ad hoc networks so that enemy devices cannot pretend to be friendly devices and intercept information or bring down a network. They intend to produce a prototype device to evaluate the validity and robustness of the new techniques.

horizontal rule

Read More News from DRDC

DRDC's booth at CANSEC

CANSEC 2016

Defence Research and Development Canada (DRDC) is participating in CANSEC 2016 from May 25-26, 2016 at the EY Centre in Ottawa, Ontario. 
May 26, 2016

The CBRN detector on the iRobot is used to “sniff” TNT in a bucket located onsite at DRDC – Suffield Research Centre on 3 June 2014.

Science supports savvy DND robotics purchase

DRDC Scientists validate $8.9M DND acquisition of Small Remotely Operated Vehicles.
March 24, 2016

A digital radio frequency memory jammer on-board an unmanned vessel during trials at of Rim of the Pacific (RIMPAC) 2014. RIMPAC is the world’s largest international maritime exercises comprised of nations with an interest in the Pacific Rim region.

Enhancing the Navy’s protection against modern threats

Explore how one of Rim of the Pacific’s highest priority experiments could protect against complex modern naval threats.
March 16, 2016

Particle physicist Arthur McDonald, co-winner of the 2015 Nobel Prize in Physics, in front of the SNO Lab.

Nobel work with Neutrinos

Learn how current DRDC scientists contributed to the Nobel Prize-Winning experiment at the Sudbury Neutrino Observatory.
February 24, 2016

Department of National Defence, Canadian Armed Forces and Defence Research and Development Canada (DRDC) personnel test over-the-air distribution (OTAD) of GPS encryption keys at DRDC Ottawa Research Centre's navigation warfare lab.

CAF moving towards new automated method of distributing GPS encryption keys

New method aims to facilitate greater number of encrypted devices by making it easier to load encryption keys
February 17, 2016

See more news
Date modified: