Search Contract Opportunities

Cyber Protection for Physical Avionics Data Inputs to Navy Platforms

ID: N211-009 • Type: SBIR / STTR Topic • Match:  85%
Opportunity Assistant

Hello! Please let me know your questions about this opportunity. I will answer based on the available opportunity documents.

Please sign-in to link federal registration and award history to assistant. Sign in to upload a capability statement or catalogue for your company

Some suggestions:
Please summarize the work to be completed under this opportunity
Do the documents mention an incumbent contractor?
Does this contract have any security clearance requirements?
I'd like to anonymously submit a question to the procurement officer(s)
Loading

Description

RT&L FOCUS AREA(S): Cybersecurity; General Warfighting Requirements TECHNOLOGY AREA(S): Air Platforms; Battlespace Environments; Electronics The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with section 3.5 of the Announcement. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws. OBJECTIVE: Research and address the holistic cyber threat posed by the transfer of aeronautical data to Navy and United States Marine Corps (USMC) aircraft by taking physical avionics data inputs to the aircraft and developing solutions to harden those input channels, protecting the data from malicious tampering and errant corruption. DESCRIPTION: Critical aeronautical data is transferred into avionics systems to provide pilot guidance or other information used to influence pilot decisions in the cockpit. This aeronautical data may include the navigation database, vertical obstruction database, flight plans, world magnetic model, maps, and imagery. To prevent malicious tampering of this data, cyber protection needs to be implemented on all physical avionics data inputs in these airborne systems. Currently, minimal cyber-safe mechanisms are offered and only provide protection against errant corruption. No complete cyber protection set exists for the physical avionics data inputs creating a multitude of threat surfaces to be addressed. The Navy must fully identify all threat surfaces and begin to prototype protections against those threats. The following are examples of physical data threat surfaces (but by no means intended to be a complete list): Corrupt/Invalid Source involves the data validity of the data sourced by the data provider (Government, industry, or open-sourced); could be a result of any other type of threat surface. Errant Corruption a non-intentional data corruption introduced by human or computer error; also the most easily identified by mechanisms such as Cyclical Redundancy Checks (CRCs). Proposed approaches should include, but not be limited to, a white hat analysis of all physical avionics data inputs to all Navy and USMC aircraft. For each physical avionics data input this research should identify the data flow which includes data source, transitional systems (e.g., tablet, Navy/Marine Corps Internet (NMCI), Joint Mission Planning Software (JMPS), maintenance computer), and end use. For each data flow, perform a human factors assessment to determine if the pilot decision making based on operational conditions (e.g., instrument flight rules (IFR) vs visual flight rules (VFR), approach vs cross country) and alteration of data inputs can be altered. Potential mitigation strategies should be identified for each physical avionics data input. These mitigation strategies could be process, software, or hardware solutions depending on the scenario. An evaluation of current protections, postulate new or enhanced cyber protections, and perform experimentation to determine if protections are sufficient to mitigate risk should be performed. All postulated solutions should focus on performance of the solution to prevent unnecessary burden on the aircrew that could prevent them from attaining mission success. Utilizing the white hat analysis, firms should develop prototype solutions for the two platforms with the largest threat surface in order to provide a formal design, implementation, and formal qualification testing of protection strategies for the data chain from source to end use. Prototype solutions in this context could be hardware, software, and/or procedural guidance. To validate the initial threat surface analysis and protections implemented provide sufficient protections to avert any corrupt/invalid source, errant corruption, Denial of Service (DoS), or spoofing/hacking attack types, potential technologies will participate in a focused ethical hacking event (or Hack-a-thon). A successful demonstration of the prototype solutions would be the prevention of all attempts to infiltrate the system and successful identification and notification of operators of hazardously misleading information that would affect decisions within the cockpit. Work produced in Phase II may become classified. Note: The prospective contractor(s) must be U.S. owned and operated with no foreign influence as defined by DoD 5220.22-M, National Industrial Security Program Operating Manual, unless acceptable mitigating procedures can and have been implemented and approved by the Defense Counterintelligence and Security Agency (DCSA) formerly Defense Security Service (DSS). The selected contractor and/or subcontractor must be able to acquire and maintain a secret level facility and Personnel Security Clearances. This will allow contractor personnel to perform on advanced phases of this project as set forth by DCSA and NAVAIR in order to gain access to classified information pertaining to the national defense of the United States and its allies; this will be an inherent requirement. The selected company will be required to safeguard classified material IAW DoD 5220.22-M during the advanced phases of this contract. PHASE I: Determine feasibility of proposed approach by performing a white hat analysis of all physical avionics data inputs to all Navy aircraft. Provide a summary of the white hat analysis, a listing of all threat surfaces, the affected aircraft, mitigation strategies, and residual risk while also identifying gaps where analysis was non-deterministic. In the Phase I option, if exercised, develop a threat brief deployable to each platform and a Business Case Analysis (BCA). The Phase I effort will include prototype plans to be developed under Phase II. PHASE II: Develop and demonstrate prototyping solutions for the two platforms with the largest threat surface. Provide a formal design, implementation, and formal qualification testing of protection strategies for the data chain from source to end use. Prototype solutions in this context could be hardware, software, and/or procedural guidance. It is probable that the work under this effort will be classified under Phase II (see Description section for details). PHASE III DUAL USE APPLICATIONS: Finalize prototype solutions and validate at a focused ethical hacking event (or Hack-A-Thon). Proofing of threat patches, if high priority topics are discovered, additional or iterative hacking events may occur to ensure completion of targeted topics (i.e., fly-fix). Transition and integrate the deployment of cyber protection strategies to naval platforms or Programs of Record. The outcome of this topic will result in a packaged set of methodologies to protect data in transit from off-aircraft maintenance stations to on-aircraft usage to protect against both errant and malicious corruptions. Those methodologies could in turn be documented and shared with the private sector for use on Navy projects. Both the commercial sector (such as GE, Jacobs, Raytheon, Rockwell Collins, L3Harris) and other DoD services could benefit from a deployed base cyber protection suite of tools. Software, hardware, and procedural solutions would need to remain portable to multiple environments to support reuse of tools and methodologies. REFERENCES: DO-200B, Standards for Processing Aeronautical Data. Radio Technical Commission for Aeronautics. June 18, 2015. https://my.rtca.org/nc__store?search=DO-200B DO-201B, User Requirements for Navigation Data. Radio Technical Commission for Aeronautics. December 13, 2018. https://my.rtca.org/nc__store?search=DO-201B

Overview

Response Deadline
March 4, 2021 Past Due
Posted
Dec. 8, 2020
Open
Jan. 14, 2021
Set Aside
Small Business (SBA)
Place of Performance
Not Provided
Source
Alt Source

Program
SBIR Phase I / II
Structure
Contract
Phase Detail
Phase I: Establish the technical merit, feasibility, and commercial potential of the proposed R/R&D efforts and determine the quality of performance of the small business awardee organization.
Phase II: Continue the R/R&D efforts initiated in Phase I. Funding is based on the results achieved in Phase I and the scientific and technical merit and commercial potential of the project proposed in Phase II. Typically, only Phase I awardees are eligible for a Phase II award
Duration
6 Months - 1 Year
Size Limit
500 Employees
On 12/8/20 Department of the Navy issued SBIR / STTR Topic N211-009 for Cyber Protection for Physical Avionics Data Inputs to Navy Platforms due 3/4/21.

Documents

Posted documents for SBIR / STTR Topic N211-009

Question & Answer

The AI Q&A Assistant has moved to the bottom right of the page

Contract Awards

Prime contracts awarded through SBIR / STTR Topic N211-009

Incumbent or Similar Awards

Potential Bidders and Partners

Awardees that have won contracts similar to SBIR / STTR Topic N211-009

Similar Active Opportunities

Open contract opportunities similar to SBIR / STTR Topic N211-009

Experts for Cyber Protection for Physical Avionics Data Inputs to Navy Platforms

Recommended subject matter experts available for hire