Search Contract Opportunities

Cybersecurity Capability for the neXtECU Engine Controller

ID: A21C-T022 • Type: SBIR / STTR Topic • Match:  100%
Opportunity Assistant

Hello! Please let me know your questions about this opportunity. I will answer based on the available opportunity documents.

Please sign-in to link federal registration and award history to assistant. Sign in to upload a capability statement or catalogue for your company

Some suggestions:
Please summarize the work to be completed under this opportunity
Do the documents mention an incumbent contractor?
Does this contract have any security clearance requirements?
I'd like to anonymously submit a question to the procurement officer(s)
Loading

Description

OBJECTIVE: Implement and maintain, cybersecurity protocols for the GVPM-RTCS neXtECU engine controller. This capability needs to meet current and future cybersecurity requirements for all ground vehicle programs. DESCRIPTION: Current Engine Control Units (ECUs) being used in military vehicles, such as the Honeywell's Digital Engine Control Unit (DECU) used in Abrams M1A2 Tanks, are becoming un-supportable and obsolete. The neXtECU, is a viable drop-in replacement controller option for the Abrams M1A2 along with other vehicle platforms such as the 1790 M88 Hercules. It is also currently used to support the development of the Advanced Combat Engine (ACE) and Powertrain (APD) upgrades. The advantages of the neXtECU are not only that it can be implemented on multiple vehicle platforms, but that it will also provide protection for the data it sends and stores. It is essential to adapt and implement cybersecurity protocols into the neXtECU for Army ground vehicles because of the exponential growth of technology and an increased rate of cyber-attacks by U.S. adversaries both foreign and domestic. Currently fielded engine controllers have limited to no cybersecurity protection which leaves them open for Malware, phishing, and possibly clandestine equipment. Without the increased cybersecurity technologies on the engine controller a vehicle can be manipulated by threats in a variety of different ways such as: interrupted flow of data, unauthorized commands to critical components which can endanger human life, and is a danger to critical and costly equipment. Compromised equipment can also lead to drastic increases in life-cycle costs, and can potentially negatively affect overall mission capabilities and success. The cybersecurity measures developed for the neXtECU will effectively protect, restrict, and encrypt data, protocols, and communication systems. The technological solution to be developed will be required to integrate a Hardware Security Module (HSM) with a 5777m processor into the neXtECU. This solution will propose possible interfaces between the bootloader, ECU, and application software. The proposed solution shall also have the potential to secure all communication buses. The proposed Microcontroller Unit (MCU) solution shall possess and industry proven trusted key store concept. Furthermore, the MCU shall address production key updates in field, and an initial strategy for generating and securing keys. These updated technologies will provide users with a safe and secure operating system that provides real-time data and information using an encrypted and protected operating system. The cybersecurity technology will also enable the neXtECU's system integrity by keeping information from being altered which provides confidence that the system information is confidential, protected, and un-corrupted. The neXtECU has many benefits for the Army due to its wide application for all ground vehicles, and it can provide a solution to upcoming sustainment issues, cybersecurity, and capability enhancements. This neXtECU with the proposed cybersecurity technology can also be used in the automotive industry, with autonomous driving vehicles, over-the-air vehicle software updates, wireless device linking, and for many other cyber based advancements that are presently growing. PHASE I: Identify and determine the software, hardware, and other technologies/equipment needed to develop this cybersecurity technology concept to work with the neXtECU. The proposed solution shall not require a hardware re-design of the neXtECU. An integration and compatibility study should be conducted in this phase to be used in Phase II to interface the new technologies within the neXtECU. An investigation of solutions shall be compatible not only with the neXtECU, but other potential industry Microcontroller Units (MCU's). Techniques and methods developed in this phase should meet all government cybersecurity provided requirements, as well as any other requirements developed during this phase. While developing requirements, this phase should evaluate overall key performance parameters needed to be successful to meet Phase II requirements. A competitive analysis and proposal of all potential embedded systems for security (i.e. ESCRYPT, Argus, Trillium, Karamba, etc.) or similar shall be conducted. A breakdown of all potential solutions as well as their commercial merit and their feasibility is required. Finally a bill of materials, volumes, and part costs for Phase I and Phase II designs should also be developed and outlined for the proposed solution. Designs in this phase also need to address any challenges identified in the above description or set of requirements. PHASE II: Phase II will develop and integrate the prototype software and hardware into the neXtECU based on the Phase I designs and solutions that were developed and recommended. The cybersecurity technology shall be designed to support all current development protocols for the neXtECU's programming (ETAS XETK, CAN UDS, Lauterbach, etc.). During this phase bench testing demonstrations will be required to accurately gauge and establish performance parameters. The expectation will be to have the GVSC Cybersecurity team test the final design to assess the capability to secure software re-programming, secure communications, and to demonstrate overall integration into the neXtECU. Phase II efforts will finalize the requirements, overall system protections and system functionality. A final bill of materials, production costs, volumes, all developed software, and a prototype shall be deliverables for the Phase II design. PHASE III DUAL USE APPLICATIONS: During this phase the solution for the neXtECU's cybersecurity technologies will be implemented. Additionally, integration of the neXtECU into the 1790 M88 Hercules vehicle platforms will take place during Phase III. REFERENCES: 1. NHTSA. Cybersecurity Research Considerations for Heavy Vehicles [online]: National Highway Safety Administration.[Accessed 2/4/2020] https://www.nhtsa.gov/sites/nhtsa.dot.gov/files/documents/sae2018sstachowski.2.pdf; 2. Stouffer, Keith, et al., Guide to Industrial Control System (ICS) Security , NIST Special Publication 800-82r2 (May 2015): http://dx.doi.org/10.6028/NIST.SP.800-82r2; 3. NHTSA. Vehicle Cybersecurity [online]: National Highway Safety Administration.[Accessed 2/4/2020]; 4. Leonard, Matt. Defending Military Vehicles against Cyberattacks -. GCN, 19 Mar. 2018. [Accessed 2/4/2020]; 5. Stone, Mark. It's Time for an Automotive Cybersecurity Wake-Up Call. Security Intelligence, 7 Mar. 2019, [Accessed 2/4/2020] https://securityintelligence.com/its-time-for-an-automotive-cybersecurity-wake-up-call/ KEYWORDS: neXtECU, Cybersecurity, Controller, Platforms, Protocols, Technology, Capabilities

Overview

Response Deadline
Oct. 21, 2021 Past Due
Posted
Aug. 25, 2021
Open
Sept. 21, 2021
Set Aside
Small Business (SBA)
Place of Performance
Not Provided
Source
Alt Source

Program
STTR Phase I / II
Structure
Contract
Phase Detail
Phase I: Establish the technical merit, feasibility, and commercial potential of the proposed R/R&D efforts and determine the quality of performance of the small business awardee organization.
Phase II: Continue the R/R&D efforts initiated in Phase I. Funding is based on the results achieved in Phase I and the scientific and technical merit and commercial potential of the project proposed in Phase II. Typically, only Phase I awardees are eligible for a Phase II award
Duration
6 Months - 1 Year
Size Limit
500 Employees
Eligibility Note
Requires partnership between small businesses and nonprofit research institution
On 8/25/21 Department of the Army issued SBIR / STTR Topic A21C-T022 for Cybersecurity Capability for the neXtECU Engine Controller due 10/21/21.

Documents

Posted documents for SBIR / STTR Topic A21C-T022

Question & Answer

The AI Q&A Assistant has moved to the bottom right of the page

Contract Awards

Prime contracts awarded through SBIR / STTR Topic A21C-T022

Incumbent or Similar Awards

Potential Bidders and Partners

Awardees that have won contracts similar to SBIR / STTR Topic A21C-T022

Similar Active Opportunities

Open contract opportunities similar to SBIR / STTR Topic A21C-T022