Search Contract Opportunities

Real Time Cybersecurity Systems for Safety Critical Military Vehicle Applications

ID: A22B-T023 • Type: SBIR / STTR Topic • Match:  85%
Opportunity Assistant

Hello! Please let me know your questions about this opportunity. I will answer based on the available opportunity documents.

Please sign-in to link federal registration and award history to assistant. Sign in to upload a capability statement or catalogue for your company

Some suggestions:
Please summarize the work to be completed under this opportunity
Do the documents mention an incumbent contractor?
Does this contract have any security clearance requirements?
I'd like to anonymously submit a question to the procurement officer(s)
Loading

Description

RT&L FOCUS AREA(S): Cybersecurity TECHNOLOGY AREA(S): Information Systems The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with section 3.5 of the Announcement. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws. OBJECTIVE: Research and development of hardware and/or software capable of real-time cybersecurity detection and protection of vehicle networks with no delay, degradation, false positives, impacts on systems and network resources. DESCRIPTION: Cybersecurity of the Army's ground systems is a critical priority to national defense in the 21st century. Recent events have shown that vehicles are vulnerable to attack and subversion through various modes which at times can be malicious in intent. The current solutions present loads and latency upon taxed vehicular systems and networks. Cyber systems such as Intrusion Detection/Prevention System (IDS/IPS) can detect and/or prevent malicious communications, but generally require resources on systems, sensors, computing and network resources, degrading those capabilities. GVSC would like to see a solution that can provide real-time cybersecurity detection and protection capabilities for real-time systems and networks on vehicles, primarily on their vehicular safety systems with no delay, no degradation, no false positives, and no impacts on systems, sensors, computing and network resources. PHASE I: In the first phase, the contractor shall demonstrate the feasibility and capability of a real-time cybersecurity detection and protection system, using hardware and/or software that enables Intrusion Detection and Prevention of cyber events. The real-time cybersecurity detection and protection capabilities must NOT impact NOR delay NOR degrade NOR create false positives on the systems, sensors, computing and network resources of safety-critical vehicular systems. PHASE II: In the second phase, the contractor shall demonstrate on real vehicle networks such as Society of Automotive Engineers (SAE) J1939 (Controller Area Network, CAN, protocol variant used in most military trucks), Military Standard 1553 (MIL-STD-1553), and/or Automotive Ethernet, using actual physical vehicle controllers. The contractor shall demonstrate the operation of the technology in a live vehicle or systems integration lab (SIL) environment. The demonstration shall include an ECU and at least one safety controller. The contractor shall validate the effectiveness of the technology by showing that none of the systems, sensors, computing, and network resources are impacted at all with the timing, resources, latency, loads, concurrency, and prioritization. The systems shall be demonstrated and verified by a 3rd party that their cybersecurity solution does NOT impact NOR delay NOR degrade NOR create false positives on the systems, sensors, computing and network resources of safety-critical vehicular systems. PHASE III DUAL USE APPLICATIONS: In the third phase, the contractor shall package the technology to be retrofit into an existing vehicle system. The contractor shall collaborate with a vehicle original equipment manufacturer (OEM) to demonstrate their technology during normal vehicle operations on a test track. The contractor shall demonstrate the same validations shown in Phase II. REFERENCES: United States Department of Transportation (USDOT), Intelligent Transportation Systems (ITS). (2020). ITS Strategic Plan 2020-2025, retrieved from https://www.its.dot.gov/stratplan2020/ITSJPO_StrategicPlan_2020-2025.pdf & https://www.its.dot.gov/factsheets/cybersecurity.htm United States Department of Transportation (USDOT), National Highway Traffic Safety Administration (NHTSA). (2020). ITS Strategic Plan 2020-2025, retrieved from https://www.nhtsa.gov/sites/nhtsa.gov/files/documents/vehicle_cybersecurity_best_practices_01072021.pdf United States Department of Energy (USDOE), National Renewable Energy Laboratory. (2019). Vehicle Cybersecurity Threats and Mitigation Approaches, retrieved from https://www.nrel.gov/docs/fy19osti/74247.pdf United States Department of Homeland Security (USDHS), Science and Technology. (n.d.). Cyber Physical Systems Security (CPSSEC), retrieved from https://www.dhs.gov/science-and-technology/cpssec National Security Agency (NSA), Central Security Service (CSS). (2015). Active Cyber Defense (ACD) Enabling the Real-Time Defense of Critical Networks, retrieved from https://apps.nsa.gov/iad/programs/iad-initiatives/active-cyber-defense.cfm KEYWORDS: Vehicle Networks, CAN, ECU, Cybersecurity, Intrusion Detection/Prevention System, Threat, Protection, Decentralization, Security, Fault Tolerance, Resiliency, Field-Programmable Gate Array (FPGA), Graphic Processing Units (GPU), parallel & concurrent computing, redundant, real-time, mitigation

Overview

Response Deadline
June 15, 2022 Past Due
Posted
April 20, 2022
Open
May 18, 2022
Set Aside
Small Business (SBA)
Place of Performance
Not Provided
Source
Alt Source

Program
STTR Phase I
Structure
Contract
Phase Detail
Phase I: Establish the technical merit, feasibility, and commercial potential of the proposed R/R&D efforts and determine the quality of performance of the small business awardee organization.
Duration
1 Year
Size Limit
500 Employees
Eligibility Note
Requires partnership between small businesses and nonprofit research institution
On 4/20/22 Department of the Army issued SBIR / STTR Topic A22B-T023 for Real Time Cybersecurity Systems for Safety Critical Military Vehicle Applications due 6/15/22.

Documents

Posted documents for SBIR / STTR Topic A22B-T023

Question & Answer

The AI Q&A Assistant has moved to the bottom right of the page

Contract Awards

Prime contracts awarded through SBIR / STTR Topic A22B-T023

Incumbent or Similar Awards

Potential Bidders and Partners

Awardees that have won contracts similar to SBIR / STTR Topic A22B-T023

Similar Active Opportunities

Open contract opportunities similar to SBIR / STTR Topic A22B-T023