2326928
Cooperative Agreement
Overview
Grant Description
NSF Convergence Accelerator Track G: Avoid 5G: Automated Verification of Internet Data-Paths for 5G - Department of Defense (DoD) use of commercial 5th generation (5G) networks entails unprecedented reliance on untrusted third-party communications infrastructure, including the 5G base stations that connect directly to 5G devices and the internet infrastructure that underlies 5G communications.
The core problem when operating through non-cooperative commercial 5G infrastructure is that the unknown infrastructure potentially exposes communications to an adversary. Traversing adversary-controlled infrastructure allows DoD's adversaries to recognize, disrupt, or extract intelligence even from encrypted communications. Increasingly complex obfuscation techniques have created an arms race against network intelligence techniques to detect the obfuscation.
With each new obfuscation, DoD can never know if it fools the adversary, or if the adversary is simply lulling DoD into a false sense of security.
The next great capability leap for operating through 5G networks will likely come from sophisticated analytics that provide situational awareness of threats within the communications infrastructure, and an implementation that dynamically routes communications along benign paths. Through a team that combines expertise across disciplines and sectors, this project will pursue this transformative capability and accelerate convergence on a new DoD 5G defense: restructuring communication paths to avoid adversary-controlled base stations, networks, and locations, thereby keeping DoD communications unobservable by the adversary.
This project proposes a system - Automated Verification of Internet Data-Paths (AVOID) - that creates this unprecedented capability through two deliverables that tackle two high-risk attack vectors for 5G communications. Deliverable 1 targets the potential for adversaries to control commercial base stations anywhere in the world, allowing them to subvert DoD communications at the point of entry into the wireless network. AVOID will recognize malicious and surveillance base stations and provide a mechanism for DoD devices to connect to specific benign base stations.
Deliverable 2 combats the ability of our adversaries to apply sophisticated and complex network analytics to any DoD communications that traverse networks or territory they control. AVOID will embed topologic and geographic awareness into a routing system and provide a mechanism for DoD's communications to avoid adversary-controlled territory across the global internet and provide safe paths to DoD-controlled networks. Combined, these deliverables will provide end-to-end adversary avoidance without requiring modification to existing applications or routers in DoD networks or cooperation by any third-party network.
The intellectual merit comes from addressing a persistently unsolved national security challenge which requires convergence across seven areas of expertise: 5G communication and network management; internet path analytics; overlay routing; operational network security; test and evaluation that targets DoD scenarios; technology transition; and professional project management. AVOID 5G will also broadly impact society. The deliverables complement the broader landscape of zero-trust architectures, secure 5G implementations, and ongoing obfuscation technique development. Government partners included in the team provide a channel for research and education outcomes, including cybersecurity workforce training.
This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the foundation's intellectual merit and broader impacts review criteria.
The core problem when operating through non-cooperative commercial 5G infrastructure is that the unknown infrastructure potentially exposes communications to an adversary. Traversing adversary-controlled infrastructure allows DoD's adversaries to recognize, disrupt, or extract intelligence even from encrypted communications. Increasingly complex obfuscation techniques have created an arms race against network intelligence techniques to detect the obfuscation.
With each new obfuscation, DoD can never know if it fools the adversary, or if the adversary is simply lulling DoD into a false sense of security.
The next great capability leap for operating through 5G networks will likely come from sophisticated analytics that provide situational awareness of threats within the communications infrastructure, and an implementation that dynamically routes communications along benign paths. Through a team that combines expertise across disciplines and sectors, this project will pursue this transformative capability and accelerate convergence on a new DoD 5G defense: restructuring communication paths to avoid adversary-controlled base stations, networks, and locations, thereby keeping DoD communications unobservable by the adversary.
This project proposes a system - Automated Verification of Internet Data-Paths (AVOID) - that creates this unprecedented capability through two deliverables that tackle two high-risk attack vectors for 5G communications. Deliverable 1 targets the potential for adversaries to control commercial base stations anywhere in the world, allowing them to subvert DoD communications at the point of entry into the wireless network. AVOID will recognize malicious and surveillance base stations and provide a mechanism for DoD devices to connect to specific benign base stations.
Deliverable 2 combats the ability of our adversaries to apply sophisticated and complex network analytics to any DoD communications that traverse networks or territory they control. AVOID will embed topologic and geographic awareness into a routing system and provide a mechanism for DoD's communications to avoid adversary-controlled territory across the global internet and provide safe paths to DoD-controlled networks. Combined, these deliverables will provide end-to-end adversary avoidance without requiring modification to existing applications or routers in DoD networks or cooperation by any third-party network.
The intellectual merit comes from addressing a persistently unsolved national security challenge which requires convergence across seven areas of expertise: 5G communication and network management; internet path analytics; overlay routing; operational network security; test and evaluation that targets DoD scenarios; technology transition; and professional project management. AVOID 5G will also broadly impact society. The deliverables complement the broader landscape of zero-trust architectures, secure 5G implementations, and ongoing obfuscation technique development. Government partners included in the team provide a channel for research and education outcomes, including cybersecurity workforce training.
This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the foundation's intellectual merit and broader impacts review criteria.
Awardee
Funding Goals
THE GOAL OF THIS FUNDING OPPORTUNITY, "NSF CONVERGENCE ACCELERATOR 2022 JOINT NSF/DOD PHASES 1 AND 2 FOR TRACK G: SECURELY OPERATING THROUGH 5G INFRASTRUCTURE", IS IDENTIFIED IN THE LINK: HTTPS://WWW.NSF.GOV/PUBLICATIONS/PUB_SUMM.JSP?ODS_KEY=NSF22538
Grant Program (CFDA)
Awarding Agency
Place of Performance
Baltimore,
Maryland
21218-2625
United States
Geographic Scope
Single Zip Code
The Johns Hopkins University was awarded
AVOID 5G: Automated Verification for Securing DoD Communications
Cooperative Agreement 2326928
worth $5,000,000
from in September 2023 with work to be completed primarily in Baltimore Maryland United States.
The grant
has a duration of 2 years and
was awarded through assistance program 47.084 NSF Technology, Innovation, and Partnerships.
The Cooperative Agreement was awarded through grant opportunity NSF Convergence Accelerator 2022 Joint NSF/DOD Phases 1 and 2 for Track G: Securely Operating Through 5G Infrastructure.
Status
(Complete)
Last Modified 1/14/25
Period of Performance
9/1/23
Start Date
8/31/25
End Date
Funding Split
$5.0M
Federal Obligation
$0.0
Non-Federal Obligation
$5.0M
Total Obligated
Activity Timeline
Subgrant Awards
Disclosed subgrants for 2326928
Transaction History
Modifications to 2326928
Additional Detail
Award ID FAIN
2326928
SAI Number
None
Award ID URI
SAI EXEMPT
Awardee Classifications
Private Institution Of Higher Education
Awarding Office
491502 INNOVATION AND TECHNOLOGY ECOSYSTEMS
Funding Office
491502 INNOVATION AND TECHNOLOGY ECOSYSTEMS
Awardee UEI
FTMTDMBR29C7
Awardee CAGE
5L406
Performance District
MD-07
Senators
Benjamin Cardin
Chris Van Hollen
Chris Van Hollen
Budget Funding
| Federal Account | Budget Subfunction | Object Class | Total | Percentage |
|---|---|---|---|---|
| Research and Related Activities, National Science Foundation (049-0100) | General science and basic research | Grants, subsidies, and contributions (41.0) | $2,999,999 | 100% |
Modified: 1/14/25