Military Technology 03/2022

C4ISR Forum MT 3/2022 · 73 will need to transmit to the command post, data centre or to the cloud, which is where satellite communications and other point-to-point technologies come into play. Regardless of which network type a communicator selects, that technology must be deployed with security in mind. In addition, the user cannot assume that the transport will provide security. There is no ‘one-size-fits all’ solution for network security. For that reason, the classification level of the data required for a particular mission must be well understood. For example, when data is at a secret or higher classification level, CSfC or a Type 1–based encryption solution is required. Unfortunately, no cost-­ effective Type 1 encryption solutions for wireless communications are currently available. That means, in the majority of cases, for secret or higher data, CSfC is the best security approach for battlefield network designers. Information about the CSfC programme can be found on the NSA CSfC website. To speed and simplify development and deployment, information about previously approved devices is available on the aptly named CSfC Components List. Battlefield network designers should keep in mind that a solution’s inclusion on the CSfC Components List does not guarantee compatibility with other devices on the list. It is best to seek vendors with solutions that are both well-known and proven. Also, CSfC, for all its many benefits, does impart an additional degree of configuration and deployment complexity, which can make it difficult to use without extensive training in multiple vendors and technology domains. An example of an NSA approved secure wireless solution for teams that need tactical deployment is provided by Curtiss-Wright’s PacStar Secure Tactical Command Post Kit, which is powered by Cisco routing and encryption, paired with either Aruba wireless, 4G or 5G wireless transports. These solutions are field proven to work well together, and are extensible to enable coverage of the entire combat area. To ease the configuration and management of CSfC encrypted battlefield networks, Curtiss-Wright’s PacStar Secure Wireless Command Post uses PacStar IQ-Core Software, a powerful configuration, management, and monitoring tool with a simple, unified interface. The wireless technology options available to battlefield network designers are continually expanding and improving, both in terms of bandwidth and security. Communicators must understand the specific requirements of their application and the types of data they will need to protect. They may also find that, counter-intuitively, the newest and most exciting new wireless technology might not be the best solution for their needs. For example, be it ever so humble, Wi-Fi may still beat out 5G cellular, with all of the promotion and momentum behind it, as a the right choice for many situations. and operate. Once set up, the broadcast range of a cellular network will still be comparatively small, unless the antenna can be sufficiently elevated and it can be connected to heavy, power hungry amplifiers. Another wireless technology frequently considered by modern battlefield communicators is the software-defined MANET-capable radio. MANET is the modern descendant of the hand-held radio, and offers great promise for interconnecting the entire battlefield. There are, however, trade-offs that need to be considered when selecting a solution. The first consideration is interoperability. Although a number of high-­ performance waveforms (the software portion of these software-defined radios, or SDR) are available, only a limited number of radios on the market can run more than the preferred waveform of that radio’s manufacturer. In practice, this leaves communicators with two less than ideal options. Either select the radio hardware based that best fits the application’s requirements and settle for the particular waveform provided for that radio, or select the waveform with the best characteristics to meet application requirements and settle for the vendor hardware solution associated with that waveform. Another issue with MANET radios lies in the ad-hoc nature of the network topology they create. Most vendors are very adept at creating a path for data, but users must be aware that certain formations may generate networks with many hops between devices, drastically reducing the performance. It is also possible to inadvertently create ‘network islands,’ if and when groups or individual radios travel outside the range of the network mesh. When correctly planned and supported with adequate nodes, MANET technologies hold great potential for enabling data networks using radios that soldiers would likely already be carrying. The third major class of wireless technology, Wi-Fi, is one that is all too often quickly dismissed as insecure. But Wi-Fi has evolved tremedosuly over the years. Simply put, today’s Wi-Fi is not the network of earlier generations. Advances in security, such as WIDS (Wireless Intrusion Detection), AES encryption, and WPA3 authentication, now make the transport level security of Wi-Fi comparable to that of commercial cellular and non-Type-1 encrypted radio transports. Additionally, Wi-Fi 6 (formerly 802.11ax) supports transmission on 2.4GHz, 5GHz, and 6GHz frequencies, with a theoretical bandwidth of 9.6Gbps, all while using lowcost and ubiquitous hardware. Moreover, modern Wi-Fi networks can operate in both a planned architecture with a wired or wireless backhaul, or in an ad-hoc mesh. While the meshing ability of a Wi-Fi network is not as dynamic or flexible as that of dedicated MANET radios, it is a capability that enhances deployment flexibility. In comparison to cellular, MANET, and Wi-Fi wireless technologies, alternative technologies such as SATCOM, and services like Starlink, are best thought of as a backhaul solution, and not an end-user device access technology. The aperture size and power required to communicate with a satellite are too demanding today for small wireless devices such as smartphones. Still, after you build a network on the battlefield, it Advanced secure wireless communications systems allow the warfighter to move beyond one-way voice communication. (All photos courtesy Curtiss-Wright Defense Solutions) f The NSA’s Commercial Solutions for Classified Mobile Access Capability Package allows for rapid deployment of 4G/5G communications.

RkJQdWJsaXNoZXIy MTM5Mjg=