Joint Tactical Network Test Environment

Total Page:16

File Type:pdf, Size:1020Kb

Joint Tactical Network Test Environment Joint Tactical Network Test Environment Networks of Networks Roger Fate NewTec Engineering – WSMR January 2012 JTNTE Compliance • Net-Centric Operations and Warfare • Vice Chief of Staff of the Army’s directive in the integration or combine tests for the purpose to field warfighting capabilities ensuring system of systems are interoperable before fielding to the Warfighter • Augment ATEC’s chartered to plan and execute rigorous and robust integrated Network T&E to provide recommendations to Milestone Decision Authorities (MDA) • GIG Key Interface Profiles • DoD Mandated Net Ready Key Performance Parameter (KPP) • WSMR IA US Army White Sands Missile Range 2 JTNTE Purpose • Provide Persistent Joint Tactical Network to Range Customers for T&E and Training • Provide Exercise Common Operating Picture or Data Transport (anywhere there is a TSN, DREN or SDREN Drop) • Provide Customers with unique needs during T&E or training US Army White Sands Missile Range 3 Requirements Gathering • SoSI Network Integration Evaluation • 1st Armored Division • BCT LUT 1 & 2 Testing Requirements • 49th Fighter Test Wing UAV • TRIAD Regional COP Working Group – WSMR, Holloman AFB, Ft. Bliss • IM Directorate TSN-IP Network and IA Requirements US Army White Sands Missile Range 4 JTNTE Network Diagram US Army White Sands Missile Range 5 WSMR Mobile and Lab Facilities US Army White Sands Missile Range 6 JTNTE Mobile Platform • Purpose – Establish persistent tactical networks in the way they are intended to be used by the Warfighter – Extend the Line of Site for systems being used and provide Last Mile connection to the TSN – Provide tactical network node for: • Link 16 • Blue Force Tracker 1 with KGV-72 (BFT1) • Enhanced Position Location Reporting System (EPLRS) • Joint Tactical Radio System with SRW (JTRS) • Remote Operations Video Enhanced Receiver 4 (ROVER) • Tactical Point to Point Ethernet Radio US Army White Sands Missile Range 7 Link 16 • Military tactical data exchange network • Military aircraft, ground forces and ships may exchange tactical pictures and messaging in near-real-time • TDMA-based secure, jam-resistant high speed data link • Frequency band 960-1215 MHz (LOS) • Mil-STD-6016 data structure • Used on at least 20 different platforms (e.g. F-15, F-16, F-18, F-22, A-10, AWACs, Bombers, tankers, Patriot, THAAD, AD/BDE TOCs) US Army White Sands Missile Range 8 Link 16 Multifunctional Information Distribution System MIDS Low Volume Terminal (LVT2) Air Defense Systems Integrator Quad Element Omni Antenna US Army White Sands Missile Range 9 Enhanced Position Location Reporting System (EPLRS) • Enhance battle space situational awareness fratricide prevention - allows weapons platforms to see where other EPLRS are located – Limited BFT units for SA and some C2, Key Leaders in the EPLRS AOI • TDMA-based secure, jam resistant, computer controlled communications network that distributes near real-time tactical information • Provides platform position information independent of Global Position System (GPS) operating at 420-450 MHz (terrestrial LOS only) • Provide a self-forming, self-healing network • Provides terrestrial connectivity for FBCB2 and a joint link to Marines and Air Force US Army White Sands Missile Range 10 EPLRS FBCB2 V5 EPLRS with ENM Defense Advance GPS Receiver (DAGR) EPLRS/RT-1720G/URO US Army White Sands Missile Range 11 Blue Force Tracker (BFT) • Enhance battle space situational awareness • Two modes of BLOS operation/communication: One-way or Two-way • Two types of systems deployed (BFT 1 and BFT 2) • BFT 1 can now send Type 1 encryption data (KGV-72 being tested during NIE) • Uses either SATCOM or military satellites (BLOS) • Prevent fratricide, track valuable military assets, provide emergency communication, and allow search and rescue forces to quickly locate, identify, and communicate with at-risk personnel • Provide SA and limited C2 form designated Key Leaders to EPLRS within an Area of Interest (AOI) US Army White Sands Missile Range 12 BFT FBCB2 V5 MT-2011F Satellite Transceiver KGV-72 Defense Advance GPS Receiver (DAGR) US Army White Sands Missile Range 13 FBCB2 Display US Army White Sands Missile Range 14 Joint Tactical Radio System (JTRS) PRC-117(G) W/PA & VVA (30 to 2000 MHz) AN/PRC-154 Rifleman Radio/ Soldier Radio Waveform (SRW) (225 MHz to 470 MHz) US Army White Sands Missile Range 15 Joint Tactical Radio (PRC-117G) • 30 MHz to 2 GHz frequency range • SINCGARS frequency hopping ECCM • 1.2 MHz and 5 MHz wideband channel • Havequick I/II frequency hopping bandwidths ECCM • JTRS SCA v2.2 operating environment • UHF SATCOM, MIL-STD-188-181B • Adaptive Networking Wideband — JITC Certified Waveform (ANW2) • UHF DAMA, MIL-STD-188-182A • Solider Radio Waveform - Certified (5 kHz) — JITC Certified • In-line network encryption • UHF DAMA, MIL-STD-188-183A • Narrowband AM/FM, 10 watts output (25 kHz) — JITC Certified power • High Performance Waveform (HPW) • SATCOM 20 watts output power • Sierra II Programmable Cryptographic • Wideband 20 W / 50 W with Power Module Amp • Internal VINSON, ANDVT/KYV-5, • Rover L-Band receive KG84C encryption • DS-101 and DS-102 keyfill modes US Army White Sands Missile Range 16 Remote Operations Video Enhanced Receiver (ROVER) US Army White Sands Missile Range 17 ROVER 4 Operating Parameters • C-band Digital • L-band Analog – 5.25 GHz to 5.85 GHz, 1.0 MHz steps – 1.71 GHz to 1.85 GHz, 0.5 MHz steps – 455 Kbps, FSK – FM Demodulation – H.261 Video – NTSC / RS-170 Vide • C-band Digital (466 kbps with • Ku-band Digital RS/Viterbi) – 14.4 GHz to 15.35 GHz, 5.0 MHz steps – 4.40 GHz to 5.85 GHz, 1.0 MHz steps – 10.71 Mbps, OQPSK – 466 kbps, FSK – 3.2 Mbps, OQPSK – Reed-Solomon/Viterbi FEC – 2.0 Mbps, BPSK – MPEG-4 video – 1.6 Mbps, OQPSK • S-band Analog – MPEG-4 / MPEG-2 Video – Receive CDL Rev F Annex B – 2.30 GHz to 2.5 GHz, 1.0 MHz steps – FM Demodulation – NTSC / RS-170 Video US Army White Sands Missile Range 18 Harris 7800 IP Pont-t-Point Radio • IEEE 802.16-Based Technology • 4.4 GHz – 5.0 GHz (Licensed Band) • Designed for IP traffic • Adjustable TX power up to 100mW • 1 MHz channel spacing step size • PtP Channel Width: 10, 20, 40 MHz, • Low Latency: 4 ms PtP • Automatic adjustment of throughput based on link conditions • FIPS 140-2, Level 2 Certified US Army White Sands Missile Range 19 Test Cases NIE 11.2 & 12.1: Air Picture Over JREAP C & RF LINK-16 ATC RADARS Link-16 RF RF Bldg 1554 BDE TOC MIDS x.25 3750 G MIDS x.25 ADSI 3750 G Bldg 2/1 AD 335 KABIC ADAM Cell w/ADSI / MIDS Data Fusion AMDWS /FAAD EO/ TAIS TASNTSN ADSI US Army White Sands Missile Range 20 ADSI Air Picture of ATC Radars US Army White Sands Missile Range 21 Test Cases NIE 11.2 & 12.1: Air Picture Over Remote RF LINK-16 ATC RADARS Link-16 Remote TX at R-455 FSTE TCP/IP MIDS MIDS 3750 G NIE BDE TOC X.25 SENTINEL TCP/IP 2/1 AD Bldg ADAM Cell w/ADSI / MIDS 335 KABIC AMDWS /FAAD EO/ TAIS Data Fusion TASNTSN Bldg TCP/IP 1554 ADSI 3750 G ADSI US Army White Sands Missile Range 22 Test Cases NIE 12.2 ATC & BFT Picture Over Link 16 NIE FBCB2/BFT/L-band Equipped Platforms ATC Link-16 RADARS RF RF Bldg MIDS NIE BDE TOC 1554 X.25 MIDS 3750 G X.25 SENTINEL ADSI 3750 G Bldg JREAP (TCP/IP) 335 ASTERIX KABIC 2/1 AD Data Fusion ADAM Cell w/ADSI / MIDS AMDWS /FAAD EO/ TAIS TASNTSN ADSI US Army White Sands Missile Range 23 .
Recommended publications
  • An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext
    An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext By Isaac Quinn DuPont A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Faculty of Information University of Toronto © Copyright by Isaac Quinn DuPont 2017 ii An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext Isaac Quinn DuPont Doctor of Philosophy Faculty of Information University of Toronto 2017 Abstract Tis dissertation is an archeological study of cryptography. It questions the validity of thinking about cryptography in familiar, instrumentalist terms, and instead reveals the ways that cryptography can been understood as writing, media, and computation. In this dissertation, I ofer a critique of the prevailing views of cryptography by tracing a number of long overlooked themes in its history, including the development of artifcial languages, machine translation, media, code, notation, silence, and order. Using an archeological method, I detail historical conditions of possibility and the technical a priori of cryptography. Te conditions of possibility are explored in three parts, where I rhetorically rewrite the conventional terms of art, namely, plaintext, encryption, and ciphertext. I argue that plaintext has historically been understood as kind of inscription or form of writing, and has been associated with the development of artifcial languages, and used to analyze and investigate the natural world. I argue that the technical a priori of plaintext, encryption, and ciphertext is constitutive of the syntactic iii and semantic properties detailed in Nelson Goodman’s theory of notation, as described in his Languages of Art. I argue that encryption (and its reverse, decryption) are deterministic modes of transcription, which have historically been thought of as the medium between plaintext and ciphertext.
    [Show full text]
  • I Islander Readers I Say the Damdest I Things... 7A ARTS » LEISURE: Life's
    mm ARTS » LEISURE: EVERY WEEK: i Islander readers Life's a beach 1B Calendar 27A I say the damdest Ostrich eggs, . Classifieds 18C i things... 7A anyone? 4B Island map 25A 1961-1986 Still first after 25 years VOL. 26, NO. 13 TUESDAY, MARCH 3>, 1987 THREE SECTIONS, 76 PAGES 50 CENTS Who's the wiser? Michael Welngart, staff member at Care and ed howl back in Its nest on Captiva last weekend. The strong winds last week. Story on page 1C. Photo by Rehabilitation of Wildlife, placed this baby great horn- owl was one of two that was blown from the nest by Rlcki Kosakow Cooper. INDEX2 •-,•.•. ALSO THIS WEEK How do you Executive women Westall isn't discouraged Arts-Leisure 4B organize new chapter when osprey parents Brldae 13B combine computers Club news 14B with seashells? of service club on Sanibel vent their indignation Fishing tips 10C Long-time Island, shellers President Kappy King Cole in- In his first osprey chick banding Nature programs 3C Margaret Thorsen and Ede vites interested Island business expedition of the season, Mark Obituary 15A Mugridge have found a way - and women to learn more about the "Bird" Westall suffered minor in- juries to his arm when an angry Police beat 4A their efforts will benefit the Sanibel fledgling Sanibel-Captiva Zonta Club. osprey mother dove at him. Shelling tips 11C Shell Museum and Research Foundation. 23B 10A The ISLANDER Tuesday, March 31, 1987 3A City hopes to gain endorsement of Realtors Tuesday for sales tax to help purchase sensitive wetlands 2A Island Shorts March 31,1987 By BARBARA BRUNDAGE directors, as do city councilmen, view a recreational facilities would not be inherent obligation and responsibility Islander staff writer real estate transaction tax as the most included.
    [Show full text]
  • Model 90Si Secure Fax Gateway User's Guide
    Model 90si Secure Fax Gateway User's Guide GateWay Fax Systems, Inc. Secure Fax Products Virginia, USA Tel: 804-796-1900 Toll-Free: 877-951-9800 Fax: 804-796-1116 E-Mail: [email protected] Web: www.gwfs.com Help Line: 877-951-9814 Revision 4.7 3/27/2013 GateWay Fax Systems, inc. Model 90si Secure Fax Gateway User's Guide 90si Quick Reference Guide Your 90si comes from the factory set for the Secure Only mode, whereby the commercial (COTS) fax connects to the 90si’s FAX jack (the other two phone jacks remain empty) and the 90si’s RS-232 Data cable connects to the Secure Data port of your crypto device. In this configuration the COTS fax can only be used for classified transac- tions with the crypto in Secure Data Mode. Connecting the COTS fax, 90si and Crypto This diagram shows the default (and recommended) factory configuration for the 90si. Shown are the rear panel of the 90si, Secure Telephone, Commercial-Off-The-Shelf (COTS) fax and the outside telepone line connection. Although there are other 90si configurations, this one will work right out of the box. See Section 2.3, Choose a Configuration, for others. 90si Secure Fax Gateway Rear Panel FAX Commercial-Off-The-Shelf Fax Machine 5VDC Power LINE (Set to Auto-Answer on 1 Ring) Supply "Red" Data Port "Secure" Secure Telephone PSTN Phone Line / Crypto (Set to Async 9.6kbps) Telephone Wall Jack Transmitting a Secure Fax Step Procedure 1. Place a call on your secure telephone / crypto. 2. Place it in secure data mode and set the handset on the table 3.
    [Show full text]
  • Telephone Security Group-Approved Equipment
    TELEPHONE SECURITY GROUP APPROVED EQUIPMENT TELEPHONE SECURITY GUIDE TSG STANDARD 6 June 2006 PREFACE This standard was prepared by the National Telecommunications Security Working Group (NTSWG). The members of the NTSWG are: Department of the Air Force, Department of the Army, Central Intelligence Agency, Center for Security Evaluation, Defense Intelligence Agency, Defense Threat Reduction Agency, Department of Energy, Department of Justice, Department of the Navy, Department of State, Department of Transportation, Department of the Treasury, Federal Bureau of Investigation, Federal Communications Commission, Joint Chiefs of Staff, National Aeronautics and Space Administration, National Reconnaissance Office, National Security Agency, Office of the Secretary of Defense, United States Marine Corps, United States Secret Service, and White House Communications Agency. Members are also provided by industry on a non-voting but participatory representation. The NTSWG is the primary technical and policy resource of the Federal Government for all aspects of the technical security program involving telephone systems. The Telephone Security Guides (TSG) Standards contain guidance for providing on-hook security to telephone systems in areas where sensitive government information is discussed. Implementation of TSG standards neither prevents the application of more stringent requirements nor satisfies the requirements of other security programs such as TEMPEST, COMSEC, or OPSEC. TSG Standard 1 is an introduction to telephone security that provides general information about the TSG standards. This edition has been revised to make finding items easier. It is divided into 2 major sections, items currently being manufactured and items no longer being made. All approved items will remain in this Standard since old hardware is still in use and the Approved status of an item can be verified by referring to this Standard.
    [Show full text]
  • A General Taxonomy for Cryptographic Assets
    bravenewcoin.com Table of contents 3 About 4 Foreword 5 Author Profile 6 General Taxonomy: An Overview 7 General Taxonomy Structure 8 Section I: Cryptographic Assets – The new ‘Superclass’ 14 Section II: General Taxonomy Key Metrics for General Crypto Assets 19 Section III: General Taxonomy for Cryptographic Assets Visualization 24 References 25 Contact About Brave New Coin Brave New Coin’s mission is to be the leader in delivering the most accurate, accessible, and comprehensive blockchain data solutions and insights, in ways that anticipate and respond to the needs of an evolving market. BNC is committed to providing the type of trusted information, technical analysis and research that will empower and inform stakeholders across the cryptographic asset marketplace. To that end, The General Taxonomy for Cryptographic Assets has been curated to deliver on the goal of a comprehensive asset classification system which provides a common frame-of-reference for all sector participants. Foreword Today the cryptographic asset sector’s market capitalization is in the hundreds of billions, with a rapidly evolving user community. Since establishing Brave New Coin in 2014 it has been our goal to provide the data, tools and insights needed to support this market as it matures into a dominant asset class. BNC has created the General Taxonomy in response to community requests for greater sector transparency and a uniform classification system for the ever-expanding universe of cryptographic assets. Its intended audience is: Asset Managers Regulators Product Owners Researchers Developers Industry Executives At BNC we want to support an engaged user community and we encourage you to explore, share and utilize the General Taxonomy you see fit.* Finally, I want to add that this document is just the beginning and we welcome your feedback on how we can continue to improve the taxonomy and its relevance to you and your industry sector.
    [Show full text]
  • Multiconnect® Rcell 100 Series MTR-H5 Router User Guide
    MultiConnect® rCell 100 MTR-H5 User Guide MULTICONNECT® RCELL 100 SERIES ROUTER USER GUIDE MultiConnect® rCell 100 Series Router User Guide Model: MTR-H5 Part Number: S000566 Version: 4.0 Copyright This publication may not be reproduced, in whole or in part, without the specific and express prior written permission signed by an executive officer of Multi-Tech Systems, Inc. All rights reserved. Copyright © 2018 by Multi-Tech Systems, Inc. Multi-Tech Systems, Inc. makes no representations or warranties, whether express, implied or by estoppels, with respect to the content, information, material and recommendations herein and specifically disclaims any implied warranties of merchantability, fitness for any particular purpose and non- infringement. Multi-Tech Systems, Inc. reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of Multi-Tech Systems, Inc. to notify any person or organization of such revisions or changes. Legal Notices The MultiTech products are not designed, manufactured or intended for use, and should not be used, or sold or re-sold for use, in connection with applications requiring fail-safe performance or in applications where the failure of the products would reasonably be expected to result in personal injury or death, significant property damage, or serious physical or environmental damage. Examples of such use include life support machines or other life preserving medical devices or systems, air traffic control or aircraft navigation or communications systems, control equipment for nuclear facilities, or missile, nuclear, biological or chemical weapons or other military applications (“Restricted Applications”). Use of the products in such Restricted Applications is at the user’s sole risk and liability.
    [Show full text]
  • Plaintext, Encryption, Ciphertext: a History of Cryptography and Its Influence on Contemporary Society
    TOC PLAINTEXT, ENCRYPTION, CIPHERTEXT: A HISTORY OF CRYPTOGRAPHY AND ITS INFLUENCE ON CONTEMPORARY SOCIETY QUINN DUPONT PHD DISSERTATION UNIVERSITY OF TORONTO, FACULTY OF INFORMATION CHAPTER 1 “REPRESENTATION” – SUBMISSION TO SIGCIS 2015 DRAFT (PLEASE DO NOT DISTRIBUTE) 1 TOC TABLE OF CONTENTS 1.! Introduction i.! Philological complexity ii.! What do we know of cryptography? iii.! Rewriting three schemata iv.! Chapter summaries Part One: Plaintext 2.! Representation i.! Alberti’s notation ii.! Mimesis and media iii.! Ancient theories of mimesis i.! Plato’s theory of mimesis ii.! Aristotle’s theory of mimesis iv.! Late medieval and renaissance web of resemblances v.! Conventia in memory techniques from Lull to Alberti’s cipher wheel vi.! Aemulatio, analogy, and sympathy in Trithemius’ magical cryptography 3.! Media and notation i.! Francis Bacon’s artifcial languages (1605-1623) i.! Francis Bacon’s bi-literal cipher ii.! Te development of notational schemes (1605-1686) iii.! Notational discourse networks i.! Identity and the alphabet ii.! A theory of notation 4.! Codes and codeworks i.! Agrippa (a book of the dead) i.! Forensic description of Agrippa ii.! Te compiled binary iii.! Te cryptographic algorithm 1.! Encryption efect 2.! Te “self-destruct” mechanism ii.! Bitcoin iii.! Executable software Part Two: Encryption 5.! Media of perception 6.! Communication and transmission 7.! Translation and Transcription 2 TOC Part Tree: Ciphertext 8.! Otherness and order, revealed 9.! Silence 10.! Epilogue i.! Politics: Homogeneity and visibility ii.! Rise of mnenotechnologies iii.! Ubiquitous cryptography 3 PART 1 – PLAINTEXT CHAPTER 2 – REPRESENTATION PLAINTEXT In his seminal work on cryptography De componendis cifris,1 Leon Battista Alberti (1404-1472) diverts from his task of exploring and inventing cryptography systems to recall a time strolling through a garden with his friend Dati.
    [Show full text]
  • U.S. Government Publishing Office Style Manual
    Style Manual An official guide to the form and style of Federal Government publishing | 2016 Keeping America Informed | OFFICIAL | DIGITAL | SECURE [email protected] Production and Distribution Notes This publication was typeset electronically using Helvetica and Minion Pro typefaces. It was printed using vegetable oil-based ink on recycled paper containing 30% post consumer waste. The GPO Style Manual will be distributed to libraries in the Federal Depository Library Program. To find a depository library near you, please go to the Federal depository library directory at http://catalog.gpo.gov/fdlpdir/public.jsp. The electronic text of this publication is available for public use free of charge at https://www.govinfo.gov/gpo-style-manual. Library of Congress Cataloging-in-Publication Data Names: United States. Government Publishing Office, author. Title: Style manual : an official guide to the form and style of federal government publications / U.S. Government Publishing Office. Other titles: Official guide to the form and style of federal government publications | Also known as: GPO style manual Description: 2016; official U.S. Government edition. | Washington, DC : U.S. Government Publishing Office, 2016. | Includes index. Identifiers: LCCN 2016055634| ISBN 9780160936029 (cloth) | ISBN 0160936020 (cloth) | ISBN 9780160936012 (paper) | ISBN 0160936012 (paper) Subjects: LCSH: Printing—United States—Style manuals. | Printing, Public—United States—Handbooks, manuals, etc. | Publishers and publishing—United States—Handbooks, manuals, etc. | Authorship—Style manuals. | Editing—Handbooks, manuals, etc. Classification: LCC Z253 .U58 2016 | DDC 808/.02—dc23 | SUDOC GP 1.23/4:ST 9/2016 LC record available at https://lccn.loc.gov/2016055634 Use of ISBN Prefix This is the official U.S.
    [Show full text]
  • Secure Enhanced Reactive Routing Protocol for Manet Using Two Fish Algorithm
    International Journal of Engineering &Technology, 7 (3.12) (2018) 621-626 International Journal of Engineering & Technology Website: www.sciencepubco.com/index.php/IJET Research paper Secure Enhanced Reactive Routing Protocol for Manet Using Two Fish Algorithm M.Deepa1, P. Krishna Priya2 1Ph.D Scholar, 2Director, 1,2Department of Computer Applications, Coimbatore Institute of Management and Technology, Tamil Nadu, India. *Corresponding Author Email: [email protected] Abstract In Mobile Adhoc Network (MANET) implementing a secure communication is a critical task due to its nature of wireless, infrastructureless, arbitrary network. Its not organized by any centralized control. Each node in this network acts as a router. Routing plays a major role in the network data transmission. Various protocols exist for the purpose of routing process. On Demand routing is a category of routing protocol were routes are obtained only on demand. AODV is one of the efficient on demand routing protocol. In this work an enhanced protocol with security features, the Secure AODV- ESB (Secure Adhoc On Demand Distance Vector based on Energy level and Signal Strength Implementing Bayesian Probability) has been proposed for Mobile Adhoc Network. Its is an extension of the previous work AODV – ESB protocol, which is a modification of the existing AODV protocol. The AODV protocol works on two phases. The route discovery process and route maintenance phase. Major problem faced by AODV was the frequent route break caused by the dynamic mobile nature of the Mobile Adhoc network, which leads to frequent route discovery process. To avoid frequent route break AODV-ESB routing protocol was proposed, it adopts the energy level and Signal strength as parameters for the route selection for transmission of data.
    [Show full text]
  • OMNI and Omnixi
    SPECIFICATIONS OMNI and OMNIxi The OMNI™ Secure Terminal provides PHYSICAL CHARACTERISTICS SECURE DATA APPLICATION Type-1 security for both voice and data Size: 5.1”W x 6.2” D x 1.9”H (12.9cm x 15.7cm x 4.8cm) FNBDT Data Rates (OMNI) Weight: 1.5 lbs (0.7kg) • Synchronous Secure Data Up to 28.8 Kbps communications in a versatile narrow • Asynchronous Secure Data Up to 33.6 Kbps band encryption solution to address desktop ERFORMANCE HARACTERISTICS • Asynchronous Secure Data Up to 56 Kbps when P C other end is attached to a secure digital link and portable wire-line user requirements. Security Features: FNBDT Data Rates (OMNIxi) • Type I Embedded Cryptography: • Synchronous Secure Data Up to 15 Mbps - SBU to Top Secret SCI • Asynchronous Secure Data Up to 128 Kbps • Secure Access Control System (SACS): Windows™ 95, 98, 2000, NT compatible - Access Control List (ACL)[100 Entries] FEATURES OMNI™ PRODUCT DESCRIPTION - Maximum and Minimum Security Levels SPECIAL FEATURES OMNI™ adds NSA certified • Alphanumeric Display for Identification and Authentication • NSA Type 1 Certified • TEMPEST Compliant: NSTISSAM TEMPEST 1/92 User Communities: Type-1 security to any • Telephone Security: TSG-5 • U.S. National • CCEB Countries • Canadian National • NATO Member Nations standard analog telephone, • Key Management: • FNBDT Interoperable personal computer, or secure - SDNS ReKey using FNBDT Signaling • UK National • Coalition User Communities - 4 Level Key Set Support • Australian National fax machine. The OMNI™ - National • CCEB • NATO • Coalition • New Zealand National • Secure Voice, Data and offers toll quality secure • Selectable OMNI™ Modes: Voice Encoders: Fax over PSTN voice as well as secure data - Traditional • MELP @ 2.4Kbps communications using an - Autosecure on Receive • G.729D@ 6.4Kbps - Unattended • High Quality Voice integral V.90 capable modem.
    [Show full text]
  • An/Prc-150(C) Operator Reference Guide
    PUBLICATION NUMBER: 10515-0103-4001 AUGUST 2007 Rev. D R AN/PRC-150(C) OPERATOR REFERENCE GUIDE "The material contained herein is subject to U.S. export approval. No export or re-export is permitted without written approval from the U.S. Department of State." TABLE OF CONTENTS Subject Page BASIC PROGRAMMINIG PROCEDURES 3 COMSEC LOADING PROCEDURES 10 AUTOMATIC LINK ESTABLISHMENT (ALE) 2G 24 THIRD GENERATION (ALE) 3G 29 TACTICAL CHAT 39 TIME-OF-DAY (TOD) SYNC 51 LAST DITCH VOICE OPERATION 59 PRC-150(C) WITH KY-100 AIRTERM AN/ARC-220 61 CABLES AND CONNECTORS 66 HF COMMUNICATIONS GUIDE 70 ANTENNA SECTION 76 BITE FAULT CODE LISTINGS 98 RECOMMENDED METHOD FOR CCI SHIPMENTS TO HARRIS 114 1 AN/PRC-150(C) 2 BASIC PROGRAMMING PROCEDURES PURPOSE - This is a sequential guide and items should be programmed in the order presented as they apply to the operational scenario. While navigating through the radio menu structure, the Left/Right arrow keys on the KDU keypad are used to select the item to be programmed, and the Up/Down arrow keys are used to scroll through the available parameters for each item. Default settings on a zeroized radio for each item are shown in bold where applicable. SELECTING RADIO MODE FIX/ALE/HOP/3G/3G+ MODE: Press #3/MODE button on KDU until desired mode is displayed and press ENT or wait and the radio will automatically enter selected mode. 3 PLAIN/CIPHER TEXT (PT/CC/CT) OPERATION Rotate function switch to desired position. PROGRAM RADIO SETTINGS 1. Press PGM, Select CONFIG, RADIO.
    [Show full text]
  • Enhanced Key Cryptography Protective Technique in Wireless Sensor Networks
    INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 9, ISSUE 11, NOVEMBER 2020 ISSN 2277-8616 Enhanced Key Cryptography Protective Technique In Wireless Sensor Networks Dr.J.R.Arunkumar, Mr.Amanuel Bahiru Abstract: In emerging trends of networks, wireless Sensor Networks is playing vital role for data communication and transmission. In that communication different types of attacks are notices during data transfer from sink to another node as well as sink node to base station. However different type of security needs and required for message and data transfer. Even single key encryption is not enough to secure the above statement give. This is the issue forced to design the efficient protective technique in order to secure the data. This paper describes some study about the basic key cryptographic protective technique in wireless sensor networks. The security of WSN plays a vital role in the WSN, as sink node often store important information with base station but these base station may be unsafe. The main issue of sensor storage is to secure the data. Many of the security algorithms are available in the Sensor networks environment. This proposed algorithm is also to ensure the data key generation very important. In this proposed method Cryptographic table is used to generate key and perform several versatile operation used to secure the data in WSN. Finally, this paper show of the proposed scheme is investigated from the characteristics of computational effectiveness, storing condition and communication cost, and its protective techniques used to protect WSNs is discussed under different attack. Index Terms: Wireless Sensor Networks, Security, Sensor nodes, security algorithm and protective techniques —————————— —————————— 1.
    [Show full text]