12.07.2015 Views

Core Avionics Master Plan - NAVAIR - U.S. Navy

Core Avionics Master Plan - NAVAIR - U.S. Navy

Core Avionics Master Plan - NAVAIR - U.S. Navy

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Core</strong> <strong>Avionics</strong> <strong>Master</strong> <strong>Plan</strong> 2011 Appendix A-42. Funded Enhancements and Potential Pursuits.Improved NATO Operations Coordination (Mode 5). (2013) Mode 5 developmenthas been performed jointly with NATO partners, enabling Coalition partners to deploythe capability together to enhance their warfighting coordination. It is also backwardcompatible with Mode 4, since integration may be more challenging or unaffordable forlegacy platforms. The Mode 5 waveform has less impact on ATC surveillance.Improved Civil Airspace Operations Coordination (ADS-B). (2016) Europeancoalition force platforms are under more pressure to configure their platforms for accessto civil airspaces comply because they have less airspace available for dedicatedmilitary operations. Platforms that get configured with ADS-B could use that functionalityfor PPLI reporting and would be capable of coordinating more efficient or direct civilairspace transit operations. Centralized CNS/ATM integration efforts already afford theframework for this capability, and could be leveraged to make US platforms moreinteroperable with their coalition allies and with civil operators.Improved Tactical Battlespace Operations Coordination (M5L2-B). (2018)Activating the M5L2-B capability already designed into the latest interrogators andtransceivers could increase SA and bring additional SIAP functionality for improvedcoordination between Coalition partner forces.E. Robustness and Security. Cooperative Surveillance robustness and securityaddress system vulnerability to exploitation. Robustness refers to strength of thesurveillance signals and architecture against spoofing or jamming, as well as the qualityof the positive identification functionality. Security refers to encryption and protection ofinformation across the spectrum of different classifications.1. Current capabilities.As previously stated, Mode 4 is still authorized for use. The NSA restriction limitsdevelopment or modifications of systems that only provide Mode 4. The Mode 5waveform has already been designed and will be deployed for shipboard and airborneapplications. It is more robust, which enables receivers to establish and maintain astronger signal lock to avoid spoofing and jamming. Mode 5 also utilizes an improvedencryption process with algorithms that encrypt both the interrogation and reply signals.2. Funded Enhancements and Potential Pursuits.NSA Compliant Security. (2011) As with Mode 4, NSA has decertified cryptoalgorithms associated with some legacy IFF key-loading equipment. Replacementalgorithms are being developed and certified to replace the decertified software.Enhanced IFF Keying (Mode 5). (2013) Integration of Mode 5 functionality willaddress security and keying support issues that are problematic with Mode 4, therebyenhancing system security. The Mode 5 Crypto Modernization effort will provideupgrades to the Electronic Key Management System (EKMS). Mode 5 does notupgrade EKMS, but EKMS upgrades are required to support MODE 5, including newkeying devices which enhance key loading capabilities, reduce key loading time, andeliminate problems with improperly keyed systems. All Mode 5 keying material will beelectronic. Mode 5 systems are also capable of storing multiple days of key informationand automatic selection of the Communications Security (COMSEC) validity interval,which eliminates issues with key rollover and encryption code change times.A-4 Cooperative Surveillance 13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!