Download Secure Communications: A Global Challenge

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Secure Communications:
A Global Challenge
2014 Financial data
Sales
Backlog
928
International 89%
National 11%
1,530
International 96%
National 4%
Figures shown in Mill. €
Global presence…
The perfect size to work
everywhere
Who we are
is an international technological company that operates in the field of engineering,
providing “turnkey” solutions for communications and control systems, with specific
products based on proprietary technology for the aviation, maritime, rail, energy,
environmental, security and defence industries.
is the leading company in Spain within the field of critical communications protection
with over 20 years of experience designing and manufacturing Encryption Systems for
the Spanish Administration
Core Capabilities
What we do
Leading Solutions
for:
Secure Communication
Communications
Software Defined
Jammers
Energy Tactical
Power Generators
Mobile and
Deployable
Systems
Command, Control and
Communications Systems
Avionics and
Vetronics
Secure Coms a Global
Challenge
Securing your critical networks
Introduction
• 
Experiences from recent wars against nations and global terrorism have identified a need for
a much higher degree of information sharing and joint decision making among agencies.
• 
Meeting this need means increase in computing and communications capacities and the
replacement of current stove-piped information systems and networks by an integrated
infrastructure and service creation environment .
• 
The tremendous success of the Internet and web in providing an integrated environment in
the commercial arena have pushed governments to create Greater Information Grids to
enable net-centric operations and warfare.
• 
However, a number of technical challenges need to be addressed. EPICOM is contributing to
this effort and will play its role in helping governments and industries to find solutions to
these challenges.
All rights reserved. Distribution and copying of this document, use and communication of its content is not permitted without written authorization from DF EPICOM
8 New Global Scenarios
• 
Commercial world has seen the explosion of the Internet and intranet to supplement
ubiquitous telephony services as well as a major explosion in wireless telephony. We are
now also looking at the beginnings of the convergence of voice, data, and video services on
both wired and wireless networks.
• 
The governments and intelligence communities have not benefited fully from these
advances, from infrastructure integration, or from the new information sharing paradigm. As
their networks and information systems are stovepiped and have little interoperability.
• 
There are also critical bottlenecks in tactical networks, and the information sharing
philosophy is based on “need to know” rather than “need to share.”
• 
While the last experiences during recent wars against global terrorism have shown that the
ability to receive superior intelligence from multiple sources and media, to move
information rapidly, and to carry out joint missions easily has had a major force
multiplier effect. However, as mentioned above, these capabilities do not exist ubiquitously,
and experiences have also exposed vulnerabilities, bandwidth bottlenecks and problemes in
stovepiped communication infrastructures.
All rights reserved. Distribution and copying of this document, use and communication of its content is not permitted without written authorization from DF EPICOM
9 New Challenges
Challenges arise from several dimensions:
• 
A much stronger focus on the mission and more dynamic missions.
• 
An operational model that has elements of the public Internet as well as those of a large
Enterprise intranet with more demanding and more diverse requirements from applications .
• 
New requirements on relative precedence based on user and mission identities
• 
The much higher importance of security in military Communication
• 
A much higher fraction of users with wireless access
• 
The significantly higher use of satellite communication and the first use of satellites with
routers onboard
• 
More widely varying (spatially and temporally) RF conditions, which make the basic resource
itself unpredictable
• 
A much larger fraction of communication over mobile ad hoc networks, which have not
matured in commercial networking
• 
A much higher degree of infrastructure mobility, in addition to user mobility
10 All rights reserved. Distribution and copying of this document, use and communication of its content is not permitted without written authorization from DF EPICOM
Security and INTEROPERABILITY
• 
In this environment, security considerations add new requirements on routing protocols. In
particular, one must be able to authenticate route advertisements and protect against node
spoofing, node compromises, etc. Finally, the need to encrypt user data as well as original IP
headers, and the desire to limit the information passing from plain text to cipher text and cipher
text to plain text, create major new challenges in designing efficient routing protocols.
• 
Finally the new environment also needs higher diversity and survivability than commercial
counterparts and thus creates challenges for the interoperability:
• 
Due different implementations of IP-based IPSec ciphers, the NC3O has determined the
communication and security specifications for multinational/coalition interoperability of IP
security for NNEC IP services, this was referred to as the NII IP Network Encryptor (NINE).
• 
EPICOM is actively involved in the “NINE Interoperability Specifications Working
Group” (NISWG) since 2012. The evolution of the EP430GN will be implement the NINE
protocol specification.
• 
Also SCIP Interoperability Protocol was determined for END TO END SECURE
COMMUNICATIONS iused in IP networks and non-IP networks (GSM, SATCOM, ISDN, PSTN).
• 
EPICOM has developed the first equipment with the standard SCIP Multimedia mode (Voice & Video
over IP).
11 All rights reserved. Distribution and copying of this document, use and communication of its content is not permitted without written authorization from DF EPICOM
Business Case: EP430GN
Securing your critical networks
EP430GN CRYPTOSYSTEM
NATO SECRET APPROVED
EP430GN ENCRYPTOR
• 
Market: National & International.
• 
Removable crypto module.
• 
Red & Black separation.
• 
Management Center: EP543N
• 
Key Fill device: EP745.
• 
Encryptor published in the NATO catalogue, web: www.ia.nato.int/niapc
2 Gbps EP745 KEY FILL DEVICE
EP543N MANAGEMENT CENTER
All rights reserved. Distribution and copying of this document, use and communication of its content is not permitted without written authorization from DF EPICOM
EP430GN ENCRYPTOR.
Fast & Robust
Securing your critical networks
All rights reserved. Distribution and copying of this document, use and communication of its content is not permitted without written authorization from DF EPICOM
SCIP INTEROPERABILITY
PROTOCOL
SECURE COMMUNICATIONS INTEROPERABILITY
PROTOCOL
• 
Protocol for END TO END SECURE COMMUNICATIONS.
• 
Used in IP networks and non-IP networks (GSM, SATCOM, ISDN, PSTN)
• 
EPICOM is actively involved in the “International Interoperability Control Working
Group” (I-ICWG) since 2010.
• 
EPICOM has developed the first equipment with the standard SCIP Multimedia
mode (Voice & Video over IP).
• 
The EP641 can implement different algorithms.
15 All rights reserved. Distribution and copying of this document, use and communication of its content is not permitted without written authorization from DF EPICOM
SCIP VOICE & VIDEO OVER IP
SECURE SYSTEM
EP641: SCIP VOIP ENCRYPTOR
EP1170: SIP SECURE SERVER
16 16 All rights reserved. Distribution and copying of this document, use and communication of its content is not permitted without written authorization from DF EPICOM
Intelligent Systems
Control: Avionics
Military Avionic Commercialization
Proprietary Product
• 
DF Núcleo has developed, certified, manufacture and
integrated, the Generator Control Unit (GCU) for the
consortium Eurofighter. DF Núcleo is currently providing
service to the air forces fleet of the following allied
countries: Germany, Saudi Arabia, Spain, Italy, United
Kingdom …
•  Control units for on-board systems (aerodynamic surfaces,
etc..)
C3 Systems:
Experience
DF NÚCLEO is highly specialized, with more than 45
years of experience, in the design, development and
manufacturing of a wide range of systems
with
command & control applications for both, civil and
military communications
C3 Systems:
Military Applications
•  Command and Control Centers for ground,
naval and air operations
•  Communications Centers (COMCE´s)
•  Communications and Information Systems
(CIS)
•  Shelterized, Mobile and Transportable units
•  Red/Black Systems
•  EMI, TEMPEST and EMP protection
•  External Communications and Interfaces with
other control centers
•  Crisis & Emergency Coordination Centers
Mobile & Deployable Systems
Design, integration, implementation and commissioning
deployable systems in operational areas
•  Station of Command, Control and Communications
•  Deployable Satelite Communications
•  Deployable Air Traffic Control Centers (DARS,
SWOC, TWR mobile)
•  Information and Communications Centers and
Remote Control
•  Control Stations and Communication links for
Unmanned Aerial Vehicles (UAV’s)
Energy
Tactical Power Generators
Tactical generators supplied to NATO in ZO for
baking deployable systems :
• 
• 
• 
• 
• 
Command Posts
CIS Systems
Communication Modules
Satellite Terminals
Air Traffic Control Centers (ARS, TWR)
ü  REDUNDANCY
ü  COMPLIANCE Environmental Characteristics (STANAG 2895)
Communications
Software Defined Jammers
•  DF Núcleo has already established a R&D
line aimed at developing products to
combat RC-IED.
•  Using the same philosophy as software
defined radio (SDR) that is progressively
imposed on tactical communications
equipment DF Núcleo countermeasure
solutions are based on what we call
SOFTWARE DEFINED JAMMERS (SDJ)
fully programmable devices that
integrate into a single element functions
of analysis, detection, classification,
blockage and interception of radio
signals.
SIGNUM J 100
Analysis Detec-on Classifica-on Blockage Intercep-on Intelligent Systems