The Air Force Research Laboratory's Transformational Capabilities Office issued a Sources Sought Synopsis/Request for Information (RFI) regarding the Trusted Network Entry (TNE) project on December 19, 2024. This initiative aims to gather market insights on innovative communication and networking solutions for airborne and space-based systems, particularly enhancing trust at various communication layers. The operational challenge focuses on establishing trust through Trusted Network Nodes (TNNs), Network Trusted Tokens (NTTs), and an Assured Network Infrastructure (ANI). Near-term objectives include identifying future network environments, exploring commercial solutions, and defining necessary modifications to existing technologies. The RFI outlines three lines of effort: TNN, NTT, and ANI, all essential for enabling ad-hoc network entry in combat situations. Interested participants are encouraged to respond with relevant capabilities and may contribute to any or all areas. The government's intent is to utilize collected information to inform acquisition strategies and develop a framework for future advancements. Responses to the RFI must be submitted by January 19, 2025, and are to adhere to specified guidelines regarding proprietary information. The initiative reflects the Department of Defense's commitment to enhancing trust in dynamic and complex network environments.
The Transformational Capabilities Office has issued an inquiry regarding technologies for the Trusted Network Entry (TNE) as part of a Request for Information (RFI) dated December 19, 2024. The document outlines critical questions aimed at evaluating vendors' capabilities to address various operational challenges across three specified Lines of Effort (LoEs). Vendors are asked to detail how their solutions confront these challenges, compare proposed capabilities with existing standards regarding Cost, Size, Weight, and Power (C-SWaP), and discuss innovative attributes of their technologies.
Additionally, the RFI seeks insights into how proposed solutions can integrate within a Modular Open System, support secure ad-hoc network entries, and utilize technologies such as Hardware Roots of Trust (HRoT), Chain of Trust configurations, and multifactor authentication designs. It emphasizes the need for secure creation and management of encryption keys, development of classified tactical devices, and design of connections across various security classifications.
This inquiry aims to gather information that will inform the government’s approach to enhancing cybersecurity and secure communications within operational environments, ensuring robust, innovative, and integrated solutions. The focus on secure technology implementations reflects current priorities in government contracting for reliable defense and technology solutions.