DOD SBIR 24.4 Annual

Active
Yes
Status
Open
Release Date
October 3rd, 2023
Open Date
October 3rd, 2023
Due Date(s)
March 31st, 2025
Close Date
March 31st, 2025
Topic No.
A244-022

Topic

Ensuring Sensor Data Security and Integrity

Agency

Department of DefenseN/A

Program

Type: SBIRPhase: BOTHYear: 2024

Summary

The Department of Defense (DOD) is seeking proposals for the topic "Ensuring Sensor Data Security and Integrity" as part of its SBIR program. The objective of this topic is to develop a platform that secures sensor data at the individual record level and supports experimentation to advance technology for DoD and Army Data Strategy VAULTIS goals. The platform should be cost-effective, flexible, and implemented through an Application Programming Interface (API) with no data size limitation. It should also ensure the integrity of sensor data throughout its lifecycle and incorporate attributes such as encryption, immutable data storage, audit and logging, and tamper-proof chain of custody. The Army aims to become more data-centric and capable of conducting operations in contested environments. The project will be conducted in two phases, with Direct to Phase II (DP2) proposals accepted for a cost of up to $2,000,000 for an 18-month period of performance. The contractor will be responsible for integrating, testing, demonstrating, and delivering a lightweight and scalable prototype data provenance solution. The solution should secure all sensor data at the individual record level and include database, replication, data audit, and encryption in a single integrated solution. It should also incorporate knowledge graphs, analytic visualization tools, and support data analysis. The use of blockchain technology is highlighted as a potential dual-use application for protecting sensor data fidelity in various sectors such as healthcare, critical infrastructure, smart homes, and autonomous vehicles. The project references the Army's data plan and strategic goals for 2040. The deadline for proposal submission is March 31, 2025. For more information, visit the solicitation link provided: DOD SBIR 24.4 Annual.

Description

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Integrated Sensing and Cyber; Integrated Network Systems-of-Systems

 

OBJECTIVE: The objective of this topic is to develop a platform that secures the sensor data layer at the individual record level and provides support to experimentation that advances technology for DoD and Army Data Strategy VAULTIS goals: Visible, Accessible, Understandable, Linked, Trustworthy, Interoperable and Secure.

 

DESCRIPTION: This topic seeks to develop a cost-effective prototype platform that is flexible enough to work from tactical edge data fabric nodes to operational, strategic and enterprise levels (joint/external). The platform must be implemented through a flexible Application Programming Interface (API) with no limitation on the size of the data. In addition, a related objective is to experiment with the capture and holding immutable raw output of the sensor data at point of image or signal collection and sure integrity throughout the data lifecycle through to the end user. The following attributes are expected to be integrated: (1) Unique encryption key for each submission, (2) Integrated and always on immutable data storage, audit, and logging, (3) Tamper-proof chain of custody for everything, based on distributed ledger technology, (4) Encryption using AES-256 or better, and (5) Easy installation requiring minimal time, resource, and ongoing maintenance. Unique capabilities must be developed to ensure the Army becomes more data-centric and can conduct operations in contested environments, which will enable our ability to prevail on the future battlefield. Doing so will allow us to project power in cyberspace and defend our networks, weapons, and data from threats. The Army achieving Data-Centric Operations requires the experimental integration of emerging technology, novel Tactics, Techniques and Procedures (TTPs), and enhanced data security engineering.

 

PHASE I: This topic is only accepting Direct to Phase II (DP2) proposals for a cost up to $2,000,000 for an 18-month period of performance.

 

Proposers interested in submitting a DP2 proposal must provide documentation to substantiate that the scientific and technical merit and feasibility equivalent to a Phase I project has been met. Documentation can include data, reports, specific measurements, success criteria of a prototype, etc.

 

(DIRECT TO) PHASE II: The Contractor shall integrate, test, demonstrate, and deliver a lightweight and scalable prototype data provenance solution that secures all sensor data at the individual record level (one unique encryption key per record) without performance compromise. The platform must include database, replication, data audit (immutable), and encryption in a single integrated solution. The contractor shall demonstrate secure data management that incorporates U.S. Government sensor-collected data and further enriched with commercial satellite remote sensing data and other Publicly Available Information (PAI). The Contractor shall integrate a software-based knowledge management and data engineering solution that enables knowledge graphs. The secure data management solution must leverage ontology-driven knowledge graphs to support use by a non-technical user class that can query data in natural language and get a summarized response. It also must support analytic visualization tools and provide an environment for data professionals to produce additional data analysis. The use of knowledge graphs and ontologies enables scalable and extensible data schemas for the Army’s 2040 strategic goals, directly aligned to its Joint All Domain strategy. Ensuring data integrity through always on auditing and individual record level encryption will support delivery of a trusted cohesive picture from multiple sources and enables the communication of value relevant to traditional and non-traditional sensors or PAI and is key to ensuring the Army gets value out of their experiments. The software solution must be adaptable to new mission constraints as new use case experiments are designed by the military. To properly safeguard Army data, the contractor will have to be able to store and process up to CUI data as part of this effort.

 

PHASE III DUAL USE APPLICATIONS:

The topic’s scope (specifically around creating a chain of custody and immutable data validity) and enabling technology is blockchain. ​



Numerous academic (IEEE, NIH) and trade association research shows the efficacy of leveraging blockchain to create said chain-of-custody, immutable dataset from sensor data. ​



For the most part, commercial trends indicate blockchain as an incredibly promising technology for IoT systems.​
Potential dual uses of blockchain to protect sensor data fidelity include:​



Healthcare and remote patient monitoring​
Electric grid and other critical infrastructure ​
Smart homes​
Autonomous vehicles 

 

REFERENCES:  

https://api.army.mil/e2/c/downloads/2022/10/13/16061cab/army-data-plan-final.pdf
https://warontherocks.com/2023/08/delivering-the-army-of-2030/
https://executivegov.com/2022/10/army-unveils-plan-to-transform-into-data-centric-organization/

 

KEYWORDS:  sensors; data; Unique encryption key; Individual record level; API

Similar Opportunities

DOD SBIR 24.4 Annual - NAVWAR Open Topic for Advanced Data Integrity and Control Methods
Department of Defense
The Department of Defense (DOD) is seeking proposals for the NAVWAR Open Topic for Advanced Data Integrity and Control Methods. The objective of this solicitation is to develop a method to assure integrity, control access, and distribution for information on any device or network. The DOD requires the ability to securely move information from anywhere to anywhere, and once delivered, ensure its integrity, control access, and limit further distribution. The current approach to achieving this relies on networks and applications, but the DOD is exploring methods to control data independent of an application or platform. Proposed solutions must protect data independent of networks, applications, or database technologies, function in disrupted, disconnected, intermittent, and low-bandwidth situations, and recover gracefully once connectivity is restored. The Phase I awards for this topic will have a period of performance of four months and a cost not to exceed $75,000, while Phase II will involve a small-scale deployment of the proposed concept. Phase III will focus on integrating the capability demonstrated in Phase II with current Naval networks. The technology developed through this solicitation has potential applications beyond the defense domain and can benefit anyone working with sensitive information.
DOD SBIR 24.4 Annual - xTechScalable AI
Department of Defense
The Department of Defense (DOD) is seeking proposals for the topic of "xTechScalable AI" as part of the SBIR program. The Army branch is specifically interested in novel and disruptive concepts and technology solutions that can address the vulnerabilities of current machine learning pipelines and models. The goal is to develop comprehensive security models that can defend against universal AI threat vectors and are scalable to rapidly evolving threats. The Army is particularly interested in proposals that focus on systematic testing and evaluation methods, trusted and secure validation and verification strategies, continuous monitoring capabilities, improved transparency and assurance of code and data, and improved telemetry capabilities. The Army will prioritize submissions from winners of the xTechScalable AI prize competition. The project will involve a Direct to Phase II submission, followed by the production of prototype solutions that are easy to operate by soldiers. Phase III will focus on maturing the technology to TRL 6/7 and producing prototypes for further development and commercialization. The deadline for proposal submission is March 31, 2025. For more information and to submit a proposal, visit the solicitation agency's website at [solicitation_agency_url].
DOD SBIR 24.4 Annual - xTechScalable AI
Department of Defense
The Department of Defense (DOD) is seeking proposals for the topic "xTechScalable AI" as part of the SBIR program. The Army branch is specifically interested in novel and disruptive concepts and technology solutions that can address the vulnerabilities of current machine learning pipelines and models. The goal is to develop comprehensive security models capable of defending against universal AI threat vectors. The Army is prioritizing proposals that focus on systematic testing and evaluation methods, trusted and secure validation and verification strategies, continuous monitoring capabilities, improved transparency and assurance of code and data, and improved telemetry capabilities. The Army will use the xTechScalable AI prize competition to identify small businesses that meet the criteria for award, and only winners of the competition will be eligible to submit a proposal under this topic. The project will have three phases: Phase I involves submitting a Direct to Phase II (DP2) proposal, Phase II involves producing prototype solutions for evaluation by soldiers, and Phase III involves completing the maturation of the technology and producing prototypes for further development and commercialization. The deadline for proposal submission is March 31, 2025. For more information and to submit a proposal, visit the solicitation agency's website at [solicitation_agency_url].
DOD SBIR 24.4 Annual - Chief Digital and Artificial Intelligence Office (CDAO) Data Mesh Reference Design (REFDES)
Department of Defense
The Department of Defense (DOD) is seeking proposals for the Chief Digital and Artificial Intelligence Office (CDAO) Data Mesh Reference Design (REFDES). The objective is to make all data across the Department of Defense seamlessly interoperable while retaining federated control, hosting, and ownership. The DOD aims to establish a set of software services that allow data users to discover, access, and consume DoD data products via self-service API. The data access must support attribute-based access control (ABAC) and operate in a zero-trust environment. The program consists of three phases: Phase I involves creating a formal REFDES, Phase II focuses on building a Minimum Viable Product (MVP) version of the design, and Phase III involves delivering a full production capability. The REFDES must address key concepts such as VAULTIS compliance, services communication model and framework, data templating, dynamic attribution association, automated notification services, cybersecurity, and zero trust support. The resulting data mesh will support interoperability for applications in both battlefield and boardroom settings. The solicitation is open until March 31, 2025. For more information, visit the [SBIR topic link](https://www.sbir.gov/node/2602059) or the [solicitation agency website](https://www.defensesbirsttr.mil/SBIR-STTR/Opportunities/).