NASA SBIR 2020-I Solicitation

Proposal Summary


PROPOSAL NUMBER:
 20-1- A3.03-6314
SUBTOPIC TITLE:
 Future Aviation Systems Safety
PROPOSAL TITLE:
 Strategic Cybersecurity Framework for UTM-ISSA
SMALL BUSINESS CONCERN (Firm Name, Mail Address, City/State/Zip, Phone)
Vcrsoft, LLC
3513 Napolean Court
Plano, TX 75023
(817) 213-6184

Principal Investigator (Name, E-mail, Mail Address, City/State/Zip, Phone)

Name:
VC Ramesh
E-mail:
vcr@vcrsoft.com
Address:
3513 Napolean CT Plano, TX 75023 - 7050
Phone:
(817) 213-6184

Business Official (Name, E-mail, Mail Address, City/State/Zip, Phone)

Name:
VC Ramesh
E-mail:
vcr@vcrsoft.com
Address:
3513 Napolean CT Plano, TX 75023 - 7050
Phone:
(817) 213-6184
Estimated Technology Readiness Level (TRL) :
Begin: 1
End: 3
Technical Abstract (Limit 2000 characters, approximately 200 words)

NASA's UTM-ISSA architecture has 3 layers where the Monitor-Assess-Mitigate (MAM) components of ISSA are situated: at the UAS level (vehicle system functions), at the Ground Control Station (GCS) level (GCS functions), and at the Supplemental Data Service Provider (SDSP) level (SDS services). We modify this by adding an extra intermediate layer at the UAS Service Supplier (USS) level (USS functions). The aim of the proposed effort is to develop and demonstrate a strategic cybersecurity framework for this UTM-ISSA architecture. While there are many risk factors that impact ISSA, we focus on risks that emanate from cybersecurity threats from a variety of players. 

For the monitor portion, we propose an approach to aggregate a variety of cybersecurity-relevant data sources at various levels of the UTM-ISSA. Designing the information schema for these data elements is part of the proposed effort. We divide the Assess portion into two: Assess-1 and Assess-2. The Assess-1 portion involves a signature-based misuse detection for cybersecurity threats followed (sequentially) by a deep learning based anomaly detection module. The Assess-2 takes as input the anomalous patterns from Assess-1 and provides strategic labels: Who?, What?, Why?, How? and When? based on a deep learning multi-label classifier. The Mitigate component uses an attack tree for devising strategic countermeasures and a game theory module for devising tactical countermeasures corresponding to each strategy at each level of the UTM-ISSA.

We propose to demonstrate the feasibility of the proposed approach using an illustrative cyber-terrorist scenario that features a coordinated cybersecurity attack on multiple UAS.

Potential NASA Applications (Limit 1500 characters, approximately 150 words)

NASA's UTM-ISSA program is the first anticipated tech transfer target and application. NASA's UAM program is the next anticipated application. NASA has many other programs, such as the Mars Rover and Counter-UAS, that will benefit from the strategic cybersecurity framework developed in this research.

Potential Non-NASA Applications (Limit 1500 characters, approximately 150 words)

The Department of Homeland Security (DHS) and the Department of Defense (DoD) have many cybersecurity, counter-UAS and counter-swarm programs that will benefit from the proposed framework. In the private security, many drone/UAS as well as USS vendors are likely targets for commercialization.

Duration: 6

Form Generated on 06/29/2020 21:00:27