Verification and Validation of Mission Data Libraries for Electronic Warfare Operational Support



Similar documents
Innovation. Performance. Security. SMARTSCAN man-portable land EW solutions. target. up-to-the-minute situational intelligence

COMBATSS-21 Scalable combat management system for the world s navies

WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS)

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems

Tactical Oil Spill Management TOSM APTOMAR.COM

Bio-inspired cyber security for your enterprise

Services we provide. Tel:

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 6 R-1 Line #165

GCC Homeland Security in a New Order. Dr. Theodore Karasik Director of Research and Consultancy INEGMA. September 2013

Position Descriptions. Aerospace

Rapid software development. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 17 Slide 1

Electronic Warfare System Integrated Electronic Warfare System. Own the Enemy s Battlespace

The future of range instrumentation.

AIRBUS GROUP AUSTRALIA PACIFIC

Synthetic Aperture Radar: Principles and Applications of AI in Automatic Target Recognition

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing

INTRUSION PREVENTION AND EXPERT SYSTEMS

Integrating System Safety and Software Assurance

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Case No COMP/M FINMECCANICA / BAES AVIONICS & COMMUNICATIONS. REGULATION (EC) No 139/2004 MERGER PROCEDURE

SADEC - VIRTUAL TRAINING LABORATORY

Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response

Image courtesy Newcastle Port Corporation CENTRE FOR OPTIMAL PLANNING & OPERATIONS. Productivity and Efficiency for the Energy & Resources Sector

Compliance Guide: ASD ISM OVERVIEW

Surveillance and Security Systems

Data center solutions from Siemens. For the factories of the 21 st century. siemens.com/datacenters

ASTRAEA the findings so far

A Cyber Security Integrator s perspective and approach

Responsible Investment Policy

Propsim enabled Aerospace, Satellite and Airborne Radio System Testing

Cyber Security Evolved

Internet of Things (IoT): A vision, architectural elements, and future directions

Coordinated Operation Capability Using Scalable C2

IAI/Malat Solutions for the Maritime Arena

Observation and Findings

Sea Eagle FCCT. Naval Electro-Optical Fire Control System

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

How To Set Up A Wide Area Surveillance System

Venator -110 General Purpose Light Frigate Technical Brief

IN FLIGHT SECURITY INCIDENT MANAGEMENT

Pacom Systems. All rights reserved.

UNCLASSIFIED PE D8Z

Encl: (1) Surface Warfare Tactical Requirement Group Membership

Continuous Network Monitoring

TIBCO Cyber Security Platform. Atif Chaughtai

The European and UK Space Agencies

PATRIOT MISSILE DEFENSE Software Problem Led to System Failure at Dhahran, Saudi Arabia

FREQUENTLY ASKED QUESTIONS

COMPETITIVE INTELLIGENCE

A Methodology for Safety Critical Software Systems Planning

Feedback on the Inquiry into Serious Injury. Presented to the Road Safety Committee of the Parliament of Victoria. 08 May 2013

Organizational Requirements Engineering

ELBIT SYSTEMS. Jefferies Global Industrials Conference - August Joseph Gaspar EVP & CFO

Records Authority. Australian Security Intelligence Organisation

Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189

CUSTOMER KEYNOTE Hal Buddenbohm

30 In Compliance October

Data Intensive Science and Computing

Rapheal Holder From Platform to Service in the Network Centric Value Chain October 23, Internal Information Services

Socio technical Systems. Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 2 Slide 1

Air Traffic Management Services Plan

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

CLOUD. Enabling your location intelligence capability. Introducing PSMA Cloud

SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT

How DCMA Helps To Ensure Good Measurements

Integrated Physical Security and Incident Management

How To Protect Your Network From Attack From A Network Security Threat

Certification Authorities Software Team (CAST) Position Paper CAST-3

Speeding up Level 3 CMM Certification Process with Estimation Tool General Dynamics Calgary

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

DRONE DETECTION RADAR

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

PRIVACY POLICY. This document is our privacy policy and it tells you how we collect and manage your personal information.

FCC HOMELAND SECURITY LIAISON ACTIVITIES

Why it may be time to consider Certified Avionics for UAS (Unmanned Aerial Vehicles/Systems) White paper

PERSONNEL SECURITY PRACTICAL ADVICE FOR HR AND SECURITY MANAGERS

G2 Industry Day JULY Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE

WHY THE WATERFALL MODEL DOESN T WORK

Type selection of. DenMARK S new

Should you allow your employees to bring their own technology to work?

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Department of Defense INSTRUCTION

Prepared for tomorrow s challenges with your global full service partner

The Moloney Asset Management System (MAMS)

The Truth about False Positives

National Information Assurance Certification and Accreditation Process (NIACAP)

NATIONAL TABLE OF FREQUENCY ALLOCATIONS

Introduction to PAS 127:2014 Checkpoint security screening of people and their belongings Guide

Guidance for Data Users on the Collection and Use of Personal Data through the Internet 1

Achieve. Performance objectives

Extended Resolution TOA Measurement in an IFM Receiver

International Investigator Course

Transcription:

Verification and Validation of Mission Data Libraries for Electronic Warfare Operational Support Flight Lieutenant Charles Winsor Royal Australian Air Force Dr Thomas Millhouse Nova Systems, Australia

Introduction Electronic Support systems depend on libraries of accurate, current and relevant mission data to identify emitters and provide tactical threat warning to aircraft and ships Electronic Warfare Operational Support is the process of updating these mission data libraries to adapt to changes in the operational environment

Introduction Library reprogramming has historically been treated like software development Software engineering standards demand time-consuming Verification and Validation for mission critical systems Verification and Validation provide assurance that an Electronic Support system will perform in its intended operational environment

Introduction Excessive Verification and Validation may compromise the essential responsiveness of Electronic Warfare Operational Support We propose a new approach to balance the rigour of software engineering with the responsiveness of Electronic Warfare Operational Support

Acknowledgement

Outline Electronic Support Mission Data Libraries Electronic Warfare Operational Support Verification and Validation Finding the Balance A New Approach

Electronic Support Electronic Support is the branch of Electronic Warfare that deals with the passive intercept, analysis and exploitation of electromagnetic radiation Electronic Support is used in modern warfare for surveillance, intelligence collection and tactical threat warning of radar-guided weapons

Electronic Support Electronic Support systems aim to: intercept and detect signals locate, identify and report emitters INTERCEPT Receiver DETECT LOCATE Signal Processor Mission Data Library REPORT Operator Display IDENTIFY

Mission Data Libraries Most Electronic Support systems are loaded pre-mission with reprogrammable mission data libraries These libraries enable automatic identification of detected emitters High quality libraries are essential to achieve timely threat warning: manual emitter identification by an operator is slow fast reactions needed against threats

Mission Data Libraries Emitter parameters form the basis of a mission data library: enables identification of emitters from detected signals Emitter-to-platform associations improve situational awareness: identified emitters may be correlated to known platforms or locations Additional information can be associated to emitters to improve situational understanding

Mission Data Libraries Mission data quality characteristics: Accuracy Currency Relevance All share a common dependence on time All are interdependent

Mission Data Libraries Mission data libraries are typically specified to suit an Area of Operations: libraries should be updated as emitters enter or leave the specified region Mission data is typically based on observed emitter parameters: libraries should be updated as emitter parameters change particularly important as we enter the era of software-defined radio

Consequences No identification Misidentification Ambiguous identification

Consequences No identification: no threat warning countermeasures not initiated platform loss Misidentification or ambiguous identification: false alarm wrong countermeasures initiated mission abort

EW Operational Support Aim To update libraries before they become ineffective or unsuitable for operational use Problem The electromagnetic environment may change significantly on a daily basis Challenge To complete post-mission analysis, update library requirements, develop an updated library, and verify and validate that library to a suitable extent all before the current library becomes an operational liability!

EW Operational Support Pre-Mission Upload Post-Mission Download OPERATE Mission Replay ANALYSE Resolve Anomalies Recommend Changes Validate Verify REPROGRAM Develop Design

Verification & Validation Australian Technical Airworthiness regulations treat mission data libraries as software (not as data): similar regulations are applied in the Australian maritime and land domains Software engineering standards like DO-178B are applied to routine library reprogramming: threat warning sensors are mission critical systems libraries may be assessed to need high Software Assurance Levels Assurance of mission critical software demands time-consuming Verification and Validation

Verification & Validation Verification The evaluation of whether or not a product complies with a requirement specification The library was developed correctly Validation The assurance that a product meets the needs of the customer The correct library was developed [IEEE 1490-2011]

Verification & Validation Verification and Validation are important to provide assurance that mission data requirements are satisfied by a library......but those mission data requirements change whilst library Verification and Validation is being conducted An optimal balance must be found between rigour and responsiveness

Finding the Balance 1. Programming errors found and resolved 2. System performance optimisation 3. Mission data currency degradation 4. Mission data relevance degradation

Verification Software-only testing: basic error checking basic performance estimation Was the library implemented as designed? Hardware-in-the-loop testing: advanced error checking advanced performance estimation assess emitter interactions Does the library design satisfy its requirements?

Limitations of Verification The same mission data is used to develop and verify the library The performance of a library is fundamentally limited by the quality of the available mission data Verification predicts library performance assuming mission data is correct Library verification provides no assurance of underlying mission data quality

Validation Field testing: Were the library requirements fit for purpose? Options: controlled or mission conditions? generic test scenario or mission rehearsal? emitters of interest only, or background emissions as well?

Limitations of Validation High cost If emitter emulators are used, same fundamental limitation as verification: predicts library performance assuming emitter emulation is correct If authentic emitters are used, still not a true representation of the operational environment: no two radars emit exactly the same signal when does close enough become good enough?

A New Approach Verification and Validation are activities performed as part of the library reprogramming process Library reprogramming is an activity performed within the EWOS cycle What if we treated the entire EWOS cycle as a holistic Validation activity? Can rapid, continuous execution of the EWOS cycle fulfil the aim of Validation?

EWOS as Validation Collect test data from operations: true mission conditions emitters of interest background emitters Assess library performance in the operational environment through post-mission analysis Assess the ongoing suitability of library requirements: Were yesterday's library requirements still valid during today's mission? If not, what needs to change? And how else do we expect tomorrow's mission to change those library requirements?

EWOS as Validation Does rapid, continuous execution of the EWOS cycle mitigate the need for a formal Verification and Validation process? A low quality library can still cause mission failure or the loss of life and materiel: focussed testing of high risk emitters Potential to compound errors: initial library version must be of reasonable quality Similar principles to the Spiral Model for software development [Boehm, 1988]

EWOS as Validation OPERATE ANALYSE REPROGRAM [Boehm, 1988]

Improving Library Performance

Implementation Holistic consideration of Verification, Validation and the entire EWOS cycle Organisations, personnel and infrastructure capable of sustaining highly responsive EWOS Expertise to identify mission risks within libraries and tailor Verification and Validation processes to specifically address those risks: instead of blanket-application of generic software engineering standards to EWOS

Into the Future Mission data library development processes for Electronic Support systems are currently similar to the Waterfall Model [Royce, 1970] Rapid, continuous execution of the EWOS cycle could be considered similar to the Spiral Model [Boehm, 1988] Many new software development models have emerged in the last few decades Is it time for EWOS to move into the twenty-first century?

Conclusion Libraries of accurate, current and relevant mission data are essential to enable the performance of Electronic Support systems Low quality mission data libraries can result in mission failure and other serious consequences Assurance of library quality is conventionally achieved through application of software engineering rigour

Conclusion Conducting extensive Verification and Validation processes to assure library quality can actually reduce performance The EWOS cycle must be responsive to keep pace with an evolving electromagnetic environment A better balance must be found between rigour and responsiveness

References D.C. Schleher (1999), Electronic Warfare in the Information Age R.G. Wiley (2006), Electronic Intelligence: The Interception and Analysis of Radar Signals DO-178B, Software Considerations in Airborne Systems and Equipment Certification IEEE 1490-2011, A Guide to the Project Management Body of Knowledge W. Royce (1970), Managing the Development of Large Software Systems B. Boehm (1988), A Spiral Model of Software Development and Enhancement

Verification and Validation of Mission Data Libraries for Electronic Warfare Operational Support Flight Lieutenant Charles Winsor Royal Australian Air Force Dr Thomas Millhouse Nova Systems, Australia