Anda di halaman 1dari 10

Anx A

RESEARCH COLLABORATION WITH ACADEMIA

Ser Topics Topics Received


from
1. Backup of Sensitive Data & Disaster recovery mechanism. HQ Sigs 10 Corps
2. Dev a secure OS for customized smartphones to be used by
Army pers only and having features for secure comm on LTE / 5G
tech.
3. Dev an Indigenous Antivirus Software.
4. Radio Gateway. Pak Army is holding different radios on its
inventory. The radios are not interoperable owing to different HQ Sigs 11 Corps
waveforms and encryption techs. A need is felt to devise radio
gateway which will enable different radios (HF, VHF, UHF) of
different nets to comm with each other. Academia may be offered
the proj to design and manufacture radio gateway.
5. Electro-Magnetic Pulse (EMP) - Modern Trends, Appl
Scenarios and Prot measures for Pak Army
(1) In today’s era of 5th generation warfare, a hybrid nature of
war has emerged. In this hybrid matrix, one of the preferred mode
of conduct for any adversary would be to tgt the cyber domain
which is cap of inflicting huge backbone infrastructure losses
resulting in crippling down of response due to high reliance on
networked / computerized devices.
(2) Electro-magnetic pulse or EMP is a neglected and very
less talked about domain of Cyber Warfare though it has
devastating consequences for intended tgt. A strong EM fd can
induce irreversible damage to wide rg of electrical and electronic
eqpt. Telecomm eqpt can be highly vuln, due to the presence of
lengthy copper cables b/w devices. Radar & electronic warfare
eqpt, satellite, microwave, UHF, VHF, HF, low band comm. eqpt
and TV eqpt are all potentially vuln to the EMP effs. Most
susceptible part of the eqpt are memory based sys, transistors,
integrated circuits (ICs) and printed circuits boards. The damage
may req complete replacement of the eqpt or at least maj
portions. A powerful EMP can even damage phy objects such as
bldgs and hardened structures (Bunkers, ac Hangers). It can
wreak havoc on electronic sys, shutting down power grids,
sources and sup mechanisms. An EMP attk could irreparably
cripple any mil force by simultaneously inflicting large-scale
damage and critically limiting the response cap.
(3) Above in view, a meaningful research may be carried out to
identvulns of Pak Army against a potent EMP attk and dev both
offn and def mechanism so as to dec the vulns and inc the
response options of Pak Army in the purview of 5th Generation
Warfare.
6. Indigenous Armd Forces GPS. Current GPS is vuln to en
disruption and deception. It is one of the foremost needs of Pak
Armed Forces, given it’s utility on the battlefield.

7. AI Controlled Resource Aloc. Optimization of resource and


bandwidth aloc in wireless NW Performance analysis using
Artificial Intelligence.

8. Indigenous Encryption Algorithms. Current algorithms


schemes rely on keys being generated by vendors, compromising
security. Encryption schemes, along with keys, must be
developed by the armd forces and changed regularly.

9.
Video Based Real time Gesture Analytics for Detection of
Suicide Bomber. This will entail analysis of gestures from the
videos of past suicide bombers and develop algorithms to identify
them in real time from the video feed of surveillance sys.
Primarily, it is a work in pattern-classification, but AI can be
included to develop self-learning algorithms.

10.
Automatic Control of Micro UAVs for Border Patrolling
and Breach Identification. Fencing along western border is
in progress. Still, breach attempts cannot be ruled out. Patrolling
an extended border in a difficult terrain is a challenging task that
can be circumvented by incorporating micro UAVs for border
patrolling that fly along fixed paths, transmit video and raise
alarms if breach is detected.

11.
IOMT (Internet of Military Things) 5 Corps Data
Centre
12.
IOBT (Internet of Battle Things)

13.
Problem areas in implementation of 5G network scheme 46 Sig Bn

14. Evaluation of current CSIRT in Army


15. Transition of Pak Army from conventional comm to Net Centric
warfare
16. Role of Artificial Int in Telcomm NW, Internet of Things, HQ Spec Comm
Blockchain and info security / Tech. Org
17. Fraud Detection in Telcomm sys and Branchless / Mobile Banking
sys.
18.
Protection of Children in Cyberspace.

19.
Dev of Pub Safety NW to deal natural and manmade disasters.

20.
Implementation of Raman Amplifier without High Power
Pump Module. Existing optical amplifier (EDFA) can’t provide
flat gain across entire C&L band. Currently developed Raman
Amplifier provide flat gain to desired freq bank by using signle /
multiple high power pump modules which is very costly. Hence,
the req of pump module free Raman Amplifier is nec which will be
efficient and reduce the cost of Raman Amplifier.

21. Group based Multi-Query Optimization Framework for


4 Corps Data
Interactive SQL Query Engines on Hadoop Centre

Relevance Study: In the recent past, execution of


high‐concurrency queries with interactive SQL query engines on
Hadoop has become an imp activity for many datacenters.
However, these systems do not adopt Multi‐Query Optimization
(MQO) to accelerate the process. There are two maj concerns,
Firstly, traditional MQO researches assume that multiple queries
have high similarity. However, these systems usually serve a
variety of applications. Although queries from the same Appl have
high similarity, queries from diff applications may have low
similarity, so using traditional MQO will be inefficient and time
consuming. Secondly, integrating MQO may lead to lots of sys
modifications. To intg MQO into interactive SQL query engines on
Hadoop efficiently, a query gp–based MQO framework may be
propose. A lightweight mechanism can be used to rep SQL
queries, on which a gp method is exploited to speed up the
optimization process.

22. Emerging Trends and Challenges in Datacenter Virtualization


Environment to Integrate Security

Relevance Study: Data centers contain many cpt and a mass-


memory device that provides cpt and storage caps to users. All
the devices in these data centers are interconnected through
high-speed LAN switches with low latency (often 10 GB speed).
The capacity of storage arrays that are organized into SAN
(Storage Area Network) depends on the size and no of disk
device they contain, while the processing capacity depends on
the no of cores and processors. Firewalls are commonly depl
security measure in the data center, but most of the firewalls
experience issues during DDoS attacks which are a matter of
serious concern. Virtualization can be consd as a primary defense
pt, however any misconfiguration can make it a pt of entrance for
attackers. It has been found in existing research that many
attacks on virtualized data center are targeted towards gaining
access of hypervisor, i.e attacks on hypervisor through the host
OS and attk on hypervisor through a guest OS. We can highlight
these challenges and recommend new techniques of integration
of security with respect to virtualization in data centres.
23. Dev of Indigenous encryption devices compatible with NG 50 Sig Bn
PATCOMS
24. Design of indigenous Auto Ant Alignment Sys
25. Indigenous Antivirus Software 49 Sig Bn

26. Topic/ Thesis Statement. Dev of OTT/SMN app for Army Pers General
Relevance of Topic/Subj with existing System of Pak Army Headquarters C&IT
Branch Sigs-Plans
Digital age subscriber is accustomed to SMN. After restriction on
commercial SMNs due to security concerns, a secure alternative
is considered essential.

Pri and time line (if any). High / within 6-9 months
27. Topic/ Thesis Statement. Combiner Box for Multiple Telephone
Sys
Relevance of Topic/Subj with existing System of Pak Army
Adding security and reducing the no of telephone sets of different
comm NWs incl PACSCOM, DEFCOMM, Margalla-2, GHQ-
Margalla and other IP phone and local intercom to one telephone
set only, through an intelligent Combiner Black-Box.

Pri and time line (if any). High / within 6-9 months
28. Topic/ Thesis Statement. Secure PSTN
Relevance of Topic/Subj with existing System of Pak Army
Secure telephone is req to provide end-to-end voice security of
telephone conversation on PASCOMS, DEFCOMM, and NG-
PATCOMS. The purpose is to prevent eavesdropping. In effect,
the equipment should provide comm security on all public
switched telephone network (PSTN).

Pri and time line (if any).High / within 6-9 months


29. Topic/ Thesis Statement. PKI Certificate
Relevance of Topic/Subj with existing System of Pak Army
Mgla 2 and GHQ mgla, authentication of phones and SBC/exch,
NAC to ctr MAC/IP spoofing.

Pri and time line (if any). High / within 12 months


30. Topic/ Thesis Statement. Secure Handset (for HF/ V/UHF
radios)
Relevance of Topic/Subj with existing System of Pak Army
Secure handset should provide digital voice and data encryption
(AES-256 or higher) over HF/VHF radio sets with proprietary
encryption.

Pri and time line (if any). Medium / within 12-18 months
31. Topic/ Thesis Statement. Secure Mobile
Relevance of Topic/Subj with existing System of Pak Army
Secure mobile telephone is required to provide end-to-end voice
security over GSM NW. Telephone set must confirm to the
existing ITU standards.
Pri and time line (if any). Medium / within 12-18 months
32. Topic/ Thesis Statement. IP Encryptor
Relevance of Topic/Subj with existing System of Pak Army
IP Encryption unit is req to encrypt IP data over various IP based
NWs incl NG-PATCOMS/ PASCOMS radio links transporting IP
traffic as transparent bridged Ethernet in Point-to-Point (P2P) and
switched Ethernet Point-to-Multi-Poin (P2MP) amd any-to-any
configuration.

Pri and time line (if any). Medium / within 18-24 months
33. Topic/ Thesis Statement. Customized Fire Wall
Relevance of Topic/Subj with existing System of Pak Army
Firewall provides IDP/ IDP and filtering svcs. NG firewall offers
addl appl lvl filtering in addn to providing advance encryption
algos. However, instl of hardware/ software backdoor may
comprise the purpose of instl a firewall. To have trusted and
indigenous firewall to be instl on various C&IT NWs is need of the
hr.

Pri and time line (if any): Medium / within 24-36 months
34. Secure Phone for PSTN Connectivity Mil College of
1. PKR 0.35 Mn for depl of 10 x standalone servers at Signals Rwp
PMB PASCOMS.

2. Detailing of 1x offr ex PMB PASCOMS for trg and tfr of


Knowledge. The offrso detailed will be trained on dev and
configurations of the servers at premises of PMB PASCOMS.

3. 2x server machines at PMB PASCOMS.

4. 2x Pub Static IPs.

5. Internet Connectivity.

6. The possibility of using the existing eqpt of PMB


PASCOMS (i,e AR Routers) is also under investigation.

Localization of Radio Transmitter using Aerial Surv

1. Ready to Fly Cargo Drone cap of carrying 2 Kg pay ld as


per fol details:-

a. Drone DJI Metrice 200.


b. 4x TB55 Btys.
c. 1x Controller.
d. 1x XT2 Gimble.

2. 2x Laptops (min Core i5).

3. SDRs

a. RTL (Complete kit with all antennas).


b. HackRF (Complete kit with all antennas).
c. BladeRF (Complete kit with all antennas).

4. PKR 0.4 Mn for dev.

35. Monitoring solutions for HF/ VHF/ UHF Radios, Satellite phones, HQ Sigs 30 Corps
Internet and GSM (Passive Sys).
36. Social media apps for Army pers only.

37. Modulators / Demodulators for radio comm.


38. Hybrid DB (Audio/ word docus) with search engine having multi
options for analysis for depl with monitoring / interception set ups.

39. Architectures Complier Optimization & Embedded Sys 21 Sig Bn


40. Data Mining, Data Basis & GIS.
41. High Performance Computing
42. Robotics & Artificial Intelligence
43. IP Based Security Sys, Their Uses, Vuln and Way Fwd. 3 Sigs Bn
Theme. Security, which has always been among humans
primal needs has taken turns over the years with more vuln.
Today, in the modern era where technology is defining our lives
we have better soln to these vuln. When it comes to the latest
trends in security, there is a dire need to discuss IP Based
security sys in detail, by conversing about its concept, the way the
sys works, the necessity of this system and why we need it, it is
also essential to discuss different IP based security sys currently
used in the world considering their ltds. As Pak Army is facing
new challenges and the need of latest security sys is of vital imp,
we need to have a centralized IP based sec sys instead of the
existing system which lacks unanimity and has ltds so recom
viable solns to this and proposing a new sys is essential. In this
purview, IP based security sys would be discussed in detail
keeping in vision their uses and vuln with a view to recom viable
solns for use in Pak Army.
44. Needs of IP Based Security Sys in Pak Army

1. Apart from conventional threats on its border, Pak Army is


now facing an imminent threat inside its expanses in the form of
terrorism. Neither the en nor the borders are defined anymore.

2. For fighting an en with no bounds Pak Army needs to


extend its security sys over the areas where phy presence of a
sldr is either impossible or perilous.

3. Fol are the basic needs of using an IP based security sys


in Pak Army:-

a. Extending Eyes and Ears. Army needs to be at the


places where a sldr cannot be present. It will
increase overall security and safety. Security
cameras positioned throughout an AOR will help in
prevention of breaches.
b. Improve Sldrs Productivity. The presence of
security devices in the AOR can improve
productivity of sldr as a whole and can add to the
already laid out security.
c. Cont Real-Time Monitoring. IP based security sys
allows security representatives to monitor critical
areas cont, in real time, from their HQs.
d. Visual Evidence for Investigations. IP Based
security devices can provide invaluable evidence for
investigations of Ts activity and other specific events
that have taken place within the AOR.
e. Deterrence. Not only do devices help you maint
security in the AOR, they also discourage Ts.
Conspicuously placed cameras have been shown to
reduce threats of violence and vandalism drastically.
f. Visitor Monitoring. It provides proper access
control for visitors. Security devices at entrances
can help monitor visitors and make sure they are
properly checked.
45. Implementation Ph. Pak army is known for its professionalism
and its ability to swt to latest trends for compatibility and staying at
par with its counter-parts. The maj challenge in the shift towards
the IP based sys has already been countered as we are already
using few IP based sys. But the problem area which needs to be
addressed is the expansion of such sys in our overall security
plan. Whether it is border security or internal security. The true
benefits of such sys can be achieved by incorporating it in existing
security plan and using it alongside human int.
46. INTERVENTION POSSIBILITIES IN ELECTRONIC
COUNTERMEASURES (ECM)
1. Modern-day electronic warfare is an increasingly factor in
determining the effect. It is a force multiplier that operates on
multiple lvls of conflict, from self-protection to attk plans. If EW
actions are properly integrated with other mil ops, a synergistic
effect is achieved, losses are minimized and efficiency is
improvedi.
2. Countermeasures sys intercept sigs so that
countermeasures can be used to actively engage the
countermeasures platform in wpns sys. In order to build EOB, sys
must collect signals of interest. In both cases, the sys ability to
perform its function is directly related to the likelihood of receiving
and detecting the signal of interest. Ideally, unity is the chance of
successii. Several factors reduce the likelihood of interception.
The key factor is the likelihood of detection and noise. Detection
depends on sensors that ultimately determine the presence or
absence of a contact depending on a receiver. Having the
technical means to disrupt or deceive the recipient is an
advantage that would be very careful to guard.
3. The purpose of the electronic counter measure intercept
system is to intercept electronic signals of interest in collecting
information. The information is based on a potential or actual
enmey's facilities, capabilities and intentions. It is fundamental to
the victory of a countermeasures op to get information of the
conceivable nearness of an en as early as possibleiii. To this end,
equipment with a high probability of interception and rapid
acquisition of sig is required. The probability that the system can
detects and processes any given signaliv is defined as the
probability of interception. The intercept system should ideally
intercept any signal emitted with a range of less than the
maximum range based on the factors of free space attenuation
and system sensitivity. The ideal system would have high
sensitivity, low probability of false alarm, wide bandwidth, 360 °
antenna coverage, a high degree of accuracy in direction, high
processing capacity, reliability, cost - effectiveness and unity of
POI.
4. In order to analyze ECM systems based on POI, it must be
understood that POI is largely a question of definition based on
the purpose of the system. Specifying the probability of
interception of unity is unnecessary simply because it is the ideal
case. To do this, a more complex system may be required than is
required to carry out the mission. vIt is more realistic to specify
POI based on working backwards in automatic systems from the
maximum allowable time before interception or time. In other
systems, it is sufficient to simply intercept a fraction of the total
signal emitted to display or alert the presence of a signal or every
plus or very pulse must be intercepted.

Refs:-
ihttps://www.researchgate.net/publication/3936652_The_analysis_and_design_of_modern_Low_

Prob bility_of_Intercept

iihttps://fas.org/man/dod-101/navy/docs/fun/part11.htm

iiihttp://www.kennethkuhn.com/hpmuseum/scans/wj_prob_of_intercept.pdf

iv https://pdfs.semanticscholar.org/5061/88591b78ce8eccaeb90440a7edd05568d3fd.pdf

vhttps://www.researchgate.net/publication/3936652_The_analysis_and_design_of_modern_Low_

Prob bility_of_Intercept

Anda mungkin juga menyukai