Managing Next-Generation Open Standard Vehicle Electronics Architectures

article
article
Article
October 02, 2019

Managing Next-Generation Open Standard Vehicle Electronics Architectures

Published in Military Embedded Systems

The new IP-based networking architect­ures being integrated into military ground vehicles are able to unify the communications and shared hosting of services that used to require discrete hardware devices. These network architectures are frequently derived from enterprise-class functions leveraging the robust networking capabilities, cyber­security maturity, and development pace, plus the innovation, research, and development developed for the commercial sector. These trends promise significant technology cost savings and an increased pace of modernization, but they also introduce complexity with respect to usability and manageability.

Newer on-vehicle integrated networks will be composed of heterogeneous networks (including functions such as routing, switching, timing/A-PNT, encryp­tion, cybersecurity, voice/video/data integration, remote control, sensor integration, logging, and more) in the form of software and equipment from multiple commercial vendors. Many networks have enormous feature sets in order to meet emerging interoperability and cyber­security requirements for Department of Defense (DoD) systems and will require a level of training and expertise for operation and maintenance that far exceeds available specialists.

In recent years, major efforts have been undertaken to develop comprehensive “standards-based communication,” such as Vehicular Integration for C4ISR/EW Interoperability (VICTORY). These efforts address interoperability issues, databus functionality, and standardized messaging services for interconnected system components. But the resulting standards don’t typically address the network operation, configuration, and management challenges of hybrid (multi­media, multiclassification, multiplatform) DoD-ready networks themselves. Going forward, the complexity, downtime, and configuration errors in current and next-generation tactical and expeditionary command-and-control (C2) networks must be reduced.

Read the full article.

David Jedynak

David Jedynak

Business Unit Director and Technical Fellow

David Jedynak is Business Unit Director for Curtiss-Wright’s Salt Lake City facility, home of the Parvus small form factor network and computing products. David is also a Curtiss-Wright Technical Fellow. Previously, he served as Chief Technology Officer for Curtiss-Wright Defense Solutions for many years, and continues to provide technology leadership for the group. David joined Curtiss-Wright in 2008, and has focused his expertise in network-centric systems, COTS solutions and Assured Position, Navigation and Timing. He actively drives and supports the adoption of modular open standard approach (MOSA) architectures for the defense industry to accelerate technology deployment. Prior to joining Curtiss-Wright, David worked in both the automotive electronics and film industries on the forefront of industry-wide migrations to cutting-edge open standard digital architectures. He holds a BS Electrical Engineering from UCLA, as well as a Certificate in Astronautical Engineering and a Certificate in Project Management, both also from UCLA.

What is Assured Positioning, Navigation and Timing?

The potential vulnerabilities of the military’s dependence on Global Positioning System (GPS) and Global Navigation Satellite System (GNSS) data are driving demand for new deployed approaches for detecting threats. In GPS/GNSS-denied environments, ensuring accurate Positioning, Navigation and Timing (PNT) information is delivered to the warfighter is absolutely critical.

Commercial Solutions for Classified (CSfC)

Commercial Solutions for Classified (CSfC) is an important part of NSA’s commercial cybersecurity strategy to deliver secure solutions that leverage commercial technologies and products to deliver cybersecurity solutions quickly. The CSfC program is founded on the principle that properly configured, layered solutions can provide adequate protection of classified data in various applications.