• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

SECURING ISTAR SYSTEMS

June 8, 2004 by

SECURING ISTAR SYSTEMS WITH RECONFIGUABLE TECHNOLOGY
Paul Parkinson
Senior Systems Architect, Wind River

Brian Taylor
European Programme Manager, OEM Partnership

Abstract. This article outlines the potential for reconfigurable technology in Intelligence Surveillance & Reconnaissance (ISTAR) systems including the prevention of reverse engineering, and introduces new techniques for improving security, interoperability and field upgradeability.

Introduction

Intelligence Surveillance Target Acquisition and Reconnaissance (ISTAR) is increasingly becoming a system of systems, with each system building upon the lessons learned for the previous one deployed. The fusion of the data provided from these many different sources is being used to get inside the opponents decision cycle, enabling our own forces to have superior intelligence available to make decisions upon. As a result, there is a massive push towards multi-role Unmanned Air Vehicle (UAV) platforms, ranging from low orbit theatre satellite platforms through, multi-sensor reconnaissance platforms to all out combat capable platforms.

These platforms can be vulnerable to interception by hostile forces due to their operational role. If these platforms are to utilise leading edge technology, this must be implemented in a manner which cannot be compromised or reverse-engineered by hostile forces. There is also a growing need to perform rapid deployments of new coalitions in response to world events, and field-based configuration and upgradeability will be essential in order to achieve interoperability with other coalition forces.

This paper will consider techniques utilising reconfigurable technology to achieve secure implementations which are resistant to reverse engineering by hostile forces, and effective software destruct sequences to prevent systems from being compromised.

The Dawn of Reconfigurable Computing

Traditionally, the silicon building blocks used to construct embedded systems have fallen into one of three categories. Firstly, the 32bit CPU has proven itself to be a versatile general-purpose processor for process control, but is generally sequential in operation. Second, Digital Signal Processors (DSPs) are optimized for high-performance algorithmic processing, but generally perform dedicated function. Thirdly, Field Programmable Gate Arrays (FPGAs) have been used to implement logic, but recent developments have widened their appeal and application considerably.

The distinction between these silicon building blocks has blurred considerably with the advent of the Platform FPGA. These differ from previous generations of devices in the following ways.

The gate count of Field Programmable Gate Arrays (FPGAs) has increased dramatically in recent years, with the ready availability of devices having two million gates. The massive increase in gate count has unleashed the potential of FPGAs (also known as CPLDs – Complex Programmable Logic Devices), so that now they are no longer devices which can be used solely for interface logic, but can be used as processing subsystems in their own right. The platform FPGAs will continue to evolve in the coming years towards true system-on-a-chip systems, by incorporating CPU and DSP functionality.

These platform FPGAs have the potential to be used for algorithmic operations, but until recently this has not been exploited due to the fact that it is difficult to develop million gate applications in VHDL. However, the ability to program reconfigurable logic from high-level software languages such as C, as well as VHDL, opens up the potential of these devices to further exploitation. This has been illustrated by Xilinx EDA tools ability to generate hardware peripheral & IP definition in VHDL, closely coupled with the automatic generation of the software configuration to support the running of the VxWorks RTOS running on PowerPC processor cores within the FPGA fabric.

Secure ISTAR Implementations

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • KME logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
Hilux Military Raceday Novemeber 2023 Chepstow

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    February 3, 2023
    Read more
  • VETERANS UPDATE

    February 3, 2023
    Read more
  • MANAGEMENT ON THE MOVE

    February 3, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT