Funding Opportunities
FUNDING TOPICS:

FILTER BY: action icon action icon
YEAR









DIVISION










TECHNICAL AREAS








































Research Topics:
Research Area
  • Securing Aviation
  • Protecting from Terrorist Attacks
  • Securing Borders
  • Securing Cyberspace
  • Preventing Terrorism
  • Managing Incidents
  • Securing Critical Infrastructure
Priority R&D Need
  • High-Throughput Cargo Screening
  • Cost-effective Electronic Imaging for Bulk Air Cargo
  • Passenger Identification and Vetting
  • Rapid Detection and Alarming of Explosives
  • Distinguishing Threats from Non-threats on Passengers
  • Efficient and Accurate Detection of Complex Threat Concealment on Passengers and Carried Property
  • Personal Protective Equipment for all CBRNE Hazards
  • Modeling and Predictive Analytics for Decision Making
  • Disease and Biological Threat Detection, Identification, and Classification in Field Operational Environments
  • Biological Attack Verification
  • Cross-border Tunnel Detection, Surveillance, and Forensics
  • Infrastructure Tunnel Surveillance
  • Integrated and Improved Sensors, Systems, and Data
  • Actionable Intelligence Gathering and Sharing
  • Dark Aircraft and Vessel Detection, Tracking, and Interdiction
  • Expedited People Screening
  • Maritime Surveillance and Communications in Remote Environments
  • Distributed Cloud-based Communications and Monitoring - Associated/Related Efforts
  • Human Aspects of Cybersecurity-Associated/Related Efforts
  • Network and Systems Security-Associated/Related Efforts
  • Mobile Security-Associated/Related Efforts
  • Critical Infrastructure - Associated/Related Efforts
  • Software Assurance - Associated/Related Efforts
  • Cyber Security Outreach - Associated/Related Efforts
  • Cybersecurity for Law Enforcement-Associated/Related Efforts
  • Cyber Enabled Networked Physical Systems Security
  • Organic Explosive Compound and Homemade Explosives Detection
  • Improvised Explosive Device-related Anomaly Detection
  • Automated Machine Learning
  • Prevention
  • Advanced Analytics
  • Situational Awareness
  • Communications
  • Command, Control, Communications
  • Training and Exercises
  • Responder Health, Safety, Performance
  • Logistics and Resource Management
  • Casualty Management
  • Risk Assessment and Planning
  • Intelligence and Investigation
  • Dependency and Interdependency Analysis
  • Risk-Informed Prioritization
Topic Keywords
  • Agricultural Pathogen
  • Algorithms
  • All-Hazard
  • Analysis
  • Big Data
  • Biometrics
  • Border Protection
  • Canine
  • Cargo
  • Checked Baggage
  • Child Exploitation
  • Classify
  • Communications
  • Contraband
  • Critical Infrastructure
  • Crowdsourcing
  • Cyber
  • Data
  • Data Analytics
  • Denial of Service
  • Detection
  • Diagnostics
  • Disaster
  • Explosives
  • Flood
  • Forensics
  • Human Trafficking
  • Identity
  • Incident Management
  • Infrastructure
  • Interdiction
  • Internet
  • Internet of Things
  • LMR
  • LTE
  • Locate
  • Managing Incidents
  • Mission Critical Voice
  • Mitigation
  • Mobile
  • Modeling & Simulation
  • Narcotics
  • Network
  • Opioids
  • P25
  • Physical Security
  • Policy
  • Position Navigation & Timing
  • Preventing Terrorism
  • Prevention
  • Privacy
  • Protection-Terrorist Attacks
  • Recognition
  • Resilience
  • Risk
  • Screening
  • Securing Aviation
  • Securing Borders
  • Securing Cyber
  • Security
  • Sensor
  • Situational Awareness
  • Social Media
  • Software
  • Terrorism
  • Test & Evaluation
  • Track
  • Training
  • UAS
  • Vaccine
  • Video
  • Virus
LRBAA TOPIC SEARCH RESULTS
Research Area:   Securing Borders (SEC BORD)
Priority R&D Need:  Integrated and Improved Sensors, Systems, and Data
Topic Number:  SEC BORD 03-01
Topic Title:  Unmanned Aircraft Systems (UAS) Detection, Tracking and Classification-Test and Evaluation
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Unmanned Aircraft Systems (UAS) Detection, Tracking, and Classification: Unmanned Aircraft Systems can represent a threat to people, critical infrastructure, and border alike. Technologies and methods to detect, track, and classify UAS's in complex environments, including the determination of intent. Unique research material for test and evaluation of technologies to detect, track, and locate the pilot controller of a UAS vehicle.
Unmanned Aircraft Systems (UAS) Detection, Tracking, and Classification: Unmanned Aircraft Systems can represent a threat to people, critical infrastructure, and border alike. Technologies and methods to detect, track, and classify UAS's in complex environments, including the determination of intent. Unique research material for test and evaluation of technologies to detect, track, and locate the pilot controller of a UAS vehicle. less
Topic Research Type:  Type II, Type III
End Objective:

The end objective of this effort is develop and demonstrate innovative, reliable, easy-to-use, and easy-to-deploy technologies that allow the Department of Homeland Security Components to accurately and consistently detect, track, classify, and conduct threat assessments of Unmanned Aerial Systems in variable and complex environments.

TRL Sought:  5-6
TRL at Conclusion:  7
Transition Customer or Program:

Customs and Border Protection / United States Coast Guard

Background Information and S&T Challenges:

DHS S&T is working to facilitate the development of technologies that allow the DHS Component to accurately and consistently detect, track, classify, and conduct threat assessments of Unmanned Aerial Systems in variable and complex environments. As such, it is open to any potentially viable technique, methodology, or approach that fulfills the aforementioned requirements. The primary challenge is target discrimination as birds, debris, insects, and other airborne objects appear as valid UAS to many sensors. Other challenges include interference with and damage of other systems using the same wave bands (including visual bands in the case of high-power laser systems), high noise levels such as the use of acoustics sensors in urban environments, and excessive target-sensor stand-off distances. Technologies should address, but not be limited to, the following requirements:

1. Easy-to-Use
2. Easy-to-Deploy
3. Work in variable weather conditions
4. Work at variable altitudes
5. Work in densely populated urban centers or sparsely populated rural areas
6. Should not interfere with customer component standard operations
7. Should not cause disruptions of civilian services
8. Have a low false alarm rate in the areas of detection, tracking, and classification
9. Capable of being configured or converted for portable operations
10. Provide users with real-time analysis and after-action reports
11. Capable of being networked incorporating robust cybersecurity attributes

Transition Opportunities:

Selected industry participants will have their technologies exposed to DHS Component acquisition and operations personnel during development and demonstration.

Supporting Information and Links:

division icon
Securing Borders
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Borders (SEC BORD)
Priority R&D Need:  Integrated and Improved Sensors, Systems, and Data
Topic Number:  SEC BORD 03-02
Topic Title:  Unmanned Aircraft Systems (UAS) Detection, Tracking and Classification-Develop Advanced Technology
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Unmanned Aircraft Systems (UAS) Detection, Tracking, and Classification: Unmanned Aircraft Systems can represent a threat to people, critical infrastructure, and border alike. Technologies and methods to detect, track, and classify UAS's in complex environments, including the determination of intent. Unique research material for developing advanced technologies to detect, track, and locate the pilot controller of a UAS vehicle.
Unmanned Aircraft Systems (UAS) Detection, Tracking, and Classification: Unmanned Aircraft Systems can represent a threat to people, critical infrastructure, and border alike. Technologies and methods to detect, track, and classify UAS's in complex environments, including the determination of intent. Unique research material for developing advanced technologies to detect, track, and locate the pilot controller of a UAS vehicle. less
Topic Research Type:  Type II, Type III
End Objective:

The end objective of this effort is to collect unique research material that address and explore the development and deployment of innovative, reliable, easy-to-use, and easy-to-deploy technologies that allow the component customers of the Department of Homeland Security's Science and Technology Directorate to accurately and consistently detect, track, classify, and conduct a cursory threat assessment of Unmanned Aircraft Systems in variable and complex environments.

TRL Sought:  5-6
TRL at Conclusion:  7
Transition Customer or Program:

Customs and Border Protection, US Border Patrol

Background Information and S&T Challenges:

DHS S&T is working to facilitate the development of technologies that allow the component customers of the Department of Homeland Security's Science and Technology Directorate to accurately and consistently detect, track, classify, and conduct a cursory threat assessment of Unmanned Aircraft Systems in variable and complex environments. As such, it is open to any potentially viable technique, methodology, or approach that fulfills the aforementioned requirements on behalf of our component customers. Proposed systems should fulfill, but not be limited to, the following requirements:

1. Easy-to-Use
2. Easy-to-Deploy
3. Work in variable weather conditions
4. Work at variable altitudes
5. Work in densely populated urban centers or sparsely populated communities
6. Should not interfere with customer component standard operations
7. Should not cause disruptions of civilian services
8. Have a low false alarm rate in the areas of detection, tracking, and classification
9. Have a smaller portable version
10. Provide users with real-time analysis and after-action reports
11. Should have networking capabilities
12. Should have high-level cybersecurity capabilities

Transition Opportunities:

Industry participants chosen to take part in DHS S&T UAS Detection, Tracking, and Classification Programs will carry out projects whose ultimate objective and mission will fulfill key requirements defined by DHS S&T component customers. DHS S&T funded projects will have clearly defined transition requirements consistent with the needs of DHS S&T component customers.

Supporting Information and Links:

division icon
Securing Borders
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Borders (SEC BORD)
Priority R&D Need:  Integrated and Improved Sensors, Systems, and Data
Topic Number:  SEC BORD 03-03
Topic Title:  Unmanned Aircraft Systems Mitigation-Test and Evaluation
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Unmanned Aerial Systems (UAS) Mitigation: Unmanned Aerial Systems can represent a threat to people, critical infrastructure, and borders alike. Technologies and methods to mitigate either the UAS aircraft, communications links, or the controllers in environments which may be complex and/or urban. Modifications or adjuncts to existing systems that extent their capabilities to include mitigation also fall under this topic.
Unmanned Aerial Systems (UAS) Mitigation: Unmanned Aerial Systems can represent a threat to people, critical infrastructure, and borders alike. Technologies and methods to mitigate either the UAS aircraft, communications links, or the controllers in environments which may be complex and/or urban. Modifications or adjuncts to existing systems that extent their capabilities to include mitigation also fall under this topic. less
Topic Research Type:  Type II, Type III
End Objective:

The end objective of this effort the development and deployment of innovative, reliable, easy-to-use, and easy-to-deploy technologies that allow DHS Components to accurately and consistently mitigate Unmanned Aerial Systems in variable and complex environments.

TRL Sought:  5-6
TRL at Conclusion:  7
Transition Customer or Program:

Customs and Border Protection

Background Information and S&T Challenges:

DHS S&T is working to facilitate the development of technologies that allow the component customers of the Department of Homeland Security's Science and Technology Directorate to accurately and consistently mitigate Unmanned Aircraft Systems as a threat in variable and complex environments. As such, the Directorate is open to any potentially viable technique, methodology, or approach that fulfills the aforementioned requirements on behalf of our component customers. Proposed systems should fulfill, but not be limited to, the following requirements:

 1. Innovative Approaches in the following areas should be considered:
        a. Directional RF/GNSS Jamming
        b. Omni-Directional RF/GNSS Jamming
        c. Spoofing (cyber attacking)
        d. Kinetic Attacks
 2. Easy-to-Use
 3. Easy-to-Deploy
 4. Work in variable weather conditions
 5. Work at variable altitudes
 6. Work in densely populated urban centers or sparsely populated communities
 7. Should not interfere with customer component standard operations
 8. Should not cause disruptions of civilian services
 9. Be effective at variable distances
10. Have a smaller portable version
11. Provide users with real-time analysis and after-action reports
12. Should have networking capabilities
13. Should have integrated cybersecurity protections

Transition Opportunities:

Industry participants chosen to take part in DHS S&T UAS Threat Mitigation Programs will carry out projects whose ultimate objective and mission will fulfill key requirements defined by DHS S&T component customers. DHS S&T funded projects will have clearly defined transition requirements consistent with the needs of DHS S&T component customers.

Supporting Information and Links:

division icon
Securing Borders
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Borders (SEC BORD)
Priority R&D Need:  Integrated and Improved Sensors, Systems, and Data
Topic Number:  SEC BORD 03-04
Topic Title:  Unmanned Aircraft Systems Mitigation-Develop New or Advanced Capability
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Unmanned Aerial Systems (UAS) Mitigation: Unmanned Aerial Systems can represent a threat to people, critical infrastructure, and borders alike. Technologies and methods to mitigate either the UAS aircraft, communications links, or the controllers in environments which may be complex and/or urban. Modifications or adjuncts to existing systems that extent their capabilities to include mitigation also fall under this topic.
Unmanned Aerial Systems (UAS) Mitigation: Unmanned Aerial Systems can represent a threat to people, critical infrastructure, and borders alike. Technologies and methods to mitigate either the UAS aircraft, communications links, or the controllers in environments which may be complex and/or urban. Modifications or adjuncts to existing systems that extent their capabilities to include mitigation also fall under this topic. less
Topic Research Type:  Type II, Type III
End Objective:

The end objective of this effort the development and deployment of innovative, reliable, easy-to-use, and easy-to-deploy technologies that allow DHS Components to accurately and consistently mitigate Unmanned Aerial Systems in variable and complex environments.

TRL Sought:  5-6
TRL at Conclusion:  7
Transition Customer or Program:

Customs and Border Protection

Background Information and S&T Challenges:

DHS S&T is working to facilitate the development of technologies that allow the component customers of the Department of Homeland Security's Science and Technology Directorate to accurately and consistently mitigate Unmanned Aircraft Systems as a threat in variable and complex environments. As such, the Directorate is open to any potentially viable technique, methodology, or approach that fulfills the aforementioned requirements on behalf of our component customers. Proposed systems should fulfill, but not be limited to, the following requirements:

 1. Innovative Approaches in the following areas should be considered:
        a. Directional RF/GNSS Jamming
        b. Omni-Directional RF/GNSS Jamming
        c. Spoofing (cyber attacking)
        d. Kinetic Attacks
 2. Easy-to-Use
 3. Easy-to-Deploy
 4. Work in variable weather conditions
 5. Work at variable altitudes
 6. Work in densely populated urban centers or sparsely populated communities
 7. Should not interfere with customer component standard operations
 8. Should not cause disruptions of civilian services
 9. Be effective at variable distances
10. Have a smaller portable version
11. Provide users with real-time analysis and after-action reports
12. Should have networking capabilities
13. Should have integrated cybersecurity protections

Transition Opportunities:

Industry participants chosen to take part in DHS S&T UAS Threat Mitigation Programs will carry out projects whose ultimate objective and mission will fulfill key requirements defined by DHS S&T component customers. DHS S&T funded projects will have clearly defined transition requirements consistent with the needs of DHS S&T component customers.

Supporting Information and Links:

division icon
Securing Borders
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Distributed Cloud-based Communications and Monitoring - Associated/Related Efforts
Topic Number:  SEC CYB 01-01
Topic Title:  Cyber Enabled Networked Physical Systems
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
This is a critical time in the design and deployment of Cyber Enabled Networked Physical Systems (CNPS). Advances in networking, computing, sensing, and control systems have enabled a broad range of new devices. These systems are being designed and deployed now, but unfortunately security is often left as an additional feature that will be bolted on later. Industry is driven by functional requirements and fast moving markets. The design choices being made today will dire ... more
This is a critical time in the design and deployment of Cyber Enabled Networked Physical Systems (CNPS). Advances in networking, computing, sensing, and control systems have enabled a broad range of new devices. These systems are being designed and deployed now, but unfortunately security is often left as an additional feature that will be bolted on later. Industry is driven by functional requirements and fast moving markets. The design choices being made today will directly impact next several decades in transportation, emergency response, medical devices, and so forth. To address these challenges, CSD is engaging in efforts to build security into the design of these critical systems. less
Topic Research Type:  Type II, Type III
End Objective:

Results of this topic should provide new and novel capabilities and solutions to assist DHS, Operations, and Law Enforcement components to improve the understanding and confidence of DHS and the Homeland Security Enterprise (HSE) on how CNPS leverage network environments (trusted and untrusted), devices, and sensors to compute and communicate processes and the security risks and challenges associated with the appropriate level of automation, Machine-to-Machine (M2M), communications, learning, and intelligence.

TRL Sought: 
TRL at Conclusion: 
Transition Customer or Program:

DHS Components, Operations, and Law Enforcement Components

Background Information and S&T Challenges:

This topic is seeking to address various challenges faced by DHS, Operations, and Law Enforcement. CNPS builds upon the CPSSEC Strategy and the nine key strategic drivers identified in the 2015 NITRD CPS Vision Statement. CNPS are being designed and scaled to autonomously compute, communicate, and execute processes from data collected from networks, devices and sensors, and other intelligent systems. As CNPS system design becomes more complex, automated, intelligent, and integrated with legacy networks and systems - Cybersecurity risks and challenges will only increase.

Transition Opportunities:

Developed solutions should transition to federal and law enforcement end-users. Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Distributed Cloud-based Communications and Monitoring - Associated/Related Efforts
Topic Number:  SEC CYB 01-02
Topic Title:  Internet of Things (IoT) Security (IoTSEC)
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The research and development of tools and techniques to aid DHS mission and operations components, law enforcement entities, and Critical Infrastructure (CI) asset owners and operators (to include IT and Internet Infrastructures) in addressing the security gaps between existing traditional IT networks and the broad range of new IoT devices being designed and deployed without security considerations.
The research and development of tools and techniques to aid DHS mission and operations components, law enforcement entities, and Critical Infrastructure (CI) asset owners and operators (to include IT and Internet Infrastructures) in addressing the security gaps between existing traditional IT networks and the broad range of new IoT devices being designed and deployed without security considerations. less
Topic Research Type:  Type II, Type III
End Objective:

Results of this topic should provide new and novel capabilities and solutions to assist DHS mission, operations, and law enforcement components to securely leverage, integrate, and interact with IoT systems that affect their operations and assets. Objectives include Detecting, Authenticating, and Updating IoT devices, sensors, and systems to gain comprehensive and near continuous knowledge of an IoT environment.

TRL Sought: 
TRL at Conclusion: 
Transition Customer or Program:

DHS Mission, Operations, and Law Enforcement Components

Background Information and S&T Challenges:

This topic is seeking to address various challenges faced by DHS Mission, Operations, and Law Enforcement components in securing the interactions between existing networks and IoT Devices. The IoT continues to expand and disrupt the nation's CI/IT infrastructure. This expansion has resulted in numerous advancements but has also increased the attack surface for malicious actors.

Transition Opportunities:

Developed solutions should transition to federal and law enforcement end-users. Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Distributed Cloud-based Communications and Monitoring - Associated/Related Efforts
Topic Number:  SEC CYB 01-03
Topic Title:  National Research Infrastructure of Cyber Security Experimentation
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The results of this topic will catalyze and support the research, and development of advanced experimental research tools, technologies and methodologies as broadly available national resources. Indicators of the success of this program objective will be the realization of experimental research capabilities, and approaches that reach beyond today's state of the art.
The results of this topic will catalyze and support the research, and development of advanced experimental research tools, technologies and methodologies as broadly available national resources. Indicators of the success of this program objective will be the realization of experimental research capabilities, and approaches that reach beyond today's state of the art. less
Topic Research Type:  Type III
End Objective:

The Cybersecurity Experimentation of the Future (CEF) Testbed will provide cybersecurity researchers with the ability to run experiments on an unclassified secure "virtual internet," through contained environments that can safely test advanced defense mechanisms against live threats without endangering operational networks.The CEF Testbed will provide the cybersecurity research community with a complex test capability and infrastructure (networks, tools, methodologies, tech support) to support national-scale testing of advanced cybersecurity technologies in an open, non-proprietary environment. CEF will enable the applied/research community to share complex cybersecurity experiments, designs, lab setups, software, tools, procedures and data; this allows rapid validation of complex technical findings and avoiding redundant experimental effort.

TRL Sought:  2-3
TRL at Conclusion:  3
Transition Customer or Program:

Transition customers include cybersecurity researchers, instructors and students.

Background Information and S&T Challenges:

Realization of experimental research infrastructures, capabilities, and approaches that reach beyond today's state of the art are needed. These infrastructures, together with similar broad-based objectives that transform discovery, validation, and ongoing analysis in an increasingly complex and challenging domain must provide, as examples:

  • Support for multi-disciplinary, complex, and extreme scale experimentation;
  • Support for emerging research areas such as specialized cyber-physical systems and cybersecurity relevant human behavior;
  • The creation and capture of advances in scientific methodologies, experimental processes, and education; and
  • Strategies for dynamic and flexible experimentation across user communities and infrastructure facilities.

Transition Opportunities:

Developed solutions should transition to federal, state and academic cybersecurity testbeds. Solutions may be brand new capabilities not currently on the market or current solutions that can be modified to address specific requirements.

Supporting Information and Links:
division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Distributed Cloud-based Communications and Monitoring - Associated/Related Efforts
Topic Number:  SEC CYB 01-04
Topic Title:  Smart Cities
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
DHS S&T is working closely with National Institute of Standards and Technology (NIST)on NIST's 2017-2018 Global Cities Team Challenge (GCTC) to reach out and raise awareness of the need for cybersecurity in emerging "Smart Cities." The new DHS S&T-NIST Smart and Secure Cities and Communities Challenge (SC3) program is encouraging GCTC participants to adopt designed-in cybersecurity for "smart city" systems that are more secure, reliable, resilient and protective of priva ... more
DHS S&T is working closely with National Institute of Standards and Technology (NIST)on NIST's 2017-2018 Global Cities Team Challenge (GCTC) to reach out and raise awareness of the need for cybersecurity in emerging "Smart Cities." The new DHS S&T-NIST Smart and Secure Cities and Communities Challenge (SC3) program is encouraging GCTC participants to adopt designed-in cybersecurity for "smart city" systems that are more secure, reliable, resilient and protective of privacy. Through SC3, DHS S&T CSD is promoting the development, adoption and implementation of cybersecurity protections within smart-city environments and helping DHS S&T-funded programs and performers bring their solutions into the GCTC. DHS S&T is also calling on innovators from the cybersecurity industry and research community to teach cities, communities and GCTC teams about cyber challenges, cyber physical systems and internet-of-things devices to help address cybersecurity and privacy objectives. less
Topic Research Type:  Type II, Type III
End Objective:

To establish and demonstrate replicable, scalable, and sustainable models for incubation and deployment of interoperable, secure, standard-based solutions using advanced technologies such as Internet of Things (IoT) and Cyber-Physical Systems (CPS) and demonstrate their measurable benefits in cities and communities

TRL Sought:  4-7
TRL at Conclusion:  5-8
Transition Customer or Program:

Homeland Security Enterprise, DHS Components

Background Information and S&T Challenges:

There are numerous organizations across the United States and internationally, including local governments, nonprofit organizations, academic institutions, technologists, and corporations working to enhance and improve life in cities and communities. These projects have primarily focused on enabling IoT devices and applications to interact and improve processes across a range of domains. The challenge is that many of these projects have not focused on the privacy and security aspects of IoT enabled devices.

Transition Opportunities:

Developed solutions should transition to primarily local Smart City communities, but may be applied to a broader range of organizations.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Network and Systems Security-Associated/Related Efforts
Topic Number:  SEC CYB 03-06
Topic Title:  National Research Infrastructure of Cyber Security Experimentation
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Duplicate Topic - The results of this topic will catalyze and support the research, and development of advanced experimental research tools, technologies and methodologies as broadly available national resources. Indicators of the success of this program objective will be the realization of experimental research capabilities, and approaches that reach beyond today's state of the art.
Duplicate Topic - The results of this topic will catalyze and support the research, and development of advanced experimental research tools, technologies and methodologies as broadly available national resources. Indicators of the success of this program objective will be the realization of experimental research capabilities, and approaches that reach beyond today's state of the art. less
Topic Research Type:  Type III
End Objective:

The Cybersecurity Experimentation of the Future (CEF) Testbed will provide cybersecurity researchers with the ability to run experiments on an unclassified secure "virtual internet," through contained environments that can safely test advanced defense mechanisms against live threats without endangering operational networks. The CEF Testbed will provide the cybersecurity research community with a complex test capability and infrastructure (networks, tools, methodologies, tech support) to support national-scale testing of advanced cybersecurity technologies in an open, non-proprietary environment. CEF will enable the applied/research community to share complex cybersecurity experiments, designs, lab setups, software, tools, procedures and data; this allows rapid validation of complex technical findings and avoiding redundant experimental effort.

TRL Sought:  2-3
TRL at Conclusion:  3
Background Information and S&T Challenges:

Transition Opportunities:

Supporting Information and Links:

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Showing  to  of  topics