A key management approach for unmanned aerial systems utilizes cryptographic protocols for dynamic group keying to secure the command and control channels while limiting the receipt of the sensor broadcasts to authorized users.

Secure Resilient Systems and Technology

Our group develops architectures and technologies for ensuring security and resiliency of mission-critical cyber-physical systems, from drones and satellites to high-performance secure cloud computing. We pursue innovative research and development through the problem analysis, rapid prototyping, and field testing phases, to ultimately deliver our technological solutions for Department of Defense and Intelligence Community uses. Our group is made up of top scientists, engineers, and support staff who share a common passion for solving some of the hardest technical problems relevant to national security.

Featured Projects

An illustration of a machine transforming "C" icons into "Rust" icons.
Lincoln Laboratory is leading test and evaluation on a DARPA program to translate large C codebases into memory-safe Rust code, releasing a benchmark every six months to guide program performers.
A photo of a service member preparing a small autonomous robot.
cyber security
A security module, pre-certified by the National Security Agency, for protecting communications on uncrewed platforms can accelerate the fielding of new systems and open opportunities for the commercial sector.
a collage of images showing a satellite, a jet, a warship, and soldiers on the ground. In the middle of the collage is an illustration of a circuit board.
cyber security
Lincoln Laboratory is developing technologies to meet the highest standards for information security at the tactical edge.
an illustration of satellite in space with Earth's blue surface in the background.
cyber security
We are researching and prototyping cyber-resilient space systems software that will enable critical national security space assets to withstand, operate through, and recover from cyberattack.
an illustration of several dozen translucent blue cubes, with highlighting lines connecting them, representing nodes.
cyber security
We are creating secure software foundations and applying them to operating systems used widely in mission-critical systems for the Department of War.

Advancing Our Research