
SKA Edge Controller (SKA-EC)
SKA-EC is a rapidly deployable, lightweight platform that enables strong, scalable, high assurance security at the edge and in air gapped environments.
Lightweight endpoint devices can now benefit from symmetric encryption without the complexities, cost implications and limitations of traditional pre-shared keys, as well as avoiding the risks associated with use of PKI, future proofing the network against quantum attack.
Enabling operational advantage through cybersecurity
Robust encryption running on COTS technology
Integrates into existing security without the need to rip and replace
Flexible key creation and security grouping control
Enables dynamic control of networks to add and remove users and endpoints as required
Enables ephemeral, rotating keys on endpoint devices
Removes need to pre-load and rekey an entire device fleet
Can be deployed in minutes on portable hardware
Rapidly scalable across diverse and complex networks without delay
SKA-EC ruggedised appliances support rapid deployment of operational deployments made up of single or distributed C2 nodes to provide agility, high assurance security, enhanced manoeuvrability, reduction in SWaP, hardware costs and overheads to enhance modern military operations.
Use Cases
Dispersed and Distributed Headquarters
SKA-EC enables symmetric encryption for a modern deployed headquarters made up of multiple scalable nodes that can operate independently or collectively, creating a dispersed and disaggregated environment.
- Assurable solution
- Bearer agnostic
- Dynamic generation and forward rotation of symmetric keys
- Eliminate hardware costs, security implications and support requirements
- Manage user groups and information sharing at the encryption layer
Next-Gen UxV Operations
SKA-EC enables UxVs of any size to create dynamic symmetric keys without cryptographic hardware, enabling secure communication between Ground Control Station (GCS), UxVs and SKA-EC (core network).
- Eliminates SWaP restrictions
- Continuous endpoint authentication supports anti-spoofing and dynamic access control
Secure your Network
Solution
SKA-EC provides a simple installation and setup process on hardware, core networks or cloud environments, allowing distributed C2 node deployments in hostile terrains e.g. Forward C2 nodes closer to operations or mobile C2 nodes that can rapidly relocate as the battlefield evolves.
SKA-EC can also be easily deployed in cloud VPCs on cloud virtual machines to support ephemeral cloud missions where C2 nodes can be spun up rapidly to support covert communications in dynamic environments e.g. VPN communications between Unmanned Submarine Vehicles (USVs) and operational headquarters.
SKA-EC eliminates current restrictions on deployed C2 infrastructure. By overcoming the complexities, cost implications and limitation of Pre-shared Keys (PSKs), and avoiding the risks associated with use of PKI, SKA-EC provides a cost effective, crypto-agile and secure-by-design solution that can integrate seamlessly into existing hardware and software solutions. SKA-EC enables split trust and zero trust architectures whilst providing dynamic generation of symmetric keys across trusted endpoints.
Operations
- Extends security to the edge, providing flexibility and agility.
- Bearer Agnostic – removes operational limitations associated with reliance on physical network connections, enabling utilisation of wireless technologies and commercial networks.
- Enables dispersed and distributed operations to support current future deployment models.
- Real-time management of endpoints and ad-hoc creation and reforming of device groupings, allowing flexible network access control
Economics
- Provide security at the edge without expensive hardware-based encryption, support costs and associated SWaP restrictions.
- Reduce manual key distribution, storage and management costs.
- Compatible with current encryption algorithms and industry standards, reducing integration overheads.
Security
- Dynamic generation and forward rotation of symmetric session and authentication keys, providing forward secrecy and eliminating manual key management errors.
- Anti-spoofing capability supported by forward rotating individual device authentication keys.
- Supports split trust/zero trust architectures to provide continuous device authentication and granular access control.
- Cryptographically agile, adapting to any future key size without impacting speed and performance and independent of any hardware requirements.
Compliance
- Conforms to NIST and CSNA 2.0 standards for cryptography e.g. AES-256, Hashing algorithms
- Compliance with National Security Memorandum NSM-10 and NSA CSfC Symmetric Key Management Requirements Annex 2.1, FIPS 140-3 Inside.
- Agnostic to choice of cipher and hashing algorithm which allows for replacement as new standards emerge.
- ISO 27001, Cyber Essentials certified
SKA-EC serves as a central pillar in architecting deployed operations with distributed C2 nodes, enabling the full potential of modern military operations whilst delivering cost and operational efficiencies and improved agility and flexibility.
By combining the security strengths of dynamic PSKs with the adaptability of PKI, SKA-EC addresses the evolving challenges and requirements of deployed and desegregated operations to ensure mission success.