Académique Documents
Professionnel Documents
Culture Documents
ON
SECURITY,PRIVACY & TRUST IN SATELLITE COMMUNICATION
CONTENTS
INTRODUCTION
HOW
DO SATELLITES WORK??
TYPES
HOW
OF ORBITS
OPERATION
THREATS
OF SATELLITES
PROTECTION
MECHANISMS
CONCLUSION
REFERENCES
SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION
19/09/2014
INTRODUCTION
Satellites are specifically made for telecommunication purpose. They are used for mobile
applications such as communication to ships, vehicles, planes, hand-held terminals and for
TV and radio broadcasting.
They are responsible for providing these services to an assigned region (area) on the earth.
The power and bandwidth of these satellites depend upon the preferred size of the
footprint, complexity of the traffic control protocol schemes and the cost of ground
stations.
A satellite works most efficiently when the transmissions are focused with a desired area.
When the area is focused, then the emissions dont go outside that designated area and
thus minimizing the interference to the other systems. This leads more efficient spectrum
usage.
SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION
19/09/2014
INTRODUCTION(cont..)
Satellites antenna patterns play an important role and must be designed to best cover the
designated geographical area (which is generally irregular in shape). Satellites should be
designed by keeping in mind its usability for short and long term effects throughout its life
time.
The earth station should be in a position to control the satellite if it drifts from its orbit it
is subjected to any kind of drag from the external forces.
19/09/2014
1.
2.
3.
19/09/2014
TYPES OF ORBITS
Resource: http://www.mdpi.com/1424-8220/11/4/3652/ag
SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION
19/09/2014
http://t1.gstatic.com/images?
q=tbn:ANd9GcSpqzwSzgaOe7VsDa2KeSapLeAgP_3ReJhBOzYMbQUPNNoCgy0
19/09/2014
7
DISADVANTAGES
19/09/2014
These
19/09/2014
DISADVANTAGES
19/09/2014
10
19/09/2014
11
DISADVANTAGES
19/09/2014
12
Types
Service Satellites (FSS)
Example:
Broadcast
Example:
Also
Mobile
Example:
Satellite Phones
19/09/2014
13
OPERATION OF SATELLITES
Transmission
Reception
Low
Noise Converter
Polarization
Tuner
Antennas
http://www.hindawi.com/journals/mpe/2013/floats/43
2686/thumbnails/432686.fig.005_th.jpg
SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION
19/09/2014
14
The attacker may send a fake binding update message to the CN claiming that a node
(victim) has changed its care-of address due to its movement to a new location.
Consequently, the CN will start sending packets to the new CoA and the victim node will
not get any traffic.
19/09/2014
15
MAN-IN-THE-MIDDLE ATTACK:-
19/09/2014
16
PROTECTION MECHANISMS
One major concern for security in space network is the use of unauthenticated and forged
binding updates. To prevent such attacks, any node sending a binding update must prove its
right to redirect the traffic. This approach of RR is used before each binding update message is
sent to CN, and they are exchanged among the MH, HA and CN.
19/09/2014
17
PROTECTION MECHANISMS(cont..)
IPSec:In order to protect against attacks that are based on spoofed binding updates,
IPSec protocols, such as Authentication Header (AH) protocol and Encapsulating
Security Payload (ESP) protocol can be incorporated with mobility protocols in
space networks.
19/09/2014
18
CONCLUSION
In this paper, we have discussed the IP-security issues relating to space networks. We have
explained possible security vulnerabilities that may lead to wastage of all-important bandwidth
and processing power of the expensive IP-enabled devices onboard the Satellite / aircrafts. We
have also analyzed the existing and possible defense mechanisms that can prevent or mitigate
these security vulnerabilities along with their pros and cons. Based on the analysis, several
recommendation have been outlined to improve the existing mechanisms.
19/09/2014
19
REFERENCES
[1] V. Devarapalli, R. Wakikawa, A. Petrescu, and P. Thubert, Network MObility (NEMO) basic
support protocol, RFC 3963, Jan 2005.
[2] D. Johnson, C. E. Perkins, and J. Arkko, Mobility support in IPv6, IETF RFC 3775, June 2004.
[3] H. Soliman, C. Castelluccia, K. E. Malki, and L. Bellier, Hierarchical Mobile IPv6 mobility
management (HMIPv6), IETF RFC 5380, Oct 2008.
[4] M. Atiquzzaman and W. Ivancic, SIGMA for Space Sensor Web Networks, in ESTO AIST Sensor
Web Technology Meeting, Orlando, FL, April 2-3 2008.
[5] K. Bhasin and J. L. Hayden, Space internet architectures and technologies for NASA enterprises,
Journal of Satellite Communications, vol. 20, no. 5, Sept 2002.
[6] J. Noles, K. Scott, M. Zukoski, and H. Weiss, Next generation space internet: Prototype
implementation, in NASA Earth Science Technology Conference, Pasadena, CA, June 2002.
[7] W. Ivancic, D. Stewart, T. Bell, P. Paulsen, and D. Shell, Use of Mobile- IP priority home agents
for aeronautics, space operations and military applications, in IEEE Aerospace Conference, Big Sky,
MT, March 2004.
SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION
19/09/2014
20
19/09/2014
21
ANY QUERIES??
19/09/2014
22