Vous êtes sur la page 1sur 22

TECHNICAL SEMINAR

ON
SECURITY,PRIVACY & TRUST IN SATELLITE COMMUNICATION

NAME: SWETALINA DAS


REGD NO.: 1101289294
BRANCH: ELECTRONICS AND TELECOMMUNICATION
YEAR: 2011-2015

TRIDENT ACADEMY OF TECHNOLOGY,


BHUBANESWAR

CONTENTS
INTRODUCTION
HOW

DO SATELLITES WORK??

TYPES
HOW

OF ORBITS

SATELLITES ARE USED??

OPERATION
THREATS

OF SATELLITES

FOR SPACE NETWORKS

PROTECTION

MECHANISMS

CONCLUSION
REFERENCES
SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION

19/09/2014

INTRODUCTION

Satellites are specifically made for telecommunication purpose. They are used for mobile
applications such as communication to ships, vehicles, planes, hand-held terminals and for
TV and radio broadcasting.

They are responsible for providing these services to an assigned region (area) on the earth.
The power and bandwidth of these satellites depend upon the preferred size of the
footprint, complexity of the traffic control protocol schemes and the cost of ground
stations.

A satellite works most efficiently when the transmissions are focused with a desired area.
When the area is focused, then the emissions dont go outside that designated area and
thus minimizing the interference to the other systems. This leads more efficient spectrum
usage.
SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION

19/09/2014

INTRODUCTION(cont..)

Satellites antenna patterns play an important role and must be designed to best cover the
designated geographical area (which is generally irregular in shape). Satellites should be
designed by keeping in mind its usability for short and long term effects throughout its life
time.

The earth station should be in a position to control the satellite if it drifts from its orbit it
is subjected to any kind of drag from the external forces.

SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION

19/09/2014

HOW DO SATELLITES WORK??

1.

A Earth Station sends message in


GHz range. (Uplink)

2.

Satellite Receive and retransmit


signals back. (Downlink)

3.

Other Earth Stations receive


message in useful strength area.
(Footprint)
http://www.williamcraigcook.com/satellite/work.html

SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION

19/09/2014

TYPES OF ORBITS

GEO: Geostationary Earth Orbit

MEO: Medium Earth Orbit

LEO: Low Earth Orbit.

Resource: http://www.mdpi.com/1424-8220/11/4/3652/ag
SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION

19/09/2014

GEOSTATIONARY EARTH ORBIT

Orbit is synchronous with the earths rotation.

From the ground the satellite appears fixed.

Altitude is about 23,000 miles.

Coverage to 40% of planet per satellite.


SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION

http://t1.gstatic.com/images?
q=tbn:ANd9GcSpqzwSzgaOe7VsDa2KeSapLeAgP_3ReJhBOzYMbQUPNNoCgy0
19/09/2014
7

GEOSTATIONARY EARTH ORBIT(cont..)


ADVANTAGES

A GEO satellites distance


from earth gives it a large
coverage area, almost a
fourth of the earths
surface.

DISADVANTAGES

A GEO satellites distance also


cause it to have both a
comparatively weak signal and a
time delay in the signal, which is
bad for point to point
communication.

GEO satellites, centered above


the equator, have difficulty
broadcasting signals to near
polar regions

GEO satellites have a 24


hour view of a particular
area.
These factors make it ideal
for satellite broadcast and
other multipoint
applications.

SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION

19/09/2014

MEDIUM EARTH ORBITS

MEOs orbits between the altitudes of 5,600 and


9,500 miles.

These

orbits are primarily reserved for


communications satellites that cover the North and
South Pole.
Unlike

the circular orbit of the geostationary satellites, MEOs are


placed in an elliptical (oval-shaped) orbit.
Approximately

a dozen medium Earth orbiting satellites are


necessary to provide continuous global coverage 24 hours a day.

SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION

19/09/2014

MEDIUM EARTH ORBITS(cont..)


ADVANTAGES

A MEO satellites longer


duration of visibility and
wider footprint means
fewer satellites are
needed in a MEO network
than a LEO network.

SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION

DISADVANTAGES

A MEO satellites distance


gives it a longer time
delay and weaker signal
than a LEO satellite,
though not as bad as a
GEO satellite.

19/09/2014

10

LOW EARTH ORBITS

LEO satellites are much closer to the earth than GEO


satellites, ranging from 500 to 1,500 km above the surface.

LEO satellites dont stay in fixed position relative to the


surface, and are only visible for 15 to 20 minutes each pass.

A network of LEO satellites is necessary for LEO satellites to


be useful

SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION

19/09/2014

11

LOW EARTH ORBITS(contd..)


ADVANTAGES

A LEO satellites proximity


to earth compared to a GEO
satellite gives it a better
signal strength and less of a
time delay, which makes it
better for point to point
communication.
A LEO satellites smaller
area of coverage is less of a
waste of bandwidth.

SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION

DISADVANTAGES

A network of LEO satellites is


needed, which can be costly

LEO satellites have to


compensate for Doppler
shifts cause by their relative
movement.

Atmospheric drag effects LEO


satellites, causing gradual
orbital deterioration.

19/09/2014

12

HOW SATELLITES ARE USED??


Service
Fixed

Types
Service Satellites (FSS)

Example:
Broadcast

Service Satellites (BSS)

Example:
Also
Mobile

Point to Point Communication


Satellite Television/Radio

called Direct Broadcast Service (DBS).

Service Satellites (MSS)

Example:

Satellite Phones

SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION

19/09/2014

13

OPERATION OF SATELLITES

Transmission
Reception
Low

Noise Converter

Polarization
Tuner
Antennas

http://www.hindawi.com/journals/mpe/2013/floats/43
2686/thumbnails/432686.fig.005_th.jpg
SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION

19/09/2014

14

THREATS FOR SPACE NETWORKS

TRAFFIC REDIRECTION ATTACK:-

The attacker may send a fake binding update message to the CN claiming that a node
(victim) has changed its care-of address due to its movement to a new location.
Consequently, the CN will start sending packets to the new CoA and the victim node will
not get any traffic.

SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION

19/09/2014

15

THREATS FOR SPACE NETWORKS(cont..)

MAN-IN-THE-MIDDLE ATTACK:-

The attacker might send spoofed binding update message


to the CN telling it to update the cache entry to its own
(attackers) IP address. Consequently, the CN will start sending
the packets to the attacker instead of the Satellite. The attacker
may learn the confidential information of the message, may
modify the packet before forwarding it to the Satellite. Thus,
the attacker might act as a man-in-the-middle getting the all important
private data destined to the victim satellite (device)
without the knowledge of the concerned parties.

SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION

19/09/2014

16

PROTECTION MECHANISMS

Return Routability protocol:-

One major concern for security in space network is the use of unauthenticated and forged
binding updates. To prevent such attacks, any node sending a binding update must prove its
right to redirect the traffic. This approach of RR is used before each binding update message is
sent to CN, and they are exchanged among the MH, HA and CN.

SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION

19/09/2014

17

PROTECTION MECHANISMS(cont..)
IPSec:In order to protect against attacks that are based on spoofed binding updates,
IPSec protocols, such as Authentication Header (AH) protocol and Encapsulating
Security Payload (ESP) protocol can be incorporated with mobility protocols in
space networks.

Certificate based approach:-

Another way of authenticating BU is the certificate based approach and it


relies on digital signature to authenticate binding updates or the source of
the binding update. The CPU and memory requirement for this type approach
is usually high.
SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION

19/09/2014

18

CONCLUSION
In this paper, we have discussed the IP-security issues relating to space networks. We have
explained possible security vulnerabilities that may lead to wastage of all-important bandwidth
and processing power of the expensive IP-enabled devices onboard the Satellite / aircrafts. We
have also analyzed the existing and possible defense mechanisms that can prevent or mitigate
these security vulnerabilities along with their pros and cons. Based on the analysis, several
recommendation have been outlined to improve the existing mechanisms.

SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION

19/09/2014

19

REFERENCES
[1] V. Devarapalli, R. Wakikawa, A. Petrescu, and P. Thubert, Network MObility (NEMO) basic
support protocol, RFC 3963, Jan 2005.
[2] D. Johnson, C. E. Perkins, and J. Arkko, Mobility support in IPv6, IETF RFC 3775, June 2004.
[3] H. Soliman, C. Castelluccia, K. E. Malki, and L. Bellier, Hierarchical Mobile IPv6 mobility
management (HMIPv6), IETF RFC 5380, Oct 2008.
[4] M. Atiquzzaman and W. Ivancic, SIGMA for Space Sensor Web Networks, in ESTO AIST Sensor
Web Technology Meeting, Orlando, FL, April 2-3 2008.
[5] K. Bhasin and J. L. Hayden, Space internet architectures and technologies for NASA enterprises,
Journal of Satellite Communications, vol. 20, no. 5, Sept 2002.
[6] J. Noles, K. Scott, M. Zukoski, and H. Weiss, Next generation space internet: Prototype
implementation, in NASA Earth Science Technology Conference, Pasadena, CA, June 2002.
[7] W. Ivancic, D. Stewart, T. Bell, P. Paulsen, and D. Shell, Use of Mobile- IP priority home agents
for aeronautics, space operations and military applications, in IEEE Aerospace Conference, Big Sky,
MT, March 2004.
SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION

19/09/2014

20

SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION

19/09/2014

21

ANY QUERIES??

SECURITY,PRIVACY AND TRUST IN SATELLITE COMMUNICATION

19/09/2014

22

Vous aimerez peut-être aussi