4.6 Article

Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

A Secure and Efficient Authentication Protocol for Satellite-Terrestrial Networks

Yang Liu et al.

Summary: This study proposes an access authentication protocol with user anonymity and traceability in order to reduce communication delay and signaling cost in satellite-terrestrial networks, improving the user's network experience. Additionally, a hierarchical group key distribution scheme is proposed to enable cross-domain handover authentication between different user groups, effectively avoiding the need for reauthentication.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Hardware & Architecture

Routing and secret key assignment for secure multicast services in quantum satellite networks

Xinyi He et al.

Summary: This paper proposes a quantum satellite network and relay algorithm for multicast services, which improves the success probability of multicast service requests by utilizing dynamic link weights and relay tree construction.

JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING (2022)

Article Chemistry, Analytical

IoT Platforms and Security: An Analysis of the Leading Industrial/Commercial Solutions

Giancarlo Fortino et al.

Summary: This paper reviews and compares major examples of IoT platforms based on the IoT-A reference architecture, aiming to simplify and accelerate the development of the IoT ecosystem. The paper emphasizes the importance of security by design, integrating design principles, technology, and governance at every level and component to minimize the risk of cyber threats.

SENSORS (2022)

Article Computer Science, Information Systems

Enhancing Trustworthiness of Internet of Vehicles in Space-Air-Ground-Integrated Networks: Attestation Approach

Qixu Wang et al.

Summary: This article investigates the integration of the Internet of Vehicles (IoV) with the space-air-ground-integrated network, aiming to achieve full network coverage and better network performance. It proposes the use of a hardware trusted module as the root of trust to establish a trusted running environment and provides protection and trusted state attestation for services. To address the challenges of large-scale and high-concurrency performance in remote verification, a novel batch remote approach for trusted states is proposed. Simulation results demonstrate that this approach effectively enhances the trustworthiness of the IoV network.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

Jamming Attacks and Anti-Jamming Strategies in Wireless Networks: A Comprehensive Survey

Hossein Pirayesh et al.

Summary: This article surveys existing jamming attacks and anti-jamming strategies in various wireless networks, aiming to provide a comprehensive understanding of the current landscape and stimulate further research efforts to secure wireless networks against jamming attacks.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2022)

Article Computer Science, Information Systems

A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G

Hongzhi Guo et al.

Summary: Space-air-ground-sea integrated network (SAGSIN), as a promising network architecture for 6G, faces unprecedented security challenges. This paper provides a detailed survey on the recent progress and ongoing research on SAGSIN security, covering security threats, attack methodologies, and defense countermeasures. Unlike existing surveys, this paper presents a comprehensive overview of the security status of the entire SAGSIN network.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2022)

Article Computer Science, Information Systems

Sustainable Satellite Communications in the 6G Era: A European View for Multilayer Systems and Space Safety

Marko Hoyhtya et al.

Summary: In the New Space era, small countries are emerging as important players in the space business. Sustainability is crucial for preserving satellite services for future generations, but has been overlooked in existing surveys on space technologies. This survey paper discusses multi-layer networking approaches in the 6G era from a sustainability perspective and addresses important space safety paradigms and advancements towards a planned European connectivity constellation.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

Cyber security in New Space Analysis of threats, key enabling technologies and challenges

M. Manulis et al.

Summary: The article analyzes past satellite security threats and incidents, assessing motivations and characteristics of adversarial threats to satellites, with a focus on ground and radio frequency communications as favored targets. The potential growth of satellite constellations in the future may shift the focus towards the space segment, necessitating attention to security and operational requirements in the industry.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2021)

Article Engineering, Aerospace

Licensed shared access field trial and a testbed for satellite-terrestrial communication including research directions for 5G and beyond

Marko Hoyhtya et al.

Summary: This paper describes a testbed for evaluating licensed shared access (LSA) with real 4G and virtual base stations in a spectrum sharing scenario between satellite and cellular systems. Trials focus on 5G pioneer bands and how satellite systems can reuse IMT bands for enhanced communication services without causing interference.

INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING (2021)

Article Engineering, Electrical & Electronic

On the Path to 6G: Embracing the Next Wave of Low Earth Orbit Satellite Access

Xingqin Lin et al.

Summary: Offering space-based internet services with mega-constellations of low Earth orbit (LEO) satellites is a promising solution to bridging the digital divide. However, there are challenges from operational obstacles to technical hurdles facing the development of LEO satellite access.

IEEE COMMUNICATIONS MAGAZINE (2021)

Article Computer Science, Information Systems

A Privacy-Preserving Incentive Mechanism for Data Offloading in Satellite-Terrestrial Crowdsensing

Boxiang Zhu et al.

Summary: This study proposes a data offloading algorithm based on a satellite-terrestrial architecture. The algorithm achieves the goal of minimizing the total payment through differential private long-term privacy-preserving auction, while also improving the issue of poor signal in remote areas.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2021)

Article Engineering, Electrical & Electronic

The Challenges of Artificial Intelligence in Wireless Networks for the Internet of Things: Exploring Opportunities for Growth

Ijaz Ahmad et al.

Summary: The Internet of Things (IoT) is an extension of network connectivity to physical devices, enabling interaction and communication among them, and remote control or monitoring. It is already transforming various aspects of daily life and industry, such as healthcare, smart homes, manufacturing, commerce, and education.

IEEE INDUSTRIAL ELECTRONICS MAGAZINE (2021)

Article Computer Science, Hardware & Architecture

Non-Terrestrial Networks in the 6G Era: Challenges and Opportunities

Marco Giordani et al.

Summary: Many organizations recognize non-terrestrial networks (NTNs) as a key component for providing cost-effective and high-capacity connectivity in future 6th generation (6G) wireless networks. Despite this recognition, there are still many unanswered questions regarding proper network design, latency, and coverage constraints. This article reviews research activities on NTNs, presents their characteristics and enabling technologies in the 6G landscape, and highlights the challenges in the field that require further research.

IEEE NETWORK (2021)

Article Automation & Control Systems

Lightweight Searchable Encryption Protocol for Industrial Internet of Things

Ke Zhang et al.

Summary: The article presents a lightweight searchable attribute-based encryption scheme (LSABE) suitable for resource-constrained IoT devices, which can reduce computing costs and support multi-keyword searching. Additionally, it is extended to multi-authority scenarios to efficiently handle the generation and management of public/secret keys.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Information Systems

Reinforcement Learning for Security-Aware Computation Offloading in Satellite Networks

Saurav Sthapit et al.

Summary: The rise of NewSpace allows small and medium businesses to launch satellites commercially, with the potential for computational offloading to save energy and time. However, this practice alters the risk profile of the system.

IEEE INTERNET OF THINGS JOURNAL (2021)

Proceedings Paper Computer Science, Information Systems

Satellite Diversity to Mitigate Jamming in LEO Satellite Mega-Constellations

Vijitha Weerackody

Summary: With the increasing demand for data services provided by low-earth orbit satellites, it is crucial to incorporate resiliency features to combat potential jamming threats. Low-orbit satellites are vulnerable to jamming attacks, but utilizing satellite diversity can help overcome these challenges.

2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS) (2021)

Proceedings Paper Engineering, Aerospace

Intrusion Detection in Automatic Dependent Surveillance-Broadcast (ADS-B) with Machine Learning

Suleman Khan et al.

Summary: This study focused on improving security in aviation communication systems, particularly the ADS-B protocol, by generating a dataset with new attacks and utilizing machine learning algorithms to train the system to defend against these attacks. KNN algorithm outperformed Naive Bayes and logistic regression algorithms in terms of accuracy, precision, recall, and F1-score, achieving high performance in handling both normal and anomaly ADS-B messages.

2021 IEEE/AIAA 40TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC) (2021)

Article Computer Science, Information Systems

An Overview of the Security Landscape of Virtual Mobile Networks

Ijaz Ahmad et al.

Summary: 5G technology enables different services to be provided over the same infrastructure through virtualization, softwarization, network slicing, and cloud computing. While this offers opportunities for innovation, it also brings about security challenges and requirements that need to be addressed.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Effective Methods and Performance Analysis of a Satellite Network Security Mechanism Based on Blockchain Technology

Chengjie Li et al.

Summary: In satellite communication systems, the limited power and processing capacities of satellites pose challenges in storage and security. The vulnerability of satellite communication channels to hackers and external interference signals is a major concern. To address these issues, a communication network architecture integrating authentication and privacy protection structures has been proposed, improving communication security through stages of communication, registration, authentication, and revocation of information.

IEEE ACCESS (2021)

Article Engineering, Aerospace

An extensible network slicing framework for satellite integration into 5G

Youssouf Drif et al.

Summary: This paper presents a new Satellite Slicing Framework to fully exploit satellite infrastructure and facilitate the integration of satellite services into 5G.

INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING (2021)

Article Computer Science, Information Systems

Satellite Communications in the New Space Era: A Survey and Future Challenges

Oltjon Kodheli et al.

Summary: The survey captures the state of the art in SatComs and highlights the most promising open research topics. Main drivers of innovation, promising applications, in-depth literature review, future challenges and open research topics are presented.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)

Article Computer Science, Information Systems

A Survey on Technologies, Standards and Open Challenges in Satellite IoT

Marco Centenaro et al.

Summary: The deployment of IoT services in remote/rural areas using satellites can provide wide area coverage and connectivity. Low-orbit satellites offer an efficient solution for long-range IoT services, but there are still open issues and new challenges to be addressed in the future implementation.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)

Article Engineering, Electrical & Electronic

Spatial Anti-Jamming Scheme for Internet of Satellites Based on the Deep Reinforcement Learning and Stackelberg Game

Chen Han et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Information Systems

A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems

Lalit Chettri et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Physical-Layer Security in Space Information Networks: A Survey

Bin Li et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Hardware & Architecture

A survey on space-aerial-terrestrial integrated 5G networks

Shunliang Zhang et al.

COMPUTER NETWORKS (2020)

Article Computer Science, Hardware & Architecture

Satellite-Terrestrial Integrated Edge Computing Networks: Architecture, Challenges, and Open Issues

Renchao Xie et al.

IEEE NETWORK (2020)

Article Telecommunications

Research on Self-Adaptive Group Key Management in Deep Space Networks

Zhou Jian et al.

WIRELESS PERSONAL COMMUNICATIONS (2020)

Article Computer Science, Hardware & Architecture

INTEGRATED 5G-SATELLITE NETWORKS: A PERSPECTIVE ON PHYSICAL LAYER RELIABILITY AND SECURITY

Min Lin et al.

IEEE WIRELESS COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Machine Learning Meets Communication Networks: Current Trends and Future Challenges

Ijaz Ahmad et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Detection of TCP targeted high bandwidth attacks using self-similarity

Gagandeep Kaur et al.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2020)

Article Engineering, Industrial

A novel cyber-risk assessment method for ship systems

Victor Bolbot et al.

SAFETY SCIENCE (2020)

Article Computer Science, Information Systems

A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues

Maria Stoyanova et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Engineering, Electrical & Electronic

What should 6G be?

Shuping Dang et al.

NATURE ELECTRONICS (2020)

Article Computer Science, Information Systems

Machine Learning Threatens 5G Security

Jani Suomalainen et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Non-Terrestrial Networks in 5G & Beyond: A Survey

Federica Rinaldi et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Quantum Key Distribution Over Double-Layer Quantum Satellite Networks

Donghai Huang et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A Lightweight Key Agreement and Authentication Scheme for Satellite-Communication Systems

Izwa Altaf et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

AnFRA: Anonymous and Fast Roaming Authentication for Space Information Network

Qingyou Yang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Engineering, Electrical & Electronic

Architectures and Key Technical Challenges for 5G Systems Incorporating Satellites

Alessandro Guidotti et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Review Computer Science, Hardware & Architecture

A survey on secure routing protocols for satellite network

Yanjun Yan et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Information Systems

Mitigating Jamming Attacks Using Energy Harvesting

Gada Rezgui et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2019)

Article Computer Science, Information Systems

A Compact Antenna for GPS Anti-Jamming in Airborne Applications

Navid Rezazadeh et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Security for 5G and Beyond

Ijaz Ahmad et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations

Nataliia Neshenko et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Space-Air-Ground Integrated Network: A Survey

Jiajia Liu et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Engineering, Electrical & Electronic

Robust Secure Beamforming for 5G Cellular Networks Coexisting With Satellite Networks

Zhi Lin et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2018)

Article Chemistry, Analytical

Controller-Pilot Data Link Communication Security

Andrei Gurtov et al.

SENSORS (2018)

Article Computer Science, Information Systems

Lightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques

Bassam J. Mohd et al.

IEEE ACCESS (2018)

Article Computer Science, Artificial Intelligence

An Introduction to Deep Reinforcement Learning

Vincent Francois-Lavet et al.

FOUNDATIONS AND TRENDS IN MACHINE LEARNING (2018)

Article Engineering, Aerospace

Current Use of Linux in Spacecraft Flight Software

Hannu Leppinen

IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE (2017)

Article Engineering, Aerospace

Improvements in CPU & FPGA Performance for Small Satellite SDR Applications

Mamatha Ramapura Maheshwarappa et al.

IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS (2017)

Article Multidisciplinary Sciences

Satellite-to-ground quantum key distribution

Sheng-Kai Liao et al.

NATURE (2017)

Review Quantum Science & Technology

Progress in satellite quantum key distribution

Robert Bedington et al.

NPJ QUANTUM INFORMATION (2017)

Article Engineering, Aerospace

DVB-S2X-enabled precoding for high throughput satellite systems

Pantelis-Daniel Arapoglou et al.

INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING (2016)

Article Computer Science, Hardware & Architecture

A Fine-Grained Control Flow Integrity Approach Against Runtime Memory Attacks for Embedded Systems

Sanjeev Das et al.

IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS (2016)

Review Engineering, Industrial

Jamming attacks on wireless networks: A taxonomic survey

Satish Vadlamani et al.

INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2016)

Article Computer Science, Information Systems

Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks

Maged Hamada Ibrahim et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Engineering, Electrical & Electronic

Software Defined Networking and Virtualization for Broadband Satellite Networks

Lionel Bertaux et al.

IEEE COMMUNICATIONS MAGAZINE (2015)

Article Engineering, Electrical & Electronic

Security in Space Information Networks

Chunxiao Jiang et al.

IEEE COMMUNICATIONS MAGAZINE (2015)

Article Computer Science, Information Systems

Security in Software Defined Networks: A Survey

Ijaz Ahmad et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)

Article Computer Science, Information Systems

Design of GPS Anti-Jamming Systems Using Adaptive Notch Filters

Ying-Ren Chien

IEEE SYSTEMS JOURNAL (2015)

Article Telecommunications

A Robust Anti-Jamming Navigation Receiver with Antenna Array and GPS/SINS

Qiang Li et al.

IEEE COMMUNICATIONS LETTERS (2014)

Article Optics

Air-to-ground quantum communication

Sebastian Nauerth et al.

NATURE PHOTONICS (2013)

Article Engineering, Electrical & Electronic

Anti-Jamming Broadcast Communication using Uncoordinated Spread Spectrum Techniques

Christina Poepper et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2010)

Article Computer Science, Hardware & Architecture

Hardware Support for Secure Processing in Embedded Systems

Shufu Mao et al.

IEEE TRANSACTIONS ON COMPUTERS (2010)

Review Physics, Multidisciplinary

The security of practical quantum key distribution

Valerio Scarani et al.

REVIEWS OF MODERN PHYSICS (2009)

Article Computer Science, Theory & Methods

Security of quantum key distribution

Renato Renner

INTERNATIONAL JOURNAL OF QUANTUM INFORMATION (2008)

Article Computer Science, Hardware & Architecture

Security issues in hybrid networks with a satellite component

A Roy-Chowdhury et al.

IEEE WIRELESS COMMUNICATIONS (2005)

Article Computer Science, Hardware & Architecture

The advantages of elliptic curve cryptography for wireless security

K Lauter

IEEE WIRELESS COMMUNICATIONS (2004)