Open Access Open Access  Restricted Access Subscription Access

Satellite Communication Challenges & Threats

Fatma Abdulqadir Karkouri, Mabrouka Mohammed Algherinai Algherinai

Abstract


This paper describes the issues that arise when using satellites for transmission of data from the earth station to the outer space and from the extra-terrestrial back to the earth. Satellite communications standout amongst the most prominent cutting edge communication innovation for regional, terrestrial or worldwide information dissemination.In contemporary times where navigation & positioning, weather forecasting, digital video broadcasting (DVB), and broadband internet services, to mention a few are obtainable, and not forgetting multicast protocols and how their implementation depends on the satellite communications platform. However, security issues due to limitations such as high bit error rate power control, node distance, high link large round trip times, and link availability, and the most worrisome- activities of hackers over the link have been of utmost concern to authorities and private owners of satellites. Several issues affecting satellites over the link were discussed and subsequently,survey on the prevailing issues and solutions were dealt with.


Keywords


LNB,TCP/IP, PEP,DVB, CRPA

Full Text:

PDF

References


John .W``ITU Handbook of satellite communications”, 3rd Ed., 2002, ISBN 0-471-22189-9.

Gerard .M, Michel. B,``Satellite communications systems”, Techniques and Technology 5th Edition ,1st Feb, 2010.

Maval . G, ``Satellite Communications & Broadcasting Markets Study — Worldwide Prospects to 2010”,Pub: Euroconsult, 3rd January 2002

K.-U., Hays, P.L., Robinson, J., Moura, D., Giannopapa, C. (Eds.).,Handbook of Space Security.

C. Caini and R. Firrincieli, ―A New Transport Protocol Proposal for Internet via Satellite: the TCP Hybla‖, in Proc. ESA ASMS 2003, Frascati, Italy, Jul. 2003, .vol. SP-54.

M. Bellare, R. Canetti, and H. Krawczyk -A modular approach to the design and analysis of authentication and key exchange protocols‖, in Proc. ACM Symposium. on Theory Comput, 1998, pp. 419–428.

L. Chen and C. Kudla, ―Identity based authenticated key agreement protocols from pairings,‖ in Proc. IEEE Computer. Security Found. Workshop, 2003, pp. 219–233.

ETS TR 102 676 V1.1.1: ―Satellite Earth Stations and Systems (SES); Broadband SAtellite Multimedia (BSM); Performance Enhancing Proxies (PEPs)‖, November 2009

Arun Raj Kumar, P. and S. Selvakumar, Distributed Denial-of-Service (DDoS) Threat in Collaborative Environment- A Survey on DDoS Attack Tools and Traceback Mechanisms,‖ 2009 IEEE International Advance Computing Conference (IACC 2009) Patiala, India, 6-7 March 2009

Roy-Chowdhury A., Baras J. S., Hadjitheodosiou M., Papademetriou S., "Security Issues In Hybrid Networks With a Satellite Component", IEEE Wireless Communications, December 2005

John Wiley & Sons.

ITU Handbook of Satellite Communications, 3rd Ed., 2002, ISBN 0-471-22189-9,

Bruce R. Elbert, The Satellite Communications Applications Handbook, 1997.ISBN 0-471-31603-2.

Emilio Chuvieco and Alfredo Huete.

Fundamentals of Satellite Remote Sensing, December 1, 2009, Har/Com Edition

B. Hancock, Trinity v3, a DDoS tool, hits the streets, Computers Security 19 (7) (2000) 574.

B. Hancock, Trinity v3, a DDoS tool, hits the streets, Computers Security 19 (7) (2000) 574.

N. A. White, P. S. Maybeck, and S. L. DeVilbiss, “Detection of interference/jamming and spoofing in a DCPS-aided inertial system,” IEEE Transactions on Aerospace and Electronic Systems, vol. 34, no. 4, pp. 1208–1217, 1998.

Y. Zhang, ―A Multilayer IP Security Protocol for TCP Performance Enhancement in Wireless Networks,‖ IEEE JSAC, vol. 22, no. 4, 2004, pp. 767–76.

N. P. Smart, ―Identity-based Authenticated key agreement protocol based on weil pairing,‖ IET. Electron. Lett. vol. 38, no. 13, Pg. 630–632, 2002

M. Bellare, R. Canetti, and H. Krawczyk, ―A modular approach to the design and analysis of authentication and key exchange protocols‖, in Proc. ACM Symposium. on Theory Comput, 1998, pp. 419–428.

R. Canetti and H. Krawczyk, ―Analysis of key-exchange protocols and their use for building secure channels,‖ Lecture Notes Comput. Sci., Springer-Verlag., vol. 2045, pp. 453–474, 2001.

Arun Raj Kumar, P. and S. Selvakumar,‖Distributed Denial-of-Service (DDoS) Threat in Collaborative Environment- A Survey on DDoS Attack Tools and Traceback Mechanisms,‖ 2009 IEEE International Advance Computing Conference (IACC 2009) Patiala, India, 6-7 March 2009


Refbacks

  • There are currently no refbacks.


Copyright (c) 2018 Journal of Network Security

  • eISSN: 2395–6739
  • ISSN: 2321–8517