-
Open Sky, Open Threats: Replay Attacks in Space Launch and Re-entry Phases
Authors:
Nesrine Benchoubane,
Eray Guven,
Gunes Karabulut Kurt
Abstract:
This paper examines the effects of replay attacks on the integrity of both uplink and downlink communications during critical phases of spacecraft communication. By combining software-defined radios (SDRs) with a real-time channel emulator, we replicate realistic attack conditions on the Orion spacecraft's communication systems in both launch and reentry. Our evaluation shows that, under replay at…
▽ More
This paper examines the effects of replay attacks on the integrity of both uplink and downlink communications during critical phases of spacecraft communication. By combining software-defined radios (SDRs) with a real-time channel emulator, we replicate realistic attack conditions on the Orion spacecraft's communication systems in both launch and reentry. Our evaluation shows that, under replay attacks, the attacker's signal can overpower legitimate transmissions, leading to a Signal to Noise Ratio (SNR) difference of up to -7.8 dB during reentry and -6.5 dB during launch. To mitigate these threats, we propose a more secure receiver design incorporating a phase-coherency-dependent decision-directed (DD) equalizer with a narrowed phase-locked loop (PLL) bandwidth. This configuration enhances resilience by making synchronization more sensitive to phase distortions caused by replay interference.
△ Less
Submitted 20 June, 2025;
originally announced June 2025.
-
Next-Gen Space-Based Surveillance: Blockchain for Trusted and Efficient Debris Tracking
Authors:
Nesrine Benchoubane,
Nida Fidan,
Gunes Karabulut Kurt,
Enver Ozdemir
Abstract:
The increasing congestion of Earth's orbit due to growing satellite deployments and space debris poses a significant challenge to sustainable space operations. Traditional space surveillance systems rely on centralized architectures, which introduce single points of failure and scalability constraints. This paper proposes a blockchain-based solution where satellites function as nodes with distinct…
▽ More
The increasing congestion of Earth's orbit due to growing satellite deployments and space debris poses a significant challenge to sustainable space operations. Traditional space surveillance systems rely on centralized architectures, which introduce single points of failure and scalability constraints. This paper proposes a blockchain-based solution where satellites function as nodes with distinct roles to validate and securely store debris-tracking data. Simulation results indicate that optimal network performance is achieved with approximately 30 nodes, balancing throughput and response time, representing an approximately 9x improvement over traditional consensus mechanisms.
△ Less
Submitted 10 May, 2025; v1 submitted 12 January, 2025;
originally announced January 2025.
-
Privacy-Preserving and Simultaneous Authentication in High-Density V2X Networks
Authors:
Morteza Azmoudeh Afshar,
Nesrine Benchoubane,
Busra Cayoren,
Gunes Karabulut Kurt,
Enver Ozdemir
Abstract:
The rapid expansion of Vehicle-to-Everything (V2X) networks within the Internet of Vehicles (IoV) demands secure and efficient authentication to support high-speed, high-density and mobility-challenged environments. This paper presents a privacy-preserving authentication scheme that incorporates batch authentication, mutual authentication, and secure key establishment, enabling users to authentica…
▽ More
The rapid expansion of Vehicle-to-Everything (V2X) networks within the Internet of Vehicles (IoV) demands secure and efficient authentication to support high-speed, high-density and mobility-challenged environments. This paper presents a privacy-preserving authentication scheme that incorporates batch authentication, mutual authentication, and secure key establishment, enabling users to authenticate one another without a central authority. Our proposed scheme facilitates simultaneous multi-user authentication, significantly enhancing scalability, robustness and security in dynamic IoV networks. Results from realistic implementations show that our method achieves average authentication and verification times of 10.61 ms and 1.78 ms, respectively, for a fleet of 100 vehicles, outperforming existing methods. Scalability tests demonstrate efficient processing for larger groups of up to 500 vehicles, where average authentication times remain low, establishing our scheme as a robust solution for secure communication in IoV systems.
△ Less
Submitted 10 May, 2025; v1 submitted 10 January, 2025;
originally announced January 2025.
-
Securing Satellite Link Segment: A Secure-by-Component Design
Authors:
Olfa Ben Yahia,
William Ferguson,
Sumit Chakravarty,
Nesrine Benchoubane,
Gunes Karabulut Kurt,
Gürkan Gür,
Gregory Falco
Abstract:
The rapid evolution of communication technologies, compounded by recent geopolitical events such as the Viasat cyberattack in February 2022, has highlighted the urgent need for fast and reliable satellite missions for military and civil security operations. Consequently, this paper examines two Earth observation (EO) missions: one utilizing a single low Earth orbit (LEO) satellite and another thro…
▽ More
The rapid evolution of communication technologies, compounded by recent geopolitical events such as the Viasat cyberattack in February 2022, has highlighted the urgent need for fast and reliable satellite missions for military and civil security operations. Consequently, this paper examines two Earth observation (EO) missions: one utilizing a single low Earth orbit (LEO) satellite and another through a network of LEO satellites, employing a secure-by-component design strategy. This approach begins by defining the scope of technical security engineering, decomposing the system into components and data flows, and enumerating attack surfaces. Then it proceeds by identifying threats to low-level components, applying secure-by-design principles, redesigning components into secure blocks in alignment with the Space Attack Research & Tactic Analysis (SPARTA) framework, and crafting shall statements to refactor the system design, with a particular focus on improving the security of the link segment.
△ Less
Submitted 19 November, 2024;
originally announced November 2024.
-
On the Role of Communications for Space Domain Awareness
Authors:
Nathaniel G. Gordon,
Nesrine Benchoubane,
Gunes Karabulut Kurt,
Gregory Falco
Abstract:
Space Domain Awareness (SDA) has become increasingly vital with the rapid growth of commercial space activities and the expansion of New Space. This paper stresses the necessity of transitioning from centralized to distributed SDA architectures. The current architecture predominantly relies on individual downhaul, which we propose to transition to on-orbit distribution. Our results demonstrate tha…
▽ More
Space Domain Awareness (SDA) has become increasingly vital with the rapid growth of commercial space activities and the expansion of New Space. This paper stresses the necessity of transitioning from centralized to distributed SDA architectures. The current architecture predominantly relies on individual downhaul, which we propose to transition to on-orbit distribution. Our results demonstrate that the individual downhaul architecture does not scale efficiently with the increasing number of nodes, while on-orbit distribution offers significant improvements. By comparing the centralized architecture with the proposed distributed architecture, we highlight the advantages of enhanced coverage and resilience. Our findings show that on-orbit distribution greatly outperforms individual downhaul in terms of latency and scalability. Specifically, the latency results for on-orbit distribution are substantially lower and more consistent, even as the number of satellites increases. In addition, we address the inherent challenges associated with on-orbit distribution architecture, particularly cybersecurity concerns. We focus on link security to ensure the availability and integrity of data transmission in these advanced SDA systems. Future expectations include further refinement of on-orbit distribution strategies and the development of robust cybersecurity measures to support the scalability and resilience of SDA systems.
△ Less
Submitted 8 June, 2024;
originally announced June 2024.