2008 NASA/ESA Conference on Adaptive Hardware and Systems 2008
DOI: 10.1109/ahs.2008.57
|View full text |Cite
|
Sign up to set email alerts
|

An Approach for Recovering Satellites and their Cryptographic Capabilities in the Presence of SEUs and Attacks

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…Security architectures have been recently proposed in [13], [15], [16] to authenticate communications between ground stations and spacecrafts and to provide security services to data processed on-board. Specifically, they rely on hash functions for integrity checking, block encryption for achieving confidentiality, and on trusted modules for cryptographic keys recovery.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Security architectures have been recently proposed in [13], [15], [16] to authenticate communications between ground stations and spacecrafts and to provide security services to data processed on-board. Specifically, they rely on hash functions for integrity checking, block encryption for achieving confidentiality, and on trusted modules for cryptographic keys recovery.…”
Section: Related Workmentioning
confidence: 99%
“…In addition to providing secure communications, HMAC and SHS can be employed in invasion detection and recovery schemes [13], as well as on the upgrade of the spacecraft computation platform. By using those schemes, it becomes possible, for example, to determine whether an attacker, who may have broken into the satellite, has tampered with the system configuration, and issue an order the secure reconfiguration of its subsystems.…”
Section: Introductionmentioning
confidence: 99%
“…All of those works make use of cryptographic primitives such as hash functions to achieve their goals, but none of them considers the harsh environment surrounding spacecrafts and more specifically the resistance to SEUs. In [7] only, a security scheme for key recovery in satellites is proposed with SEU-resistant hardware. The authors, however, employ existing techniques for fault tolerance like TMR and HC, but do not specifically investigate new approaches for fault tolerance.…”
Section: Related Workmentioning
confidence: 99%
“…These cryptographic primitives allow for the integrity checking of data received from a ground station to assure that they were not accidentally or maliciously compromised. Furthermore, it could also be employed in invasion detection and recovery schemes [7]. By using those schemes, it becomes possible, for example, to determine whether an attacker, who may have broken into the satellite, has tampered with the system's program memories or FPGA configuration.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation