2022
DOI: 10.1016/j.comnet.2022.109246
|View full text |Cite
|
Sign up to set email alerts
|

Satellite-based communications security: A survey of threats, solutions, and research challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 63 publications
(21 citation statements)
references
References 122 publications
0
21
0
Order By: Relevance
“…Therefore, it is advisable to equip the attack-reconnaissance squadrons with satellite terminals. Satellite communication (SATCOM), due to its global reach, wide transmission band and easy and fast installation, may sometimes be the only medium in the operation that allows attack-reconnaissance squadrons to create teleinformatic networks, allowing for uninterrupted transmission of large amounts of information in a short time between troops in the field (Marczyk, 2013a, p. 92;Tedeschi et al, 2022;WZŁ, 2020b;Zhao et al, 2021, pp. 1-2).…”
Section: Us Army Attack Reconnaissance Squadrons Are the Size Of A Ba...mentioning
confidence: 99%
“…Therefore, it is advisable to equip the attack-reconnaissance squadrons with satellite terminals. Satellite communication (SATCOM), due to its global reach, wide transmission band and easy and fast installation, may sometimes be the only medium in the operation that allows attack-reconnaissance squadrons to create teleinformatic networks, allowing for uninterrupted transmission of large amounts of information in a short time between troops in the field (Marczyk, 2013a, p. 92;Tedeschi et al, 2022;WZŁ, 2020b;Zhao et al, 2021, pp. 1-2).…”
Section: Us Army Attack Reconnaissance Squadrons Are the Size Of A Ba...mentioning
confidence: 99%
“…In the beginning phase, we will first introduce the parameters used in this article. The link or data sender reference (SA 11 ) and data receiver reference (RA 12 ) and transmission related parameters (CAt 13 ) and two EC parameters (a, b) as well as the converter point 'G' In the S-IOT network, there is an initial preparation stage. Key exchange parameters include PubSA public key of the sender (public key SA) and PubRA public key of the receiver (public key RA), also the private key is generated through SA and RA, and the shared encryption keys E.KeySA and E.KeyRA can be calculated as follows: 7-1-1 Calculating the public key by using the private key "s" and "r" and then multiplying the score at the primary generating point G, PubSA = s ¤ G and PubRA = r ¤ G (¤ multiplication of the score) are calculated 7.1.2 Public keys are mutually shared between the SA and the RA over the public channel, so that even if a third party has access to the public keys, it cannot predict the secret key values.…”
Section: -1 the Start Stage (Preparation)mentioning
confidence: 99%
“…Recent results [13] based on real measurements on terrestrial wireless links confirmed that the wireless channel significantly impacts the classification accuracy (up to 80%), thus con-firming the need for more effective classification techniques. It is worth noting that no prior contribution has been made up to date to the physical layer authentication of satellite transmitters (in particular, the IRIDIUM constellation), given their intrinsic challenges [14]. Indeed, LEO satellites, which IRIDIUM constellation is part of, are characterized by unique features: the satellite transmitter is at around 800 Km from the earth and moves at about 7 Km/s with a pass duration of about 8 minutes [8]-involving a radio link (quality) that significantly changes over the time.…”
Section: Introductionmentioning
confidence: 99%