2005
DOI: 10.1109/mwc.2005.1561945
|View full text |Cite
|
Sign up to set email alerts
|

Security issues in hybrid networks with a satellite component

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
35
0
1

Year Published

2007
2007
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 88 publications
(36 citation statements)
references
References 17 publications
0
35
0
1
Order By: Relevance
“…Security is a critical concern faced by satellite communications [5] since the wireless information intended for the destination devices are also obtained by the non-intended third parties (i.e., eavesdroppers (Eves)) in the same beam due to the openness of wireless links. In order to provide a high level of information security, appropriate signal processing and communication technologies need to be invoked to guarantee the secure communication and the link qualities.…”
mentioning
confidence: 99%
“…Security is a critical concern faced by satellite communications [5] since the wireless information intended for the destination devices are also obtained by the non-intended third parties (i.e., eavesdroppers (Eves)) in the same beam due to the openness of wireless links. In order to provide a high level of information security, appropriate signal processing and communication technologies need to be invoked to guarantee the secure communication and the link qualities.…”
mentioning
confidence: 99%
“…Several security architectures have been proposed for satellites to remotely manage their hardware configuration from the ground station [16], and for purposes of key distribution [17] and management [18], [19], [20]. All of those works make use of cryptographic primitives such as hash functions to achieve their goals, but none of them considers the harsh environment surrounding spacecrafts and more specifically the resistance to SEUs.…”
Section: Related Workmentioning
confidence: 99%
“…Researchers have suggested using IPsec with multiple keys [10,11,31,32] or with more data in the clear [1,12] to support services on devices that are not at the endpoints of communication. The focus of those publications, and derivative works [20,21], was largely to improve performance of flows, not to increase the security of the system. When security is discussed, it is usually in the context of packet-filtering firewalls.…”
Section: Related Workmentioning
confidence: 99%