Performance evaluation and adaptive optimization of COP-1: A case with security enhancement

Secure communications in the context of civil space missions gained a major attention in the last few years, several research groups and international organizations are currently developing the required security mechanisms, based on widely used protocols of the Consultative Committee for Space Data Systems (CCSDS) Packet TM and TC family. However, given the hostile space communication environment, when security mechanisms are integrated within existing space communication systems, they greatly affect the transmission performance. This paper presents an evaluation of throughput efficiency for COP-1 protocol when security mechanisms are integrated, in the context of space communications. Based on such evaluation, the authors propose an adaptive algorithm which allows COP-1 directives to dynamically optimize the sliding window size and frame length, according to estimates of the channel fading characteristic. The proposed algorithm is particularly useful for deep space channels, over which the channel tends to be fading kind.

[1]  H. Ahmadi,et al.  Throughput analysis of a class of selective repeat protocols in high-speed environments , 1989, IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond.

[2]  Chaojing Tang,et al.  Application and performance analysis of various AEAD techniques for space telecommand authentication , 2009, IEEE Transactions on Wireless Communications.

[3]  David A. McGrew Efficient authentication of large, dynamic data sets using Galois/counter mode (GCM) , 2005, Third IEEE International Security in Storage Workshop (SISW'05).

[4]  E. O. Elliott Estimates of error rates for codes on burst-noise channels , 1963 .

[5]  John S. Baras,et al.  An authentication framework for a hybrid satellite network with resource-constrained nodes , 2005, International Conference on Space Information Technology.

[6]  Luciano Lenzini,et al.  Analysis of Command Operation Procedures (COP's) for Reliable Data Transfer in the European Space Data Network , 1991, IEEE J. Sel. Areas Commun..

[7]  Eytan Modiano,et al.  An adaptive algorithm for optimizing the packet size used in wireless ARQ protocols , 1999, Wirel. Networks.

[8]  Andreas Willig,et al.  A new class of packet- and bit-level models for wireless channels , 2002, The 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[9]  Susanna Spinsante,et al.  New Perspectives in Telecommand Security: The Application of EAX to TC Segments , 2007 .

[10]  E. Gilbert Capacity of a burst-noise channel , 1960 .

[11]  J. Gurland Multidimensional Gaussian Distributions (Kenneth S. Miller) , 1966 .

[12]  Quan Zhang,et al.  A new method of enhancing telecommand security: the application of GCM in TC protocol , 2007, Other Conferences.