Cyber security with radio frequency interferences mitigation study for satellite systems

Satellite systems including the Global Navigation Satellite System (GNSS) and the satellite communications (SATCOM) system provide great convenience and utility to human life including emergency response, wide area efficient communications, and effective transportation. Elements of satellite systems incorporate technologies such as navigation with the global positioning system (GPS), satellite digital video broadcasting, and information transmission with a very small aperture terminal (VSAT), etc. The satellite systems importance is growing in prominence with end users’ requirement for globally high data rate transmissions; the cost reduction of launching satellites; development of smaller sized satellites including cubesat, nanosat, picosat, and femtosat; and integrating internet services with satellite networks. However, with the promising benefits, challenges remain to fully develop secure and robust satellite systems with pervasive computing and communications. In this paper, we investigate both cyber security and radio frequency (RF) interferences mitigation for satellite systems, and demonstrate that they are not isolated. The action space for both cyber security and RF interferences are firstly summarized for satellite systems, based on which the mitigation schemes for both cyber security and RF interferences are given. A multi-layered satellite systems structure is provided with cross-layer design considering multi-path routing and channel coding, to provide great security and diversity gains for secure and robust satellite systems.

[1]  Olga Mendoza-Schrock,et al.  Video image registration evaluation for a layered sensing environment , 2009, Proceedings of the IEEE 2009 National Aerospace & Electronics Conference (NAECON).

[2]  M. A. Gouker,et al.  Performance evaluation of a hybrid ARQ protocol implementation for EHF SATCOM on the move systems , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[3]  Erik Blasch,et al.  Multi-agent Modeling and Analysis for Space Situation Awareness , 2009 .

[4]  Genshe Chen,et al.  Information fusion in a cloud computing era: A systems-level perspective , 2014, IEEE Aerospace and Electronic Systems Magazine.

[5]  Xinwen Fu,et al.  On simulation studies of cyber attacks against LTE networks , 2014, 2014 23rd International Conference on Computer Communication and Networks (ICCCN).

[6]  Erik Blasch,et al.  Towards an integrated defense system for cyber security situation awareness experiment , 2015, Defense + Security Symposium.

[7]  Genshe Chen,et al.  Polarization tracking for quantum satellite communications , 2014, Defense + Security Symposium.

[8]  Gang Wang,et al.  Network survivability oriented Markov games (NSOMG) in wideband satellite communications , 2014, 2014 IEEE/AIAA 33rd Digital Avionics Systems Conference (DASC).

[9]  Norman C. Beaulieu,et al.  NDA estimation of SINR for QAM signals , 2005, IEEE Communications Letters.

[10]  R. Ezers,et al.  Performance evaluation of commercial satcom modems with respect to interference and nuisance jamming , 1995, Proceedings of MILCOM '95.

[11]  Gang Wang,et al.  Optimum Design for Robustness of Frequency Hopping System , 2014, 2014 IEEE Military Communications Conference.

[12]  Chul-Gyu Kang,et al.  Interference Analysis of Geostationary Satellite Networks in the Presence of Moving Non-Geostationary Satellites , 2010, 2010 2nd International Conference on Information Technology Convergence and Services.

[13]  Kanghee Lee,et al.  A Regenerative Decode-and-Forward Wireless Network with Multihop Relays under Channel Uncertainty , 2011, 2011 UKSim 5th European Symposium on Computer Modeling and Simulation.

[14]  Lun Li,et al.  Blind Detection with Unique Identification in Two-Way Relay Channel , 2012, IEEE Transactions on Wireless Communications.

[15]  Gang Wang,et al.  Spread spectrum design for aeronautical communication system with radio frequency interference , 2015, 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC).

[16]  Kanghee Lee,et al.  Effects of node geometry on cooperative distributed AF wireless relay network , 2011, ICTC 2011.

[17]  Matthew C. Valenti,et al.  Closing the gap to the capacity of APSK: Constellation shaping and degree distributions , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).

[18]  Gang Wang,et al.  Performance evaluation of avionics communication systems with radio frequency interference , 2014, 2014 IEEE/AIAA 33rd Digital Avionics Systems Conference (DASC).

[19]  Erik Blasch,et al.  Simulation study of unmanned aerial vehicle communication networks addressing bandwidth disruptions , 2014, Defense + Security Symposium.

[20]  Erik Blasch,et al.  Performance-driven resource management in layered sensing , 2009, 2009 12th International Conference on Information Fusion.

[21]  Erik Blasch,et al.  Sensor management for collision alert in orbital object tracking , 2011, Defense + Commercial Sensing.

[22]  Erik Blasch,et al.  Comparison of three approximate kinematic models for space object tracking , 2013, Proceedings of the 16th International Conference on Information Fusion.

[23]  Matthew C. Valenti,et al.  Improving DVB-S2 performance through constellation shaping and iterative demapping , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[24]  Lun Li,et al.  Blind Transmission and Detection Designs With Unique Identification and Full Diversity for Noncoherent Two-Way Relay Networks , 2014, IEEE Transactions on Vehicular Technology.

[25]  Gang Wang,et al.  Performance evaluation of SATCOM link in the presence of radio frequency interference , 2016, 2016 IEEE Aerospace Conference.

[26]  Genshe Chen,et al.  A low-cost, near-real-time two-UAS-based UWB emitter monitoring system , 2015, IEEE Aerospace and Electronic Systems Magazine.

[27]  Genshe Chen,et al.  On detection and visualization techniques for cyber security situation awareness , 2013, Defense, Security, and Sensing.

[28]  Xinwen Fu,et al.  On effective localization attacks against Internet Threat monitors , 2013, 2013 IEEE International Conference on Communications (ICC).