Security Issues in Space Networks
نویسنده
چکیده
Satellites are being used to capture real-time images, video for various purposes, such as, observing the Earth, weather data, live images for tornado, cyclones, tsunami, etc. In future, these data can be accessed by terrestrial users through the Internet. Mobility protocols aim at providing uninterrupted realtime data communication facilities through seamless Internet connectivity to hosts or networks in motion, such as in bus, train, aircraft, and satellites. Mobile IP is an example of such a mobility protocol which uses Home Agent for mobility management, and requires signaling among the mobility agents, mobile node and the correspondent node for its operation. Originally, Mobile IP had no route optimization between end hosts; all traffic passes the mobility agents. However, recent mobility protocols, such as, Mobile IPv6 incorporated Route Optimization between end hosts, by informing correspondent node and home agent about mobile node’s current location through binding updates. However, these binding updates are vulnerable to various attacks as unauthorized agent might send fabricated binding updates to fool mobile node, correspondent node or home agent. In short, the requirement of seamless connectivity in mobile environment and use of optimized route between end hosts have introduced several security vulnerabilities to mobility protocols. In this paper, we explain such security threats on various components of the space networks. Some of the major threats are traffic redirection attack, man-in-the-middle attack, bombing attack, denial-of-service attack, DNS poisoning, replay attack, etc. These attacks can affect the privacy and the integrity of the data. We also discuss possible protection mechanisms to protect network components from these security threats.
منابع مشابه
An Overview of Group Key Management Issues in IEEE 802.16e Networks
The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...
متن کاملA Deterministic Multiple Key Space Scheme for Wireless Sensor Networks via Combinatorial Designs
The establishing of a pairwise key between two nodes for encryption in a wireless sensor network is a challenging issue. To do this, we propose a new deterministic key pre-distribution scheme which has modified the multiple key space scheme (MKSS). In the MKSS, the authors define two random parameters to make better resilience than existing schemes. Instead of a random selection of these parame...
متن کاملRole and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کاملRouting in Outer Space: Improved Security and Energy-Efficiency in Multi-Hop Wireless Networks
In this paper we consider security-related and energy-efficiency issues in multi-hop wireless networks. We start our work from the observation, known in the literature, that shortest path routing creates congested areas in multi-hop wireless networks. These areas are critical—they generate both security and energy efficiency issues. We attack these problems and set out routing in outer space, a...
متن کاملTraffic Characterization, Routing and Security Issues in High Speed Networks Interconnected Through LEO Constellations
The COST Action 253 is aiming to study high speed terrestrial (based on ATM technology) networks interconnected by non-GEO satellite constellations. The performance of these networks depends very much on the successful characterization and estimation of offered services and traffic loading, as well as on efficient management techniques for the integrated, terrestrial and space system. In the co...
متن کاملتأثیر حریم خصوصی، امنیت و اعتماد ادراک شده بر رفتار به اشتراکگذاری اطلاعات در شبکههای اجتماعی موبایل: نقش تعدیلکننده متغیر جنسیت
The appearance of social networks has been one of the most important events in recent decades. One of the issues raised in these networks, is how to trust. The purpose of this paper is to examine the impact of security, trust and privacy about information sharing on mobile social networks. The study also describes how users' gender moderates the privacy and security impact on trust. The current...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011