Personal Satellite Services. 5th International ICST Conference, PSATS 2013, Toulouse, France, June 27-28, 2013, Revised Selected Papers

Research Article

Security Architecture for Satellite Services over Cryptographically Heterogeneous Networks

Download
397 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-02762-3_9,
        author={Yingli Sheng and Haitham Cruickshank and Martin Moseley and John Ashworth},
        title={Security Architecture for Satellite Services over Cryptographically Heterogeneous Networks},
        proceedings={Personal Satellite Services. 5th International ICST Conference, PSATS 2013, Toulouse, France, June 27-28, 2013, Revised Selected Papers},
        proceedings_a={PSATS},
        year={2013},
        month={10},
        keywords={satellite Heterogeneous network policy key management mobile network Delay Tolerant Network},
        doi={10.1007/978-3-319-02762-3_9}
    }
    
  • Yingli Sheng
    Haitham Cruickshank
    Martin Moseley
    John Ashworth
    Year: 2013
    Security Architecture for Satellite Services over Cryptographically Heterogeneous Networks
    PSATS
    Springer
    DOI: 10.1007/978-3-319-02762-3_9
Yingli Sheng1,*, Haitham Cruickshank1,*, Martin Moseley2,*, John Ashworth2,*
  • 1: University of Surrey
  • 2: EADS Astrium
*Contact email: Yingli.Sheng@surrey.ac.uk, H.Cruickshank@surrey.ac.uk, Martin.Moseley@astrium.eads.net, John.Ashworth@astrium.eads.net

Abstract

The rapid growth in the demand for Internet services and many new applications has driven the development of satellite, which are the preferred delivery mechanism due to its wide area coverage, multicasting capacity and speed to deliver affordable future services. However, security has been one of the barriers for satellite services, especially for domains spanning over cryptographically heterogeneous networks. In this paper, a scalable and adaptable security architecture is specified to protect satellite services. Two major issues in the proposed security architecture, key management and policy provisioning, are presented and analyzed. And three scenarios, mobile network, fixed network and Delay Tolerant Network (DTN), are presented, with details on characteristics and security features.