Considerations for secure and resilient satellite architectures

  title={Considerations for secure and resilient satellite architectures},
  author={J. Willis and R. Mills and L. Mailloux and S. Graham},
  journal={2017 International Conference on Cyber Conflict (CyCon U.S.)},
  • J. Willis, R. Mills, +1 author S. Graham
  • Published 2017
  • Computer Science
  • 2017 International Conference on Cyber Conflict (CyCon U.S.)
Traditionally, the focus of security and ensuring confidentiality, integrity, and availability of data in spacecraft systems has been on the ground segment and the uplink/downlink components. Although these are the most obvious attack vectors, potential security risks against the satellite's platform is also a serious concern. This paper discusses a notional satellite architecture and explores security vulnerabilities using a systems-level approach. Viewing attacks through this paradigm… Expand
Security Analysis of a Space-Based Wireless Network
Autonomous Space Resupply Vehicle Systems Security Design Principle Case Study
  • L. Mailloux, R. Mills
  • Computer Science
  • 2020 IEEE Conference on Communications and Network Security (CNS)
  • 2020


On-Board Security Services in Small Satellites
An Approach for Recovering Satellites and their Cryptographic Capabilities in the Presence of SEUs and Attacks
Key Generation for Secure Inter-satellite Communication
Comprehensive Experimental Analyses of Automotive Attack Surfaces
On-Board Encryption in Earth Observation Small Satellites
  • R. Banu, T. Vladimirova
  • Computer Science
  • Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology
  • 2006
A SEU-resistant, FPGA-based implementation of the substitution transformation in AES for security on satellites
  • S. Ghaznavi, C. Gebotys
  • Engineering
  • 2008 10th International Workshop on Signal Processing for Space Communications
  • 2008
Vulnerability Assessment of Cybersecurity for SCADA Systems
Three tenets for secure cyber-physical system design and assessment
A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet