EphemeriShield – defence against cyber-antisatellite weapons

by   Rafal Graczyk, et al.

Satellites, are both crucial and, despite common misbelieve, very fragile parts our civilian and military critical infrastructure. While, many efforts are focused on securing ground and space segments, especially when national security or large businesses interests are affected, the small-sat, newspace revolution democratizes access to, and exploitation of the near earth orbits. This brings new players to the market, typically in the form of small to medium sized companies, offering new or more affordable services. Despite the necessity and inevitability of this process, it also opens potential new venues for targeted attacks against space-related infrastructure. Since sources of satellite ephemerides are very often centralized, they are subject to classical Man-in-the-Middle attacks which open venues for TLE spoofing attack, which may result in unnecessary collision avoidance maneuvers, in best case and orchestrated crashes, in worst case. In this work, we propose a countermeasure to the presented problem that include distributed solution, which will have no central authority responsible for storing and disseminating TLE information. Instead, each of the peers participating to the system, have full access to all of the records stored in the system, and distribute the data in a consensual manner,ensuring information replication at each peer node. This way, single point of failure syndromes of classic systems, which currently exist due to the direct ephemerids distribution mechanism, are removed. Our proposed solution is to build data dissemination systems using permissioned, private ledgers where peers have strong and verifiable identities, which allow also for redundancy in SST data sourcing.


page 1

page 2


Impact of State and State Sponsored Actors on the Cyber Environment and the Future of Critical Infrastructure

The purpose of this research paper is to critically explore the impact o...

A systematic literature review on Ransomware attacks

In the area of information technology, cybersecurity is critical. Inform...

Prediction of terrorism pattern accompanied by cyber-terrorism and the development direction of corresponding legal systems

As the information and communication system has become an essential elem...

From product recommendation to cyber-attack prediction: Generating attack graphs and predicting future attacks

Modern information society depends on reliable functionality of informat...

Staring Down the Digital Fulda Gap Path Dependency as a Cyber Defense Vulnerability

Academia, homeland security, defense, and media have accepted the percep...

Sanctuary lost: a cyber-physical warfare in space

Over the last decades, space has grown from a purely scientific struggle...

Please sign up or login with your details

Forgot password? Click here to reset