2017 International Conference on Cyber Conflict (CyCon U.S.) 2017
DOI: 10.1109/cyconus.2017.8167508
|View full text |Cite
|
Sign up to set email alerts
|

Considerations for secure and resilient satellite architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 20 publications
0
1
0
Order By: Relevance
“…This section presents a brief overview of commercial satellite general components and architecture to fully understand the diversity of potential suppliers that support the architecture. Willis et al (2017) describe a notional satellite as being similar to an industrial control system, made up of systems within systems connected via buses. The main elements within the architecture are propulsion, thermal, power, attitude, and data handling subsystems.…”
Section: Commercial Satellite Components/architecturementioning
confidence: 99%
“…This section presents a brief overview of commercial satellite general components and architecture to fully understand the diversity of potential suppliers that support the architecture. Willis et al (2017) describe a notional satellite as being similar to an industrial control system, made up of systems within systems connected via buses. The main elements within the architecture are propulsion, thermal, power, attitude, and data handling subsystems.…”
Section: Commercial Satellite Components/architecturementioning
confidence: 99%
“…Whilst government regulations, academic work, and recent reports by organizations such as GOES have drawn attention to space data link security more generally, these focus on securing the telecommand or internal bus rather than the Payload Data Downlink (PDD) [11], [64], [45]. To the best of our knowledge only one academic paper considers satellite systems spoofing outside of GNSS, and this only in a theoretical scenario of internet hijacking [44].…”
Section: Introductionmentioning
confidence: 99%