Abstract
According to the characteristics of space information network, this paper introduces a security threat model, and then makes a detailed threat analysis for network system from five levels, physical device, platform system, network security, data security and management security. At last, this paper offers a brief analysis of security strategy of the five levels, these results will serve as a theoretical underpinning for creating a security defense architecture for space information network roundly and dynamically.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Li, H., Li, X., Wang, K., et al.: Research on modeling methods of security protocol for space information network. Energy Procedia 13, 6657–6661 (2011)
Lee, J., Sun, K.: Satellite over satellite (SOS) network: a novel architecture for satellite network. In: INFOCOM Nineteenth Joint Conference of the IEEE Computer & Communications Societies, pp. 315–321. IEEE (2000)
Zhang, D.Y., Liu, S.S.: Research on mesh-based architecture for space information network. Comput. Technol. Dev. 8, 020 (2009)
Li, X.G.: Design and implement of the wireless real-time data transmission system based on USB. Appl. Mech. Mater. 310, 596–600 (2013)
Pelton, J.N.: Satellite communications. J. Inst. Electr. Eng. 16(9), 102–103 (2012)
Zhou, W., Ao, H., Zhou, Q., et al.: Satellite space information network: application and prospect. In: International Conference on Education, Management and Computer Science (2016)
Wang, S., Wu, B., Wang, B.: Research on doppler characteristics of inter-satellite-links in Beidou-based space information network. In: IEEE International Conference on Information and Automation, pp. 2910–2914. IEEE (2015)
Zhang, W., Bian, D., Xie, Z., et al.: A novel space information network architecture based on autonomous system. In: International Conference on Wireless Communications & Signal Processing, pp. 1–5. IEEE (2015)
Hao, X.W., Ma, J.F., Ren, F., Liu, X.Y., Zhong, Y.T.: A kind of authentication routing protocol based on double satellite network in space information network. Comput. Sci. 38(2), 79–81 (2011)
Shahriar, A.Z.M., Atiquzzaman, M., Ivancic, W.: Network mobility in satellite networks: architecture and the protocol. Int. J. Commun Syst. 26(2), 177–197 (2013)
Long, F., Yang, Z., Sun, F., et al.: A multi-objective optimization based QoS routing algorithm for multi-layered satellite IP networks. In: IEEE International Conference on Networking, Sensing and Control, ICNSC 2010, Chicago, IL, USA, 10–12 April. 2010, pp. 147–152 (2010)
Gou, X., Yan, H., Yi, F., et al.: Modeling and simulation of small satellite constellation networking using multi-topology routing. In: International Conference on Computer Application and System Modeling, pp. V12-143–V12-147. IEEE (2010)
Zhou, X., Zhang, L., Cheng, Z., et al.: Hypernetwork model and architecture for deep space information networks. Energy Procedia 13, 8309–8317 (2011)
Fang, R., Jiulun, F.: An adaptive distributed certificate management scheme for space information network. IET Inf. Secur. 7(4), 318–326 (2013)
Jiang, C., Wang, X., Wang, J., et al.: Security in space information networks. IEEE Commun. Mag. 53(8), 82–88 (2015)
Zheng, G., Arapoglou, P.D., Ottersten, B.: Physical layer security in multibeam satellite systems. IEEE Trans. Wirel. Commun. 11(2), 852–863 (2012)
Rui, M.P.P.: Security for satellite access to mesh networks (2014)
Karadogan, I., Das, R.: Analysis of attack types on TCP/IP based networks via exploiting protocols. In: Signal Processing and Communications Applications Conference, pp. 1785–1788. IEEE (2015)
Baek, Y.S., Koo, B.T.: Secure communication method and system in network environment which includes transmitter, receiver, and wiretapper. US9060264 (2015)
Hsu, T.S.: Method and apparatus having null-encryption for signaling and media packets between a mobile station and a secure gateway (2015)
Wu, H., Preneel, B.: AEGIS: a fast authenticated encryption algorithm. In: Lange, T., Lauter, K., Lisoněk, P. (eds.) SAC 2013. LNCS, vol. 8282, pp. 185–201. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-43414-7_10
Lai, J., Deng, R.H., et al.: Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption (2014)
Acknowledgements
This work was supported by the National Natural Science Foundation of China (91438120). And the Foundation of advanced research.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chundong, S., Luting, J., Yaqi, M., Shaohua, L. (2018). The Security Threat and Strategy Analysis of Space Information Network. In: Yu, Q. (eds) Space Information Networks. SINC 2017. Communications in Computer and Information Science, vol 803. Springer, Singapore. https://doi.org/10.1007/978-981-10-7877-4_2
Download citation
DOI: https://doi.org/10.1007/978-981-10-7877-4_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7876-7
Online ISBN: 978-981-10-7877-4
eBook Packages: Computer ScienceComputer Science (R0)