TY - JOUR
T1 - Safeguarding Inter-Satellite Transmissions
T2 - A Viewpoint from Covertness
AU - Wang, Shuai
AU - Ye, Jia
AU - Chen, Chao
AU - Pan, Gaofeng
AU - An, Jianping
N1 - Publisher Copyright:
© 2002-2012 IEEE.
PY - 2025
Y1 - 2025
N2 - As inter-satellite communication (ISC) networks continue to evolve and play a critical role in space missions, ensuring the security and integrity of these networks has become a paramount concern. The unique characteristics of ISCs, such as the predictable movement of satellites and the use of high-frequency bands, push the limits of commonly used physical layer security and encryption techniques for securing communications networks. By concealing the existence of transmissions from potential adversaries, covert communications provide a robust defense against interception and unauthorized access, ensuring the confidentiality and integrity of sensitive data exchanged between satellites. This article explores the potential of covert techniques, considering the unique characteristics of ISCs, and verifies their effectiveness through numerical experiments. It also discusses future research directions in covert ISCs that need to be explored to advance this critical field and mitigate security risks. The contributions and organizations involved in this work are dedicated to enhancing the security of ISC networks and preserving the integrity of space missions.
AB - As inter-satellite communication (ISC) networks continue to evolve and play a critical role in space missions, ensuring the security and integrity of these networks has become a paramount concern. The unique characteristics of ISCs, such as the predictable movement of satellites and the use of high-frequency bands, push the limits of commonly used physical layer security and encryption techniques for securing communications networks. By concealing the existence of transmissions from potential adversaries, covert communications provide a robust defense against interception and unauthorized access, ensuring the confidentiality and integrity of sensitive data exchanged between satellites. This article explores the potential of covert techniques, considering the unique characteristics of ISCs, and verifies their effectiveness through numerical experiments. It also discusses future research directions in covert ISCs that need to be explored to advance this critical field and mitigate security risks. The contributions and organizations involved in this work are dedicated to enhancing the security of ISC networks and preserving the integrity of space missions.
UR - http://www.scopus.com/inward/record.url?scp=85214875778&partnerID=8YFLogxK
U2 - 10.1109/MWC.002.2400042
DO - 10.1109/MWC.002.2400042
M3 - Article
AN - SCOPUS:85214875778
SN - 1536-1284
VL - 32
SP - 221
EP - 228
JO - IEEE Wireless Communications
JF - IEEE Wireless Communications
IS - 1
ER -