Space-Air-Ground Integrated Network Security

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book focuses on security science and technology, data and information security, and mobile and network security for space-air-ground integrated networks (SAGINs). SAGIN are expected to play an increasingly important role in providing real-time, flexible, and integrated communication and data transmission services in an efficient manner. Today, SAGINs have been widely developed for a range of applications in navigation, environmental monitoring, traffic management, counter-terrorism, etc. However, security becomes a major concern, since the satellites, spacecrafts, and aircrafts are susceptible to a variety of traditional/specific network-based attacks, including eavesdropping, session hijacking, and illegal access.

In this book, we review the theoretical foundations of SAGIN security. We also address a range of related security threats and provide cutting-edge solutions in the aspect of ground network security, airborne network security, space network security, and provide future trends in SAGIN security. The book goes from an introduction to the topic’s background, to a description of the basic theory, and then to cutting-edge technologies, making it suitable for readers at all levels including professional researchers and beginners. To gain the most from the book, readers should have taken prior courses in information theory, cryptography, network security, etc.


Author(s): Jianwei Liu, Lin Bai, Chunxiao Jiang, Wei Zhang
Publisher: Springer
Year: 2023

Language: English
Pages: 434
City: Singapore

Preface
Contents
Acronyms
1 Introduction to SAGIN Security
1.1 Introduction
1.2 Network Architecture of SAGIN
1.2.1 Demand Analysis of SAGIN
1.2.2 The State of the Art for SAGIN
1.2.3 Architecture of SAGIN
1.2.4 Suggestions for the Development of SAGIN
1.3 Security Requirements of SAGIN
1.3.1 Data Confidentiality and Data Integrity
1.3.2 Register, Usage, and Revocation
1.3.3 Access Authentication and Access Control
1.4 The State of the Art for SAGIN Security
1.5 Security Technologies and Key Security Challenges
1.5.1 Formal Security Models
1.5.2 Lightweight Cryptographic Algorithms and Protocols
1.5.3 Cross-Domain Key Distribution and Update
1.5.4 Efficient Access Authentication
References
2 Theory Foundation of SAGIN Security
2.1 Mathematic Foundation
2.1.1 Congruence
2.1.2 Groups, Rings and Fields
2.1.3 Elliptic Curves
2.1.4 One-Way Functions
2.1.5 Bilinear Map and Bilinear Diffie-Hellman Assumption
2.2 Cryptography Fundation
2.2.1 Symmetric Encryption
2.2.2 Asymmetric Encryption
2.2.3 Hash Function
2.2.4 Digital Signature
2.2.5 Security Protocol
2.2.6 Provable Security
2.3 Communication Foundation
2.3.1 Digital Modulation
2.3.1.1 ASK
2.3.1.2 PSK
2.3.1.3 QAM
2.3.1.4 OFDM
2.3.2 Multiple Access Techniques
2.3.2.1 Frequency Division Multiple Access (FDMA)
2.3.2.2 Time-Division Multiple Access (TDMA)
2.3.2.3 Code Division Multiple Access (CDMA)
2.3.2.4 Space Division Multiple Access (SDMA)
2.3.2.5 Orthogonal Frequency Division Multiple Access (OFDMA)
2.3.3 MIMO
2.3.3.1 MIMO System
2.3.3.2 MIMO Precoding
2.3.3.3 MIMO Detection
2.3.3.4 Diversity and Spatial-Multiplexing
References
3 Ground Network Security
3.1 Introduction to Ground Network Security
3.1.1 A Brief Introduction to Ground Network
3.1.2 Security Issues of Ground Network
3.1.3 State-of-the-Art of Ground Network Security
3.2 Mobile Communication Network Security
3.2.1 Secure Routing
3.2.1.1 Problem Definition
3.2.1.2 Basic Algorithm: Network-Capability-Based Routing
3.2.1.3 Security-Oriented Routing and Dynamic Reconfiguration
3.2.1.4 Overall Architecture
3.2.1.5 Routing Path Comparison
3.2.2 Mobile Network Authentication
3.2.2.1 System Architecture
3.2.2.2 Definition of Flow-Rule-Production Permissions
3.2.2.3 Identity and The FRP Permissions Registration
3.2.2.4 The Identity-Based Signature Scheme in PERM-GUARD
3.2.2.5 Flow Rule Validity Authentication Algorithm
3.2.2.6 Flow Rules Verification Function Test
3.2.2.7 Time Consumption Analysis
3.2.2.8 Performance Analysis
3.2.2.9 Discussion on Scalability
3.2.3 Seamless Group Pre-Handover Authentication Scheme for 5G
3.2.4 Edge Data Security
3.3 Internet of Things Security
3.3.1 Blockchain-Based Dynamic Provable Data Possession
3.3.2 Blockchain-Based Anonymous Authentication
3.3.3 Secure Data Aggregation for IoT-Enabled Maritime Transportation Systems
3.3.4 IMS: An Identity-Based Many-to-Many Subscription Scheme With Efficient Key Management for Wireless Broadcast Systems
7. The IMS Scheme
3.3.5 Blockchain-Based PUF Authentication
3.4 Internet of Vehicles Security
3.4.1 Trustworthiness Scalable Computation
3.4.1.1 Introduction
3.4.1.2 Blockchain Assisted Trustworthiness Scalable Computation
3.4.1.3 Time-Efficient V2I Authentication
3.4.1.4 Result and Future Work
3.4.2 A Scalable Security Protocol for Intra-Vehicular Controller Area Network
3.4.2.1 Background
3.4.2.2 Scalable Protocol Suite
3.4.2.3 Security Verification
3.4.2.4 Performance Analysis
3.4.3 Lightweight Authentication for Emergency Vehicle Avoidance
3.4.3.1 Introduction
3.4.3.2 Authentication for Emergency Vehicle Avoidance
3.4.3.3 Results
3.4.4 Secure Vehicle Platooning
3.4.4.1 Introduction
3.4.4.2 System and Security Model
3.4.4.3 Proposed Secure Platooning Protocol
3.4.4.4 Security Evaluation
3.4.4.5 Performance Analysis
3.5 Conclusions
References
4 Airborne Network Security
4.1 Introduction to Airborne Network Security
4.1.1 A Brief Introduction to Airborne Networks
4.1.2 Security Issues of Airborne Networks
4.1.3 State-of-the-Art of Physical-Layer Security of Airborne Networks
4.1.3.1 Introduction of Physical Layer Security
4.1.3.2 Physical Layer Security Technology in Airborne Networks
4.2 GNSS Spoofing Detection for Swarm UAV Networks
4.2.1 Background
4.2.2 System Architecture
4.2.3 Blockchain-Based GNSS Spoofing Detection Scheme
4.2.4 Performance Analysis
4.2.5 Conclusions
4.3 Secure Data Acquisition for UAV-Enabled IoT Networks
4.3.1 System Model
4.3.2 Secrecy Rate Analysis and Problem Formulation
4.3.3 Joint Communications and UAV Placement Design
4.3.3.1 Design of RCW Settings
4.3.3.2 ABF Optimization and UAV 3D Placement
4.3.3.3 Overall Optimization Algorithms
4.3.4 Simulation Results
4.3.5 Conclusions
4.4 Secure Data Relaying for UAV-Aided SAGIN
4.4.1 System Model
4.4.2 Problem Formulation
4.4.3 Joint Power Allocation and UAV Deployment
4.4.3.1 Secrecy Rate Maximization for the IoRT-Based Secure SAGCN
4.4.3.2 Initialization Settings for System Secrecy Rate Optimization
4.4.4 Simulation Results
4.4.5 Conclusions
4.5 Conclusions
References
5 Space Network Security
5.1 Introduction to Space Network Security
5.1.1 A Brief Introduction to Space Networksand Architectures
5.1.2 Security Issues of Space Networks
5.1.3 State-of-the-Art of Space Network Security
5.2 Satellite Internet Security Architecture
5.2.1 Secure Handoff in Space Information Networks
5.2.2 Secure Transmission Control in Space Networks
5.2.3 Key Management in Satellite Internet Security
5.2.4 Secure Routing in Satellite Information Networks
5.3 NGSO Satellite Relay Network Security
5.3.1 Relay-Aided Security in Space Information Networks
5.3.2 Satellite Beam Hopping for Uplink Network Security
5.3.3 Relay Selection for Downlink Network Security
5.3.4 Satellite Power Allocation and Relay Deployment
5.3.5 Future Directions in NGSO Satellite Network Security
5.4 GSO Backbone Satellite Network Security
5.4.1 Security-Aware VNE Techniques in GSO Satellites
5.4.2 ML-Based GSO Satellite VNE Algorithms
5.4.3 RL-Based Architecture in GSO Satellite Security
5.4.4 Secure Network Models and Evaluation Indicators
5.4.5 RL Algorithms on Policy Network
5.5 Conclusion
References
6 Future Trend of Network Security
6.1 AI for Network Security
6.1.1 AI-Powered Network Attacks
6.1.1.1 Automated Vulnerability Detection and Exploit Generation
6.1.1.2 AI-Empowered Privacy Attacks
6.1.2 AI-Powered Network Defense
6.2 Zero Trust Security
6.2.1 Zero Trust Architecture
6.2.2 Zero Trust Access Concepts Model
6.2.3 Build a Zero Trust Network
6.3 THz Communications Security
6.3.1 Basics of THz Communications
6.3.2 Secrecy Beamforming in THz Communications
6.3.2.1 Wyner's Wiretap Channel
6.3.2.2 Secrecy Beamforming
6.3.3 Eavesdropping and the Counter-Measures in THz Communications
6.3.3.1 Eavesdropping in THz Communications
6.3.3.2 The Counter-Measures
6.4 Conclusion
References