SlideShare a Scribd company logo
Dr. ing. Marco Lisi
(marco.lisi@ieee.org)
Master di II Livello in "Homeland Security"
Università degli Studi Campus Bio-Medico di Roma, A. A. 2014-2015
SECURITY IN SATELLITE SYSTEMS
01/06/2015
Summary
 All critical infrastructures of our society rely on ICT
systems; their confidentiality, availability, integrity,
continuity and quality of service have to be
guaranteed and protected
 Satellite systems, integrated into world-wide ICT
infrastructures, are more and more vulnerable to
intentional and non-intentional threats
 Satellite security is often limited to encryption and
anti-jamming technologies, but satellite ground
segments are exposed to the same type of threats
typically experienced by terrestrial information
systems
 Information security is no longer a “nice to have”,
but rather a “must have” option.
01/06/2015
Satellite Integration in
Network-Centric Architectures
01/06/2015
Satellite Pirating
The most famous case of satellite pirating is that of
John MacDougall, alias “Captain Midnight”, who was
able in 1986 to superimpose his messages onto a
commercial DTH TV channel.
01/06/2015
Satellite System Components and Links
01/06/2015
Unintentional Threats to Satellite
Systems
01/06/2015
Intentional Threats to Satellite Systems
01/06/2015
Satellite Systems: Threats and
Countermeasures
01/06/2015
Spacecraft Communications Infrastructure
01/06/2015
Space Communications Standards
 The European Space Agency (ESA) is integrating
security features into its space communications
standards
 ESA communications with its spacecrafts are based
on the CCSDS (Consultative Committee for Space
Data Systems) Packet TM/TC Protocol Family, that
does not presently integrate default security
features
 CCSDS, however, has proposed new standards (Space
Communication Protocol Standards, SCPS) providing
built-in security support functions.
01/06/2015
Conclusions
 In a network-centric perspective, satellite systems
need to incorporate standardized and certifiable
approaches to information security
 So far information security has been perceived as a
customized add-on, leading to a variety of security
requirements and to a number of proprietary
solutions, adopted by space agencies and industries
 Certification standards and security solutions for
network-centric military systems can be effectively
applied to complex, network-centric satellite systems
 Information security features, including encryption,
keys management and conditional access control, will
have to be designed into the network from the
beginning, as an integral part of it.

More Related Content

ODP
OUGF - OSAmI - OSGi Ubiquity
PDF
Muses poster4evostar2013
PDF
EU H2020 PRISMACLOUD Project Overview
PDF
The European Space Agency Strengthens IT Security With Secunia's Vulnerabilit...
PPT
Network security & information security maintainence modified
PDF
Cloud Computing Security V1.2
PPTX
JDMDE Specialisation KaHo Sint-Lieven
PPTX
Lecture 07 networking
OUGF - OSAmI - OSGi Ubiquity
Muses poster4evostar2013
EU H2020 PRISMACLOUD Project Overview
The European Space Agency Strengthens IT Security With Secunia's Vulnerabilit...
Network security & information security maintainence modified
Cloud Computing Security V1.2
JDMDE Specialisation KaHo Sint-Lieven
Lecture 07 networking

What's hot (17)

PPTX
Using distributed firewalls in securing LANs
PPTX
Cloud security and compliance ppt
PDF
Practical Guide to RF-MEMS
PDF
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
PPTX
Cloud Security using NIST guidelines
DOCX
Ijwns
PDF
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
PDF
Effect splus systems-and-network-cluster-results-draft-v1
ODP
Enabling Open Access For Flood Risk Preparedness
PDF
Cybersecurity Essentials
PPTX
Network Research Assistance
PDF
Workshop summary software assurance and trust
DOCX
Ijwns
DOCX
Ijwns
DOCX
International Journal of Wireless Networks Systems (IJWNS)
PDF
Secure, Automated Network Access for Any Device on Campus
Using distributed firewalls in securing LANs
Cloud security and compliance ppt
Practical Guide to RF-MEMS
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Cloud Security using NIST guidelines
Ijwns
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
Effect splus systems-and-network-cluster-results-draft-v1
Enabling Open Access For Flood Risk Preparedness
Cybersecurity Essentials
Network Research Assistance
Workshop summary software assurance and trust
Ijwns
Ijwns
International Journal of Wireless Networks Systems (IJWNS)
Secure, Automated Network Access for Any Device on Campus
Ad

Viewers also liked (14)

PDF
GNSS and Timing: the Need for a Global PNT Infrastructure
PPTX
PPTX
Second Project PPT
PPTX
Genetic algorithms for shortest path routing
PPTX
Satellite Systems
PDF
Satellite Telephony Security
PPTX
Security in wireless sensor network
PPT
security in wireless sensor networks
PPTX
Seminar (network security)
PPTX
Social network privacy & security
PPTX
Mobile jammer
PPTX
RFID BASED SECURITY ACCESS CONTROL SYSTEM
PPTX
Wireless sensor network security
PPTX
FOG COMPUTING
GNSS and Timing: the Need for a Global PNT Infrastructure
Second Project PPT
Genetic algorithms for shortest path routing
Satellite Systems
Satellite Telephony Security
Security in wireless sensor network
security in wireless sensor networks
Seminar (network security)
Social network privacy & security
Mobile jammer
RFID BASED SECURITY ACCESS CONTROL SYSTEM
Wireless sensor network security
FOG COMPUTING
Ad

Similar to Security_in_Satellite_Systems_Lisi_2015 (20)

PDF
Satellite Network Threats Hacking Security Analysis Adam Hudaib
PDF
Satellite Network Threats Hacking Security Analysis Adam Hudaib
PDF
Understanding satellite cyber security - CyberHive.pdf
PDF
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
PDF
Satellite Network Hacking & Security Analysis
PDF
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
PDF
A research paper on survey of secure comm. for satellite and internet based o...
PPTX
Global cybersecurity on earth + in space
PPTX
Global Cyber Security on Earth + in Space
PDF
Nss repko
PDF
Employing Commercial Communications
PDF
Cyber Security: Protecting Today's Mission Critical Public Safety Networks
PDF
Satellite-Hacking UNDERCODE Book for .pdf
PDF
Satellite hacking
PDF
Security in Large, Strategic and Complex Systems: Challenges and Solutions_Li...
PPTX
semminar pres.1 for the seminar presentation.pptx
PPTX
Sample_Seminar_First_Presentation_for_college.pptx
PDF
Transmission Security (TRANSEC) - White Paper
PDF
Whitepaper: Staying Ahead of the Changing Security Threat Landscape
PPTX
UNIT-1-Satellite Communication.pptx
Satellite Network Threats Hacking Security Analysis Adam Hudaib
Satellite Network Threats Hacking Security Analysis Adam Hudaib
Understanding satellite cyber security - CyberHive.pdf
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
Satellite Network Hacking & Security Analysis
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
A research paper on survey of secure comm. for satellite and internet based o...
Global cybersecurity on earth + in space
Global Cyber Security on Earth + in Space
Nss repko
Employing Commercial Communications
Cyber Security: Protecting Today's Mission Critical Public Safety Networks
Satellite-Hacking UNDERCODE Book for .pdf
Satellite hacking
Security in Large, Strategic and Complex Systems: Challenges and Solutions_Li...
semminar pres.1 for the seminar presentation.pptx
Sample_Seminar_First_Presentation_for_college.pptx
Transmission Security (TRANSEC) - White Paper
Whitepaper: Staying Ahead of the Changing Security Threat Landscape
UNIT-1-Satellite Communication.pptx

More from Marco Lisi (20)

PPTX
Presentation on Malicious Hardware_Lisi_2020
PDF
"High positioning accuracy and precise time transfer with PPP GNSS receivers"
PDF
A Through-life, Integrated and Concurrent Engineering Methodology for the Res...
PDF
"Performance Specification of Active Antenna Systems"
PDF
Antenna estec presentation_lisi_v01
PDF
Egnos galileo unphu-santo_domingo_2018_lisi
PDF
Isncc conference 2018_lisi_v02
PDF
Galileo: System and Applications
PDF
An Introduction to Service Systems Engineering (SSE)
PDF
"Integration and Fusion of Space and Ground Technologies and Infrastructures"
PDF
Satellite Link Budget_Course_Sofia_2017_Lisi
PDF
"Galileo Initial Services: paving the way for the GNSS of the future"
PDF
"Initial Services", the new phase of the Galileo program
PDF
Galileo_Initial_Services_Lisi_Geomedia_1_2017
PDF
Economia dei servizi: una visione sistemica
PDF
2017 Ka-band and AIAA ICSSC Joint Conference -Trieste
PDF
A COMMUNICATIONS AND PNT INTEGRATED NETWORK INFRASTRUCTURE FOR THE MOON VILLAGE
PDF
Federated Systems of Pico-Satellites for Future Space-Based Service Infrastru...
PDF
Navigating in a Digital "New World"
PDF
"GNSS-based Timing for Power Grids and other Critical Infrastructures"
Presentation on Malicious Hardware_Lisi_2020
"High positioning accuracy and precise time transfer with PPP GNSS receivers"
A Through-life, Integrated and Concurrent Engineering Methodology for the Res...
"Performance Specification of Active Antenna Systems"
Antenna estec presentation_lisi_v01
Egnos galileo unphu-santo_domingo_2018_lisi
Isncc conference 2018_lisi_v02
Galileo: System and Applications
An Introduction to Service Systems Engineering (SSE)
"Integration and Fusion of Space and Ground Technologies and Infrastructures"
Satellite Link Budget_Course_Sofia_2017_Lisi
"Galileo Initial Services: paving the way for the GNSS of the future"
"Initial Services", the new phase of the Galileo program
Galileo_Initial_Services_Lisi_Geomedia_1_2017
Economia dei servizi: una visione sistemica
2017 Ka-band and AIAA ICSSC Joint Conference -Trieste
A COMMUNICATIONS AND PNT INTEGRATED NETWORK INFRASTRUCTURE FOR THE MOON VILLAGE
Federated Systems of Pico-Satellites for Future Space-Based Service Infrastru...
Navigating in a Digital "New World"
"GNSS-based Timing for Power Grids and other Critical Infrastructures"

Recently uploaded (20)

PDF
Hybrid model detection and classification of lung cancer
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
STKI Israel Market Study 2025 version august
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
1. Introduction to Computer Programming.pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Hybrid model detection and classification of lung cancer
Final SEM Unit 1 for mit wpu at pune .pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
NewMind AI Weekly Chronicles – August ’25 Week III
Module 1.ppt Iot fundamentals and Architecture
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
cloud_computing_Infrastucture_as_cloud_p
OMC Textile Division Presentation 2021.pptx
STKI Israel Market Study 2025 version august
Enhancing emotion recognition model for a student engagement use case through...
Getting started with AI Agents and Multi-Agent Systems
Zenith AI: Advanced Artificial Intelligence
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
1. Introduction to Computer Programming.pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Assigned Numbers - 2025 - Bluetooth® Document
A contest of sentiment analysis: k-nearest neighbor versus neural network
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
gpt5_lecture_notes_comprehensive_20250812015547.pdf

Security_in_Satellite_Systems_Lisi_2015

  • 1. Dr. ing. Marco Lisi (marco.lisi@ieee.org) Master di II Livello in "Homeland Security" Università degli Studi Campus Bio-Medico di Roma, A. A. 2014-2015 SECURITY IN SATELLITE SYSTEMS
  • 2. 01/06/2015 Summary  All critical infrastructures of our society rely on ICT systems; their confidentiality, availability, integrity, continuity and quality of service have to be guaranteed and protected  Satellite systems, integrated into world-wide ICT infrastructures, are more and more vulnerable to intentional and non-intentional threats  Satellite security is often limited to encryption and anti-jamming technologies, but satellite ground segments are exposed to the same type of threats typically experienced by terrestrial information systems  Information security is no longer a “nice to have”, but rather a “must have” option.
  • 4. 01/06/2015 Satellite Pirating The most famous case of satellite pirating is that of John MacDougall, alias “Captain Midnight”, who was able in 1986 to superimpose his messages onto a commercial DTH TV channel.
  • 10. 01/06/2015 Space Communications Standards  The European Space Agency (ESA) is integrating security features into its space communications standards  ESA communications with its spacecrafts are based on the CCSDS (Consultative Committee for Space Data Systems) Packet TM/TC Protocol Family, that does not presently integrate default security features  CCSDS, however, has proposed new standards (Space Communication Protocol Standards, SCPS) providing built-in security support functions.
  • 11. 01/06/2015 Conclusions  In a network-centric perspective, satellite systems need to incorporate standardized and certifiable approaches to information security  So far information security has been perceived as a customized add-on, leading to a variety of security requirements and to a number of proprietary solutions, adopted by space agencies and industries  Certification standards and security solutions for network-centric military systems can be effectively applied to complex, network-centric satellite systems  Information security features, including encryption, keys management and conditional access control, will have to be designed into the network from the beginning, as an integral part of it.