Defending Small Satellites from Malicious Cybersecurity Threats

Document Type

Conference Proceeding

Publication Date

3-2-2022

Abstract

The connection between space and cyberspace domains is increasingly intertwined. Advancements in space technology, decreasing costs for satellite development, and the use of commercial off-the-shelf products present many cybersecurity challenges to space infrastructure. Additionally, space-based global critical infrastructure makes the space domain a prime target for malicious cyber threats. Software-defined radios introduce a potential attack vector for adversaries planning malicious satellite activity. This paper demonstrates how an adversary would send malicious commands via a software-defined radio to affect the integrity of the sensors on the satellite running NASA's core Flight System software. The experiment demonstrates one possible threat vector using a commercially available USRP N210 software-defined radio. The results show that well-constructed messages can be created to manipulate sensors on a target small satellite system. Identifying cybersecurity vulnerabilities like these in space systems can improve security and prevent disruptions for the global space enterprise.

Comments

The "Link to Full Text" on this page will open the paper's front page at the conference website. An open access PDF is available from that page. This is an Open Access conference paper published and distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives License, which permits non-commercial re-use, distribution, and reproduction in any medium, provided the original work is properly cited, and is not altered, transformed, or built upon in any way. CC BY-NC-ND 4.0

Please fully attribute as cited below in any re-use.

DOI

10.34190/iccws.17.1.60

Source Publication

Proceedings of the 17th International Conference on Information Warfare and Security, 2022

Share

COinS