Space-Integrated-Ground Information Networks ›› 2023, Vol. 4 ›› Issue (2): 13-23.doi: 10.11959/j.issn.2096-8930.2023015

• Special Issue: Satellite Internet Security Technology • Previous Articles     Next Articles

Research on LEO Satellite Network Routing Security

Wenhao XUE1, Tian PAN1, Chengcheng LU1, Fan YANG1, Tao HUANG1,2, Yunjie LIU1,2   

  1. 1 State Key Laboratory of Networking and Switching Technology, BUPT, Beijing 100876, China
    2 Purple Mountain Laboratories, Nanjing 211111, China
  • Revised:2023-05-10 Online:2023-06-20 Published:2023-06-01
  • Supported by:
    National Key Research and Development Program of China(2018YFB1800602);National Key Research and Development Program of China(2019YFB1802600)

Abstract:

The design of secure mechanisms and failure recovery mechanisms for inter-satellite routing has become pivotal in maintaining dependable communication within the LEO satellite network.To address the potential security threats faced by satellite networks, the impact of different routing attack behaviors on a typical inter-satellite routing protocol was analyzed and differentiated packet security authentication mechanisms and link failure recovery mechanisms were designed.Additionally, a satellite network emulation platform based on virtualization technology was constructed, enabled the verification of the effectiveness of the designed inter-satellite routing security mechanisms through the emulation of various routing attack scenarios.Furthermore, performance metrics such as CPU utilization and packet processing time were also evaluated before and after the introduction of security mechanisms.Experimental results demonstrated that the proposed inter-satellite routing security mechanism effectively mitigated multiple security threats in the space network environment while reduced communication latency caused by sudden link failures, thereby ensured secure and reliable communication within the LEO satellite network.

Key words: LEO satellite network, routing protocol, routing security attack, link failure recovery, security attack simulation

CLC Number: 

No Suggested Reading articles found!