Вы находитесь на странице: 1из 23

Manisha Jaya(11089C055) B.E.

4th yr ECE,SCSVMV

Satellite -an essential part of telecommunication systems worldwide carrying large amount of data and telephone traffic in addition to television signals. When we communicate via satellites there is a possibility that an interceptor can interfere and read the message being sent. To prevent this and to send the information in a secure manner we use satellite encryption. Satellite Encryption explains the need for secure satellite communications, including ways of implementing them, and discusses their implications (in business, government, and warfare).

Heard about IP SPOOFING??

IP spoofing is a method of attacking a network in order to gain unauthorized access. BASIS: Internet communication between distant computers is routinely handled by routers which find the best route by examining the destination address, but generally ignore the origination address. The origination address is only used by the destination machine when it responds back to the source.

1. 2.

3.

4.

5.

6.

Selecting a target host ( or victim). The trust relationships are reviewed to identify a host that has a trust relationship with the target host. The trusted host is then disabled and the targets TCP sequence numbers are sampled. The trusted host is then impersonated, the sequence numbers forged (after being calculated) . A connection attempt is made to a service that only requires address-based authentication (no user id or password). If a successful connection is made, the attacker executes a simple command to leave a backdoor.

The IP datagrams containing the forged IP addresses will reach the target intact, IP being a connectionless-oriented protocol which requires no handshaking. Each datagram is sent without concern for the other end.

The attacker cannot see what the target host sends, but based on the handshaking procedure, an attacker can predict what the target host will send in response. Knowing both what has been sent and what the response will be eliminates the need to actually see the response. Calculates ISN(initial sequence number).

1.The simplest solution is to not rely upon address-based authentication. This makes remote users use other type of remote connection such as telnet, ssh, or skey. 2. Another possible solution is encrypting all network traffic to avoid source and host destinations from being compromised. 3. The final recommended solution, one proposed by Bellovin in 1989-use random initial sequence numbering.

The process begins at an earth station--an installation designed to transmit and receive high powered, high frequency (GHz range)signals from a satellite. The area which receives a signal of useful strength from the satellite is known as the satellite's footprint. The transmission system from the earth station to the satellite is called the uplink, and the system from the satellite to the earth station is called the downlink.

C-band-4 to 8 GHz frequency range, for many satellitecommunications transmissions,WiFi devices , cordless telephones and weather radar systems. Ku-band-10.95-14.5 GHz-for fixed and broadcast services, and for specific applications such as NASA's Tracking Data Relay Satellite Ka-band-26.5 to 40 GHz-smallest antenna size.

Encryption or scrambling- a system that takes the signal and reconfigures it into something that is unusable without a corresponding decoder. Encryption means secret writing. It is used to hide information and access by unauthorized parties especially during communication in military and national affairs. Necessity- common knowledge of the encryption process between sender and receiver sharing a secret common element typically the cryptographic key.

` `

Symmetric encryption or Secret key encryption Asymmetric encryption -different keys for encryption- the public key & private key.

` ` ` ` `

Confidentiality Authentication Integrity check Digital signature Digital date/time stamp

 `

UPLINK: highly directional microwave radio -frequency of 3billion to 7billionHZ and power-less than 20000 watts. Planners-To match the desired scientific investigation with exactly the right encrypted commands requires a good amount of information about the satellite and about the target system. Planners perform this task. Sequence team :Is responsible for creating the actual encrypted commands to be up linked. Relies on highly advanced computer programs to help with such tasks as selecting and time-tagging the proper encrypted commands, placing them in the correct order, checking that no operating constraints are violated and making sure that all of the instructions to the satellites available computer memory .

ORIGINAL MISSION DESIGN

ON GOING MISSION PLANNING

SEQUENCE TEAM

MISSION CONTROL ACE -checks proper time for transmitting the encrypted command. DEEP SPACE NETWORK-data sent electronically using Groud Communication Facility

SATELLITE

1.

2.

DOWNLINK: Two kinds of results come back on the downlink: Telemetry-onboard measurements that have been converted to encrypted radio signals. Encrypted tracking radio science, and military data-highest priority.

Telemetry processor Radio receiver Low noise amplifier

DSN (Deep Space Network)

TDS (Telemetry Delivery System) Telemetry is typically stored for the entire life of the mission.

Downlink signal

An attacker now wants to interfere in a business communication between two persons. To do this, the attacker must change the router tables so that all Email messages between the two persons computers are forwarded to some intermediate satellite system to which the hacker has easy access. The attacker can then read the messages on this intermediate satellite site, change their contents, and forward them to the original destination as if the intermediate site were legitimately on the messages path.

` ` ` ` ` ` `

A message sender may want assurance that the message can only be read by the intended recipient and that it came from alleged sender without being altered en route. A robot can be designed to eliminate this problem. STEPS INVOLVED: Message to be sent is encrypted Robots sends the message to receivers robot Robot does the integrity check and does authentication Robot checks the identity and password It scans the receiver using retina scanner It displays the decrypted message

Encrypted satellite communication can be used in international commerce, commanding ballistic missiles, in future wars it is used to find hidden opponents and battlefields under the sea.

Вам также может понравиться