Journal of Systems Engineering and Electronics ›› 2014, Vol. 25 ›› Issue (3): 357-372.doi: 10.1109/JSEE.2014.00041


Adaptive link layer security architecture for telecommand communications in space networks

Lei Zhang1,*, Chengjin An1, Susanna Spinsante2, and Chaojing Tang1   

  1. 1. College of Electronic Science and Engineering, National University of Defense Technology, Changsha 410073, China;
    2. Department of Information Engineering, Universit`a Politecnica delle Marche, Ancona 60131, Italy
  • Online:2014-07-01 Published:2010-01-03


Impressive advances in space technology are enabling complex missions, with potentially significant and long term impacts on human life and activities. In the vision of future space exploration, communication links among planets, satellites, spacecrafts and crewed vehicles will be designed according to a new paradigm, known as the disruption tolerant networking. In this scenario, space channel peculiarities impose a massive reengineering of many of the protocols usually adopted in terrestrial networks; among them, security solutions are to be deeply reviewed, and tailored to the specific space requirements. Security is to be provided not only to the payload data exchanged on the network, but also to the telecommands sent to a spacecraft, along possibly differentiated paths. Starting from the secure space telecommand design developed by the Consultative Committee for Space Data Systems as a response to agency-based requirements, an adaptive link layer security architecture is proposed to address some of the challenges for future space networks. Based on the analysis of the communication environment and the error diffusion properties of the authentication algorithms, a suitable mechanism is proposed to classify frame retransmission requests on the basis of the originating event (error or security attack) and reduce the impact of security operations. An adaptive algorithm to optimize the space control protocol, based on estimates of the time varying space channel, is also presented. The simulation results clearly demonstrate that the proposed architecture is feasible and
efficient, especially when facing malicious attacks against frame transmission.