TPM-supported key agreement protocols for increased autonomy in constellation of spacecrafts
Title | TPM-supported key agreement protocols for increased autonomy in constellation of spacecrafts |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Juliato, M., Gebotys, C., Sanchez, I. A. |
Conference Name | 2016 IEEE Aerospace Conference |
Keywords | composability, cryptographic keys, cryptographic protocols, DH-HEMTs, Encryption, jamming, opportunistic control center, payload links, protocol iterations, Protocols, pubcrawl, Resiliency, security mechanisms, space communication links, space missions, Space vehicles, spacecrafts, TPM-supported key agreement protocols, Trusted Platform Module, trusted platform modules, TT&c |
Abstract | The incorporation of security mechanisms to protect spacecraft's TT&c; payload links is becoming a constant requirement in many space missions. More advanced mission concepts will allow spacecrafts to have higher levels of autonomy, which includes performing key management operations independently of control centers. This is especially beneficial to support missions operating distantly from Earth. In order to support such levels of autonomy, key agreement is one approach that allows spacecrafts to establish new cryptographic keys as they deem necessary. This work introduces an approach based on a trusted platform module that allows for key agreement to be performed with minimal computational efforts and protocol iterations. Besides, it allows for opportunistic control center reporting while avoiding man-in-the-middle and replay attacks. |
URL | http://ieeexplore.ieee.org/document/7500941/ |
DOI | 10.1109/AERO.2016.7500941 |
Citation Key | juliato_tpm-supported_2016 |
- pubcrawl
- TT&c
- trusted platform modules
- Trusted Platform Module
- TPM-supported key agreement protocols
- spacecrafts
- Space vehicles
- space missions
- space communication links
- security mechanisms
- Resiliency
- composability
- Protocols
- protocol iterations
- payload links
- opportunistic control center
- Jamming
- encryption
- DH-HEMTs
- Cryptographic Protocols
- cryptographic keys