defense communication strategy communication infrastructure
Download
Skip this Video
Download Presentation
Defense Communication Strategy & Communication Infrastructure

Loading in 2 Seconds...

play fullscreen
1 / 10

Defense Communication Strategy & Communication Infrastructure - PowerPoint PPT Presentation


  • 124 Views
  • Uploaded on

Defense Communication Strategy & Communication Infrastructure. Hilmi Sanusi Institut Sains Angkasa Universiti Kebangsaan Malaysia. Defense Communication through Satellites: WHY?. Better mobility Satellite as relay Higher bandwidth Multimedia content More information can be transferred

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Defense Communication Strategy & Communication Infrastructure' - allegra-nichols


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
defense communication strategy communication infrastructure

Defense Communication Strategy&Communication Infrastructure

Hilmi Sanusi

Institut Sains Angkasa

Universiti Kebangsaan Malaysia

defense communication through satellites why
Defense Communication through Satellites: WHY?
  • Better mobility
    • Satellite as relay
  • Higher bandwidth
    • Multimedia content
    • More information can be transferred
    • Better tactical ability
  • Longer distance
defense communication through satellites cons
Defense Communication through Satellites: CONS
  • Counter measure
    • Jammed using Frequency Interference
  • Eavesdropping
    • Signal interception
  • Weather…..
    • Rain attenuation (Ku – band)
the needs of secured communication
The Needs of Secured Communication
  • Satellite Communications Must Be Secure
  • Satellite uplink commands must be encrypted and authenticated to assure legitimate control of the satellite and its operation.
  • Sensitive and classified communications via satellite must be encrypted to protect them from interception and compromise.
the needs of secured communication in military
The Needs of Secured Communication in Military
  • Satellite Communications Encryption
    • satellites must employ authenticated and encrypted command links, and encrypted downlinks
  • Develop Standard to authenticate satellite command links and services
  • Hierarchy of controlling the authenticated command links
satellite communications encryption
Satellite Communications Encryption
  • Provides the end-to-end security and integrity of such message exchange
  • A data protection mechanism
  • Develop own encryption method
  • Where & How to implement
    • Network or Data-link layer
    • Hardware / reconfigurable encryption
    • Modulation scheme (CDMA for counter measure)
  • Different encryption for different purposes
    • Biometric??? (to differentiate access)
goals for secured satellite communication
Goals for Secured Satellite Communication
  • Best possible use of limited bandwidth
  • High link utilization
  • Conservation of power
  • Prioritization of traffic
  • Tolerant of intermittent connectivity
  • High forward/return link asymmetry
data integrity and data security standard
Data integrity and Data Security Standard
  • Should create appropriate standard to ensure the security of the data
  • The encrypt and decrypt data should maintain the same fidelity
  • At least follow the standard of the Consultative Committee for Space Data Systems (CCSDS ) or International Organization for Standardization (ISO) for Aircraft and Space Vehicles
slide10
VSAT . . .
  • Provides secure solutions through VSAT
    • Interception, Monitoring and logging systems.
  • Authentication
  • Wireless Local Loop – WLL
    • Coverage
    • Better control of the network
ad