Defense communication strategy communication infrastructure
This presentation is the property of its rightful owner.
Sponsored Links
1 / 10

Defense Communication Strategy & Communication Infrastructure PowerPoint PPT Presentation


  • 86 Views
  • Uploaded on
  • Presentation posted in: General

Defense Communication Strategy & Communication Infrastructure. Hilmi Sanusi Institut Sains Angkasa Universiti Kebangsaan Malaysia. Defense Communication through Satellites: WHY?. Better mobility Satellite as relay Higher bandwidth Multimedia content More information can be transferred

Download Presentation

Defense Communication Strategy & Communication Infrastructure

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Defense communication strategy communication infrastructure

Defense Communication Strategy&Communication Infrastructure

Hilmi Sanusi

Institut Sains Angkasa

Universiti Kebangsaan Malaysia


Defense communication through satellites why

Defense Communication through Satellites: WHY?

  • Better mobility

    • Satellite as relay

  • Higher bandwidth

    • Multimedia content

    • More information can be transferred

    • Better tactical ability

  • Longer distance


Defense communication through satellites cons

Defense Communication through Satellites: CONS

  • Counter measure

    • Jammed using Frequency Interference

  • Eavesdropping

    • Signal interception

  • Weather…..

    • Rain attenuation (Ku – band)


Satellite communication definition

Satellite Communication: Definition


The needs of secured communication

The Needs of Secured Communication

  • Satellite Communications Must Be Secure

  • Satellite uplink commands must be encrypted and authenticated to assure legitimate control of the satellite and its operation.

  • Sensitive and classified communications via satellite must be encrypted to protect them from interception and compromise.


The needs of secured communication in military

The Needs of Secured Communication in Military

  • Satellite Communications Encryption

    • satellites must employ authenticated and encrypted command links, and encrypted downlinks

  • Develop Standard to authenticate satellite command links and services

  • Hierarchy of controlling the authenticated command links


Satellite communications encryption

Satellite Communications Encryption

  • Provides the end-to-end security and integrity of such message exchange

  • A data protection mechanism

  • Develop own encryption method

  • Where & How to implement

    • Network or Data-link layer

    • Hardware / reconfigurable encryption

    • Modulation scheme (CDMA for counter measure)

  • Different encryption for different purposes

    • Biometric??? (to differentiate access)


Goals for secured satellite communication

Goals for Secured Satellite Communication

  • Best possible use of limited bandwidth

  • High link utilization

  • Conservation of power

  • Prioritization of traffic

  • Tolerant of intermittent connectivity

  • High forward/return link asymmetry


Data integrity and data security standard

Data integrity and Data Security Standard

  • Should create appropriate standard to ensure the security of the data

  • The encrypt and decrypt data should maintain the same fidelity

  • At least follow the standard of the Consultative Committee for Space Data Systems (CCSDS ) or International Organization for Standardization (ISO) for Aircraft and Space Vehicles


Defense communication strategy communication infrastructure

VSAT . . .

  • Provides secure solutions through VSAT

    • Interception, Monitoring and logging systems.

  • Authentication

  • Wireless Local Loop – WLL

    • Coverage

    • Better control of the network


  • Login