Home > Research > Publications & Outputs > Identifying Attack Surfaces in the Evolving Spa...

Text available via DOI:

View graph of relations

Identifying Attack Surfaces in the Evolving Space Industry Using Reference Architectures

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published
Close
Publication date1/07/2020
Host publicationIEEE Aerospace Conference
Place of PublicationBig Sky, Montana, USA
PublisherIEEE
<mark>Original language</mark>Undefined/Unknown
Event2020 IEEE Aerospace Conference - Big Sky, United States
Duration: 7/03/202014/03/2020

Conference

Conference2020 IEEE Aerospace Conference
Abbreviated titleIEEEA '20
Country/TerritoryUnited States
CityBig Sky
Period7/03/2014/03/20

Conference

Conference2020 IEEE Aerospace Conference
Abbreviated titleIEEEA '20
Country/TerritoryUnited States
CityBig Sky
Period7/03/2014/03/20

Abstract

The space environment is currently undergoing a substantial change and many new entrants to the market are deploying devices, satellites and systems in space; this evolution has been termed as NewSpace. The change is complicated by technological developments such as deploying machine learning based autonomous space systems and the Internet of Space Things (IoST). In the IoST, space systems will rely on satellite-to-x communication and interactions with wider aspects of the ground segment to a greater degree than existing systems. Such developments will inevitably lead to a change in the cyber security threat landscape of space systems. Inevitably, there will be a greater number of attack vectors for adversaries to exploit, and previously infeasible threats can be realised, and thus require mitigation. In this paper, we present a reference architecture (RA) that can be used to abstractly model in situ applications of this new space landscape. The RA specifies high-level system components and their interactions. By instantiating the RA for two scenarios we demonstrate how to analyse the attack surface using attack trees.