Securing Satellite Communications

نویسندگان

  • H. Cruickshank
  • S. Iyengar
  • M. P. Howarth
چکیده

This paper presents securing satellite communications using link level security (such as ATM security) or network level security (such as IPSEC), where both can be applied to military satellite communications. The paper examines the topic of securing very large multicast groups over satellites, where the group size and group dynamics have great impact on networks performance and network security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing multimedia services over satellite ATM networks

In recent years, there has been increasing interest in interconnecting satellite and ATM networks because both share common characteristics of the ability to provide bandwidth-on-demand and flexibility of integrating voice, video and data services. There are several new satellite constellation proposals that support multimedia service and transport ATM traffic. For a successful implementation o...

متن کامل

Role of the Globalization of Communications (Internet and Satellite) on Young Women’s Leisure Time (Case study: Young Women in Mazandaran)

Today, leisure time is changing by globalization and using of information technology. Most of people especially women prefer to spend their leisure time by modern technologies. Thus, they spend their leisure time to look up satellite programs and use of the internet. This research has done for sociological consideration of the globalization of communications (internet  & satellite) on leisure t...

متن کامل

Key management and multi-layer IPSEC for satellite multicast

Satellites are also ideally suited for delivery of multicast applications. However secure multicast over satellites is a challenging problem. One important step toward the correct solution for end-to-end security is the integration of security architectures between satellites and IP terrestrial networks. This paper presents a secure group management and key distribution architecture based on th...

متن کامل

Securing Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining

Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...

متن کامل

Power Amplifier Linearization Using Six-port Receiver for DVB-S2 Satellite Communications

A digital look-up table adaptive predistortion technique using a six-port receiver for power amplifier linearization is presented. The system is designed in Ka-band for a DVB-S2 satellite link. We use a six-port receiver at the linearizationloop in place of classic heterodyne receivers. The six-port receiver is implemented by the use of passive microwavecircuits and detector diodes. This approa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012