Title: SaTC: Core: Small: Building Resilience into LEO Satellite Networks by Exploiting Network Layer Characteristics, funded by NSF under grant CNS-2308761, 10/01/2023 – 09/30/2026

 

Project Summary:

Being a critical infrastructure of our society, the security of low Earth orbit (LEO) satellite communication (SATCOM) networks has a high stake. Because these systems typically implement their own proprietary security protocols that are not open to the public, it has long been believed that they are secure. However, the recent cyber attack on the Viasat satellite network, which happened on the first day of Russia’s invasion of Ukraine and caused widespread disruption of high-speed satellite services throughout Ukraine and other European countries, has revealed the astonishing fact that these SATCOM networks are not really secure, and the scale and sophistication of cyber attacks on these systems are far above our previous thoughts. As noted in a recent joint cybersecurity advisory by CISA and FBI, attacks to satellite networks could be “state sponsored”, which has the potential to mobilize almost unlimited computing and intelligence resources for the attack. Such a resource-unconstrained attack may be able to crack an existing crypto system in much shorter time, and hence seriously challenges the validity of existing computational-security-based security measures, which are developed based on the common-sense assumption that attackers are resource-constrained – a serious under-assumption when it comes to high-stake critical infrastructure targets such as a satellite network. Realizing the threats from this new attack model, the overarching goal of this project is to tap into the intrinsic security resources possessed by the LEO SATCOM at its network layer, such as rich and dense satellite connectivity and high satellite mobility, so as to develop a suite of physical-constrained, rather than computation/math-constrained, security methods that build LEO satellite network's resilience to resource-unconstrained attacks.

Project Goals:

This project has the following three goals:

1. Collect empirical real-world LEO satellite orbit data from publically accessible websites such as N2YO.com. Perform statistical analysis on these data to create models that characterize the spatial distribution, mobility, and connectivity of realistic LEO satellite constellations such as StarLink and OneWeb.

2. Exploit the global spatial distribution of LEO satellites and their dense connectivity and high mobility to develop physical-constrained security methods to protect real-world LEO satellite networks against resource-unconstrained cyber attacks.

3. Develop machine-learning and cryptographic mechanisms to detect compromised LEO satellites within the constellation when there are any.

 

Project Personnel

 

PI: Tao Shu, Ph.D.

 

Graduate Students

·       Xueyang Hu

·       Hairuo Xu

·       Guan Huang

·       Minarul Islam

 

Project Activities and Results

 

1. Creating real-world LEO satellite orbit dataset by developing a N2YO crawler

In this research the PI and his team proposed a novel web crawler, called N2YO-crawler, to collect real-time satellite orbit tracking data from N2YO.com, which provides live real-time trajectory tracking data for over 28,751 objects in outer space, including satellites and space debris. The data for LEO satellites, such as the 5,814 StartLink satellites and the 628 OneWeb satellites, are updated every second on this website. N2YO.com is a highly reputable provider of real-time satellite tracking services. The real-time data provided by N2YO.com are diligently collected by the US Space Surveillance Network (SSN), which operates under the rigorous oversight of the US Air Force Space Command (AFSPC). However, it should be noted that while N2YO.com is accessible in the public domain, the dataset collected by SSN is not open to the public, which hinders the empirical data-driven LEO satellite orbit research in our research community.

In contrast to existing open-source web crawlers, which often struggle to keep up with the rapid content updates of high-frequency websites and may compromise data integrity when handling large volumes of information, our N2YO crawler is adept at orchestrating massive information volumes without compromising data integrity and demonstrates an extraordinary capability to capture dynamic data with one-second resolution.

 

2. Developing a novel Transformer-based LEO satellite orbit prediction algorithm and training it over the real-world LEO satellite orbit dataset to obtain better prediction accuracy

In recent years, the proliferation of LEO (Low-Earth Orbit) satellites and the accumulation of space debris have made near-Earth space more and more crowded, and hence significantly increased the risk of collisions in this space. As a result, precise orbit prediction becomes essential for LEO satellites to avoid collision, maintain the right constellation, and retain stable communication between LEO satellites.

Conventionally, satellite orbit prediction approaches can be divided into two distinct categories: physics-based approaches and machine learning (ML)-based approaches. On one hand, physics-based methods are based on the classical laws of motion and principles of gravity, enabling the prediction of satellite trajectories by solving differential equations of motion, either analytically or numerically. However, these methods cannot consistently yield high-precision orbit predictions for LEO satellites due to the difficulty in taking into account a large number of trajectory-perturbing random factors, e.g., environmental influences such as atmospheric drag and forces of solar radiation, as well as particular satellite attributes, including mass, shape, and information regarding maneuvers. Consequently, the prediction errors can be substantial (e.g., in the order of hundreds of kilometers), potentially rendering them less effective for practical applications. On the other hand, ML-based methods have been used to complement those physics-based models by taking into account those aforementioned random factors. However, due to the absence of publically-available real-world LEO satellite orbit dataset, most existing ML-based methods are trained on simulated/synthetic orbit data, which essentially assumes a stationary orbit process and cannot reflect the non-stationary dynamic orbit changes in real-world LEO satellite constellations that are caused by satellite flight status adjustment (e.g., for the purpose of collision avoidance).

In this research, we propose a novel multi-range (global-local) self- attention transformer-based ML model, the GloLoSAT, and train the model over real-world LEO satellite orbit data crawled from N2YO.com to give more precise orbit prediction in case of a series of orbit adjustments. To overcome the limitations of existing transformer-based LSTF models that often focus solely on either global or local context, and thus lacking a comprehensive view of the input sequence, we introduce an innovative Global-Local Probsparse Self-Attention (GloLoSAT) mechanism. In particular, the global Probsparse self-attention module in this mechanism analyzes the entire input sequence to capture long-range dependencies, while local Probsparse self-attention modules provide a detailed analysis of each evenly segmented portion of the sequence to capture finer-grained details, collectively enriching the model with a multi-faceted perspective. Theoretical analysis demonstrates that our Global-Local Probsparse Self-Attention mechanism can achieve (𝐿 log(𝐿)) computational complexity with respect to the input sequence length. Extensive experiments conducted on real satellite orbit tracking datasets demonstrate the efficacy of GloLoSAT in achieving consistent performance improvements across various prediction scenarios compared to the counterparts.

3. Spoofing detection for LiDAR

In recent years the LiDAR (light detection and ranging) sensor has been adopted extensively by various IoT smart sensing applications, such as autonomous vehicles, UAVs, remote sensing, and LEO satellites. Unfortunately, LiDARs are susceptible to malicious spoofing attacks, which can lead to falsified LiDAR sensing outcomes. Most current work focuses on protecting LiDAR against spoofing attacks by using perception model-level defense methods, whose effectiveness unfortunately depends on the correctness of the LiDAR’s raw sensing outcome. A spoofer thus can elude from these methods as long as it fabricates points in the LiDAR sensing point cloud that maintain the right contextual relationship with other (legitimate) points in the point cloud. In this research, we propose to use the LiDAR signal’s Doppler frequency shift to verify the sender of the LiDAR signal and detect potential spoofing attacks. In particular, we first thoroughly analyze the working principle of LiDAR and conduct real-world experiments to deeply understand and reveal the vulnerability of LiDAR sensors. We then prove that the Doppler frequency shifts of legitimate and spoofing signals present different characteristics, which can be used to fundamentally authenticate the LiDAR sensing outcome. We then consider three different attack models, including static attacker, moving attacker, and moving attacker with control of both velocity and signal frequency. For each of the models, we first show how the spoofing attack is performed and then present our countermeasures. We also propose a statistical spoofing detection framework to jointly consider the impact of short-term uncertainty in vehicle velocity, which can provide more accurate spoofing detection results in realistic environments. Extensive numerical results are provided to verify the effectiveness of our proposed spoofing detection methods in a wide range of mobility and environment settings.

Broader Impacts

LEO satellite networks are critical infrastructures that have a huge economic and social impact. Because the stake is so high, the adversary's motivation to compromise these systems is also strong, as evidenced by the excessive attacks, some state-sponsored, received by these systems. The proposed research contributes to protecting the growing social and economic benefit of this critical infrastructure while ensuring its security. The proposed research will develop physical-constrained, rather than math-constrained, security measures under the new assumption of resource-unconstrained attacks, hence making contribution to the scientific foundation of cyber security. This project also carries out a comprehensive education plan to broaden its impacts, including research integration with curriculum development, recruitment and training of student researchers, and dissemination and outreach to the community, especially to minority and under-represented groups.