Low Earth orbit satellite constellation networks (LSCNs) have attracted significant attention around the world due to their great advantages of low latency and wide coverage, but they also bring new challenges to network security. Distributed denial of service (DDoS) attacks are considered one of the most threatening attack methods in the field of Internet security. In this paper, a space-time graph model is built to identify the key nodes in LSCNs, and a DDoS attack is adopted as the main means to attack the key nodes. The scenarios of two-satellite-key-node and multi-satellite-key-node attacks are considered, and their security performance against DDoS attacks is also analyzed. The simulation results show that the transmission path of key satellite nodes will change rapidly after being attacked, and the average end-to-end delay and packet loss are linearly related to the number of key-node attacks. This work provides a comprehensive analysis of the security performance of LSCNs under a DDoS attack and theoretical support for future research on anti-DDoS attack strategies for LSCNs.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9573504PMC
http://dx.doi.org/10.3390/s22197286DOI Listing

Publication Analysis

Top Keywords

security performance
12
ddos attack
12
satellite constellation
8
constellation networks
8
ddos attacks
8
attacks considered
8
key nodes
8
lscns ddos
8
attack
6
security
5

Similar Publications

Cowpea is deemed as a food security crop due to its ability to produce significant yields under conditions where other staples fail. Its resilience in harsh environments; such as drought, heat and marginal soils; along with its nitrogen-fixing capabilities and suitability as livestock feed make cowpea a preferred choice in many farming systems across sub-Saharan Africa (SSA). Despite its importance, Cowpea yields in farmers' fields remain suboptimal, primarily due to biotic and abiotic factors and the use of either unimproved varieties or improved varieties that are not well-suited to local conditions.

View Article and Find Full Text PDF

The performance of drones, especially for time-sensitive tasks, is critical in various applications. Fog nodes strategically placed near IoT devices serve as computational resources for drones, ensuring quick service responses for deadline-driven tasks. However, the limited battery capacity of drones poses a challenge, necessitating energy-efficient Internet of Drones (IoD) systems.

View Article and Find Full Text PDF

Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. Based on previous various chaotic image fast encryption algorithms, this paper proposes a color image sector fast encryption algorithm based on one-dimensional composite sinusoidal chaotic mapping.

View Article and Find Full Text PDF

Trump tariffs and the U.S. defense industry.

PLoS One

January 2025

Netherlands Defense Academy, Breda, The Netherlands.

In March 2018, U.S. President Trump announced that the U.

View Article and Find Full Text PDF

The increasing reliance on deep neural network-based object detection models in various applications has raised significant security concerns due to their vulnerability to adversarial attacks. In physical 3D environments, existing adversarial attacks that target object detection (3D-AE) face significant challenges. These attacks often require large and dispersed modifications to objects, making them easily noticeable and reducing their effectiveness in real-world scenarios.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!