Alexander Kedrowitsch (Virginia Tech), Jonathan Black (Virginia Tech) Daphne Yao (Virginia Tech)

Inter-satellite links will unlock true global access to high-speed internet delivered by Low Earth Orbit (LEO) mega-constellations. Functional packet routing within the constraints of the space environment, spacecraft design, and continual satellite mobility is uniquely challenging and requires novel routing algorithm approaches. Additionally, recent real-world events have highlighted adversarial attempts to deny and disrupt mega-constellation networking capabilities. In this paper, we advance highly resilient LEO mega-constellation dynamic routing algorithms by presenting our novel, ISL architecture-derived, network coordinate system. This coordinate system simplifies the network topology and permits increasingly impactful routing decisions with minimal computational overhead. From our topology, we demonstrate a proof-of-concept, lightweight routing algorithm that is highly resilient and scalable. To promote standardized resilience comparisons for LEO mega-constellation routing algorithms, we also propose a routing resilience testing framework that defines key performance metrics, adversarial capabilities, and testing scenarios. Using our proposed framework, we demonstrate our routing algorithm’s increased resilience over several state-of-the-art dynamic routing algorithms, with 12% packet delivery rate improvement during high adversarial disruption intensities.

View More Papers

coucouArray ( [post_type] => ndss-paper [post_status] => publish [posts_per_page] => 4 [orderby] => rand [tax_query] => Array ( [0] => Array ( [taxonomy] => category [field] => id [terms] => Array ( [0] => 104 [1] => 71 ) ) ) [post__not_in] => Array ( [0] => 17346 ) )

CAN-MIRGU: A Comprehensive CAN Bus Attack Dataset from Moving...

Sampath Rajapaksha, Harsha Kalutarage (Robert Gordon University, UK), Garikayi Madzudzo (Horiba Mira Ltd, UK), Andrei Petrovski (Robert Gordon University, UK), M.Omar Al-Kadri (University of Doha for Science and Technology)

Read More

Front-running Attack in Sharded Blockchains and Fair Cross-shard Consensus

Jianting Zhang (Purdue University), Wuhui Chen (Sun Yat-sen University), Sifu Luo (Sun Yat-sen University), Tiantian Gong (Purdue University), Zicong Hong (The Hong Kong Polytechnic University), Aniket Kate (Purdue University)

Read More

Measuring the Prevalence of Password Manager Issues Using In-Situ...

Adryana Hutchinson (The George Washington University), Jinwei Tang (Clark University), Adam Aviv (The George Washington University), Peter Story (Clark University)

Read More

Privacy Starts with UI: Privacy Patterns and Designer Perspectives in UI/UX Practice

Anxhela Maloku (Technical University of Munich), Alexandra Klymenko (Technical University of Munich), Stephen Meisenbacher (Technical University of Munich), Florian Matthes (Technical University of Munich)

Vision: Profiling Human Attackers: Personality and Behavioral Patterns in Deceptive Multi-Stage CTF Challenges

Khalid Alasiri (School of Computing and Augmented Intelligence Arizona State University), Rakibul Hasan (School of Computing and Augmented Intelligence Arizona State University)

From Underground to Mainstream Marketplaces: Measuring AI-Enabled NSFW Deepfakes on Fiverr

Mohamed Moustafa Dawoud (University of California, Santa Cruz), Alejandro Cuevas (Princeton University), Ram Sundara Raman (University of California, Santa Cruz)