Alexander Kedrowitsch (Virginia Tech), Jonathan Black (Virginia Tech) Daphne Yao (Virginia Tech)

Inter-satellite links will unlock true global access to high-speed internet delivered by Low Earth Orbit (LEO) mega-constellations. Functional packet routing within the constraints of the space environment, spacecraft design, and continual satellite mobility is uniquely challenging and requires novel routing algorithm approaches. Additionally, recent real-world events have highlighted adversarial attempts to deny and disrupt mega-constellation networking capabilities. In this paper, we advance highly resilient LEO mega-constellation dynamic routing algorithms by presenting our novel, ISL architecture-derived, network coordinate system. This coordinate system simplifies the network topology and permits increasingly impactful routing decisions with minimal computational overhead. From our topology, we demonstrate a proof-of-concept, lightweight routing algorithm that is highly resilient and scalable. To promote standardized resilience comparisons for LEO mega-constellation routing algorithms, we also propose a routing resilience testing framework that defines key performance metrics, adversarial capabilities, and testing scenarios. Using our proposed framework, we demonstrate our routing algorithm’s increased resilience over several state-of-the-art dynamic routing algorithms, with 12% packet delivery rate improvement during high adversarial disruption intensities.

View More Papers

Understanding the Implementation and Security Implications of Protective DNS...

Mingxuan Liu (Zhongguancun Laboratory; Tsinghua University), Yiming Zhang (Tsinghua University), Xiang Li (Tsinghua University), Chaoyi Lu (Tsinghua University), Baojun Liu (Tsinghua University), Haixin Duan (Tsinghua University; Zhongguancun Laboratory), Xiaofeng Zheng (Institute for Network Sciences and Cyberspace, Tsinghua University; QiAnXin Technology Research Institute & Legendsec Information Technology (Beijing) Inc.)

Read More

SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by...

Peizhuo Lv (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Pan Li (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Shenchen Zhu (Institute of Information Engineering, Chinese Academy of Sciences, China;…

Read More

Evaluating Disassembly Ground Truth Through Dynamic Tracing (abstract)

Lambang Akbar (National University of Singapore), Yuancheng Jiang (National University of Singapore), Roland H.C. Yap (National University of Singapore), Zhenkai Liang (National University of Singapore), Zhuohao Liu (National University of Singapore)

Read More

Transpose Attack: Stealing Datasets with Bidirectional Training

Guy Amit (Ben-Gurion University), Moshe Levy (Ben-Gurion University), Yisroel Mirsky (Ben-Gurion University)

Read More