Relay-assisted satellite networks rely on multi-hop architectures that expose data integrity to malicious or compromised relays. End-to-end Message Authentication Codes (MACs) avoid trusting relays but delay error detection until the destination, incurring costly retransmissions over long-delay space links, while hop-by-hop integrity requires trusting intermediate nodes. We propose a superposition-coded integrity scheme in which the source embeds the end-to-end MAC tag directly into the physical-layer waveform, allowing the destination to recover the tag independently of relay behavior. This prevents tag forgery even when a relay possesses the end-to-end key and eliminates the need to forward authentication data through relays. We validate the approach using a three-node software-defined radio testbed and show improved authentication reliability under malicious relay scenarios.

View More Papers

PIRANHAS: PrIvacy-Preserving Remote Attestation in Non-Hierarchical Asynchronous Swarms

Jonas Hofmann (Technische Universität Darmstadt), Philipp-Florens Lehwalder (Technische Universität Darmstadt), Shahriar Ebrahimi (Alan Turing Institute), Parisa Hassanizadeh (IPPT PAN / University of Warwick), Sebastian Faust (Technische Universität Darmstadt)

Read More

FlyTrap: Physical Distance-Pulling Attack Towards Camera-based Autonomous Target Tracking...

Shaoyuan Xie (University of California, Irvine), Mohamad Habib Fakih (University of California, Irvine), Junchi Lu (University of California, Irvine), Fayzah Alshammari (University of California, Irvine), Ningfei Wang (University of California, Irvine), Takami Sato (University of California, Irvine), Halima Bouzidi (University of California Irvine), Mohammad Abdullah Al Faruque (University of California, Irvine), Qi Alfred Chen (University…

Read More

Work-in-progress: Assertive Trace

Shun Kashiwa (UC San Diego), Michael Coblenz (UC San Diego), Deian Stefan (UC San Diego)

Read More