Relay-assisted satellite networks rely on multi-hop architectures that expose data integrity to malicious or compromised relays. End-to-end Message Authentication Codes (MACs) avoid trusting relays but delay error detection until the destination, incurring costly retransmissions over long-delay space links, while hop-by-hop integrity requires trusting intermediate nodes. We propose a superposition-coded integrity scheme in which the source embeds the end-to-end MAC tag directly into the physical-layer waveform, allowing the destination to recover the tag independently of relay behavior. This prevents tag forgery even when a relay possesses the end-to-end key and eliminates the need to forward authentication data through relays. We validate the approach using a three-node software-defined radio testbed and show improved authentication reliability under malicious relay scenarios.

View More Papers

Hey there! You are using WhatsApp: Enumerating Three Billion...

Gabriel Karl Gegenhuber (University of Vienna), Philipp Frenzel (SBA Research), Maximilian Günther (University of Vienna), Johanna Ullrich (University of Vienna), Aljosha Judmayer (University of Vienna)

Read More

HyperMirage: Direct State Manipulation in Hybrid Virtual CPU Fuzzing

Manuel Andreas (Technical University of Munich), Fabian Specht (Technical University of Munich), Marius Momeu (Technical University of Munich)

Read More