{"title":"Design for security: Guidelines for efficient, secure small satellite computation","authors":"K. Ingols","doi":"10.1109/MWSYM.2017.8059081","DOIUrl":null,"url":null,"abstract":"Historically, satellites have been built with large budgets and expensive, bespoke, “rad-hard” technology. For typical low Earth orbit missions, however, designers can now leverage commercial components to reduce cost and development time. Commercial processors provide these satellites with computational horsepower comparable to terrestrial desktop systems … which leads to the temptation of terrestrial desktop software and all of the cybersecurity headaches and mistakes made in that realm over the years. We highlight key differences in processing environments, identify common tools for security design and application, and provide design guidelines that can lead to more secure on-orbit processing while remaining mindful of the overarching drumbeat of “smaller, faster, cheaper.”","PeriodicalId":6481,"journal":{"name":"2017 IEEE MTT-S International Microwave Symposium (IMS)","volume":"9 1","pages":"226-228"},"PeriodicalIF":0.0000,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE MTT-S International Microwave Symposium (IMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MWSYM.2017.8059081","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Historically, satellites have been built with large budgets and expensive, bespoke, “rad-hard” technology. For typical low Earth orbit missions, however, designers can now leverage commercial components to reduce cost and development time. Commercial processors provide these satellites with computational horsepower comparable to terrestrial desktop systems … which leads to the temptation of terrestrial desktop software and all of the cybersecurity headaches and mistakes made in that realm over the years. We highlight key differences in processing environments, identify common tools for security design and application, and provide design guidelines that can lead to more secure on-orbit processing while remaining mindful of the overarching drumbeat of “smaller, faster, cheaper.”