Uploaded by godofdeath65

US Cyber handout

advertisement
8/2/20
Understanding Space Through a Cyber-Security Lens
Understanding Space
t
e
n
Through a Cybersecurity Lens
w
w
w
.
i
t
s
t
.
Presenter and Facilitators
✦ Dr.
t
e
n
Jerry Sellers, Ph.D., University of Surrey, UK (jsellers@tsti.net)
‣ Partner and President, TSTI with over 30 years of aerospace engineering experience, including Space Shuttle Mission Controller, NASA/JSC, and Chief
of Astronautics for the European Office of Aerospace Research and Development, London, UK
.
i
t
s
t
.
‣ Former Director of the Space Systems Research Center, USAF Academy. Responsible for designing, building, testing and operating small, scientific
satellites.
‣ Author of the text Understanding Space: An Introduction to Astronautics, Editor and contributing author of the text Applied Space Systems Engineering
‣ Adjunct Professor, Stevens Institute of Technology. Adjunct Professor, Georgetown University
‣ Certified Agile/Scrum Master, Certified Scaled Agile Framework (SAFe) Program Consultant (SPC5)
‣ Corresponding Member - International Academy of Astronautics
✦ Terri
Johnson, M.Sc. Cybersecurity and Information Assurance (terri.akse@gmail.com)
w
w
‣ Department Chair of the Computer Networking and Cybersecurity Department at Pikes Peak Community College
‣ Over 20 years of experience in Information Technology, specializing in building and securing computer networks. Terri started out working for two of the
world’s largest tax and audit firms, after which she transitioned to serving several educational institutions as both IT faculty and IT staff support
‣ Lead faculty of the NSA-DHS designated Center of Academic Excellence program at PPCC
‣ Member of the Colorado Springs chapter of ISSA (Information Systems Security Association), PPCC Cyber Club Advisor, and Coach to PPCC's
nationally recognized Cyber Competition Team
w
‣ Industry certifications include: Cisco's CCNA Routing / Switching and CCNA Security and EC-Council’s CEH (Certified Ethical Hacker)
✦ Jason
Sellers
‣ Summer intern supporting SPEC Innovations analyzing applications of model-based systems engineering simulation tools and techniques
‣ Member of Nationally-ranked FRC Robotics Team
‣ Dungeon Master
‣ Eagle Scout
Course Introduction
Copyright ©2020 Teaching Science and Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
1
8/2/20
Understanding Space Through a Cyber-Security Lens
About TSTI
A respected name in systems engineering workforce development for over 25 years.
t
e
n
✦Teaching
Science and Technology, Inc. (TSTI) is a veteran-owned small business that assists companies and
organizations who wish to improve their systems engineering skills as they relate to the space and other domains.
‣
We present quality short courses and workshops in space systems engineering and program management to customers around the
world. Our teaching style is highly interactive with emphasis on learning-by-doing and practical real-world examples and applications.
‣
Our systems engineering courses provide the processes, tools, and information necessary to “jump-start” new-hires to the space
business or improve the performance of mid- to senior-level engineers, systems engineers, and technical program managers.
‣
In addition, we provide focused systems engineering support to organizations as they approach critical events in the development
process and work as red team support.
‣
We wrote the books that describe SE in the space domain, and we’ve all had practical SE and PM experience in the development
world.
✦Since
.
i
t
s
t
.
2010, TSTI has taught more than 500 courses to more than 20,000 students for NASA, ESA, DoD and
industry around the world
w
w
w
✦What
‣
‣
‣
‣
‣
Sets Our Courses Apart:
CREDIBILITY: We wrote the books. We’ve been there, done that. We bring extensive systems engineering experience.
COMPETENCE: We’re professional teachers. This is our day job. We take the complex and make it simple. We’re explainers and
motivators. Hands-on exercises ensure that you learn space by doing space. No death by PowerPoint.
CURRICULUM: We take you from new hire to seasoned space professional. Our on-line learning portal enables continuity through
your increasing levels of expertise.
COST: We’re small, with low overhead, and come to you. Your cost is 50% less – you can train twice the people for the same price.
CONTRACTING: You can get on contract in minutes! We’re only a credit card purchase away.
Learn more at: www.tsti.net
Course Introduction
Copyright ©2020 Teaching Science and Technology Inc.
About TSTI
ONSITE TRAINING
VIRTUAL TRAINING
TSTI is a premier provider of
onsite space systems
engineering training to NASA,
DoD and Industry.
Since Covid, TSTI has pivoted to
providing 100% virtual training.
Self-paced online courses also
available.
Starting a new project?
Struggling with an existing
one? Need integrated work
force development tailored to
your project?
.
i
t
s
t
.
w
w
w
PROJECT COACHING AND
INTEGRATED PROGRAMS
t
e
n
SYSTEMS ENGINEERING
CONSULTING SERVICES
Project start ups. Red Team
proposal review. Expertise in
Model-Based Systems
Engineering (MBSE).
Learn more at: www.tsti.net
Course Introduction
Copyright ©2020 Teaching Science and Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
2
8/2/20
Understanding Space Through a Cyber-Security Lens
Course Trajectory
✦ Course
Threats—Natural & Human
Introduction
t
e
n
✦ Context
‣
The Space Mission
Architecture
✦ Opportunities
‣
Understanding Orbits
‣
Space Mission Operations
✦ Threats
w
w
w
‣
The Space Environment
‣
The Human Environment
✦ Vulnerabilities
‣
RF Systems
‣
Space Data Architectures
.
i
t
s
t
.
Understanding Space
Through a Cyber Lens
Vulnerabilities—RF Systems &
Data Architectures
Opportunities—Orbits &
Operations
Context
Course Introduction
Copyright ©2020 Teaching Science and Technology Inc.
Course Reference
t
e
n
‣ The Primary Course Reference is:
.
i
t
s
t
.
• Understanding Space: An Introduction to Astronautics (US), 4th
edition, by Jerry Jon Sellers with contributions by William Astore,
Robert B. Giffen and Wiley J. Larson. Published by Coyote
Enterprises on the Inkling platform.
‣ Other References include:
• Applied Space Systems Engineering (ASSE), by Larson, Kirkpatrick,
w
w
Sellers, Thomas and Verma, McGraw-Hill
• Human Spaceflight: Mission Analysis and Design (HSF), by Larson,
Pranke, Giffen, and Connolly
• Other sources as noted
w
• Inputs from over 20,000 space professionals who have taken our
courses
This book and over 20 others are
part of the Space Technology Series,
a government and industry
sponsored project managed out of
the USAF Academy
Available at: www.spacetechnologyseries.com
Course Introduction
Copyright ©2020 Teaching Science and Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
3
8/2/20
Understanding Space Through a Cyber-Security Lens
Course Objectives
✦At
the end of this course you should be able to…
t
e
n
‣ Gain Core Space Knowledge
Apply Space Concepts
• Describe the Space Mission Architecture, the context for all
space activities
.
i
t
s
t
.
Understand Threats
Comprehend Capabilities
and Limitations
‣ Comprehend space mission Capabilities, Trade-offs and
Limitations specific to the cyber-security domain
• Explain how orbital mechanics and operational architectures
w
w
w
constrain access to space systems
‣ Discuss natural and human-made threats to space systems
Gain Core Space Knowledge
Learning Trajectory. Throughout the course we’ll
build your core space knowledge so you tackle
ever more challenging space problems in the
cyber-security domain.
• Describe potential vulnerabilities to space systems through
communications links and data architectures
‣ Apply Cyber/Space Concepts to real-world scenarios
Course Introduction
Copyright ©2020 Teaching Science and Technology Inc.
Course Schedule (all times PDT)
✦Day
1 Morning Session
✦Day
1000-1030: Course Introduction and Context
‣
0900-0930: Course Introduction and Context
‣
1030-1045: Progress Check/Break
‣
0930-0945: Progress Check/Break
‣
‣
‣
1045-1115: Opportunities (Orbits and Ops)
1115-1130: Progress Check/Break
‣
0945-1015: Opportunities (Orbits and Ops)
1015-1030: Progress Check/Break
‣
1130-1200: Threats (Space and Human)
‣
1030-1100: Threats (Space and Human)
‣
1200-1215: Progress Check/Break
‣
1100-1115: Progress Check/Break
‣
1215-1245: Vulnerabilities (RF and Data)
‣
1115-1145: Vulnerabilities (RF and Data)
‣
1245-1315: Progress Check and Application Challenge
‣
1145-1215: Progress Check and Application Challenge
‣
1315-1330: Wrap-up and Close
✦Day
1 Afternoon Session
‣
1430-1500: Course Introduction and Context
‣
‣
1500-1515: Progress Check/Break
1515-1545: Opportunities (Orbits and Ops)
‣
1545-1600: Progress Check/Break
‣
1600-1630: Threats (Space and Human)
‣
1630-1645: Progress Check/Break
w
‣
1645-1715: Vulnerabilities (RF and Data)
1715-1745: Progress Check and Application Challenge
1745-1800: Wrap-up and Close
‣
1215-1230: Wrap-up and Close
✦Day
‣
.
i
t
s
t
.
w
w
‣
Course Introduction
Copyright ©2020 Teaching Science and Technology Inc.
2 Afternoon Session
‣
1330-1400: Course Introduction and Context
‣
‣
1400-1415: Progress Check/Break
1415-1445: Opportunities (Orbits and Ops)
‣
1445-1500: Progress Check/Break
‣
1500-1530: Threats (Space and Human)
‣
1530-1545: Progress Check/Break
‣
1545-1615: Vulnerabilities (RF and Data)
‣
1615-1645: Progress Check and Application Challenge
1645-1700: Wrap-up and Close
‣
t
e
n
2/3 Morning Sessions
‣
Copyright ©2020 Teaching Science and Technology Inc.
4
8/2/20
Understanding Space Through a Cyber-Security Lens
Space in Context
‣ Learning Objectives - By the end of
this lesson you should be able to...
t
e
n
• List and describe the unique
.
i
t
s
t
.
w
advantages of space
• Describe the basic types of space
missions that leverage these
advantages
• Identify and describe the elements
common to all space missions - the
space mission architecture - and
how they work together to achieve a
successful mission
w
w
‣ References
Using Space:
Space in Context
‣Why Space?
‣Space Missions
‣Mission Elements
Space Mission Architecture. The space mission
architecture is the collection of space elements that
make any mission possible. US Fig. 1-23.
• US Chapter 1, HSF Chapter 15
Teaching Science & Technology Inc.
Why Space?
t
e
n
‣ Getting into space is dangerous and expensive.
•
So why bother?
‣ Space offers a number of compelling
advantages that makes its exploitation
advantageous and (sometimes) profitable - the
Space Imperatives
•
•
•
•
•
Global Perspective
Clear View of the Heavens
Free Fall Environment
Resources
The Final Frontier!
w
w
The single most important reason we go to
space is to gain a global perspective
.
i
t
s
t
.
w
Using Space:
Space in Context
‣Why Space?
‣Space Missions
‣Mission Elements
A Global Perspective. Space is the ultimate
high ground. From orbital altitudes we can view
large parts of the Earth all at once. US Fig. 1-4.
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
5
8/2/20
Understanding Space Through a Cyber-Security Lens
Global Perspective - Communications
‣ Humans have been using the high ground to relay messages for
centuries (using mirrors, flags, etc.)
‣ In October 1945, scientist and science-fiction writer Arthur C.
Clarke (author of classics, such as 2001: A Space Odyssey)
proposed a fantastic idea - do this from space! Put satellites into
geostationary orbits (“geo”) to relay communications around the
globe
w
w
w
Satellite communication is
the single most important
application of space today !
t
e
n
Using Space:
.
i
t
s
t
.
Space in Context
‣Why Space?
‣Space Missions
‣Mission Elements
The Geosynchronous Orbit (GEO) Belt. Today about
300 satellites in geo link civil and military users
around the world. Examples include: WGS, MilStar, XM
Radio, Intelsat and many, many more.
Teaching Science & Technology Inc.
Global Perspective - Navigation
t
e
n
‣ From their positions in space, Global Positioning System (GPS) satellites provide world-wide
position, navigation and timing (PNT) 24/7/365
•
.
i
t
s
GLONASS, owned/operated by the Russian Federation, provides similar service
• Europeans recently began providing equivalent services with their partially deployed Galileo constellation
• The Chinese BeiDou Navigation Satellite System provides a similar, but more limited capability from
geostationary orbit
Originally conceived for
its military applications,
GPS is now critical to
the world economy!
w
w
t
.
w
Using Space:
Space in Context
‣Why Space?
‣Space Missions
‣Mission Elements
Space Navigation. By using a method of trilateration a groundbased user can get a “fix” on their position by contacting four or
more satellites at the same time. US Fig. 1-12.
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
6
8/2/20
Understanding Space Through a Cyber-Security Lens
Global Perspective - Remote Sensing
t
e
n
‣ Space missions take advantage of the
Global Perspective for remote sensing
‣ Satellite remote sensing of the Earth is
used for:
•
•
•
•
.
i
t
s
t
.
Earth’s environment monitoring
Weather monitoring, prediction
City & agricultural planning
w
w
w
Using Space:
Space in Context
‣Why Space?
‣Space Missions
‣Mission Elements
Landsat Images of Flooding in Colorado. These Landsat 8
images are from Aug 16 (left) and Sep 17 (right) 2013.
Some parts of Colorado received nearly a year’s worth of rain
in one week in September. When the second image was
taken, the South Platte River was about 1.8 m (~6 ft) above
flood stage. The river is shown here on the right as it flows by
Greeley, CO. (Courtesy of US Geological Survey (USGS)) US
Fig. 12-18.
Military applications—spy satellites
Once the exclusive domain of the military,
space-based remote sensing is fast
becoming a major market for commercial
space missions
Teaching Science & Technology Inc.
Space Mission Elements
‣ The Mission
‣ Orbits & Trajectories
‣ Spacecraft
‣ Launch Vehicles
‣ Mission Operations
w
w
t
.
w
.
i
t
s
t
e
n
Using Space:
Space in Context
‣Why Space?
‣Space Missions
‣Mission Elements
Space Mission Architecture. The space mission architecture is
the collection of space elements that make any mission possible.
US Fig. 1-23.
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
7
8/2/20
Understanding Space Through a Cyber-Security Lens
The Mission
t
e
n
‣ At the heart of the space mission
architecture is the mission itself. Its
scope tells us:
.
i
t
s
t
.
• The need that is being fulfilled by the
capability being delivered
w
w
w
Using Space:
Space in Context
• The goals and objectives of the stakeholders
• The concept of operations that captures
how systems and users and other
stakeholders will interact
‣Why Space?
‣Space Missions
‣Mission Elements
The Mission! President Kennedy laid out the
mission objectives for the Apollo program in
1961.
Teaching Science & Technology Inc.
The Spacecraft
t
e
n
‣ The Spacecraft is divided into the payload and
spacecraft bus
•
•
The payload performs the mission, it’s the reason
we’re going into space at all!
-
It gathers data or relays communication for users
and investors back on Earth
-
The subject is the object the payload is focused on
The Spacecraft bus provides support for the
payload, e.g. Pointing, Thermal Control, Structure,
Propulsion, Power, etc.
The Bus. Like a school bus, the
spacecraft bus includes all of the
necessary support functions to
keep the payload healthy and
happy. US Fig. 11-22.
t
.
w
.
i
t
s
Space Payload. Mars Reconnaissance
Orbiter using its Climate Sounder payload to
probe Mars’ atmosphere. Courtesy NASA.
w
w
Using Space:
Space in Context
‣Why Space?
‣Space Missions
‣Mission Elements
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
8
8/2/20
Understanding Space Through a Cyber-Security Lens
Trajectories and Orbits
‣ A trajectory is the path an object follows
through space
• The size of the racetrack depends on the energy
w
w
w
of the object in orbit
t
e
n
.
i
t
s
t
.
‣ An orbit can be thought of as a fixed
racetrack around a planet
Using Space:
Space in Context
‣Why Space?
Orbit Racetrack. US Fig. 1-27.
‣Space Missions
‣Mission Elements
• Orbit altitude and field of regard of the
spacecraft dictate the swath width or coverage
on the ground
Swath. The higher the orbit the greater
the swath generated by the field of
regard. US Fig. 1-28.
Launch Vehicles
Teaching Science & Technology Inc.
‣ A launch vehicle provides
the necessary velocity
change to get a spacecraft
into orbit.
t
.
w
.
i
t
s
• Launch vehicles are divided
into stages, providing a
portion of the total velocity
change, before being
discarded
w
w
Bring Home Some Asteroid! Atlas V rocket carrying NASA's OSIRIS-REx
Asteroid Sample Return Mission, Sept. 2016.
t
e
n
Using Space:
Space in Context
‣Why Space?
‣Space Missions
‣Mission Elements
• An upper stage may also be
needed to transfer the
spacecraft from a parking
orbit to its final mission orbit
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
9
8/2/20
Understanding Space Through a Cyber-Security Lens
Mission Operations
‣ The mission operations systems include all of the ground
and space-based infrastructure needed to coordinate
other elements of the space mission architecture—the
“glue” that holds the mission together. These include:
• Manufacturing and test facilities such as clean rooms and
.
i
t
s
t
.
test chambers to build systems and ensure they’ll work in
space
• Launch facilities to prepare the launch vehicle and get it
safely off the ground, and...
• Communication networks and operations centers used by
w
w
w
t
e
n
Using Space:
Space in Context
the flight-control team to coordinate activities once it’s in
space.
Communication Architecture. A complex ‣Why Space?
infrastructure of control centers, tracking
sites, satellites, and relay satellites maintains ‣Space Missions
contact between spacecraft and users. US Fig.
‣Mission Elements
1-34.
‣ Mission management and operations encompasses all of
the activities needed to take a mission from a blank
sheet of paper to on-orbit reality
• Mission management team—Defines the mission statement,
lays out a workable mission architecture to make it happen
• Mission operations team—Monitors the spacecraft’s health
and status to ensure users get uninterrupted service
Apollo Mission Control Center after the
triumphant return of Apollo 13. US Fig. 1-35.
Systems Engineering and Project Management
Teaching Science & Technology Inc.
‣ People are the most important part of any
space mission. Without people handling
various jobs and services, all the expensive
hardware is useless.
‣ These experts handle all of the systems
engineering, project management, and
mission support functions needed to go from
“cradle to grave,” from a blank sheet of paper
to on-orbit reality.
w
w
•
Systems engineering is the art and science of
designing and building systems that deliver
capabilities to meet the user’s needs.
•
Project management is the discipline of
planning, organizing, monitoring, and controlling
all resources needed to achieve the mission’s
intended purpose.
Copyright ©2020 Teaching Science and Technology Inc.
.
i
t
s
t
e
n
t
.
w
Systems Engineering. The process for balancing
cost, schedule, performance and along with risk to
deliver the needed capability to users
Using Space:
Space in Context
‣Why Space?
‣Space Missions
‣Mission Elements
Project Management. Leads the team to
deliver on time, on budget
Teaching Science & Technology Inc.
10
8/2/20
Understanding Space Through a Cyber-Security Lens
Space ISAC
‣ Mission: Collaborating to Protect Our Space Assets
t
e
n
‣ Announced in April 2019 during classified session at the 35th Space Symposium,
headquartered in Colorado Springs and co-located with the National Cyber Security Center
(NCC).
.
i
t
s
t
.
‣ An Information Sharing and Analysis Ecosystem
• Space ISAC Members – including Northrop Grumman, Lockheed Martin, etc
• Partner Agencies – including NASA, DHS, US Space Force, etc.
w
w
w
‣ Focused on 3 Core Areas of Threat within the Space Sector
• Supply Chain
• Business Systems
• Missions
https://s-isac.org/
Teaching Science & Technology Inc.
Review - Space in Context
t
e
n
‣ Space offers several unique advantages - The Space Imperative - that make its exploration essential for
modern society
•
•
•
•
•
Global perspective
A clear view of the universe without the adverse effects of the atmosphere
A free-fall environment
Abundant resources
A final frontier
•
•
Communications satellites tie together remote regions of the globe
Remote-sensing satellites observe the Earth from space, providing weather forecasts, essential military information, and valuable
data to help us better manage Earth’s resources
Navigation satellites revolutionize how we travel on Earth
Space observatories peer to the edge of the universe and study the dynamic nature of the sun
Scientific spacecraft explore the Earth and the outer reaches of the solar system and peer to the edge of the universe
Manned missions provide valuable information about living and working in space and experiment with processing important
materials
.
i
t
s
t
.
‣ Since the beginning of the space age, a wide variety of missions have evolved to take advantage of space
•
•
•
•
w
w
‣ Central to understanding any space mission is the mission itself, its scope tells us
•
•
•
The need describes the capability being delivered,
The goals and objectives lay out the expectations of the stakeholders,
The Concept of Operations or ConOps documents how systems and users will interact
•
The spacecraft—composed of the payload that performs the mission and the bus that provides essential housekeeping and other
support functions
The trajectories and orbits—the path the spacecraft follows through space. This includes the orbit (or racetrack) the spacecraft
follows around the Earth.
Launch vehicles—the rockets which propel the spacecraft into space and maneuver it along its mission orbit
The mission operations systems—the “glue” that holds the mission together. They consist of all the infrastructure needed to get the
mission off the ground, and keep it there, such as manufacturing facilities, launch sites, communications networks, and mission
operations centers.
Mission management and operations—the brains of a space mission. An army of people make a mission successful. From the initial
idea to the end of the mission, individuals doing their jobs well ensure the mission products meet the users’ needs.
w
‣ A space mission architecture includes the following elements
•
•
•
•
Copyright ©2020 Teaching Science and Technology Inc.
Using Space:
Space in Context
‣Why Space?
‣Space Missions
‣Mission Elements
Teaching Science & Technology Inc.
11
8/2/20
Understanding Space Through a Cyber-Security Lens
Key Take-Aways—Through a CyberSpace Lens
‣ Satellites in space have an enormous impact on daily life. These are some examples of what
could be disrupted if vulnerabilities are exploited within the satellite communication systems:
•
Internet traffic
•
Weather forecasting
GPS
•
-
Airline travel
-
Financial transactions
-
Cell phones
-
Power grid
-
Health services
-
Military operations
Remote sensing
•
-
•
t
e
n
Using Space:
.
i
t
s
t
.
w
Space in Context
‣Why Space?
‣Space Missions
w
w
‣Mission Elements
Agriculture
Military operations
Television signals
‣ Space has become a much larger attack vector – originally satellites were mostly
government-funded initiatives; now private industry has enormous numbers of satellites as
well.
‣ SPACE ISAC – collaborative group across the global space industry
Notes
Teaching Science & Technology Inc.
.
i
t
s
t
.
w
w
w
t
e
n
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
12
8/2/20
Understanding Space Through a Cyber-Security Lens
Opportunities—Orbits and Operations
Opportunities:
‣ Learning Objectives - By the end of this lesson you
should be able to...
t
e
n
• Understand and be able to explain what it takes to get an
object into orbit
• Explain the approach used to develop the restricted twobody equation of motion, including coordinate systems and
assumptions
• Define the two constants of orbital motion—specific
mechanical energy and specific angular momentum
.
i
t
s
t
.
• Apply the concept of conservation of specific angular
w
w
w
Orbits and Operations
momentum to show an orbital plane remains fixed in space
• Describe the purpose of the Concept of Operations
• Describe the major space operations activities
• Explain and give examples of space mission operations
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
systems currently in use
• Characterize key mission operations trade-offs
‣ References
• US Chapter 4
Teaching Science & Technology Inc.
Racetracks in Space
t
e
n
Opportunities:
Orbits and Operations
‣ Orbits can be thought of as big
racetracks on which spacecraft
“drive” around the Earth
‣ More Energy → Bigger
Racetrack!
w
w
.
i
t
s
t
.
w
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
Orbits as Racetracks. Orbits are like giant racetracks on which
spacecraft “drive” around Earth. US Fig. 4-1.
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
13
8/2/20
Understanding Space Through a Cyber-Security Lens
Baseballs into Orbit: Basic Motion
Opportunities:
‣ Imagine we could drop a baseball and throw one horizontally from the
same height at exactly the same time. Which one would hit the ground
first?
• They both hit at the same time!
• This is because horizontal and vertical motion are independent
• Gravity is acting on both balls equally, pulling them to the ground with exactly
the same acceleration of 9.798 m/s2 (neglecting drag)
w
w
w
This high speed video
shows both a
dropped ball and
launched ball hitting
the ground at the
same time
Orbits and Operations
t
e
n
.
i
t
s
t
.
Both Balls Hit at the Same Time. US Fig.
4-3.
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
Teaching Science & Technology Inc.
Bigger Picture
t
e
n
Opportunities:
Orbits and Operations
‣ Look at the shape and size of the the
Earth...the Earth curves or drops about 5 m
vertically for every 8 km you go out
horizontally
.
i
t
s
t
.
5m
w
w
‣ Imagine we build a tower 5 m tall at some
point on the Earth and attach a “diving board”
8 km long (ignore the natural sag of such a
long cantilever)
w
‣ At the edge of the diving board the surface is
10 m below
10 m
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
Earth’s Curvature. Earth’s curvature means
the surface curves down about 5 m for every
8 km. US Fig. 4-4.
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
14
8/2/20
Understanding Space Through a Cyber-Security Lens
Bigger Picture (cont’d)
‣ Imagine I could throw a baseball 8 km/sec!
Opportunities:
‣ How far would the ball drop due to gravity in 1 sec?
• Gravity at the the Earth’s surface causes objects to fall about 9.798 m/s2
• So in 1 sec an object falls about 5 m (d = 1/2 at2 = 4.905 to be exact)
.
i
t
s
t
.
‣ How far did the Earth curve away in 8 km? 5 m
‣ So how far above the ground is our ball after 1 sec? 5 m!
‣ What happens 1 sec later?
Orbits and Operations
t
e
n
• How long would it take the ball to reach the end of the diving board? 1 sec!
• The ball goes another 8 km horizontally and falls another 5 m and the Earth curves away another 5 m and the ball is
still 5 m above the surface. We’re in a circular orbit!
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
w
w
w
5m
5m
5m
Teaching Science & Technology Inc.
Trajectories
t
e
n
Opportunities:
Orbits and Operations
‣ As we throw baseballs faster and faster,
eventually we can reach a speed at which the
Earth curves away as fast as the baseball
falls, placing the ball in orbit.
w
w
‣ At exactly the right speed it will be in a
circular orbit!
•
•
.
i
t
s
t
.
w
A little faster and it’s in an elliptical orbit.
Even faster and it can escape Earth altogether
on a parabolic or hyperbolic trajectory.
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
Baseballs in Orbit. US Fig. 4-5.
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
15
8/2/20
Understanding Space Through a Cyber-Security Lens
Simulation
Opportunities:
w
w
w
t
e
n
Orbits and Operations
.
i
t
s
t
.
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
Teaching Science & Technology Inc.
Orbital Velocity
t
e
n
Orbits:
‣ So how fast is fast enough to achieve a circular orbit?
Let’s use some math...
.
i
t
s
t
.
km
w
w
‣ Where,
•
V = circular velocity of a satellite at radius R
•
G = Universal gravitational constant = 6.67 x 10-11 Nm2/kg2
•
M = mass of the Earth = 5.98 x 1024 kg
•
R = radius of the Earth = 6378 km
•
Slower, and you hit the Earth; faster, and you’re in an elliptical orbit
w
Understanding Orbits
‣Racetracks in
Space
‣Baseballs into
Orbit
‣Orbital Velocity
‣The Restricted
Two-Body
Problem
‣Constants of
Orbit Motion
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
16
8/2/20
Understanding Space Through a Cyber-Security Lens
Mechanical Energy in Action
Opportunities:
w
w
w
t
e
n
Orbits and Operations
.
i
t
s
t
.
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
Teaching Science & Technology Inc.
Angular Momentum
‣ Specific angular momentum is the total angular
momentum (H) divided by the mass of the
spacecraft
‣ The specific angular momentum of an orbit gives
us a vector perpendicular to the orbit plane
‣ Angular momentum is constant!
•
Therefore the orbit plane is also constant so it is fixed
in inertial space
Copyright ©2020 Teaching Science and Technology Inc.
.
i
t
ts
The Right-hand Rule. We find the direction of
the angular velocity vector, Ω, and the angular
momentum vector, H, using the right-hand
rule. US Fig. 4-15.
.
w
w
w
US Eqn. 4-28
t
e
n
Opportunities:
Orbits and Operations
Specific Angular Momentum. The specific
angular momentum vector, h, is
perpendicular to the orbital plane defined
by R and V. US Fig. 4-38.
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
Teaching Science & Technology Inc.
17
8/2/20
Understanding Space Through a Cyber-Security Lens
Angular Momentum in Action
Opportunities:
w
w
w
t
e
n
Orbits and Operations
.
i
t
s
t
.
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
Teaching Science & Technology Inc.
Space Mission Geometry
t
e
n
Opportunities:
Orbits and Operations
.
w
.
i
t
ts
w
w
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
18
8/2/20
Understanding Space Through a Cyber-Security Lens
Satellite Ground Tracks - Introduction
‣ Most satellites are for missions focused on the Earth
•
Orbits:
t
e
n
Describing & Using
Orbits
Taking pictures, communications, navigation
‣ Need to know what path the satellite traces over the Earth’s surface
‣ As a satellite revolves around the Earth, the Earth rotates under the satellite
•
.
i
t
s
t
.
Now, try to imagine what the trace of the satellite looks like on the surface of the
Earth
w
w
w
Earth and Spacecraft Motion. The
Earth spins on its axis at nearly
1600 km/hr (1000 mph) at the
equator, while a spacecraft orbits
above it. The ground track is the
trace of the satellite’s path over
the surface of the Earth.
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
Teaching Science & Technology Inc.
Building a Ground Track
t
e
n
Orbits:
‣ Since the Earth rotates underneath the satellite orbit, each
successive ground track shifts to the left and is “scrunched” by the
orbital period times the Earth’s rotation rate (15 deg per hour)
.
i
t
ts
.
w
w
w
Describing & Using
Orbits
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
A Normal Spacecraft Ground Track. As Earth rotates, successive ground tracks appear to shift to the
west from an Earth-based observer’s viewpoint. US Fig. 5-31.
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
19
8/2/20
Understanding Space Through a Cyber-Security Lens
Examples
Orbits:
w
w
w
t
e
n
Describing & Using
Orbits
.
i
t
s
t
.
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
Orbital Ground Tracks. Orbit A has a period of 2.67 hours. Orbit B has a period of 8 hours. Orbit C has a period of
18 hours. Orbit D has a period of 24 hours. Orbit E has a period of 24 hours. US Fig. 5-33.
Teaching Science & Technology Inc.
Standard Orbits: Low Earth Orbit (LEO)
‣ A satellite in LEO,
like the ISS
shown here,
completes
‣ 1 orbit about
every 90 min or
‣ about 15 orbits
per day
‣ A give ground
station on Earth
may only “see”
the satellite for
up to 10 min at
a time a few
times per day
depending on
where it is the
exact orbit
parameters
t
e
n
Opportunities:
Orbits and Operations
w
w
.
w
.
i
t
ts
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
20
8/2/20
Understanding Space Through a Cyber-Security Lens
Standard Orbits: Geostationary Orbit (GEO)
Opportunities:
w
w
w
t
e
n
Orbits and Operations
.
i
t
s
t
.
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
Teaching Science & Technology Inc.
Review - Understanding Orbits
‣ Combining Newton’s Second Law and his Law of Universal Gravitation, we form the restricted twobody equation of motion
‣ The coordinate system used to derive the two-body equation of motion is the geocentric-equatorial
system
•
Origin—Earth’s center
•
Fundamental plane—equatorial plane
•
Direction perpendicular to the plane in the North Pole direction
•
Principal direction—vernal equinox direction
‣ In deriving the 2-body Equation of Motion, we assume
•
•
.
i
t
ts
.
w
w
w
t
e
n
Drag force is negligible; Spacecraft is not thrusting
Gravitational pull of third bodies and all other forces are negligible; mEarth >> mspacecraft
•
Earth is spherically symmetrical and of uniform density and we can treat it mathematically as a
point mass; Spacecraft mass is constant, so ∆m = 0
•
The geocentric-equatorial coordinate system is sufficiently inertial for Newton’s laws to apply
Opportunities:
Orbits and Operations
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
‣ Solving the restricted two-body equation of motion results in the polar equation for a conic section
•
This tells us that all objects moving under the influence of gravity must follow one of four paths:
circle, ellipse, parabola or hyperbola
Copyright ©2020 Teaching Science and Technology Inc.
Teaching Science & Technology Inc.
21
8/2/20
Understanding Space Through a Cyber-Security Lens
Mission Operations Systems
t
e
n
‣ The ConOps is driven by the availability
and access to operations systems
‣ Mission operations systems include any
facilities or infrastructure needed to
design, assemble, integrate, test, launch,
or operate a space mission
‣ Some critical operations systems function
during the three basic phases of a
spacecraft’s life—building, launching, and
operating:
w
w
w
.
i
t
s
t
.
•
Spacecraft Manufacturing — the systems that
support design, assembly, integration, and
testing
•
Launch — the systems that bring the
spacecraft and launch vehicle together and
get them safely off the pad
•
Operations — mainly communication systems,
such as the web of radio links that track and
relay data to and from the spacecraft
Launch Complex. Launch
vehicles such as the Atlas V
shown here require pads
and processing equipment
to operate. Courtesy ULA.
Opportunities:
Spacecraft Manufacturing.
Specialized equipment and
facilities are needed to
assemble and test space
systems
Orbits and Operations
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
Mission Control. Operators
control all aspects of a mission
from the control center
(Courtesy ESA)
Teaching Science & Technology Inc.
Communication Architecture
‣ The communication architecture
is the configuration of satellites
and ground stations in a space
system and the network that links
them together.
• Ground stations—Earth-based
antennas, transmitters, and
receivers
w
w
• Control center—Controls the
spacecraft and all other elements
in the network
• Relay satellites—additional
spacecraft that link the primary
spacecraft with ground stations
.
i
t
ts
.
w
• Spacecraft—the in-space element
t
e
n
Opportunities:
Orbits and Operations
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
Communication Architecture. A communication architecture for
space missions consists of ground- and space-based elements tied
together through different communication paths or links. US Fig. 1524.
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
22
8/2/20
Understanding Space Through a Cyber-Security Lens
Critical Mission Ops Systems - AFSCN, DSN, TDRS
‣ To manage 450+ contacts per day with 140+
operational satellites the USAF relies on the Air
Force Satellite Control Network (AFSCN), a series of
tracking sites around the world.
t
e
n
‣ To link with spacecraft beyond Earth orbit, NASA
relies on the Deep Space Network (DSN) consisting
of three complexes controlled and monitored by the
Network Operations Control Team (NOCT) at the
Jet Propulsion Laboratory in Pasadena, CA
•
.
i
t
s
t
.
Complexes are spaced evenly around the globe to ensure
continuous coverage of satellites anywhere in the solar
system
w
w
w
Opportunities:
Orbits and Operations
World-wide AFSCN Locations.
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
TDRS
‣ Tracking and Data Relay Satellite (TDRS) is a type of
relay satellite, that forms part of the Tracking and
Data Relay Satellite System (TDRSS)
•
A network of 8 satellites in geostationary orbit used by
NASA and other US government agencies as a spacebased communication architecture
•
Relays data from space systems in low-Earth orbit such
as the Space Shuttle and the ISS to operations centers
‣ There are multiple commercial networks as well
World-wide DSN Locations.
Teaching Science & Technology Inc.
Space Operations Activities
t
e
n
‣ Operations Planning
.
i
t
ts
‣ Flight Control
‣ Mission Data
Receipt/Delivery
.
w
‣ Tracking and Navigation
‣ Spacecraft Support and
Analysis
‣ Maintenance and Support
‣ Training
w
w
‣ Mission Data Processing and
Archiving
‣ Customer/User Support
Opportunities:
Orbits and Operations
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
US Fig. 15-32.
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
23
8/2/20
Understanding Space Through a Cyber-Security Lens
Mission Data Receipt and Delivery/Data Processing/
User and Customer Support
t
e
n
‣ The only reason we fly space missions is to generate
data or otherwise serve the users who pay the bills!
‣ Collect, analyze and distribute mission data to users
‣ Analyzing and archiving spacecraft engineering data
.
i
t
s
t
.
‣ Space missions exist to support users and customers.
• Principal investigators are the scientists designated
to analyze and publish the results of data collected by
science payloads.
w
w
w
Opportunities:
Orbits and Operations
Data Generators. NASA’s Aqua satellite is part of
the “A-Train,” which consists of a coordinated group
of satellites flying in formation around the globe.
Aqua and its sister satellites generate many
hundreds of megabits of data each day that needs
to find its way to operators and users. (Courtesy of
NASA). US Fig 15-40.
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
Engineering Data. Analysis
of engineering data provides
insight into the health and
status of the spacecraft.
Teaching Science & Technology Inc.
Key Space Operations Trade-offs
.
w
‣ Ground station staffing
‣ Anomaly response
w
w
‣ State-of-health monitoring
‣ New or existing
hardware/software
t
e
n
.
i
t
ts
‣ Spacecraft autonomy
‣ Ground station automation
Spacecraft Autonomy.
Due to its great distance
from Earth real-time
control wasn’t possible so
the Cassini spacecraft at
Saturn required a high
degree of autonomy.
(Courtesy NASA)
Ground Staffing. People
are expensive. Maintaining
a large staff of operators
24/7/365 represents a
large mission investment.
The fewer operators
needed, the less expensive
the mission. (Courtesy
USAF)
Opportunities:
Orbits and Operations
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
24
8/2/20
Understanding Space Through a Cyber-Security Lens
Review - Space Operations
‣ The Concept of Operations (ConOps) describes how we plan to use the system to fulfill the mission.
t
e
n
‣ Mission operations systems include the facilities and infrastructure to design, assemble, integrate, test,
launch, and operate a space mission
Opportunities:
Orbits and Operations
‣ The AFSCN, DSN and other assets represent key mission operations systems that drive the mission ConOps
‣ Space operations tasks include:
• Operations Planning
• Flight Control, Training
• Mission Data Receipt/Delivery
• Tracking and Navigation
• Spacecraft Support and Analysis
w
w
w
• Maintenance and Support
.
i
t
s
t
.
• Mission Data Processing and Archiving, Customer/User Support
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
‣ Key mission operations trade-offs include:
• Spacecraft autonomy
• Ground station automation
• Ground station staffing
• Anomaly response
• State-of-health monitoring
• New or existing hardware/software
US Fig. 15-32.
Key Take-Aways—Through a CyberSpace Lens
Teaching Science & Technology Inc.
.
w
‣ Orbital mechanics inherently limit access to space
systems from specific geographical locations
w
w
t
e
n
.
i
t
ts
‣ Getting into orbit is hard
‣ Ground-based mission operations activities provide
multiple attack surfaces (equipment and people)
‣Getting to Orbit
‣Standard Orbits
and Ground
Tracks
‣Mission
Operations
Systems
‣Mission
Operations
Activities
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
25
8/2/20
Understanding Space Through a Cyber-Security Lens
Notes
w
w
w
t
e
n
.
i
t
s
t
.
Teaching Science & Technology Inc.
Notes
.
i
t
ts
.
w
w
w
t
e
n
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
26
8/2/20
Understanding Space Through a Cyber-Security Lens
Threats—Natural and Human
t
e
n
‣ Objectives - At the end of this lesson you
should be able to...
•
•
•
•
.
i
t
s
t
.
Know where space is and how it’s defined
List and describe the major hazards of the
space environment and describe their
effects on spacecraft
w
w
w
Discuss potential malicious threats to
spacecraft and ground infrastructure
‣ References
US Chapter 3
Threats:
Natural and Human
‣Background
‣Cosmic
Perspective
‣Space
Environment
Threats
‣Human Threats
Teaching Science & Technology Inc.
Motivation: Why Worry about the Space Environment?
t
e
n
‣ Approximately 25% of all spacecraft anomalies are related to the space
environment. Famous examples include:
• 2014: The radiation storm on Sep. 1 is likely responsible for the star tracker
•
reset on both STEREO A and STEREO B* (within 16 minutes of each other), IMU
was triggered to power on (normally off).
2014: X1.6 flare and accompanying CME is likely the cause for the Dawn
anomaly on 2014-09-11 – delayed the start of the first science orbit at Ceres by
about a month.
.
i
t
s
t
.
w
• 2010: Control of Galaxy 15 lost due to electrostatic discharge cause by solar
•
Threats:
Natural and Human
flare. Satellite drifted through crowded GEO belt in full send and receive mode
2009: Iridium satellite destroyed when it collided with the dead Cosmos 2251
satellite (space debris)
w
w
Warning- Traffic Hazard!. Iridium
Collision with Cosmos 2251
• 2000: Boeing 702 satellite (Anik F-1): degraded solar array performance due to
•
outgassing induced fogging
2000: Stardust comet flyby spacecraft blinded and sent into safe mode by a
solar flare
Caution - Solar Flare.
Stardust spacecraft
was blinded by a solar
flare
‣Background
‣Cosmic
Perspective
‣Space
Environment
Threats
‣Human Threats
• 1994: Telsat Canada’s Anik E-1 and E-2 suddenly began to spin out of control due
to spacecraft charging
• 1990: High energy charged particles caused bit flips in HST fine guidance
system electronics (FGS) passing through the South Atlantic Anomaly (SAA)
causing guide star acquisition failures. Subsequently, FGS use was suspended in
the SAA.
• 1979: Increased solar activity heated the outer layers of the Earth's atmosphere
and thereby increased drag on Skylab, leading to an early reentry.
Copyright ©2020 Teaching Science and Technology Inc.
Beware - Outgassing.
Anik F-1 degraded
performance due to
outgassing
Teaching Science & Technology Inc.
27
8/2/20
Understanding Space Through a Cyber-Security Lens
Space is Hard
w
w
w
t
e
n
.
i
t
s
t
.
Teaching Science & Technology Inc.
Cosmic Perspective
Where is Space? For awarding astronaut wings, NASA defines
space at an altitude of 80 km (50 mi). The Karman Line is placed
at an altitude of 100 km (60 mi) and is recognized by the
Fédération Aéronautique Internationale (FAI) as the beginning of
space. For our purposes, space begins where satellites can
maintain orbit—about 130 km (81 mi). US Fig. 3-2.
.
i
t
s
t
.
w
Perspective. Imagine if
Earth were the size of
a peach—then the ISS
orbit would be just
above the fuzz. US Fig.
3-3.
w
w
The Solar System in Perspective. If Earth were the size of a baseball, about 100 cm (~4 in) in
diameter, the Moon would be only 28 mm (1 in) in diameter and about 3 m (10 ft) away. At the
same scale the Sun would be a ball 10.9 m (~36 ft) in diameter (about the size and volume of a
small house); it would be more than 1.2 km (about 0.75 mi) away. Again, keeping the same
scale, the dwarf planet Pluto would be about the same size as Earth’sMoon, 19 mm (~0.75 in),
and 46 km (~28.5 mi) away from the house-sized Sun. US Fig. 3-9.
Copyright ©2020 Teaching Science and Technology Inc.
t
e
n
Threats:
Natural and Human
‣Background
‣Cosmic
Perspective
‣Space
Environment
Threats
‣Human Threats
Teaching Science & Technology Inc.
28
8/2/20
Understanding Space Through a Cyber-Security Lens
Effects of the Space Environment
‣ The gravitational environment causes some physiological and fluid management
problems, but provides opportunities for manufacturing
t
e
n
Threats:
Natural and Human
‣ Earth’s atmosphere affects a spacecraft, even in orbit—primarily through drag
‣ The vacuum in space above the atmosphere gives spacecraft other challenges
‣ Natural and man-made debris in space pose collision hazards
.
i
t
s
t
.
‣ Radiation and charged particles can severely damage unprotected spacecraft
w
w
w
Factors Affecting Spacecraft in the
Space Environment. There are six
challenges unique to the space
environment we deal with—gravity,
the
atmosphere,
vacuum,
micrometeoroids
and
debris,
radiation, and charged particles. US
Fig. 3-13.
‣Background
‣Cosmic
Perspective
‣Space
Environment
Threats
‣Human Threats
Teaching Science & Technology Inc.
Atmosphere - Drag and Atomic Oxygen
‣ Earth’s atmosphere affects a spacecraft below about
600 km, in two primary ways:
Structure of Earth’s
Atmosphere. The
density of Earth’s
atmosphere
decreases
exponentially as we go
higher. Even in lowEarth orbit, however,
spacecraft can still
receive the effects of
the atmosphere in the
form of drag. US Fig.
3-16.
• Drag—shortens orbital lifetimes, changes their attitude
• Interaction with atmospheric neutrals—primarily tomic
w
w
• Atmospheric density highly dependent on solar activity and
thus very difficult to model and predict
• Changes order of magnitude from solar minimum to solar
maximum at altitudes from 400 km to 700 km
t
e
n
.
i
t
s
t
.
w
oxygen—that degrade spacecraft surfaces and interfere with
sensors
Threats:
Natural and Human
‣Background
‣Cosmic
Perspective
‣Space
Environment
Threats
‣Human Threats
‣ Radiation in the upper atmosphere causes O2 to
dissociate into free oxygen atoms, atomic oxygen or AO
• AO is VERY reactive and potentially damaging to spacecraft
surfaces
Copyright ©2020 Teaching Science and Technology Inc.
Solar Cycle. The sun experiences an 11-year cycle
that affects drag in LEO.
Teaching Science & Technology Inc.
29
8/2/20
Understanding Space Through a Cyber-Security Lens
Vacuum Effects
Threats:
‣ Outgassing - the release of trapped gasses and volatiles from
materials over time when exposed to a vacuum or low pressure.
t
e
n
• Called off-gassing inside a crew compartment.
Natural and Human
• Outgassing products can re-condense on sensitive spacecraft surfaces
.
i
t
s
t
.
‣ Cold-welding - metals fusing together in vacuum
‣ “Tin Whiskers” - crystalline structures of tin that sometimes
grow from surfaces where tin is used as a final finish. Can lead
to short circuits and system failures.
w
w
w
‣ Heat Transfer - complicated in a vacuum. There are three ways
to move heat:
Vacuum Testing. Spacecraft in a
thermal-vacuum
chamber
to
simulate the effects of the space
environment. US Fig. 3-21.
‣Background
‣Cosmic
Perspective
‣Space
Environment
Threats
‣Human Threats
• Convection - transfer of heat from a liquid or gas medium
• Conduction - transfer of heat through a solid medium
• Radiation - transfer of heat energy through direct Electromagnetic
radiation (infrared, IR)
- Radiation is the primary way heat gets in or out of a spacecraft in a vacuum
Radiators. The massive radiators on
the ISS eject heat from the crew
modules by radiating it into space.
Courtesy NASA.
Micrometeroids and Space Junk: History
Teaching Science & Technology Inc.
t
e
n
Threats:
Natural and Human
.
i
t
s
t
.
w
w
w
‣Background
‣Cosmic
Perspective
‣Space
Environment
Threats
‣Human Threats
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
30
8/2/20
Understanding Space Through a Cyber-Security Lens
Micro-meteoroids and Space Junk: How bad is it?
‣ The Air Force Space Control Center tracks about
20,000 man-made objects, baseball sized and
larger, in Earth orbit
t
e
n
• There are an estimated 40,000 golf-ball sized
.
i
t
s
t
.
objects too small to track, plus millions of smaller
objects
• Chinese Fengyun-1C intercept test created over
1900 debris fragments alone!
‣ In space, chances of getting hit by something big
are small, but chances of getting hit by
something small are bigger and growing
‣ Numerous satellites have been damaged—
CERISE, Space Shuttle, Iridium—or had to
maneuver to dodge debris
‣ National efforts are aimed at decreasing the
amount of debris generated—but no international
laws exist
w
w
w
Threats:
Natural and Human
‣Background
‣Cosmic
Perspective
‣Space
Environment
Threats
‣Human Threats
Orbital Debris “Box Score.” The Orbital
Debris Quarterly News, Volume 24, Issue 2
April 2020
Teaching Science & Technology Inc.
EM Radiation Environment
‣ Radiation from the Sun can cause
•
Heating on exposed surfaces—due to
infrared or thermal radiation
•
Prolonged exposure to ultraviolet
radiation can begin to degrade
spacecraft surfaces
•
•
Bursts of radio frequency interference
- Photons impart momentum, ~ 5 N of
force per km 2 of surface
Copyright ©2020 Teaching Science and Technology Inc.
t
e
n
Threats:
Natural and Human
.
i
t
s
t
.
w
w
w
Solar pressure, which can change a
spacecraft’s orientation
Solar
Radiation.
The Sun
emits
electromagn
etic energy
over a wide
range of the
spectrum.
‣Background
‣Cosmic
Solar
Perspective
Prominence.
‣Space
NASA’s STEREO
Environment
(Ahead)
Threats
spacecraft
‣Human Threats
captured this
view of the Sun
on Aug. 25,
2010 showing
the action in an
extreme UV
wavelength.The
video clip covers
about 30 hours
of activity
Teaching Science & Technology Inc.
31
8/2/20
Understanding Space Through a Cyber-Security Lens
Charged Particle Sources
t
e
n
‣ Three primary sources for these
particles are:
.
i
t
s
t
.
• The solar wind and solar particle events
(SPE)
• Galactic cosmic rays (GCRs)
• The Van Allen radiation belts
w
w
w
The Atom. The nucleus of an atom contains positively
charged protons and neutral neutrons. Around the
nucleus are negatively charged electrons. US Fig. 3-6.
‣ There are two separate effects to
worry about
• Low energy (plasma)
• High energy
Threats:
Natural and Human
Massive Eruptions. SOHO images of the
“Halloween Storm” 2003.
‣Background
‣Cosmic
Perspective
‣Space
Environment
Threats
‣Human Threats
Low Energy (Plasma) Effects
Teaching Science & Technology Inc.
t
e
n
Threats:
Natural and Human
‣ Low-energy particles can cause:
•
•
.
i
t
s
t
.
w
Arcing (the dominant concern)
Electrostatic Discharge (point-to-point arcing) –
caused by large potential differences
•
•
Dielectric Breakdown (arcing through a material)
•
Re-attraction of contamination: may be significant
in degrading surfaces.
Coronal Mass Ejection (CME).
(Courtesy SOHO/EIT/LASCO)
Arcing generates electromagnetic interference
(EMI) and damages surfaces (damage to solar
arrays and electronics of greatest concern)
w
w
‣Background
‣Cosmic
Perspective
‣Space
Environment
Threats
‣Human Threats
‣ Significant issues in GEO, less so in LEO
Electrostatic Discharge.
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
32
8/2/20
Understanding Space Through a Cyber-Security Lens
High Energy Effects
‣ Single Event Phenomena (SEP) – Instantaneous effects due to
a single particle hitting electronics. Examples include:
t
e
n
• Single Event Upset (SEU): A non-destructive bit flip
• Single Event Latchup (SEL): A potentially destructive high
current
‣ Dose Effects – Long-term, accumulated damage
• Total Ionizing Dose (TID) – Electrostatic changes
- Biological systems: DNA damage
- Semiconductors: Charge trapped in dielectrics alters
performance; eventual circuit failure
- Materials: Darken optics. Loss of mechanical strength (e.g.
embrittle PTFE Teflon)
• Displacement Damage (DD) – Crystalline structure changes
- Decrease minority carrier lifetime in semiconductors
- Decrease efficiency of solar cells, LEDs, and CCDs
- Dark-signal increases in CCDs
w
w
w
Threats:
.
i
t
s
t
.
Natural and Human
‣ Mitigations
• Spacecraft shielding – offers limited protection
• Use radiation-tolerant electrical components and materials
• Error detection and correction (EDAC) algorithms
Solar Particle Event. This animation depicts the effect of a
solar particle event that arrives at Earth.
Single Event
Upset. High
energy charged
particles
penetrate into
silicon memory
and other
devices causing
immediate
damage.
‣Background
‣Cosmic
Perspective
‣Space
Environment
Threats
‣Human Threats
Teaching Science & Technology Inc.
The Good Old Days….
w
w
ground
010
001
010
link
100
101
010
101
000
011
100
t
e
n
.
i
t
s
t
.
w
downlink
uplink
ground
link
100
011
000
101
0
1
0
101
100
010
001
0
1
0
‣Background
‣Cosmic
Perspective
‣Space
Environment
Threats
‣Human Threats
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
33
8/2/20
Understanding Space Through a Cyber-Security Lens
…the New Reality…
t
e
n
Spoofing
uplink
DDoS = Distributed
Denial of Service.
Examples: Type of
Service (TOS) flood,
Internet of Things
(IoT) botnet attack,
Ping flood
w
w
w
.
i
t
s
t
.
ground
link
downlink
Eaves
Dropping
ground
link
‣Background
‣Cosmic
Perspective
‣Space
Environment
Threats
‣Human Threats
0
110
001
100
0
1
0
101
010
010
101
0
0
010
010
001
010
100
101
010
101
000
011
100
Hacking
Denial of Service
Ransomware
Teaching Science & Technology Inc.
Cyber Security – Space Challenges
‣ Hard to Identify—Some attacks may be indistinguishable from
natural hazards (e.g. Single Event Upsets)
‣ “It can’t happen here” mentality
‣ Conservative, inflexible, slow-changing (non-Agile) culture
- Hardware and software systems in space used to be a ‘walled garden’ –
completely isolated from the internet.
- Procedures and Contracts have slow adoption
• Complacency — Lack of security culture in civilian space
- Commercial Sector
- Science Sector
‣ Security is an after-thought
t
e
n
.
i
t
s
t
.
w
• Change is measured in years
w
w
‣Background
‣Cosmic
Perspective
‣Space
Environment
Threats
‣Human Threats
• Requirements are identified too late in the SDLC process
• Security is tacked onto the system, not part of the original design
‣ Patching and upgrading existing systems is difficult and expensive
(and some cases impossible) with deployed space systems
Adapted from : José Pizarro – “Back of an envelope of the current civilian space security issues”; June 2019
and
World Global Affairs Council, Colorado Springs, August 2019
Copyright ©2020 Teaching Science and Technology Inc.
Teaching Science & Technology Inc.
34
8/2/20
Understanding Space Through a Cyber-Security Lens
Cyber Security – Space Challenges (cont’d)
‣ The attack surface is increasing at all phases:
t
e
n
•
Increased reliance on spacecraft autonomy and other software-intense features are requested (= more code required)
•
More stakeholders are involved, e.g. more international missions (= more potential attack vector)
•
Project Managers
•
Software Architects
•
Software Designers
•
Developers
•
Testers
.
i
t
s
t
.
‣ Operating Systems or other integrated software (e.g. database) are outdated
‣Background
‣Cosmic
Perspective
‣Space
Environment
Threats
‣Human Threats
w
w
w
‣ Removing end-of-life software
Teaching Science & Technology Inc.
T h is P h o to b y U n kn o w n A u th o r is licen sed u n d er C C B Y -S A
Review - The Space Environment
t
e
n
‣ For our purposes, space begins at an altitude where a satellite can briefly maintain an orbit.
Thus, space is close. It’s only about 130 km (81 mi) straight up.
.
i
t
s
t
.
w
‣ Six major environmental factors affect spacecraft in Earth orbit.
• Gravity - Earth exerts a gravitational pull which keeps spacecraft in orbit. We best
describe the condition of spacecraft and astronauts in orbit as free-fall, because they’re
falling around Earth.
• Atmosphere - Earth’s atmosphere isn’t completely absent in low-Earth orbit. It can cause
drag and exposure to damaging atomic oxygen
• Vacuum - In the vacuum of space, spacecraft can experience: Outgassing, Cold Welding
and Heat Transfer issues
w
w
•
Micrometeoroids and space junk - can damage spacecraft during a high speed impact
•
Radiation - from the Sun, can cause: Heating on exposed surfaces, Damage to electronic
components, disruption in communication, and Solar Pressure causing a change in a
spacecraft’s orientation
•
Charged particles - from solar wind and flares, Galactic cosmic rays (GCRs), and Van Allen
radiation belts cause charging, single event phenomena (SEP) and total dose effects
Threats:
Natural and Human
‣Background
‣Cosmic
Perspective
‣Space
Environment
Threats
‣Human Threats
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
35
8/2/20
Understanding Space Through a Cyber-Security Lens
Key Take-Aways—Through a CyberSpace Lens
t
e
n
‣ Space is hard (and it sucks)
‣ The natural environment is a huge threat to space
activities—denying services at random times
.
i
t
s
t
.
‣ Some anomalies due to the natural environment may be
indistinguishable from human attacks
‣Background
‣Cosmic
Perspective
‣Space
Environment
Threats
‣Human Threats
w
w
w
‣ Relatively minor “hacks” (e.g. causing a spacecraft to
point its sensor at the sun) could have devastating
impacts to operations
Teaching Science & Technology Inc.
Notes
.
i
t
ts
.
w
w
w
t
e
n
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
36
8/2/20
Understanding Space Through a Cyber-Security Lens
Vulnerabilities—RF and Data Systems
‣ Objectives - At the end of this lesson you should be able to...
t
e
n
• Describe the inputs, outputs, and fundamental processes within the
spacecraft communication subsystem and how it fits into overall
communication architecture
Vulnerabilities:
RF Systems and
Data Systems
• Explain basic principles of radio frequency (RF) communication and how they
apply to developing link budgets
.
i
t
s
t
.
• Characterize key limitations and trade-offs in communication subsystem
design
• Explain the vital functions performed by the data handling subsystem (DHS)
• Describe how the DHS fits into the overall mission data architecture
w
w
w
• List and describe the key components of a DHS
‣RF Systems
‣Data Handling
Systems
• Characterize the relative importance of software to each spacecraft
subsystem
• Discuss the challenges and opportunities posed by the increasing reliance on
spacecraft software to perform system functions
• Distinguish the competing design issues faced by the DHS
‣ References
• US Chapter 13.1
Teaching Science & Technology Inc.
Introduction
t
e
n
‣ The communication subsystem is the “ears and mouth” of the spacecraft
‣ The communication subsystem sends payload and subsystem information to the ground
station and receives commands in return
.
i
t
ts
‣ It consists of modulators/demodulators (“MODEMs”), transmitters, receivers, and
antennas
• Payload and spacecraft information modulates onto the carrier signal, then is amplified and
broadcast to the ground system through the antenna.
.
w
• The spacecraft collects commands from ground stations (using its antenna), amplifies the signal,
then demodulates it to produce instructions for the rest of the spacecraft.
Communication
Subsystem
Components. The communication
portion of the CDHS consists of
modulators (mod), demodulators
(demod),
transmitters
(TX),
receivers (RX), and antennas. US
Fig. 13-7.
w
w
Vulnerabilities:
RF Systems and
Data Systems
‣RF Systems
‣Data Handling
Systems
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
37
8/2/20
Understanding Space Through a Cyber-Security Lens
Introduction - Communication Architecture
‣ The communication subsystem works
as part of an overall communication
architecture
t
e
n
‣ The communication architecture is the
configuration of satellites and ground
station nodes in a space system and
the network that links them together
•
•
•
•
.
i
t
s
t
.
Spacecraft—the in-space element
Ground stations—Earth-based antennas,
transmitters, and receivers
w
w
w
Vulnerabilities:
RF Systems and
Data Systems
‣RF Systems
‣Data Handling
Systems
Control center—Controls the spacecraft
and all other elements in the network
Relay satellites—additional spacecraft that
link the primary spacecraft with ground
stations
‣ Communication subsystems create all
of the links between these nodes
Communication Architecture. A communication architecture
for space missions consists of ground- and space-based
elements tied together through different communication paths
or links. US Fig. 15-24.
Teaching Science & Technology Inc.
Delivering the Message - RF Communication Basics
‣ Radio Frequency (RF) Communication is
the process of modulating an information
signal onto a carrier signal and then
retrieving that information at the receiver
•
‣ For RF communication, we “cut the string”
and use a radio frequency carrier signal in
its place
•
•
.
w
Basic Communication. Two cans and a string
provide an example of RF communication with
the string taking the place of the carrier signal.
US Fig. 13-4.
w
w
For example, by laying the message signal
(00101100) onto the carrier frequency, we
can see a crude representation of pulse
amplitude modulation in the figure shown here
By changing, the pulse width (like Morse code),
frequency, and other parameters of the
carrier frequency, we have a wide variety of
coding techniques available in addition to
simple AM
t
e
n
.
i
t
ts
Like 2 cans and a string
Vulnerabilities:
RF Systems and
Data Systems
‣RF Systems
‣Data Handling
Systems
Amplitude Modulation. This example provides a crude
representation of pulse amplitude modulation. US Fig.
13-21.
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
38
8/2/20
Understanding Space Through a Cyber-Security Lens
Key Issues
‣ In every day communication, to be heard and
understood we must focus on five key issues:
t
e
n
‣ Distance
• It takes more energy to communicate over
longer distances
‣ Speed
.
i
t
s
t
.
• Receiver must be able to process the information
as fast as it’s being sent
• This is defined by the data rate
‣ Carrier Frequency
w
w
w
• Sound must be within the range of human
hearing
• The “Mosquito” ringtone on cell phones cannot be
heard by most adults
‣ Language
Vulnerabilities:
RF Systems and
Data Systems
‣RF Systems
Can You Hear Me Now? For a listener to hear and understand
you, five things are important: language, distance, carrier ‣Data Handling
frequency, data rate and environment. US Fig. 13-3.
Systems
• Transmitter (speaker) and Receiver (listener)
must find a common language
‣ Environment
In an analog sense, to be heard and understood, your
signal, S, must be greater than the noise, N
• Too much background noise can swamp the
signal being sent (loud room)
S/N > 1
Teaching Science & Technology Inc.
Delivering the Message - Link Budgets
‣ The link budget accounts for the data rate and other factors that
contribute to the basic ability for the spacecraft and ground system
to communicate effectively.
‣ The five key issues are still as important:
• Distance - Characterized as Space Losses
• Language - Characterized by Modulation method (e.g. AM or FM)
• Speed - Defined to be the Data Rate
• Environment - Which produces Noise
• Carrier Frequency - Regulated and controlled at the national and
international level
‣ Since we’re dealing with binary rather than analog communication,
the primary figure-of-merit for a digital data link is:
• Eb/No (“eb-no”) = the ratio of the received energy per bit (Eb) to noise
density (No) ratio
• Where a given minimum Eb/No is required for effective communication
depending on modulation method used (“language”)
‣ Eb/No can be found using Friis’ Equation shown here derived in
1945 by Danish-American radio engineer Harald T. Friis at Bell Labs.
‣ Link Budget analysis helps us determine if there is enough energy in
each bit we send so that the receiver can distinguish between a “1”
and a “0” in the presence of background noise
.
w
w
w
Can You Hear Me Now? For effective RF communication, five
things are still important: distance (space losses), language
(modulation), speed (data rate), environment (noise), and
carrier frequency. US Fig. 13-11.
t
e
n
.
i
t
ts
Where:
Pt = transmitter power
Gt = transmit antenna gain
Ll = transmitter-to-antenna line loss
Ls = space loss
La = atmospheric loss
Gr = receive antenna gain
k = Boltzmann's constant
Ts = receiver system noise temperature
R = data rate
[EIRP] = P Ll Gt = Effective Isotropic Radiated Power
= transmitter figure-of-merit
Gr / Ts= receiver figure-of-merit
Vulnerabilities:
RF Systems and
Data Systems
‣RF Systems
‣Data Handling
Systems
All space links are encrypted by various means
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
39
8/2/20
Understanding Space Through a Cyber-Security Lens
Design Issues - Limitations
‣ Physical Limits—Atmospheric windows
place physical limitations on which
frequencies can pass through the
atmosphere.
t
e
n
.
i
t
s
t
.
‣ Technical Limits—such as antenna size,
available power, data transmission rate,
available technology and other
spacecraft and ground system
specifications constrain the range of
frequencies that we can use for a given
mission.
w
w
w
Vulnerabilities:
RF Systems and
Data Systems
Crippled Antenna. When the high gain antenna on NASA’s
Galileo spacecraft bound for Jupiter failed to open, they had to
conduct the entire mission using the low gain antenna at a
much lower data rate. Courtesy NASA.
‣RF Systems
‣ Legal Limits—National and international
licensing of spacecraft frequencies by the
International Telecommunications Union
(ITU) and the World Administrative Radio
Conference (WARC) regulate what
frequencies can be used.
‣Data Handling
Systems
Atmospheric Windows. Earth’s atmosphere is selectively
transparent to different wavelengths of EM radiation. To
communicate through the atmosphere you need to use a
wavelength that will get through. US Fig. 12-7.
Trade-offs
Teaching Science & Technology Inc.
t
e
n
‣ Communication subsystem designers have a range of options for increasing the chance
of being heard (greater Eb/No) but each option comes with its own constraints.
.
i
t
ts
‣ These trade-offs are summarized here
To increase the chance of being heard you
could...
But You’re Constrained by...
Talk Louder - Increase Transmitter Power (Pt)
⇆
Use a “Megaphone” - Increase Transmitter Gain (Gt)
⇆
Get Closer - Decrease Space Losses (Ls)
⇆
.
w
Available Spacecraft Power
w
w
Limit for Onboard Antenna Size
Required Mission Orbit
Listen with “Bigger Ears” - Increase Receiver Gain (Gr)
⇆
Talk Slower - Reduce the Data Rate
⇆
Technology, Time Available to Transmit All Data
⇆
Technology, Existing Ground Stations
⇆
Technology, Frequency Allocation
SHUT UP! - Reduce Environmental Noise
Use higher carrier frequencies
Size of Existing Ground Stations
Vulnerabilities:
RF Systems and
Data Systems
‣RF Systems
‣Data Handling
Systems
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
40
8/2/20
Understanding Space Through a Cyber-Security Lens
Review - Communications
‣ The communication subsystem is the “ears and mouth” of the spacecraft
• Sends payload and subsystem information to the ground station and receives commands in return
Vulnerabilities:
• Consists of modulators/demodulators (“MODEMs”), transmitters, receivers, and antennas
RF Systems and
‣ The communication subsystem works as part of an overall communication architecture
Data Systems
• The communication architecture is the configuration of satellites and ground station nodes in a space system and the
network that links them together
• Communication subsystems create all of the links between these nodes
‣ Radio Frequency (RF) Communication is the process of modulating an information signal onto a carrier signal and then
retrieving that information at the receiver
‣ The link budget accounts for the data rate and other factors that contribute to the basic ability for the spacecraft and
ground system to communicate effectively. Five key issues are important:
• Distance - Characterized as Space Losses
‣RF Systems
• Language - Characterized by Modulation method (e.g. AM or FM)
• Speed - Defined to be the Data Rate
‣Data Handling
• Environment - Which produces Noise
Systems
• Carrier Frequency - Regulated and controlled at the national and international level
‣ Link Budget analysis helps us determine if there is enough energy in each bit we send so that the receiver can
distinguish between a “1” and a “0” in the presence of background noise
‣ Key limitations in communication subsystem design include:
• Physical limits
• Technical limits
• Legal limits
‣ System design must manage a variety of trade-offs to best ensure the message gets through
Teaching Science & Technology Inc.
w
w
w
t
e
n
.
i
t
s
t
.
Introduction - Purpose
‣ The data handling subsystem (DHS) acts as the “brains” of
the spacecraft
‣ Its purpose is to manage, store and control all ground
commands, payload data and telemetry during every phase of
the mission
‣ The DHS “to-do” list reads like this:
telemetry for transmission to the ground in real and near-real time
w
w
• Receive and process all payload data
• Autonomously Boot up and Self-test
• Detect & correct errors (inherent or environmentally induced), and
go into a safe mode if necessary
.
i
t
ts
.
w
• Respond to ground commands
• Collect, process, store and format subsystem health & status
t
e
n
Data Handling. The data handling
portion of the CDHS is the “brains” of
the spacecraft with a long “to-do” list.
Vulnerabilities:
RF Systems and
Data Systems
‣RF Systems
‣Data Handling
Systems
• Control attitude, orbit, temperature, power and every other process
onboard the spacecraft
• Allow for on-orbit corrections, updates and upgrades to functionality
‣ And do all of this while operating in the harsh space
environment
Copyright ©2020 Teaching Science and Technology Inc.
Teaching Science & Technology Inc.
41
8/2/20
Understanding Space Through a Cyber-Security Lens
Data Architecture
‣ The DHS is one part of an integrated mission data architecture that involves both ground
and space data systems
t
e
n
‣ Recall, the whole purpose of virtually all space missions is to generate or transfer data.
We’re in the data business!
Vulnerabilities:
RF Systems and
Data Systems
.
i
t
s
t
.
‣ DHS interface to the ground data architecture is via the communication subsystem
• These two systems are so tightly coupled that they are sometimes lumped together as the
Communication and Data Handling Subsystem (CDHS) which together act as the spacecraft’s
“ears,” “brain,” and “mouth.”
w
w
w
Data Architecture. The Data
Handing Subsystem is the key
link in the complex “data chain”
that ultimately delivers payload
data to users, processes
onboard commands, and sends
health and status telemetry
(TLM) to operators. US Fig. 132.
‣RF Systems
‣Data Handling
Systems
Teaching Science & Technology Inc.
What’s in the DHS?
t
e
n
‣ The data handling subsystem (DHS) consists of:
• Central Processing Unit (CPU) - Where the “thinking” takes place
- Based on terrestrial computers, but constrained by the radiation
.
i
t
ts
environment
- Usually several generations behind ground computers in capability
• Memory - RAM, ROM and other solid state memory devices store
.
w
the operating system, application programs, health and status
telemetry data as well as payload data
- Data storage has become basically “free” as terabits can now be
readily stored onboard even small satellites.
w
w
• Input/Output - Data lines that interface to sensors and other
subsystems
- Typically based on some standard (e.g. MilStd-1553 or Space Wire)
• Other Components
- Transducers to sense temperature, pressure, etc.
- Field-programmable Gate Arrays (FPGAs)
- Application-specific Integrated Circuits (ASICs)
• Software - To execute all key functions
Copyright ©2020 Teaching Science and Technology Inc.
Data Handling. The data handling
subsystem components. US Fig. 13-13.
Vulnerabilities:
RF Systems and
Data Systems
‣RF Systems
‣Data Handling
Systems
Teaching Science & Technology Inc.
42
8/2/20
Understanding Space Through a Cyber-Security Lens
Spacecraft Software
Flying Software. Spacecraft
have become “flying software”
in the sense that every single
subsystem depends, at least
to some extent, on software
to perform its functions. US
Fig. 13-15.
w
w
w
t
e
n
.
i
t
s
t
.
Vulnerabilities:
RF Systems and
Data Systems
‣RF Systems
‣Data Handling
Systems
Teaching Science & Technology Inc.
Software Growth
t
e
n
‣ The amount of software in space and every-day systems has exploded over the last decade!
‣ Spacecraft software development essentially never ends throughout the mission life
• A 2x growth in software from launch to end of mission is common
.
i
t
ts
‣ Even your car probably has nearly 100 million lines of code!
‣ The more we depend on software for every conceivable spacecraft function, the more likely we’ll experience
software-related failures
‣ As space system software reaches millions of lines of code, it becomes practically impossible to fully test before
launch (or ever) - a sobering thought
Software Explosion. This graph shows the
exponential increase in software for NASA
planetary missions, from Mariner-6 in 1969
to the Mars Science Lab in 2013. Note the
scale is logarithmic. (Adapted from NASA
Study
Flight
Software
Complexity,
10/09/2008). US Fig. 13-16.
w
w
.
w
Copyright ©2020 Teaching Science and Technology Inc.
Vulnerabilities:
RF Systems and
Data Systems
‣RF Systems
‣Data Handling
Systems
Teaching Science & Technology Inc.
43
8/2/20
Understanding Space Through a Cyber-Security Lens
Software Failures
t
e
n
‣ What Happened?
• Upon arrival at Mars in September 1999, the Mars
Climate Orbiter (MCO) began a scheduled 16-minute Mars
orbit insertion (MOI) maneuver to achieve orbit
Vulnerabilities:
RF Systems and
Data Systems
.
i
t
s
t
.
• Approximately 49 seconds before the anticipated
occultation by Mars, communication was lost and never
reestablished
• The cumulative effect of these small impulses led to a 169
km navigation error, which was catastrophic to the mission
w
w
w
‣ Root Causes:
‣RF Systems
• Root cause of mission loss was an error in the “Sm_forces”
program output files, which were delivered to the navigation ‣Data Handling
team in English units (pounds-force seconds) instead of the
Systems
specified metric units (Newton-seconds).
• The "Sm_forces" software was misclassified as non-mission
critical, which reduced the rigor of the review program.
Death Dive. Did You Mean Pounds or Newtons?
Courtesy AGI.
• The Software Management and Development Plan (SMDP)
was not followed in the walkthroughs of the "Sm_forces"
software
Teaching Science & Technology Inc.
Design Issues
t
e
n
‣ Mission needs
• How smart does the satellite need to be? - Level of autonomy
‣ Spacecraft needs
• What needs to get done? - Number and type of data handling
tasks
• Where will it get done? - Overall complexity and distribution of
data handling tasks
- Implement Onboard vs. On the Ground
- Implement in Hardware vs. Software
- Implement in Software vs. Firmware
single event phenomena
.
w
w
w
• How tough? - Level of radiation tolerance needed to survive
‣ Developer Needs
• How to build it? - Language, development environment and
tools
• How to test it? - Integrated hardware-in-the-loop test beds
‣ Operational Needs - “-ilities,” e.g. flexibility, maintainability
Copyright ©2020 Teaching Science and Technology Inc.
.
i
t
ts
Vulnerabilities:
RF Systems and
Data Systems
‣RF Systems
‣Data Handling
Systems
DHS Design Issues. The design of the data
handling subsystem hinges on how we
address a number of mission, spacecraft,
developer and operator needs.
Teaching Science & Technology Inc.
44
8/2/20
Understanding Space Through a Cyber-Security Lens
Review - Data Handling
‣ The data handling subsystem (DHS) acts as the “brains” of the spacecraft. Its purpose is to manage, store and
control all ground commands, payload data and telemetry during every phase of the mission. It needs to:
t
e
n
•
Respond to ground commands
Collect, process, store and format subsystem telemetry and payload data
•
Autonomously Boot up and Self-test, Detect & Correct Errors and go into a Safe Mode if necessary
•
Control attitude, orbit, temperature, power and every other process onboard the spacecraft
Allow for on-orbit corrections, updates and upgrades to functionality
•
•
.
i
t
s
t
.
Vulnerabilities:
RF Systems and
Data Systems
‣ The DHS is one part of an integrated mission data architecture that involves both ground and space data systems
‣ The DHS consists of:
• Central Processing Unit (CPU) - Where the “thinking” takes place
w
w
w
•
Memory - RAM, ROM and other solid state memory devices store the operating system, application programs,
health and status telemetry data as well as payload data
•
Data storage has become basically “free” as terabits can now be readily stored onboard even small satellites
•
•
Input/Output - Data lines that interface to sensors and other subsystems
Other Components such as transducers, FPGAs and ASICs
•
Software - To execute all key functions
‣RF Systems
‣Data Handling
Systems
‣ Software drives all data handling functions - Spacecraft have become “flying software”
• The amount and complexity of software in space systems (and terrestrial systems for that matter) is exploding
•
The more we depend on software, the more likely software will contribute to failures
Teaching Science & Technology Inc.
Key Take-Aways—Through a CyberSpace Lens
‣ RF security still a niche sub-field of cyber-security
.
w
‣ Hardware/software vendors, developments
environments, legacy languages create additional
vulnerabilities
w
w
t
e
n
.
i
t
ts
‣ Access to RF equipment (Rx, Tx) is relatively easy, but
everyone’s links are encrypted
Vulnerabilities:
RF Systems and
Data Systems
‣RF Systems
‣Data Handling
Systems
‣ The more space relies on software, the more
stakeholders are involved, the more people there are
working on the project, the higher the vulnerability
Teaching Science & Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
45
8/2/20
Understanding Space Through a Cyber-Security Lens
Cyber Challenge Scenario
‣ Background:
•
YLee Imaging has been operating a high resolution commercial remote sensing satellite for about 2 years.
The U.S. Government is one of their largest customers.
•
The satellite is in a 710 km Sun-syncronous orbit with a 10:33 am southbound nodal crossing time
•
YLee operates their own ground station in Colorado but leases access to ground stations in Norway and
Alaska.
•
The satellite was built by Acme Aerospace in Iowa. Two more satellites are currently in final development for
launch next year.
‣ Issue
•
t
e
n
.
i
t
s
t
.
During the last two passes (1 over Norway, 1 over Colorado) YLee operators noticed bad headers on
roughly 10% of the spacecraft health and status telemetry data packets (no problems noted with payload
data downloads). This is about 1000 worse than would normally be expected based on the link budget.
w
w
w
‣ Challenge Questions
1.How would you determine if this issue was due to natural or man-made causes?
2.What would be potential reasons for natural causes?
3.Assuming the issue is due to malicious causes, what opportunities would a bad actor have?
4.Assuming the issue is due to malicious causes, what vulnerabilities could have been exploited?
5.Given there are two more satellites in development, what design or operational changes could be considered
to prevent future issues of this type?
Course Trajectory Review
Teaching Science & Technology Inc.
✦ Course
✦ Context
‣
.
i
t
ts
The Space Mission
Architecture
Understanding Space
✦ Opportunities
‣
Understanding Orbits
‣
Space Mission Operations
✦ Threats
‣
The Space Environment
‣
The Human Environment
✦ Vulnerabilities
‣
RF Systems
‣
Space Data Architectures
t
e
n
Threats—Natural & Human
Introduction
.
w
w
w
Through a Cyber Lens
Vulnerabilities—RF Systems &
Data Architectures
Opportunities—Orbits &
Operations
Course Introduction
Copyright ©2020 Teaching Science and Technology Inc.
Context
Copyright ©2020 Teaching Science and Technology Inc.
46
8/2/20
Understanding Space Through a Cyber-Security Lens
Course Objectives Review
✦At
the end of this course you should be able to…
t
e
n
‣ Gain Core Space Knowledge
• Describe the Space Mission Architecture, the context for all
space activities
.
i
t
s
t
.
‣ Comprehend space mission Capabilities, Trade-offs and
Limitations specific to the cyber-security domain
• Explain how orbital mechanics and operational architectures
w
w
w
constrain access to space systems
‣ Discuss natural and human-made threats to space systems
Apply Space Concepts
Understand Threats
Comprehend Capabilities
and Limitations
Gain Core Space Knowledge
Learning Trajectory. Throughout the course we’ll
build your core space knowledge so you tackle
ever more challenging space problems in the
cyber-security domain.
• Describe potential vulnerabilities to space systems through
communications links and data architectures
‣ Apply Cyber/Space Concepts to real-world scenarios
Course Introduction
Copyright ©2020 Teaching Science and Technology Inc.
.
i
t
ts
.
w
Thank you for your time and attention!
w
w
t
e
n
Please visit us at: www.tsti.net
Course Introduction
Copyright ©2020 Teaching Science and Technology Inc.
Copyright ©2020 Teaching Science and Technology Inc.
47
8/2/20
Understanding Space Through a Cyber-Security Lens
Notes
w
w
w
t
e
n
.
i
t
s
t
.
Course Introduction
Copyright ©2020 Teaching Science and Technology Inc.
Notes
.
i
t
ts
.
w
w
w
Course Introduction
Copyright ©2020 Teaching Science and Technology Inc.
t
e
n
Copyright ©2020 Teaching Science and Technology Inc.
48
Download