Welcome!

Mobile IoT Authors: Shelly Palmer, Yeshim Deniz, Liz McMillan, Ed Featherston, Carmen Gonzalez

Related Topics: Mobile IoT

Mobile IoT: Article

Space Shuttle Wireless Part 3

Space Shuttle Wireless Part 3

In this concluding part of a three-part series on the space shuttle, WBT's David Geer looks at spread spectrum technology and its role in keeping encrypted data secure.

The communications link to the orbiter is a spread spectrum link, a technology that was invented by Hedy Lamar (believe it or not!) during WWII for secure radio transmissions. Spread spectrum makes signal jamming and eavesdropping much more challenging, an important issue for a radio signal coming from orbit, which could be intercepted from anywhere within its footprint. Eavesdropping can also be used to interfere with satellite transmissions via availability attacks, wherein interference from the other channel makes the signal unavailable.

The spread spectrum link uses a modulation scheme in which there are only 72KB of actual data sent. The data is convolutionally encoded (a complex form of modulation, which provides for error correction). This high data rate is like "taking an 11MHz signal and modulating that on top of the 72KB of coded data," says Phil Liebrecht, associate director and program manager for Mission Services, NASA Goddard Space Flight Center.

The process modulates 72KB of data with a much higher pseudo-noise code, which gives the orbiter link protection against interference from other RF signals. It also provides protection for those other signals to keep the orbiter signal from causing interference to the other S-band systems that are in use on earth. This interference could come from signals such as microwave links.

Encryption
Encrypted data can be delivered over almost any radio band, in space or otherwise. It's not the S and Ku bands that are secured, but rather the data that passes over them. NIST (the National Institute of Standards and Technology, Boulder, Colorado) assembles the FIPS (Federal Information Processing Standards), which are followed for all non-classified government communications.

The DES (Data Encryption Standard) is an older and popularly accepted, encryption standard, which met FIPS requirements. It used a 56-bit key. Then came the Triple DES with a 112-bit key, offering enhanced security. A new standard adopted just a few years ago is the AES (Advanced Encryption Standard), based on the Rijndael algorithm. This standard is the latest direction for cryptography in commercial applications. For everything classified (secret, top secret) the NSA (National Security Agency) at Fort Mead, Maryland is responsible for the security algorithms.

One aspect of DES and AES is what is called symmetric encryption. "You apply the encryption algorithm to your data and then you apply it again to decrypt the data. The symmetric algorithms are very fast. People have demonstrated Rijndael chips that work on gigabit Ethernet connections," says Mark A. Sturza, senior advisor to Wavestream Corporation, 3CsysCo.com. (Wavestream manufactures amplifiers for the Ku and Ka bands, which will replace the current tube amplifiers used by NASA. These amplifiers are used on the ground and in space for transmissions to the shuttle.)

To do symmetric encryption you need to have a single key, which is used at both ends of the communication. Key exchange is done utilizing public key cryptography, making use of the well-known RSA algorithm created by Ron Rivest, Adi Shamir, and Leonard Adelman. There are other methods of key exchange than RSA, but RSA has shown its strength over many years and is known to offer high security.

How Is Shuttle Mission Data Encrypted?
I had assumed that the data sent over NASA's S and Ku band systems during shuttle missions would be protected by one of the secret encryption methods from the NSA. "Actually I sort of doubt that," says Sturza. "It's probably DES or triple DES just because the AES is too new." Cryptography could be "NSA like" for the satellite command-and-control data, which is done with an NSA-approved cryptographic device. "It would be disastrous if high school students could start controlling satellites, especially military satellites," says Sturza.

For something as important as the space shuttle program, the algorithms and/or keys for encryption are probably changed regularly. "I would strongly suspect that they change it on a mission-by-mission basis," says Sturza. It's possible that this is done through hard coding using cryptoloaders such as the NSA uses. These devices are loaded with the keys at a secure location and then taken to the shuttle and plugged in so that the keys can be loaded into the embedded equipment.

Hardware
At the heart of shuttle mission communications is the NSP (Network Signal Processor), which is onboard the shuttle. This device routes and processes all commands, telemetry, and voice between the ground and the orbiter. Any command and voice data that are uplinked to the orbiter, specifically to its S-band PM uplink, or to the Ku-band forward link, are received by the NSP. Not all data is encrypted; data that is encrypted is recognized as such by the NSP and routed to the ComSec (Communications Security) device on the shuttle, where it is decrypted and routed back to the NSP. Data that is to be encrypted before leaving the shuttle is routed to the ComSec and returned to the NSP before being downlinked to the ground.

Differences in Voice and Data Handling
Voice and data are not treated the same throughout the process. When returning voice communications to the ground they are demultiplexed from the command data and converted to analog signals before being routed to the ACCU (Audio Central Control Unit). The command data on the other hand is routed to the GPCs (General Purpose Computers) within the data processing system via the flight forward MDM (multiplexer/demultiplexer).

The NSP digitizes analog voice received from the ACCU. The signal is multiplexed again with the telemetry data from the PCMMU (the pulse code modulation master unit); this multiplexed data is then ready for real-time transmission to the ground. The data is also routed to the operational recorders for archiving. Data is always encrypted at the ComSec before going to the NSP and back to the ground.

Conclusion
Clearly, communicating with the space shuttle is a much more complex proposal than just choosing a radio and talking, but as this series of articles has shown, the more we look into the details of just how the astronauts phone home the more complex it gets, and this is typical of space flight in general. Applications that are trivial in most environments require truly innovative and detailed solutions when exposed to the most hostile of environments. The astronauts' complete reliance on the technology that surrounds them means that every component is mission-critical and every detail needs to be specified and tested beyond what would seem to be common sense requirements.

While this series was in production, the shuttle Columbia was destroyed while re-entering the atmosphere, a tragic reminder of just how complex space technology is, and how easily it can fail. But as I look out my window into the night sky, I'm reminded that somewhere among the stars, one of those grand lights is an International Space Station, a wireless one. It's no longer current to say that we live in a Wireless World. With GPS for Mars coming so quickly, and a space-based Internet already in design, it's time to start talking about our Wireless Solar System.

More Stories By David Geer

David Geer is a contributing writer to WBT, a journalist, and a computer technician. He graduated from Lake Erie College in 1993 with a BA in psychology and has worked in the computer industry and in the media since 1998.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
SYS-CON Events announced today that IBM has been named “Diamond Sponsor” of SYS-CON's 21st Cloud Expo, which will take place on October 31 through November 2nd 2017 at the Santa Clara Convention Center in Santa Clara, California.
We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA
SYS-CON Events announced today that SourceForge has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. SourceForge is the largest, most trusted destination for Open Source Software development, collaboration, discovery and download on the web serving over 32 million viewers, 150 million downloads and over 460,000 active development projects each and every month.
SYS-CON Events announced today that CHEETAH Training & Innovation will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct. 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CHEETAH Training & Innovation is a cloud consulting and IT training firm specializing in improving clients cloud strategies and infrastructures for medium to large companies.
SYS-CON Events announced today that TMC has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo and Big Data at Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Global buyers rely on TMC’s content-driven marketplaces to make purchase decisions and navigate markets. Learn how we can help you reach your marketing goals.
SYS-CON Events announced today that Conference Guru has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. A valuable conference experience generates new contacts, sales leads, potential strategic partners and potential investors; helps gather competitive intelligence and even provides inspiration for new products and services. Conference Guru works with conference organi...
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend 21st Cloud Expo October 31 - November 2, 2017, at the Santa Clara Convention Center, CA, and June 12-14, 2018, at the Javits Center in New York City, NY, and learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists examined how DevOps helps to meet the de...
When growing capacity and power in the data center, the architectural trade-offs between server scale-up vs. scale-out continue to be debated. Both approaches are valid: scale-out adds multiple, smaller servers running in a distributed computing model, while scale-up adds fewer, more powerful servers that are capable of running larger workloads. It’s worth noting that there are additional, unique advantages that scale-up architectures offer. One big advantage is large memory and compute capacity...
"When we talk about cloud without compromise what we're talking about is that when people think about 'I need the flexibility of the cloud' - it's the ability to create applications and run them in a cloud environment that's far more flexible,” explained Matthew Finnie, CTO of Interoute, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
SYS-CON Events announced today that Datanami has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Datanami is a communication channel dedicated to providing insight, analysis and up-to-the-minute information about emerging trends and solutions in Big Data. The publication sheds light on all cutting-edge technologies including networking, storage and applications, and thei...
SYS-CON Events announced today that Silicon India has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Published in Silicon Valley, Silicon India magazine is the premiere platform for CIOs to discuss their innovative enterprise solutions and allows IT vendors to learn about new solutions that can help grow their business.
The Internet giants are fully embracing AI. All the services they offer to their customers are aimed at drawing a map of the world with the data they get. The AIs from these companies are used to build disruptive approaches that cannot be used by established enterprises, which are threatened by these disruptions. However, most leaders underestimate the effect this will have on their businesses. In his session at 21st Cloud Expo, Rene Buest, Director Market Research & Technology Evangelism at Ara...
In his session at @ThingsExpo, Eric Lachapelle, CEO of the Professional Evaluation and Certification Board (PECB), provided an overview of various initiatives to certify the security of connected devices and future trends in ensuring public trust of IoT. Eric Lachapelle is the Chief Executive Officer of the Professional Evaluation and Certification Board (PECB), an international certification body. His role is to help companies and individuals to achieve professional, accredited and worldwide re...
SYS-CON Events announced today that TechTarget has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. TechTarget storage websites are the best online information resource for news, tips and expert advice for the storage, backup and disaster recovery markets.
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...