Cyber Attacks on Space Information Networks: Vulnerabilities, Threats, and Countermeasures for Satellite Security
Abstract
1. Introduction
Objectives and Contributions
- Identify and categorize the major vulnerabilities that render SINs susceptible to cyber attacks, including technical, organizational, and architectural weaknesses.
- Present a taxonomy of threat types within the SIN domain.
- Review and critically assess current countermeasures, including artificial intelligence (AI), federated learning, deep learning techniques, random-routing techniques, and quantum computing.
- Highlight key research challenges and propose future directions for securing SINs against advanced persistent threats.
2. Review Methodology and Literature Selection
2.1. Search Strategy
2.2. Inclusion and Exclusion Criteria
- Inclusion: Peer-reviewed articles, published conference proceedings, and preprints (from 2006 to 2025) that directly address cyber threats, vulnerabilities, defense mechanisms, or resilience strategies for space or satellite-based systems.
- Exclusion: Articles focused solely on non-space terrestrial cybersecurity, non-peer-reviewed blog posts or news, and publications without technical contributions.
2.3. Screening Process
2.4. Categorization Framework
- Vulnerabilities: Systemic weaknesses and risks inherent in space systems and their interconnections.
- Threats: Existing and emerging cyber attack types targeting satellite systems.
- Countermeasures: Detection, prevention, and response strategies, including AI/ML, encryption, and quantum computing.
3. Background on Space Information Networks (SINs)
3.1. Definition and Architecture
- Space segment: Includes satellites in various orbits (LEO, MEO, GEO) equipped with communication payloads, sensors, and ISL capabilities.
- Ground segment: Consists of mission control centers, data processing stations, and antenna arrays responsible for uplink/downlink operations, tasking, and telemetry tracking.
- User segment: Encompasses terminals and receiving stations utilized by end-users in domains such as defense, navigation, environmental monitoring, and telecommunications.
3.2. Key Enabling Technologies
- Software-defined networking (SDN): Enables centralized control of data flow and dynamic reconfiguration of communication paths based on network conditions.
- Edge computing: Allows satellites to preprocess data onboard, reducing latency and bandwidth usage for ground transmission.
- Commercial Off-the-Shelf (COTS) components: Widely adopted to reduce cost and development time, though often at the expense of introducing vulnerabilities.
- Internet of Space Things (IoST): Refers to a globally distributed network of interconnected space-based assets that share sensing, communication, and control data [4].
3.3. Unique Cybersecurity Challenges in SINs
- Physical inaccessibility: Once in orbit, satellites cannot be physically patched or reconfigured, limiting the ability to respond to emerging threats.
- Latency and bandwidth constraints: These hinder the deployment of traditional intrusion detection and monitoring systems.
- Long lifecycle and legacy systems: Many satellite components are used for decades, often running outdated software stacks with unpatched vulnerabilities.
- Highly distributed and interdependent systems: Attackers can compromise one node and propagate threats across space and ground infrastructure.
- Lack of standardization: Varying design and security practices across space agencies and commercial operators create gaps in defense [5].
4. Significant Vulnerabilities in Space Information Networks Susceptible to Cyber Attacks
4.1. Complexity of Space Systems and Interconnectedness
4.2. Increased Attack Surface Due to New Technologies
4.3. Lack of Standardized Security Measures
4.4. Evolving Threat Landscape
4.5. Physical and Cyber Interdependencies
4.6. Insider Threats and Supply Chain Risks
4.7. Limited Cyber Resilience Engineering Standards
4.8. Quantum Technology Threats
4.9. Tension Between Principles-Based and Compliance-Based Standards
4.10. Budget Constraints and Lack of Investment
4.11. Challenges in Testing and Validation
5. Threats in Space Information Networks
5.1. Case Examples of Cyber Threats
5.1.1. Active Security Attacks
Denial-of-Service (DoS) Attacks
Message Modification
5.1.2. Passive Security Attacks
Eavesdropping
Satellite Transponder Stealing
6. Effective Countermeasures for Preventing and Responding to Cyber Attacks on Satellite-Based Information Networks
6.1. Artificial Intelligence and Machine Learning for Threat Detection
6.1.1. Distributed Network Intrusion Detection System in Satellite–Terrestrial Integrated Networks Using Federated Learning
STIN Architecture Construction
Federated Learning Adapted Algorithm
- Synchronization of processing time across heterogeneous nodes.
- Efficient and accurate traffic identification in both satellite and terrestrial domains.
Topology Optimization
Evaluation and Performance Metrics
Critical Observations and Reflections
6.1.2. Deep Learning Approach for Interruption Attacks Detection in LEO Satellite Networks
Critical Observations and Reflections
6.2. Network Segmentation and Traffic Filtering
6.2.1. Random Routing Algorithm for Enhancing the Cybersecurity of LEO Satellite Networks
Critical Observations and Reflections
6.3. Encryption and Authentication Mechanisms
6.3.1. QCrypt: Advanced Quantum-Based Image Encryption for Secure Satellite Data Transmission
Insights
Critical Observations and Reflections on QCrypt
6.4. Key Cybersecurity Mechanisms for Satellite Networks
7. Discussion and Future Direction
8. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Thangavel, K.; Plotnek, J.J.; Gardi, A.; Sabbatini, R. Understanding and Investigating Adversary Threats and Countermeasures in the Context of Space Cybersecurity. In Proceedings of the 2022 IEEE/AIAA 41st Digital Avionics Systems Conference (DASC), Portsmouth, VA, USA, 18–22 September 2022; pp. 1–10. [Google Scholar] [CrossRef]
- Borgia, S.; Topputo, F.; Zanero, S. HACK: A Holistic Modeling Approach for CubeSat Cyberattacks. Mater. Res. Proc. 2023, 33, 281–287. [Google Scholar] [CrossRef]
- Yue, G.; Zhang, J.; Zhao, M.; Li, S.; Han, C.; Lin, X. LEO Satellite Constellation for 5G and Beyond: How to Address the Challenges? Comput. Netw. 2022, 214, 109144. [Google Scholar] [CrossRef]
- Calabrese, M.; Kavallieratos, G.; Falco, G. A Hosted Payload Cyber Attack Against Satellites. In Proceedings of the AIAA SciTech 2024 Forum, Orlando, FL, USA, 8–12 January 2024; p. 0270. [Google Scholar] [CrossRef]
- Shahzad, S.S.; Joiner, K.; Qiao, L.; Deane, F.; Plested, J. Cyber Resilience Limitations in Space Systems Design Process: Insights from Space Designers. Systems 2024, 12, 434. [Google Scholar] [CrossRef]
- Willbold, J.; Sciberras, F.; Strohmeier, M.; Lenders, V. Satellite Cybersecurity Reconnaissance: Strategies and Their Real-World Evaluation. In Proceedings of the 2024 IEEE Aerospace Conference, Big Sky, MT, USA, 2–9 March 2024; pp. 1–13. [Google Scholar] [CrossRef]
- Salim, S.; Moustafa, N.; Hassanian, M.; Ormod, D.; Slay, J. Deep-Federated-Learning-Based Threat Detection Model for Extreme Satellite Communications. IEEE Internet Things J. 2024, 11, 3853–3867. [Google Scholar] [CrossRef]
- Kang, M.; Park, S.; Lee, Y. A Survey on Satellite Communication System Security. Sensors 2024, 24, 2897. [Google Scholar] [CrossRef]
- Li, K.; Zhou, H.; Tu, Z.; Wang, W.; Zhang, H. Distributed Network Intrusion Detection System in Satellite-Terrestrial Integrated Networks Using Federated Learning. IEEE Access 2020, 8, 214852–214865. [Google Scholar] [CrossRef]
- Akande, A.J.; Foo, E.; Hou, Z.; Li, Q. Cybersecurity for Satellite Smart Critical Infrastructure; Springer: Berlin/Heidelberg, Germany, 2023; pp. 1–22. [Google Scholar] [CrossRef]
- Jero, S.; Furgala, J.; Heller, M.; Nahill, B.; Mergendahl, S.; Skowyra, R. Securing the Satellite Software Stack. In Proceedings of the Workshop on Security of Space and Satellite Systems (SpaceSec) 2024, San Diego, CA, USA, 1 March 2024; pp. 1–9. [Google Scholar] [CrossRef]
- Zhuo, M.; Liu, L.; Zhou, S.; Tian, Z. Survey on security issues of routing and anomaly detection for space information networks. Sci. Rep. 2021, 11, 22261. [Google Scholar] [CrossRef]
- Yue, P.; An, J.; Zhang, J.; Ye, J.; Pan, G.; Wang, S.; Xiao, P.; Hanzo, L. Low Earth Orbit satellite security and reliability: Issues, solutions, and the road ahead. IEEE Commun. Surv. Tutor. 2023, 25, 1604–1652. [Google Scholar] [CrossRef]
- Fratty, R.; Saar, Y.; Kumar, R.; Arnon, S. Random Routing Algorithm for Enhancing the Cybersecurity of LEO Satellite Networks. Electronics 2023, 12, 518. [Google Scholar] [CrossRef]
- Singh, S.; Verma, S.; Pali, P.; Tiwari, H.; Kanojiya, S. Application of Artificial Intelligence (AI) to Enhance Satellite Security. Int. J. Innov. Res. Comput. Commun. Eng. 2023, 12, 3237–3240. [Google Scholar] [CrossRef]
- Moustafa, N.; Khan, I.A.; Hassanin, M.; Ormrod, D.; Pi, D.; Razzak, I.; Slay, J. DFSat: Deep Federated Learning for Identifying Cyber Threats in IoT-based Satellite Networks. IEEE Trans. Ind. Inform. 2022. [Google Scholar] [CrossRef]
- Wang, Y.; Wu, Y.; Yang, Q.; Zhang, J. Anomaly Detection of Spacecraft Telemetry Data Using Temporal Convolution Networks. In Proceedings of the IEEE International Instrumentation and Measurement Technology Conference (I2MTC), Glasgow, UK, 17–20 May 2021. [Google Scholar] [CrossRef]
- Almohri, H.M.J.; Nguyen, N.; Rana, M.M.; Matrawy, A.; Debbabi, M. CANSat-IDS: A Distributed Intrusion Detection System for Controller Area Networks in Satellites. Comput. Secur. 2024, 138, 103617. [Google Scholar]
- Cuéllar, S.; Santos, M.; Alonso, F.; Fabregas, E.; Farias, G. Explainable anomaly detection in spacecraft telemetry. Eng. Appl. Artif. Intell. 2024, 133, 108083. [Google Scholar] [CrossRef]
- Babic, K.; Balic, M.; Begusic, D. GNSS Spoofing Detection Based on Wavelets and Machine Learning. Electronics 2025, 14, 2391. [Google Scholar] [CrossRef]
- Shahzad, S.S.; Joiner, K.; Qiao, L.; Deane, F.; Plested, J. Machine Learning Methods for Spacecraft Telemetry Mining. IEEE Access 2019, 7, 1–10. [Google Scholar]
- Azar, A.T.; Shehab, E.; Mattar, A.M.; Hameed, I.A.; Elsaid, S.A. Deep Learning-Based Hybrid Intrusion Detection Systems to Protect Satellite Networks. J. Netw. Syst. Manag. 2023, 31, 82. [Google Scholar] [CrossRef]
- Toubi, A.; Hajami, A. Vulnerability Assessment and Mitigation Strategies for Satellite Communication Systems Under DDoS Attacks. In Proceedings of the International Conference on Global Aeronautical Engineering and Satellite Technology 2024 (GAST’24), Marrakesh, Morocco, 24–26 April 2024; pp. 1–8. [Google Scholar] [CrossRef]
- Meng, F.; Yan, X.; Zhang, Y.; Yang, J.; Cao, A.; Liu, R.; Zhao, Y. Mitigating DDoS Attacks in LEO Satellite Networks Through Bottleneck Minimize Routing. Electronics 2025, 14, 2376. [Google Scholar] [CrossRef]
- Park, J.; Eom, T.; Kim, H.; Park, H.; Yoon, Z.; Park, J. Threat Vector–Hierarchical Attack Representation Model-Based Threat Modeling and Security Assessment for Satellite Networks. Appl. Sci. 2025, 15, 2751. [Google Scholar] [CrossRef]
- Panigrahi, L.; Pattanayak, B.K.; Mohanty, B.; Pattnaik, S.; Habboush, A.K. A Smart Secure Model for Detection of DDoS Malicious Traces in Integrated LEO Satellite–Terrestrial Communications. Int. J. Electr. Electron. Res. 2024, 12, 503–511. [Google Scholar] [CrossRef]
- Deng, Y.; Wu, Q.; Lai, Z.; Gu, C.; Li, H.; Li, Y.; Liu, J. Time-varying Bottleneck Links in LEO Satellite Networks: Identification, Exploits, and Countermeasures. In Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 24–28 February 2025. [Google Scholar] [CrossRef]
- Li, H.; Shi, D.; Wang, W.; Liao, D.; Gadekallu, T.R.; Yu, K. Secure Routing for LEO Satellite Network Survivability. Comput. Netw. 2022, 211, 109011. [Google Scholar] [CrossRef]
- Tedeschi, P.; Sciancalepore, S.; Di Pietro, R. Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research Challenges. Comput. Netw. 2022, 216, 109246. [Google Scholar] [CrossRef]
- Abdrabou, M.; Gebali, F.; Shawky, M.A.; Alluhaidan, A.S.; Mansour, A.; El-Rahman, S.A.; Al-Ahwal, A.; Shamseldin, T. Advanced Security Framework for Low Earth Orbit Satellites in Space Information Network. EURASIP J. Wirel. Commun. Netw. 2024, 2024, 87. [Google Scholar] [CrossRef]
- Surdi, S.A. Space Situational Awareness through Blockchain Technology. J. Space Saf. Eng. 2020, 7, 295–301. [Google Scholar] [CrossRef]
- Wang, B.; Chang, Z.; Li, S.; Hämäläinen, T. An Efficient and Privacy-Preserving Blockchain-Based Authentication Scheme for Low Earth Orbit Satellite-Assisted Internet of Things. IEEE Trans. Aerosp. Electron. Syst. 2022, 58, 5153–5164. [Google Scholar] [CrossRef]
- Li, C.; Sun, X.; Zhang, Z. Effective Methods and Performance Analysis of a Satellite Network Security Mechanism Based on Blockchain Technology. IEEE Access 2021, 9, 113558–113565. [Google Scholar] [CrossRef]
- Farrea, K.A.; Baig, Z.; Doss, R.; Liu, D. Zero Trust-Based Authentication for Inter-Satellite Links in NextGen Low Earth Orbit Networks. Ad Hoc Netw. 2025, 174, 103817. [Google Scholar] [CrossRef]
- Yang, B.; Liu, S.; Xu, T.; Li, C.; Zhu, Y.; Li, Z.; Zhao, Z. AI-Oriented Two-Phase Multifactor Authentication in SAGINs: Prospects and Challenges. IEEE Consum. Electron. Mag. 2024, 13, 79–90. [Google Scholar] [CrossRef]
- Collins, R.J.; Amiri, R.; Fujiwara, M.; Honjo, T.; Shimizu, K.; Tamaki, K.; Takeoka, M.; Sasaki, M.; Andersson, E.; Buller, G.S. Experimental Demonstration of Quantum Digital Signatures over 43 dB Channel Loss Using Differential Phase Shift Quantum Key Distribution. Sci. Rep. 2017, 7, 3235. [Google Scholar] [CrossRef]
- Roger, T.; Singh, R.; Perumangatt, C.; Marangon, D.G.; Sanzaro, M.; Smith, P.R.; Woodward, R.I.; Shields, A.J. Real-Time Gigahertz Free-Space Quantum Key Distribution within an Emulated Satellite Overpass. Sci. Adv. 2023, 9, eadj5873. [Google Scholar] [CrossRef]
- Sidhu, J.S.; Brougham, T.; McArthur, D.; Pousa, R.G.; Oi, D.K.L. Finite Key Effects in Satellite Quantum Key Distribution. NPJ Quantum Inf. 2022, 8, 18. [Google Scholar] [CrossRef]
- Dharminder, D.; Dadsena, P.K.; Gupta, P.; Sankaran, S. A Post-Quantum Secure Construction of an Authentication Protocol for Satellite Communication. Int. J. Satell. Commun. Netw. 2023, 41, 14–28. [Google Scholar] [CrossRef]
- Islam, T.; Sidhu, J.S.; Higgins, B.L.; Brougham, T.; Vergoossen, T.; Oi, D.K.L.; Jennewein, T.; Ling, A. Finite-Resource Performance of Small-Satellite-Based Quantum-Key-Distribution Missions. PRX Quantum 2024, 5, 030101. [Google Scholar] [CrossRef]
- Chen, Y.-A.; Zhang, Q.; Chen, T.-Y.; Cai, W.-Q.; Liao, S.-K.; Zhang, J.; Chen, K.; Yin, J.; Ren, J.-G.; Chen, Z.; et al. An Integrated Space-to-Ground Quantum Communication Network over 4600 Kilometres. Nature 2021, 589, 214–219. [Google Scholar] [CrossRef]
- Mohamed Ihsan, P.M.; Arun, A.R.; Vetriselvi, V.; Gautham Kumar, G.; Praveen Kumar, R. QCrypt: Advanced Quantum-based Image Encryption for Secure Satellite Data Transmission. In Proceedings of the 2024 Third International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT), Trichirappalli, India, 24–26 July 2024; pp. 1–9. [Google Scholar] [CrossRef]
- Khare, S.; Singh, N. Securing Satellite Communication: Exploring Cybersecurity Measures in Satellite Networks. In Proceedings of the 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0, Raigarh, India, 5–7 June 2024; pp. 1–5. [Google Scholar] [CrossRef]
- Hsu, J.; Falco, G. Space Booby Traps: Hacking Back and Assured Cyber Deterrence in Space. In Proceedings of the 2023 IEEE International Conference on Assured Autonomy (ICAA), Laurel, MD, USA, 6–8 June 2023; pp. 115–118. [Google Scholar] [CrossRef]
- Buenneke, R.H.; Abramson, R.L.; Shearer, T.D.; McArthur, P.B. Best Practices for Protection of Commercial Satellite Communications Infrastructure. In Proceedings of the AIAA, Keystone, CO, USA, 21–24 August 2006. [Google Scholar] [CrossRef]
- Wan, M.; Fang, J.; Guo, C.; Geng, L.; Liu, Y.; Ma, W.; Xu, C.; Su, M. A Federated Learning-Based Intrusion Detection System for Satellite-Terrestrial Integrated Networks. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Hyderabad, India, 6–11 April 2025; Volume 31. [Google Scholar] [CrossRef]
- Saha, S.S.; Rahman, S.; Ahmed, M.U.; Aditya, S.K. Ensuring Cybersecure Telemetry and Telecommand in Small Satellites: Recent Trends and Empirical Propositions. IEEE Aerosp. Electron. Syst. Mag. 2019, 34, 34–49. [Google Scholar] [CrossRef]
- Tariq, A.; Bibi, S.; Abbas, N. Protecting Satellite Communications and Smart Cities from AI-Powered Cyber Threats Using Deepfake Detection and Quantum Computing. IEEE Access 2025, 13, 11234–11256. [Google Scholar] [CrossRef]
Vulnerability | Description | Citation(s) |
---|---|---|
Complexity of space systems | Interconnectedness and tight integration of components create a large attack surface. | [1] |
Increased attack surface | Use of COTS components and small satellites expands the attack surface. | [4] |
Lack of standardized security measures | Prioritization of safety over security leaves gaps for exploitation. | [5,11] |
Evolving threat landscape | New attack methods and affordable communication equipment increase risks. | [6,7] |
Insider threats and supply chain risks | Global supply chains and COTS components introduce vulnerabilities. | [5,11] |
Limited cyber resilience standards | Unique challenges of space systems are not adequately addressed. | [5] |
Quantum technology threats | Future threats to satellite communication networks require quantum-resistant solutions. | [8] |
Tension between standards | Flexibility vs. compliance in standards complicates security implementation. | [5] |
Budget constraints | High costs of space systems leave little room for cybersecurity investment. | [5] |
Challenges in testing and validation | Complexity of space systems makes comprehensive testing difficult. | [5] |
Countermeasure | Mechanism | Citation(s) |
---|---|---|
Encryption and authentication | Protects data from interception and ensures authorized access. | [30,43] |
AI and machine learning | Detects anomalies and predicts system failures in real time. | [9,15,16] |
Federated learning-based IDS (AI/ML; privacy-preserving) | BiLSTM detectors train on-board/ground and aggregate via FedAvg to detect Sat–IoT threats without sharing raw telemetry. | [16] |
Temporal CNN-based telemetry monitoring (AI/ML; real-time) | TCN forecasts next readings and flags anomalies from residuals, enabling fast on-orbit health monitoring. | [17] |
Edge–ground distributed IDS for CAN bus (architecture + ML) | Lightweight on-board timing analysis pairs with ground-side payload inspection; models updated as firmware. | [18] |
Explainable anomaly detection (XAI) | Compact magnitude/frequency/waveform features + lightweight classifier, with LIME explanations for each alert. | [19] |
Network segmentation and filtering | Limits the spread of malicious activities and blocks suspicious traffic. | [9,23] |
Blockchain technology | Ensures secure communication, authentication, and data integrity. | [32,33] |
Active defense | Neutralizes attackers without harming legitimate users. | [44] |
Quantum communication | Future-proofs networks against quantum attacks. | [8,37,38,39,40,41,42] |
Cross-Layer Security Frameworks | Integrates multiple layers of defense against various types of attacks. | [30] |
Best practices for SATCOM | Includes information sharing, risk management, and responses to threats. | [45] |
Runtime verification | Monitors and simulates systems in real time to identify vulnerabilities. | [46] |
Vulnerability assessment | Identifies and mitigates potential security risks through simulations. | [23] |
Insider threat mitigation | Preserves data privacy during learning processes. | [9,10] |
Redundant ground stations | Ensures service availability even if some stations are compromised. | [47] |
Space cybersecurity policies | Addresses challenges posed by COTS hardware and software. | [1] |
GNSS spoofing detection using wavelets and ML | Combines discrete wavelet transform with ML classifiers for accurate spoofing detection in GNSS signals. | [20] |
Zero Trust-based authentication for ISLs | Applies continuous verification and lightweight HECC encryption to secure inter-satellite links against spoofing and replay attacks. | [34] |
AI-oriented Two-Phase Multifactor Authentication in SAGINs | Cryptographic one-shot authentication with AI-based continuous verification using spatial–temporal features. | [35] |
Finite-resource QKD for small satellites | Evaluates finite-key performance for CubeSat-based QKD missions, enabling secure keys under high-loss conditions. | [40] |
Space-to-ground quantum communication network | Demonstrates a 4600 km quantum-secure communication network integrating fiber and satellite QKD links. | [41] |
Quantum digital signatures over fiber | Implements QDS over 134 km equivalent fiber loss using DPS-QKD protocol for non-repudiation. | [36] |
Gigahertz free-space QKD | Achieves real-time gigahertz QKD over an emulated satellite pass, full key distillation within one overpass. | [37] |
Finite-key effects in satellite QKD | Analyzes finite-block statistics to optimize secret key length in short-duration satellite QKD links. | [38] |
Network segmentation and filtering | K-Bottleneck Minimize routing avoids high-risk links, raising attacker cost and improving robustness. | [24] |
Trust + ML-based filtering | Ensemble trust model with ACO routing achieves 98% accuracy in detecting and isolating DDoS traces. | [26] |
Bottleneck Risk Analyzer (SKYFALL) | Identifies time-varying LEO bottleneck links; shows link flooding can cut throughput by 3.4×. | [27] |
Trust-based secure routing (SLT) | D-S evidence trust evaluation integrated with OPSPF increases delivery rate and isolates malicious nodes. | [28] |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sharmin, A.; Mahmud, B.U.; Nabi, N.; Shaima, M.; Faruk, M.J.H. Cyber Attacks on Space Information Networks: Vulnerabilities, Threats, and Countermeasures for Satellite Security. J. Cybersecur. Priv. 2025, 5, 76. https://doi.org/10.3390/jcp5030076
Sharmin A, Mahmud BU, Nabi N, Shaima M, Faruk MJH. Cyber Attacks on Space Information Networks: Vulnerabilities, Threats, and Countermeasures for Satellite Security. Journal of Cybersecurity and Privacy. 2025; 5(3):76. https://doi.org/10.3390/jcp5030076
Chicago/Turabian StyleSharmin, Afsana, Bahar Uddin Mahmud, Norun Nabi, Mujiba Shaima, and Md Jobair Hossain Faruk. 2025. "Cyber Attacks on Space Information Networks: Vulnerabilities, Threats, and Countermeasures for Satellite Security" Journal of Cybersecurity and Privacy 5, no. 3: 76. https://doi.org/10.3390/jcp5030076
APA StyleSharmin, A., Mahmud, B. U., Nabi, N., Shaima, M., & Faruk, M. J. H. (2025). Cyber Attacks on Space Information Networks: Vulnerabilities, Threats, and Countermeasures for Satellite Security. Journal of Cybersecurity and Privacy, 5(3), 76. https://doi.org/10.3390/jcp5030076