This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

\name: Efficient and Accurate Verification for Risk-Avoidance Routing in LEO Satellite Networks

Chenwei Gu, Qian Wu†‡, Zeqi Lai{}^{{\dagger}{\ddagger}\textsuperscript{${{}^{\P}}$}\thanks{${{}^{\P}}$~{}Zeqi Lai is the corresponding author.}}, Hewu Li†‡, Jihao Li, Weisen Liu, Qi Zhang, Jun Liu†‡, Yuanjie Li†‡  Zeqi Lai is the corresponding author. Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing 100084, China
Zhongguancun Laboratory, Beijing, China
Abstract

Emerging satellite Internet constellations such as SpaceX’s Starlink will deploy thousands of broadband satellites and construct Low-Earth Orbit (LEO) satellite networks (LSNs) in space, significantly expanding the boundaries of today’s terrestrial Internet. However, due to the unique global LEO dynamics, satellite routers will inevitably pass through uncontrolled areas, suffering from security threats. It should be important for satellite network operators (SNOs) to enable verifiable risk-avoidance routing to identify path anomalies. In this paper, we present \name, a novel network path verification framework tailored for emerging LSNs. \nameaddresses the limitations of existing crypto-based and delay-based verification approaches and accomplishes efficient and accurate path verification by: (i) adopting a dynamic relay selection mechanism deployed in SNO’s operation center to judiciously select verifiable relays for each communication pair over LSNs; and (ii) incorporating a lightweight path verification algorithm to dynamically verify each segment path split by distributed relays. We build an LSN simulator based on real constellation information and the results demonstrate that \namecan significantly improve the path verification accuracy and achieve lower router overhead compared with existing approaches.

Index Terms:
LEO Satellite Network, Path Verification.
publicationid: pubid: 979-8-3503-5171-2/24/$31.00 ©\copyright2024 IEEE

I Introduction

Low-Earth Orbit (LEO) Satellite Networks (LSNs) are gaining tremendous popularity in recent years, carrying a large fraction of Internet traffic [1]. Many “NewSpace” players like SpaceX [2] and Amazon Kuiper Project [3] are constructing their own LSNs powered by laser inter-satellite links (ISLs) [4, 5] to provide global Internet services. In particular, Starlink, the largest operational LSN today, has launched more than 6300 LEO satellites [6] and attracted more than 3 million global subscribers as of May 2024 [7]. As LSNs are developing at such a fast pace, security issues have become increasingly prominent. Potential threats in LSNs include not only traditional electromagnetic interference [8], but also new threats in cyberspace since LSNs target to provide global Internet services. Fundamentally, LSNs have a unique characteristic different from the terrestrial Internet: the core network infrastructures in an LSN (\eg a large number of satellite routers) are moving in their free-space orbits globally, and satellites will inevitably travel to uncontrolled and risky regions overseas. Such LEO dynamics can involve potential security risks such as traffic hijacking and information leakages [9] by hacking satellites [10, 11, 12]. Therefore, for satellite network operators (SNOs), it should be important to enforce the forwarding path to bypass potential risk areas and, more importantly, verify that the actual forwarding paths do avoid the risk areas. The network community has a very long history of working on path or routing verification. Depending on the verification criteria, previous approaches can be classified into two main categories: crypto-based and delay-based path verification. In the former, each intermediate node performs cryptographic operations on forwardings packets and appends a Message Authentication Code (MAC) to each packet [13, 14, 15]. Hence, the path can be verified by checking a chain consisting of nested MACs. However, such complex cryptographic operations incur substantial computation and bandwidth overheads on resource-constrained satellite routers. To avoid high router overhead, other efforts have proposed lightweight delay-based approaches to verify the network paths by comparing the estimated delay of the planned path with the real delay of the actual path [16, 17, 18]. In delay-based approaches, the network operator typically has to pre-deploy a set of relay nodes in advance, which are geographically very far away from the risk area. The path from a source to its destination is forced to pass through a certain relay. The underlying verification principle is that: due to the long distance between the relay and the risk area, if the actual path detours and passes through the risk area, the end-to-end path delay should be significantly higher than the estimated value. Note that this approach estimates the path delay based on a fundamental assumption in today’s terrestrial Internet that the propagation delay between two network nodes can be approximately estimated by a linear function of the physical distance between them [19]. However, in emerging LSNs, due to the unique global LEO dynamics, the entire network topology and paths fluctuate frequently [20, 21], causing the linear assumption does not hold anymore. As a result, existing delay-based methods suffer from poor accuracy in LSNs. To overcome the inefficiency and inaccuracy of existing verification approaches, in this paper, we present \name, a novel verification framework that extends existing efforts and accomplishes efficient and accurate network path verification in dynamic LSNs, by exploiting the following two techniques. First, \nameincorporates a dynamic relay selection algorithm together with a flexible relay-based traffic steering mechanism for SNOs to dynamically schedule LSN traffic to bypass risk areas. Unlike previous approaches that depend on static relays which may result in high verification errors, \nameproposes the Nearest Low-Risk Planes (NLRPNLRP) to limit the risk nodes in a small range, and dynamically selects relays based on NLRPNLRP. As such, \nameeffectively avoids the risk areas without involving too much delay caused by risk-bypassing meandering routes. Second, \nameadopts a lightweight avoidance verification algorithm that integrates the routing information and propagation delays to jointly verify the path compliance between the planned and the actual paths. \nameverifies the entire network path by verifying all segments divided by relays. Specifically, in \name, only relays perform MAC operations to authenticate that the packets indeed pass through them and conduct delay-based verification for each segment path. Instead of using the linear RTT estimation like [16, 17, 18], \namefirst adopts an inter-relay probing mechanism to obtain each segment delay ground truth for a period. Then \nameestimates the segment detour delay threshold that functions as a jitter buffer by computing twice the minimum propagation delay from each node on the segment to the risk nodes based on the predictable satellite trajectory and topology [22]. The sum of them is the segment delay upper bound for determining if packets have traversed the risk area in this segment path. To evaluate the effectiveness of \name, we conduct a large-scale simulation by combining real-world LSN information [2, 3] and the recent LSN simulator [23]. Extensive experiments demonstrate that \namecan accomplish: (i) high verification accuracy: \nameobtains near-to-100%100\% verification accuracy for city pairs served by Starlink and Kuiper constellations; (ii) low delay penalty caused by detours: compared with Alibi Routing [16], \namecan largely reduce the delay of verifiable risk-avoidance paths; and (iii) better scalability and performance: \nameachieves low processing overhead and can scale to LSNs with thousands of nodes, and \name’s achievable goodput ratio is much higher than existing crypto-based approaches [13, 14, 15]. In summary, the main contributions of this paper include:

  • We highlight the importance of path verification in emerging LSNs, and expose the inefficiency and inaccuracy problems of existing path verification approaches in LSNs (§II).

  • We present \name, a novel path verification framework tailored for LSNs. \nameexploits a dynamic relay-based traffic steering mechanism and a lightweight, segment avoidance verification algorithm to efficiently and accurately verify dynamic network paths in LSNs (§IIIIV).

  • We build a \nameprototype and conduct extensive simulations to demonstrate the effectiveness of \name, in terms of improved verification accuracy, performance, and reduced router overheads (§VI).

II Threat Model and motivation

II-A Preliminaries for low-Earth orbit satellite networks

Refer to caption
Figure 1: Routing security threats in an LSN: attackers in uncontrolled risk areas may steal information or hijack traffic.

Today’s LSNs like SpaceX’s Starlink [2] consist of hundreds to thousands of LEO satellites that work as “routers in space”, together with many geo-distributed ground stations connecting satellites and terrestrial network infrastructures. Satellites communicate with ground entities (\eg ground stations or satellite terminals) via ground-satellite radio links (GSL). Besides, many satellite constellations (\eg Starlink and Kuiper) leverage high-speed laser inter-satellite links (ISLs) for inter-satellite networking and communication. As visualized in [24], because satellites move at a high velocity in various orbital directions over the Earth, the entire LSN experiences frequent topology changes, especially in space-ground connections. LSN traffic between two terrestrial nodes (\eg from a Starlink’s satellite terminal to a remote ground station) is forwarded by a network path constructed by uplink/downlink and ISLs. To deal with the unique LSN topology fluctuation, many recent works have proposed space routing mechanisms (\eg [20, 21]) to dynamically build and maintain paths for any two terrestrial nodes connected to the LSN.

II-B Potential risks in uncontrolled areas

As plotted in Fig. 1, because satellites move globally, they might enter an uncontrolled risk area, posing routing security threats in LSNs. In this paper, we define a “risk area” as a geographical region where malicious attackers may exist there and launch the following attacks on satellites above the area:

  • Information stealing. Attackers in the risk area can eavesdrop on traffic and extract or speculate private data [9]. As shown in Fig. 1, assume traffic from the satellite terminal is expected to be forwarded to the ground station by a planned network path marked by the solid arrows, attackers in risk areas can eavesdrop on traffic forwarded from S7 to S9.

  • Traffic hijacking. More powerful attackers in a risk area can hijack [10, 11, 12] the route and cause path inconsistency. They propagate error routing advertisements to allure surrounding satellites to forward packets to them and redirect traffic to specific nodes for censorships, or other man-in-the-middle attacks like packet injection, modification, and counterfeit. In the example illustrated in Fig. 1, the attacker in the risk area may modify the planned path to S7\rightarrowS4\rightarrowS5\rightarrowS9.

Therefore, to avoid the above risks, it should be essential for satellite network operators (SNOs) to: (i) apply avoidance policies to force their traffic to bypass potential risk areas, and more importantly, (ii) verify that the actual paths are consistent to the planned avoidance policies in practice.

II-C Are existing path verification methods sufficient?

Over the past decade, the network community has had a body of efforts working on network path verification. In particular, existing path verification efforts can be classified into two main categories: crypto-based and delay-based approaches. Crypto-based path verification. One classic path verification approach is to embed the planned path (\eg a sequence of nodes that build the network path) into the header of each packet. Then intermediate nodes authenticate and update related fields before sending to the next node [13, 14, 15]. These approaches have three limitations in LSNs. First, each intermediate node needs to perform cryptographic operations like calculating MACs hop by hop, which involves high computation overhead that could be unaffordable for resource-constrained satellites. Second, the increased length of the verification header also leads to extra packet header overhead, resulting in goodput ratio reduction (as will be analyzed in detail in §VI). Third, per-hop authentication inevitably involves additional processing delay on each node. Note that the high mobility of LEO satellites incurs frequent path changes [25, 22, 20], if the packet processing delay is too high, the pre-calculated path might be invalid on the route. Although some recent works like PPV [26] and MASK [27] propose probabilistic authentication instead of verifying every packet hop by hop, the computation overhead can be still high when the traffic volume is large. Delay-based path verification. Alibi Routing [16] proposes a new path verification approach, exploiting the key idea that a detour from the planned path to any node in the risk area will breach the maintained delay by incurring significant extra delay. To verify whether a network path from a source (SrcSrc) to its destination (DstDst) passes through the risk area, Alibi Routing pre-computes a target area that is far away from the risk area where possible verifiable relays (called alibis) are located. It enforces that the path from SrcSrc to DstDst must pass through the alibis. Because the relay is very far from the risk area, if the SrcDstSrc\rightarrow Dst path passes through the risk area, the observed end-to-end delay should be significantly higher than the maintained value. However, these approaches are based on a fundamental assumption that the delay between two terrestrial nodes has a linear relationship with their great-circle distance. Although this assumption exists in many scenarios in today’s terrestrial Internet [19], it is not applicable in LSNs with highly dynamic topology. An increase in path delay may not necessarily be caused by traversing the risk area but path changes due to topology fluctuation. We conduct a quantitative analysis to demonstrate how the unique topology fluctuations in LSNs affect the verification accuracy of existing delay-based approaches. Our analysis is based on the real Starlink constellation information [2] and an LSN simulation based on StarryNet [23] (details will be illustrated in §VI). We build a virtual LSN consisting of 1584 satellites with 72 orbits and 22 satellites per orbit (Starlink Phase 1, Shell 1) and 165 geo-distributed ground stations [28] around the world. We simulate about 2000 city pairs communicating over the LSN and use the shortest path routing upon the +Grid topology, \ie a satellite connects two neighboring satellites in the same orbit and two in the adjacent orbits [20].

Refer to caption
Figure 2: Non-linear relationship between the great circle distance and RTTs.
Refer to caption
Figure 3: Verification inaccuracy of Alibi Routing in dynamic LSNs.

First, we observe that the linear relationship assumption [19] does not hold in LSNs as illustrated in Fig.3. On our further investigation, we confirm that the delay increase is caused by frequent topology fluctuations and path changes in LSNs even if the SrcSrc and DstDst are static on the ground. Second, we observe the non-linear relationship can lead to inaccuracy for delay-based verification approaches. We simulate the Alibi Routing [16] mechanism, set Egypt as a potential risk area, and set a static ground relay for each city pair. We calculate the ratio of false positive (FP, \ie the real path does not traverse the risk area but is considered as passing through it) and false negative (FN, \ie the opposite of FP) of each city pair in 24 hours with an interval of 1 second. These error ratios are defined as the proportion of the amount of time slots that FP or FN occurs to the total amount of time slots. Fig. 3 plots the CDF of the error ratios of the city pairs. We observe that delay-based verification methods suffer from high inaccuracy since most city pairs’ FN and FP ratios are higher than 25%. Our motivation. Accomplishing path verification is important in dynamic and uncontrolled LSN environments. However, existing methods suffer from either per-node high processing overheads, or verification inaccuracy, which motivates us to explore a more efficient and accurate solution for network path verification in LSNs, \ie the \nameframework.

III \nameOverview

III-A \namearchitecture

Basic idea. At a high level, \nameaddresses the limitations of existing approaches in terms of overhead and accuracy as follows. First, to verify a network path from SrcSrc to DstDst, \nameadopts a collection of dynamic satellite relays to split the entire path into a series of consecutive segments. Thus, verifying the entire path is equivalent to verifying each segment path. Second, to reduce the verification overhead, \nameonly requires relays (instead of all nodes on the path) to authenticate forwarded packets. Therefore, it can be verified that the forwarding path indeed passes through the predefined relays by checking the relay’s authentication chain in DstDst. Third, while the end-to-end delay of a network path fluctuates due to the LSN’s dynamics, the delay fluctuation of a segment (\eg between two adjacent relays) is less dramatic than the delay fluctuation of the entire path. \nameverifies each segment by comparing the real inter-relay delay with the estimated upper bound. Architecture. Fig. 4 plots \name’s high-level architecture and an illustration of the key differences between \nameand existing verification approaches. \nameprovides the SNO with the ability to verify the path compliance between the planned packet delivery path and the real one. \namecan be built upon existing Path-Aware Networking (PAN) [29, 30] architecture that allows end users to self-define paths for packets, or source routing [31], both enforcing network paths to pass through pre-calculated satellite relays. In addition, \nameincorporates two new features for dynamic LSN path verification. First, \nameadopts a Dynamic Relay Selection mechanism deployed in SNO’s operation center to judiciously select relays for every communication pair over the LSN. These relays then split the entire path from SrcSrc to DstDst into a sequence of consecutive segments. Second, \nameincorporates a probing mechanism to periodically obtain the segment delay between any two adjacent key nodes (satssat_{s}, relays, and satdsat_{d}) and an Inter-Relay Verification approach deployed on selected satellite relays and DstDst to verify whether the segment path is consistent with the planned path. If the packet on the current segment path does not traverse the risk area, the relay node will perform a symmetric MAC to update the passing packet’s authentication fields.

Refer to caption
(a) Crypto-based verification: high processing overhead on all satellites.
Refer to caption
(b) Delay-based verification: path fluctuations result in limited accuracy.
Refer to caption
(c) \nameperforms crypto-based verification on relays, and extends existing delay-based verification approach to verify each segment of the path.
Figure 4: \namearchitecture and an illustration of the key differences from previous verification approaches.

III-B \nameverification workflow

For each communication pair (SrcSrc, DstDst) and a given risk area, \nameaccomplishes the verification as follows. (1) Dynamic relay selection. \namefirst calculates a time-varying relay set which includes all relays for (SrcSrc, DstDst) at different time slots. Then it estimates the segment detour delay threshold which is used to calculate the segment delay upper bound based on the relay sequence. All the information is computed based on the predictable satellite trajectory and dynamic LSN topology. Once decided, the SNO operation center delivers the results to SrcSrc. (2) Intra-segment state probing. If a path changes or a new session begins, end users, relays and SNO negotiate session keys [14] which is out of our scope in secure channels [32]. After that, each relay (including satdsat_{d}) periodically (\eg tens of seconds) sends a probing packet to its previous relay to probe delay of the current segment. To ensure that probing packets are not tampered with, all nodes on a segment path authenticate the probing packet with adjacent shared symmetric keys [16]. (3) Authentication fields initiation. Before a packet’s departure, SrcSrc inserts the corrected sending timestamp, hash value, and relay authentication fields AUTHAUTH in the packet header. (4) Relay-based segment verification. Network nodes forward the packets according to the planned path. When a relay receives packets, it verifies the segment path based on its probing ground truth and detour threshold. If packets do not traverse the risk area, the relay computes a MAC value and inserts it with the timestamp to update its part in AUTHAUTH field. (5) Destination verification. After receiving a packet, DstDst verifies the packet’s source (out of our scope), AUTHAUTH fields updated by relays, and the last segment path to determine whether the packet bypasses the risk area.

III-C Technical challenges

To accomplish efficient and accurate verification, \nameneeds to solve the following LSN-specific challenges. Appropriate relay selection under LEO dynamics. Considering the high dynamics in LSNs, correctly and timely selecting verifiable relays away from the risk area while not involving too much additional delay at a global scale is challenging. Specifically, we formulate the Avoidance-Verifiable Dynamic Relay Selection (AVDRS) problem in LSNs, based on which we further design an efficient solution. Unpredictable delay jitters. Only exploiting the period probing delay ground truth as an upper bound to verify whether a packet has gone through the risk area is too strict. It’s impossible that the real delays are equal to the probing delays exactly. It’s hard to distinguish whether an observed micro delay increase is caused by slight delay jitters or detours which may mislead the segment delay-based verification. In the next section, we introduce the details of \nameand describe how \nameaddresses these challenges.

IV \nameDesign Details

IV-A Modeling an LSN

Network model. To model the LEO dynamics, we divide time intervals into discrete time snapshots 𝒯={t1,t2,}\mathcal{T}=\{t_{1},t_{2},...\}. During (ti,ti+1)(t_{i},t_{i+1}), the LSN topology and distance between neighboring satellites are nearly constant. The topology at tt is represented by a graph 𝒢t=(𝒱,t)\mathcal{G}^{\,t}=(\mathcal{V},\mathcal{L}^{\,t}) (𝒱\mathcal{V} is the union set of satellites 𝒱𝒮\mathcal{V_{S}}, and ground entities 𝒱\mathcal{V_{E}}). t={lijt|i,j𝒱}\mathcal{L}^{\,t}=\{l_{ij}^{\,t}|i,j\in\mathcal{V}\} is the link set of ISLs and GSLs. If node i,ji,j are connected at tt, the 0-10\text{-}1 variable lijt=1l_{ij}^{\,t}=1. The orbit can be represented by a number pp (p<𝒫p<\mathcal{P}, where 𝒫\mathcal{P} is the amount of orbits). Similarly, we use nn (n<n<\mathcal{H}, where \mathcal{H} is the number of satellites per orbit) to describe the in-orbit position of a satellite. Formally, a satellite satisat_{i} can be represented by a unique logical coordinate sati=(pi,ni){sat}_{i}=(p_{i},n_{i}). Link establishment and path construction. At time tt, the SNO will compute the risk satellites, \ie𝒮t={rs1,rs2,}t\mathcal{RS}^{\,t}=\{{rs}_{1},{rs}_{2},...\}^{\,t} in the risk area RARA. We set pathabt{path}_{ab}^{\,t} as the path at tt between nodes a,b𝒱a,b\in\mathcal{V} consisting of a sequence of on-path nodes. The segment path between adjacent nodes in satsttsatdt{sat}_{s}^{\,t}\cup\mathcal{RE}^{\,t}\cup{sat}_{d}^{\,t} is the shortest routing path computed by Dijkstra (t\mathcal{RE}^{\,t} is the satellite relay set, t={r1,r2,}t𝒱𝒮(𝒮tsatstsatdt)\mathcal{RE}^{\,t}=\{r_{1},r_{2},...\}^{\,t}\subseteq\mathcal{V_{S}}\setminus(\mathcal{RS}^{\,t}\cup sat_{s}^{\,t}\cup sat_{d}^{\,t})). As the chosen relays are in order, we use a sequence set 𝒴t={y1,y2,}t\mathcal{Y}^{\,t}=\{y_{1},y_{2},...\}^{\,t} to describe the relation in a path, and yi<yjy_{i}<y_{j} means node ii precedes node jj. The active link between adjacent nodes i,jpathabti,j\in{path}_{ab}^{\,t} is l~ijtlijt\tilde{l}_{ij}^{\,t}\leq{l}_{ij}^{\,t}. The delay between any two neighboring nodes dijtd_{ij}^{\,t} can be estimated by dividing their straight-line distance by the light speed. DabtD_{ab}^{\,t} is the total delay of pathabt{path}_{ab}^{\,t}. Since there exist several paths between two nodes with similar delays, we use a set 𝒫abt\mathcal{EP}_{ab}^{\,t} to contain all the related nodes in these paths.

IV-B Dynamic relay selection

AVDRS Formulation

considering LSN topology’s frequent variation, to ease the burden brought by global users’ frequent requests, SNO should reduce communication frequency by pre-computing results during a future period for satellite terminals (\eg  dish) to store them. It’s vital to ensure a short end-to-end delay, which limits us from selecting remote relays. We formulate the Avoidance-Verifiable Dynamic Relay Selection (AVDRS) problem which aims at selecting viable satellite relays while satisfying low delay inflation. Input: the topology t\mathcal{L}^{\,t}, access satellite pairs satstsat_{s}^{\,t}, satdtsat_{d}^{\,t} of SrcSrc and DstDst respectively, and the risk satellites 𝒮t\mathcal{RS}^{\,t}. Output: the selected relay sequence t\mathcal{RE}^{\,t}. Goals: \nametargets at obtaining the relays while minimizing the end-to-end delay between SrcSrc to DstDst at tt:

minDsdt=i,jpathsdt,yi+1=yjl~ijtdijt\min{D_{sd}^{\,t}=\sum_{i,j\in{path}_{sd}^{\,t},y_{i}+1=y_{j}}{\tilde{l}_{ij}^{\,t}\cdot d_{ij}^{\,t}}} (1)

Constraints: Constraint 2 describes the node sequence of a path. Dist(i,j)Dis^{\,t}(i,j) is the distance between an on-path node and a risk satellite and it limits the candidate relays’ range. The larger the θ\theta is, the further the relay is, and it’s more secure while incurring longer end-to-end delay. Constraint 4 depicts the connectivity of the constructed path. Constraint 5 ensures no equal paths can traverse RARA. Every relay needs to authenticate the packet and the related field length increases as its number σ\sigma grows. So the last constraint limits the number of chosen relays to lower the communication overhead. Intuitively, more relays mean finer verification granularity, \eg all the on-path nodes authenticate. However, from our analysis, a bad relay may incur a longer delay and not contribute to the verification accuracy.

yi<yj,i,jpathsdt,ifiprecedesjy_{i}<y_{j},\ i,j\in{path}_{sd}^{\,t},\ \mathrm{if}\ i\ \mathrm{precedes}\ j (2)
minipathsdt,j𝒮tDist(i,j)θ\min_{i\in{path}_{sd}^{\,t},j\in\mathcal{RS}^{\,t}}{Dis^{\,t}(i,j)}\geq\theta (3)
l~ijtlijt,i,jpathsdt,yi+1=yj\tilde{l}_{ij}^{\,t}\leq{l}_{ij}^{\,t},\ i,j\in{path}_{sd}^{\,t},\ y_{i}+1=y_{j} (4)
𝒫ijt𝒮t=,i,jsatsttsatdt\mathcal{EP}_{ij}^{\,t}\cap\mathcal{RS}^{\,t}=\varnothing,\ i,j\in{sat}_{s}^{\,t}\cup\mathcal{RE}^{\,t}\cup{sat}_{d}^{\,t} (5)
|t|σ|\mathcal{RE}^{\,t}|\leq\sigma (6)

Problem analysis. To solve the problem above, SNO should calculate the optimal solution in each time slot for large amounts of users. Since the available relay amount for LSNs is ψ103\psi\sim{10}^{3}, the combination number is O(AψσO(A_{\psi}^{\sigma}) at a time (the sequence is in order), which cannot be calculated in a short time, let alone for millions of global users. Besides, to satisfy Constraints 2 and 5, the problem is more complex as it can be analogized to NP-hard Hamiltonian Path Problem (HPP) [33].

Corollary 1

AVDRS problem can be analogized to HPP.

Proof 1

HPP specifies a set of points and finds a path in the graph that visits every point only once. We set an unordered t\mathcal{RE}^{\,t} and a graph where if the closed 𝒫ijt𝒮t=,i,jsatsttsatdt\mathcal{EP}_{ij}^{\,t}\cap\mathcal{RS}^{\,t}=\varnothing,\,i,j\in{sat}_{s}^{\,t}\cup\mathcal{RE}^{\,t}\cup{sat}_{d}^{\,t}, then lijt=1l_{ij}^{\,t}=1. The problem is reduced to finding a sequence that can traverse every relay only once.

Dynamic Relay Selection Algorithm (DRSA)

The details of DRSA are shown in Alg.1. DRSA limits 𝒮t\mathcal{RS}^{\,t} within a range to ensure that as many close low-risk satellites outside the range as possible can be candidate relays.

Refer to caption
Figure 5: Illustration of DRSA workflow.

Calculating the Nearest Low-Risk Planes (NLRP). NLRPNLRP consists of eight low-risk planes, \ie four planes in each orbital direction. NE-bound direction is that satellites fly from Southwest to Northeast, and SE-bound is from Northwest to Southeast [24]. NLRPNLRP limits the risk satellites in a range (it is adjusted by θ\theta in Constraint 3, which helps set delay buffers against unpredictable delays according to current network conditions. If θ\theta is defined as the number of hops, NLRPNLRP is θ\theta-hop away from the outermost edge risk satellites). Then the upmost, bottommost, leftmost, and rightmost low-risk planes in two orbital directions respectively can be obtained

NLRP={plNE,prNE,nuNE,nbNE,plSE,prSE,nuSE,nbSE}NLRP=\{p_{l}^{\,NE},p_{r}^{\,NE},n_{u}^{\,NE},n_{b}^{\,NE},p_{l}^{\,SE},p_{r}^{\,SE},n_{u}^{\,SE},n_{b}^{\,SE}\} (7)

where, l,r,u,bl,r,u,b represent the left, right, up, and bottom, and NE,SENE,SE means the orbital direction (Fig.5 only shows NE-bound NLRPNLRP and SE-bound NLRPNLRP is a closed frame in different direction interwoven with NE-bound NLRPNLRP). Dynamic Relay Selection Algorithm (DRSA). Then DRSA selects relays as shown in Alg.1. We discuss it in two cases: dir(satst)=dir(satdt)dir({sat}_{s}^{\,t})=dir({sat}_{d}^{\,t}) and dir(satst)dir(satdt)dir({sat}_{s}^{\,t})\neq dir({sat}_{d}^{\,t}), where dir()dir(*) is the satellite direction. When dir(satst)=dir(satdt)dir({sat}_{s}^{\,t})=dir({sat}_{d}^{\,t}), firstly a frame FsdtF^{t}_{sd} formed by the planes of satst{sat}_{s}^{\,t} and satdt{sat}_{d}^{\,t} is obtained as seen in Fig. 5. Next, DRSA sets t\mathcal{RE}^{\,t} in which a relay rir_{i} is located in the same plane of the previous and the following nodes in satsttsatdtsat_{s}^{\,t}\cup\mathcal{RE}^{\,t}\cup sat_{d}^{\,t} to make sure there are no other equal-delay segment paths theoretically. Setting relays in this way can reduce the risk that other paths with similar delays traversing RARA affect the verification accuracy. If FsdtF_{sd}^{\,t} and NLRPt{NLRP}^{\,t} do not overlap (Line 3-4 in Alg.1), \egFs6s14tF_{s_{6}s_{14}}^{t} formed by (s6,s7,s14,s15)(s_{6},s_{7},s_{14},s_{15}) and NLRPtNLRP^{\,t} in Fig. 5, all the nodes constructing possible equal-cost shortest paths from s6{s}_{6} to s14{s}_{14} are contained in Fs6s14tF_{s_{6}s_{14}}^{\,t}. In this case, s7s_{7} is the only relay since it’s farther away from NLRPtNLRP^{\,t}. Otherwise, there are two types of overlap: semi-overlap seen in Line 5-7, (\egFs1s8tF_{s_{1}s_{8}}^{\,t} in Fig. 5) and fully-overlap seen in Line 8-11, (\egFs10s9tF_{s_{10}s_{9}}^{\,t} in Fig. 5). In semi-overlap, there exists a candidate path that does not traverse RARA while achieving the shortest delay and DRSA selects this corner node as the only relay, \ie the equal-cost path depicted by the thicker purple solid arrows traverses RARA, so s7s_{7} is the relay and the shortest path is the path depicted by the finer green solid arrows. In the second case where all the candidate paths contain risk satellites, DRSA enlarges the FsdtF_{sd}^{\,t} and selects the corner nodes that are located on the intersection of a certain border of NLRPtNLRP^{\,t} and the planes of satstsat_{s}^{\,t}, satdtsat_{d}^{\,t} as relays, \iet=(s1,s7)\mathcal{RE}^{\,t}=(s_{1},s_{7}).

Refer to caption
Figure 6: sats{sat}_{s} and satd{sat}_{d} are in different directions.

If dir(satst)dir(satdt)dir({sat}_{s}^{\,t})\neq dir({sat}_{d}^{\,t}), it can also use the same-direction way above. As shown in Fig. 6, we approximately convert 3-D into 2-D topology and determine the intersection relationship between Fs1s4tF_{s_{1}s_{4}}^{\,t} and NLRPt{NLRP}^{\,t}. For example, Fig. 6 plots the topology transformation and the chosen relays (s2,s3)(s_{2},s_{3}) which are the corner nodes in this case. Setting detour threshold. As mentioned in §III-A, \namedivides a path into several segments and each relay or DstDst authenticates one segment. The real delays vary dynamically, nearly fluctuating within a certain range. As each segment path is the shortest path, we assume no attacks will incur a lower delay than the probing delay during a period, so what is the delay upper bound for a packet to be considered as not traversing RARA? If an on-path node mis-forwards the packet to RARA, the minimum detour delay is more than twice the minimum propagation delay between any on-path node and any risk satellite like δs1s7\delta_{s_{1}s_{7}} in Fig. 5. Therefore, SNO sets a segment detour delay threshold δijt\delta_{ij}^{\,t} between any two adjacent nodes i,ji,j constructing a segment as:

δijt=minapathijt,b𝒮t2Dabt,\displaystyle\delta_{ij}^{\,t}=\min_{a\in{path}_{ij}^{\,t},b\in\mathcal{RS}^{\,t}}{2\cdot D_{ab}^{\,t}}, (8)
i,jsatst𝒮tsatdt,yi<yj\displaystyle i,j\in{sat}_{s}^{\,t}\cup\mathcal{RS}^{\,t}\cup{sat}_{d}^{\,t},\,y_{i}<y_{j}
Algorithm 1 DRSA: Dynamic Relay Selection Algorithm
0:  satst=(ps,ns)sat_{s}^{\,t}=(p_{s},n_{s}), satdt=(pd,nd)sat_{d}^{\,t}=(p_{d},n_{d}), RARA
0:  t,Δt\mathcal{RE}^{\,t},\Delta^{\,t}
1:  get NLRPt{NLRP}^{\,t},FsdtF_{sd}^{\,t},t=[],Δt=[]\mathcal{RE}^{\,t}=[],\Delta^{\,t}=[]–detour threshold list
2:  r=(ps,nd)r_{*}=(p_{s},n_{d}) or (pd,ns)(p_{d},n_{s})
3:  if FsdtNLRPt==F_{sd}^{\,t}\cap{NLRP}^{\,t}==\varnothing then
4:     Δt.add(δsr,δrd)\Delta^{\,t}.add(\delta_{sr_{*}},\delta_{r_{*}d}), t.add(r)\mathcal{RE}^{\,t}.add(r_{*})
5:  else if FsdtandNLRPtissemi-overlapF_{sd}^{\,t}\ and\ {NLRP}^{\,t}\ is\ semi\text{-}overlap then
6:     pathsdt=Dijkstra(satst,r)Dijkstra(r,satdt){path}_{sd}^{\,t}=Dijkstra(sat_{s}^{\,t},r_{*})\cup Dijkstra(r_{*},sat_{d}^{\,t})
7:     t.add(r)\mathcal{RE}^{\,t}.add(r_{*}), Δt.add(δsr,δrd)\Delta^{\,t}.add(\delta_{sr_{*}},\delta_{r_{*}d}) where rpathsdtr_{*}\in path_{sd}^{\,t} satisfies pathsdt𝒮t=={path}_{sd}^{\,t}\cap\mathcal{RS}^{\,t}==\varnothing
8:  else if FsdtandNLRPtisfully-overlapF_{sd}^{\,t}\ and\ {NLRP}^{\,t}\ is\ fully\text{-}overlap then
9:     get Frame=FsdtNLRPtFrame=F_{sd}^{\,t}\cup{NLRP}^{\,t}
10:     get two corner nodes as relays r1,r2r_{1},r_{2},
11:     t.add(r1,r2)\mathcal{RE}^{\,t}.add(r_{1},r_{2}), Δt.add(δsr1,δr1r2,δr2d)\Delta^{\,t}.add(\delta_{sr_{1}},\delta_{r_{1}r_{2}},\delta_{r_{2}d})
12:  else
13:     return  Error /*\egsatst,satdt𝒮tsat_{s}^{\,t},sat_{d}^{\,t}\in\mathcal{RS}^{\,t}*/
14:  end if
15:  return  t,Δt\mathcal{RE}^{\,t},\Delta^{\,t}

Discussion of number of relays σ\sigma. Taking sats=s1,satd=s7{sat}_{s}=s_{1},{sat}_{d}=s_{7} in Fig. 5 as an example: (i) if we select a bad relay sequence like (s11,s3)(s_{11},s_{3}), not only is path longer but the relay s11s_{11} is closer to the risk satellite s12s_{12}, increasing verification inaccuracy; (ii) if we set s4s_{4} as the only relay, the verification granularity seems finer as the path is divided into s1s4s_{1}\to s_{4} and s4s7s_{4}\to s_{7}. But the gain is trivial since the detour threshold in such two segment paths is similar, \ie 2Ds4s122Ds5s132\cdot D_{s_{4}s_{12}}\approx 2\cdot D_{s_{5}s_{13}}. Particularly, no relay is needed if satssat_{s} and satdsat_{d} are in the same plane and not in the fully-overlap case (\egs1s_{1} and s7s_{7} are in the same plane). To sum up, DRSA minimizes σ\sigma to a large extent by constructing NLRPNLRP and setting at most two relays.

IV-C Pre-process at SrcSrc

Before communication begins, SrcSrc and SNO exchange Veri infos including the detour threshold list Δ\Delta, and relays during a future period. Every time a connection begins or relays change (inspected by querying its local cache in each time slot), SrcSrc, DstDst, and relays negotiate session keys and achieve the path authorization [14] (out of our scope) through secure channels between them and SNO [32]. Then, when sending a packet, SrcSrc first sends a probe to test the current access delay DaccessD_{access} to eliminate the error brought by the first hop. Next, SrcSrc records the corrected sending timestamp ts0=tssend+Daccess+α{ts}_{0}={ts}_{send}+D_{access}+\alpha (α\alpha is processing time) and calculates the truncation of the hash value HASH=H(Payload||PATH||Δts0||ts0||ts0)[0:l]HASH=H(Payload||PATH||\Delta^{\,ts_{0}}||ts_{0}||\mathcal{RE}^{\,ts_{0}})[0:l], where [0:l][0:l] is the truncation of the lowest llB of the data to improve goodput [15, 27]. Then SrcSrc constructs the reserved AUTHAUTH chain, makes a final packet source authorization and sends pktpkt. Each relay’s AUTHAUTH field is shown in Fig. 7 where l=4l=4, including relay’s ID rir_{i}, segment detour threshold δij\delta_{ij}, timestamp tsits_{i} when sending out the packet, and its MAC authentication value.

Algorithm 2 Verification Processes
1:  Step (I): Pre-processing at SrcSrc
2:  Probe access delay DaccessD_{access}
3:  ts0=tssend+Daccess+αts_{0}=ts_{send}+D_{access}+\alpha /*correct the sending timestamp*/
4:  Perform HASHHASH, inquire PATHPATH at ts0ts_{0}
5:  Construct AUTHAUTH fields and send pktpkt
6:  Step (II): Relay-based segment verification
7:  get PATHPATH, AUTHAUTH, \mathcal{RE} from pktpkt
8:  if Current satisatd{sat}_{i}\notin\mathcal{RE}\cup{sat}_{d} then
9:     Forward pktpkt or process probing packets
10:  else if Current sati{sat}_{i}\in\mathcal{RE} then
11:     Probe dtri1ridt_{r_{i-1}r_{i}} periodically
12:     Check if AUTHi1{AUTH}_{i-1} has been updated (1)
13:     Check if tsitsi1δri1ri+dtri1rits_{i}-ts_{i-1}\leq\delta_{r_{i-1}r_{i}}+dt_{r_{i-1}r_{i}} (2)
14:     if (1) and (2) are satisfied then
15:        Perform MACKri[0:l]MAC_{K_{r_{i}}}[0:l],  update AUTHi{AUTH}_{i}, forward pktpkt
16:     end if
17:  else {/*current satisat_{i} is the dst sat*/}
18:     Insert tsdts_{d}, forward pktpkt and probe the last segment delay periodically
19:  end if
20:  Step (III): Final verification at DstDst
21:  get AUTHAUTH from pktpkt
22:  Verify pktpkt’s source authorization (1)
23:  Verify HASHHASH (2)
24:  Authenticate MAC values in AUTHAUTH (3)
25:  get the last relay’s tsnAUTHn{ts}_{n}\in AUTH_{n}, δrnd\delta_{r_{n}d}
26:  Check if tsdtsnδrnd+dtrndts_{d}-ts_{n}\leq\delta_{r_{n}{d}}+dt_{r_{n}d} (4)
27:  if (1)-(4) are all satisfied then
28:     Accept pktpkt
29:  else
30:     Drop pktpkt
31:  end if

IV-D Relay-based segment verification

When receiving a packet, the satellite should determine if it is a relay by checking the AUTHAUTH chain. If not, it just forwards it without doing any operations. Otherwise, after negotiating the session keys and obtaining the segment path and relay sequence, periodically, the relay probes with a nonce to its previous relay for some link states like queuing and processing delay. The probing reply packets must have been authenticated hop by hop on this segment path through the neighboring shared symmetric keys [16, 26]. Then, the relay obtains the probing delay dtri1ridt_{r_{i-1}r_{i}} of the segment path. Similarly, satdsat_{d} announces the last segment delay to DstDst. Next, upon receiving normal communication packets, the relay rir_{i} just checks if its previous relay ri1r_{i-1} has updated AUTHi1{AUTH}_{i-1} but ignores its validation as \nameoffloads the step to DstDst. Then, it determines whether the real delay of this segment path has exceeded the upper bound, \ie

{tsitsi1>δri1ri+dtri1ri, drop the packet  otherwise,  updateAUTHi\begin{cases}{ts}_{i}-{ts}_{i-1}>\delta_{r_{i-1}r_{i}}+dt_{r_{i-1}r_{i}},&\text{ drop the packet }\\ \text{ otherwise, }&\text{ update}\ AUTH_{i}\end{cases} (9)

If not, it calculates MACKri(HASH||tsi||ri)[0:l]{MAC}_{K_{r_{i}}}(HASH||ts_{i}||r_{i})[0:l] and inserts it into the packet together with tsits_{i} and sends the packet. If all the intermediate relays have updated the related fields and the packet is forwarded to satd{sat}_{d}, satd{sat}_{d} inserts the time tsdts_{d} when it receives the packet and forwards to DstDst.

IV-E Final path verification at DstDst

When DstDst receives the packet, it verifies the packet in the following steps: (i) it first authenticates the packet’s source validation (this is out of our scope); (ii) after that, it calculates the hash value in the same way as SrcSrc to verify if the packet has been tampered; (iii) then it authenticates the MAC chain of relays by re-computing MACs with their shared session keys to verify that the real path has indeed gone through these relays and passed all these relay’s verifications; (iv) lastly, DstDst authenticates the last segment path in the same way as relay‘s. If all the four conditions are satisfied, DstDst accepts it and considers it not traversing the RARA.

V Security Analysis

Defense against hijacking. When benign nodes outside RARA mis-forward packets into RARA and the packets are redirected to other colluded evil nodes without modifications, the packets are ultimately forwarded to at least a benign node, \eg satd{sat}_{d}. This node will forward them to the next node according to the pre-set PATHPATH. Any path inconsistency will incur an extra delay that exceeds the pre-set segment delay upper bounds. Defense against path counterfeit and modification. Some evil nodes may collude with each other by modifying the PATHPATH sequence or the next relay when the packets have entered the RARA. In the former attack, although the real path is different, DstDst will detect it by authenticating the source and recomputing the packet’s HASHHASH of the planned path; while in the latter case, a packet may skip some nodes. If skipping some normal nodes on a segment path, the segment delay will be prolonged as mentioned above; and if skipping relays, the downstream relays or DstDst will drop the packet as the previous one does not update its AUTHAUTH field. If some colluded satellites forge timestamps and MACs, DstDst will detect it by re-computing the real relay’s MAC chain. Defense against replay. The HASHHASH value contains the timestamp when sending the packet to ensure freshness. Adversaries do not know the session keys, so they cannot forge the source of a packet. Besides, the expired packets will not pass the delay-based verification.

VI Performance Evaluation

Refer to caption
Figure 7: The AUTHAUTH header structure of \name.

Our evaluation in this section focuses on the following aspects related to \name: (i) Q1: can \nameachieve high accuracy for network path verification in dynamic LSNs? (ii) Q2: can \name’s verifiable risk-avoidance routing be exempt from severe delay penalty? (iii) Q3: does \nameinvolve acceptable overhead on satellite routers? and (iv) Q4: can \namescale to large-scale LSNs?

VI-A Experiment setup

Prototype and testbed setups. \nameprototype has two major components: (i) \name’s controller. \namecontroller is implemented on a simulation testbed based on StarryNet [23], a novel docker-based framework to simulate large-scaled LSNs written in Python. The controller reads the satellite location data produced by StarryNet first. Then it invokes the DRSA module to calculate the risk satellites and NLRPNLRPs based on the self-defined risk area. After that, the controller calculates the dynamic relays periodically, obtains the segment detour delay thresholds, and constructs the complete routing path for each communication city pair. (ii) Satellite routers and city pairs. They are simulated as individual containers with a complete TCP/IP stack on StarryNet to provide delay with processing time. Based on IPv6 which has an optional hop-by-hop header for every intermediate node to process packets, the verification-related data (seen in Fig. 7) are embedded in the hop-by-hop header. We use HMAC-SHA256 [34] to calculate the digest and extract its first 4 bytes. SrcSrc pings DstDst continuously. Each ping packet is processed in an individual queue by the module Netfilter [35]. As seen in Alg. 2, after obtaining the segment detour delay thresholds and path from the controller, SrcSrc pre-processes each ping packet by embedding them with timestamp, HASHHASH, and AUTHAUTH fields. The relays update the AUTHAUTH fields and forward the packets to DstDst which makes the final verification decision. The normal nodes forward the packet without extra operations. The whole simulation environment is built on two high-end servers equipped with Xeon(R) Gold 5215 CPUs (2.50GHz) and 512GB memory. Dataset and parameter setting. We choose 197 communication city pairs distributed mainly in America and part of South Asia within the service range of Starlink [36]. To measure the overheads and accuracy, we ping 6000s6000s (longer than an orbital period) for some city pairs with different path lengths and numbers of relays simultaneously on StarryNet. In \name, we set three cases of θ=1/2/3\theta=1/2/3 that measure the distance from the NLRPNLRP to the risk satellites in Constraint 3. We apply Alibi’s relay selection methodology for LSNs (which is also used in §II-C) and select ground stations as relays. Alibi has a similar user-configurable variable f=0/0.5f=0/0.5 to find relays. A larger ff means fewer relays can be found since the target area where relays are located is smaller, but it’s better to resist delay jitters incurred by congestion, \etc We set 2 different-sized countries as risk areas: Egypt and North Korea. Constellation parameters. Our LSN simulation is based on real-world LEO constellation parameters. Specifically, in addition to the constellation and basic network setups in §II-C, we also simulate Amazon Kuiper with 1156 satellites evenly distributed in 34 orbital planes [3].

VI-B Verification accuracy

We set a traffic hijacking scene where packets are forwarded to the risk nodes to see if the prolonged detour delay can be detected. After running our experiments on StarryNet for several hours, \name’s verification accuracy reaches 100%100\% in the cases of different numbers of relays. The real detour delay is larger than the pre-set upper bound, as such, no packet that enters the risk area is considered as not traversing the risk area. In the simulation testbed, Alibi produces 38.7%38.7\% and 27.3%27.3\% average FP and FN ratios when the risk area is Egypt. Such poor accuracy of Alibi results from frequent variation of the GSLs between satellites and static relays.

Refer to caption
(a) Egypt.
Refer to caption
(b) North Korea.
Figure 8: Delay inflation of \name (STAR) and Alibi.

VI-C Network performance

Selecting relays far away from the risk area ensures better verification accuracy but incurs larger delay inflation. So we set a configurable variable θ\theta in Constraint 3 that depicts the size of NLRPNLRP (\ie the distance between the NLRPNLRP borders and the marginal risk satellites) to make a trade-off between verification accuracy and end-to-end delay. As shown in Fig. 8, a larger NLRPNLRP does incur a longer end-to-end delay, which holds true in both constellations as shown in Table I. However, from a global perspective, the average extra delay of \nameis within a reasonable range compared with Alibi. The maximum delay inflation of Alibi reaches 156.54%156.54\% and 175.49%175.49\% in two risk countries respectively when f=0.5f=0.5. Besides, limited by the small number and uneven distribution of ground relays, Alibi cannot always find verifiable relays. When ff is larger, there is a high possibility that no fixed relays will be found. From our analysis, only 112 of the 197 communication pairs can be assigned a fixed relay when the risk area is North Korea. However, \namecan choose global satellites as relays to verify a path only if the users’ access satellites are not located inside the NLRPNLRP. On top of that, Fig. 9 plots the detour delay thresholds under different θ\thetas defined in Constraint 3. \nameachieves a delay buffer from tens to hundreds of milliseconds. This additional buffer against unpredictable delay jitters functions better when the NLRPNLRP is larger. When avoiding Egypt, the detour threshold increases as the θ\theta increases. However, there is no explicit detour threshold increase when avoiding North Korea. For example, the average detour thresholds of the three cases of different θ\thetas in Starlink are all about 75ms, which means when the risk area is small, setting a smaller θ\theta may be enough to achieve a high verification accuracy.

TABLE I: Average delay inflation under different θ\thetas.
Starlink Kuiper
Egypt North Korea Egypt North Korea
θ=1\theta=1 12.44%12.44\% 3.63%3.63\% 10.60%10.60\% 2.37%2.37\%
θ=2\theta=2 23.31%23.31\% 5.44%5.44\% 15.67%15.67\% 3.04%3.04\%
θ=3\theta=3 36.41%36.41\% 9.01%9.01\% 24.73%24.73\% 4.35%4.35\%
Refer to caption
(a) Starlink, RARA is Egypt.
Refer to caption
(b) Kuiper, RARA is Egypt.
Refer to caption
(c) Starlink, RARA is North Korea.
Refer to caption
(d) Kuiper, RARA is North Korea.
Figure 9: Detour thresholds under different cases.

VI-D Verification overheads

We analyze the overheads in two aspects: communication overhead and computation overhead and compare \namewith three crypto-based approaches ICING [13], OPT [14], and EPIC [15]. The verification header length of the three methods increases as the path length grows because they verify the path hop by hop. Communication overhead. Our \namefield length is at most 48B48B no matter how many hops NN a route has as there are two relays at most (one relay consumes 16B16B fields) as shown in Table II. To compare them in a meaningful way, we use a 40B40B IPv6 header plus the security-related fields. As shown in Fig. 10, the longer the path is, the more communication overhead the hop-by-hop methods incur especially ICING. Since the constellation scale is much larger than a single AS in the terrestrial network, it’s normal to transmit traffic on a path with tens of hops in LSNs. Fig. 10 plots the theoretically maximum goodput ratios (GR) under different hops. \nameachieves 110.16%, 43.53%, and 11.33% higher GRs than ICING, OPT, and EPIC respectively in the case of 30 hops, 1024B payload, and the number of relays σ=2\sigma=2.

TABLE II: Security-related field length (Bytes) in different verification methods.
Path Len NN ICING[13] OPT[14] EPIC[15] \name
13+42N13+42N 52+16N52+16N 24+5N24+5N 16/32/48
forN=10for\,N=10 433433 212212 7474 16/32/48
forN=20for\,N=20 853853 372372 124124 16/32/48
forN=30for\,N=30 12731273 532532 174174 16/32/48
TABLE III: Verification delays comparison (μs\mu s). σ\sigma is the number of relays and NN is the path length.
\name EPIC
σ=0,N=35\sigma=0,N=35 172μs\mu s 6241μs\mu s
σ=1,N=32\sigma=1,N=32 308μs\mu s 5820μs\mu s
σ=2,N=34\sigma=2,N=34 550μs\mu s 6062μs\mu s
Refer to caption
(a) 20 hops.
Refer to caption
(b) 30 hops.
Figure 10: Goodput ratios in different hops. (The number of relays of \nameσ=2\sigma=2).

Computational overhead. The complexity of computing relays and detour thresholds is O(|𝒮|N)O(|\mathcal{RS}|\cdot N) and there is no need to calculate them frequently. If none of sats{sat}_{s}, satd{sat}_{d} and NLRPNLRP changes, the relays will change neither. Here we discuss the variation frequency of NLRPNLRP. Fig. 11 plots the variation frequency of NLRPNLRP and the risk satellites 𝒮\mathcal{RS} every 1000s when the risk area is Egypt. In Starlink, the average variation interval of NLRPNLRP’s up and bottom planes is about 260.70s. Generally, the variation frequency of NLRPNLRP is fewer than that of 𝒮\mathcal{RS}. The satellite distribution in Kuiper is sparser, so even if 𝒮\mathcal{RS} changes, the NLRPNLRP may not change. So \namelargely decreases relay selection and key negotiation frequency.

Refer to caption
(a) Starlink.
Refer to caption
(b) Kuiper.
Figure 11: Variation frequency of 𝒮\mathcal{RS} and NLRPNLRP of Egypt.
Refer to caption
Figure 12: Normalized RTTs under different flow scales when avoiding Egypt. (Base is baseline without verification.)
Refer to caption
Figure 13: RARs of all communication pairs in Starlink.

Besides, \nameis not a hop-by-hop verification method, incurring only a little verification delay caused by at most two cryptographic operations. We compare \nameto EPIC which also has one MAC operation per hop. As shown in Table III, \name’s verification delay is 97.2% less than EPIC when the path has 35 hops.

VI-E Scalability analysis

We analyze the RTTs when a path loads different numbers of flows in parallel obtained from StarryNet as shown in Fig. 13. When the number of flows is small, \namenearly incurs no verification delays. As the number of flows grows, \nameincurs more verification delay, especially when σ=2\sigma=2. The average verification delay of processing between 700 and 1000 flows in parallel is 86ms, 92ms, and 134ms in three σ\sigmas respectively. Hence, SNOs should consider setting a larger NLRPNLRP when the number of flows is large. Next, we analyze the number of required relays. If the number is small, the key negotiation overhead is low. \namewill choose a certain number σ\sigma of relays for a communication pair cpcp at a certain time. The proportion of these time slots when selecting σ\sigma relays is RARσcpRAR_{\sigma}^{\,cp}. For example, \nameselects a relay for a pair cpcp for 600s during the past 1000s, so RAR1cp=600/1000=0.6RAR_{1}^{\,cp}=600/1000=0.6. Fig. 13 plots the boxplot of RARσRAR_{\sigma}s of 197 global pairs in Starlink when avoiding Egypt. The average RAR2RAR_{2} of all these pairs when θ=1\theta=1 is only 29.6%.

VII Discussion

Probing period. If the probing period is too short, more probing packets are needed; and if it’s too long, the previously measured delay ground truth may not work if the path has changed. Based on our simulations, we quantify the path variation frequency. We set the access strategy that the end users connect to the nearest satellites. The results show that when the risk area is Egypt and θ=1\theta=1, the paths vary every 26.2s and 26.7s on average in Starlink and Kuiper respectively during the 6000s. The maximum variation interval is 124s and 148s respectively. Normally, a path variation occurs when either of the following cases occurs: i) the access satellites of the end-users vary, or ii) the risk satellites vary. In addition, the path frequency varies with different-sized risk areas. In the future, we will further quantify the modest probing period considering the path variation. Real-world deployment. Since an SNO controls an individual satellite network, the related verification protocols and standards can be deployed in its satellites, and there are encrypted tunnels among the end terminals (\eg dish), satellites, and ground stations [32] to transmit secret authentication information. \namecan be deployed on the Path-Aware Internet Architecture [30, 37, 38, 31] where endpoints can customize paths for given destinations, flows, or packets. After the packets are sent out, satellites follow the forwarding paths embedded in the packets. Avoidance of multiple risk areas. Multiple risk areas may be set by the SNO simultaneously and \namestill works by deciding the intersection relations between the frame constructed by the access satellites and the NLRPNLRP of each risk area. The SNO can set some middle waypoints between adjacent risk areas. Thus the packets are forwarded to these waypoints in order. Each adjacent waypoint pair (including access satellites) is like an individual city pair’s access satellites and the path between them avoids a single risk area. Besides, if these risk areas are close, SNO can aggregate their NLRPNLRPs as a larger one and then follow the way of \name. So it’s possible to have only 2 relays when avoiding two risk areas located closely but the aggregated NLRPNLRP will be larger. In future work, we will apply \nameto the cases where end users are in the NLRPNLRPs.

VIII Related Works

We briefly discuss other related works uncovered by §II-C. Path-Aware Networking (PAN). PAN architecture proposes a way for end-users to self-define the paths in data planes flexibly [30, 37]. All these works provide a basis for the source to insert a path into the packet to guide the intermediate nodes to forward it. LSN routing. There are few routing methods aimed at avoiding risk areas in LSNs, so we roughly introduce some routing methods that can be modified to apply in avoiding risk areas. In some solutions [20, 39], the source calculates a low-risk path by utilizing the topology that eliminates risk nodes in advance and inserts it into the header of each packet. Location-based routing [21] proposes a distributed geographical routing method that utilizes the information of ground cells and relative locations to decide which is the next hop. LRAR [40] is the only routing method for avoiding risk areas. Though these ways can be used to avoid risk areas, it’s hard to prove the real avoidance. Traffic engineering in LSNs. Some traffic engineering methods [41, 42, 43] can transfer the risk nodes into faulty nodes and consider them unreachable. As such, they predict the failure and back up all routing tables in advance. But it brings a lot of storage burden to satellites. StarCure [44] turns the failure nodes (risk nodes) into congested ones and schedules traffic onto other available routes. But it also lacks the ability to verify that the paths avoid traversing the risk area.

IX Conclusion

Dynamic LEO satellites may enter the risk areas and suffer from security issues like hijacking and information stealing in LSNs. To prove that the real route does avoid the risk areas, a path verification method should be proposed in LSNs. However, existing path verification methods can not adapt to the highly dynamic LSNs for their high communication or computation overheads in crypto-based ways, and low accuracy in delay-based ways. Therefore, we propose the lightweight \namethat integrates the advantages of both methods and utilizes satellite trajectories, routing information, and propagation delays to verify that the real path does avoid the risk area. Our extensive simulation proves that \namecan achieve near 100% accuracy. Besides, compared with those hop-by-hop methods, \namelargely reduces overheads and has great scalability.

X Acknowledgements

We thank our shepherd Olaf Maennel and the anonymous ICNP reviewers for their comments and suggestions. This work is supported by the National Key R&D Program of China (No. 2022YFB3105203) and the National Natural Science Foundation of China (NSFC No.62372259).

References

  • [1] N. NEWS, “Traffic from elon musk’s starlink satellites tripled this year, says new report,” https://www.nbcnews.com/tech/innovation/elon-musk-starlink-satellite-traffic-brazil-us-ukraine-gaza-rcna129100, 2023.
  • [2] SpaceX, “Starlink constellation,” https://www.starlink.com/, 2024.
  • [3] Amazon, “Project kuiper.” https://www.aboutamazon.com/what-we-do/devices-services/project-kuiper, 2024.
  • [4] “SpaceX FCC update. SPACEX NON-GEOSTATIONARY SATELLITE SYSTEM.” https://licensing.fcc.gov/myibfs/download.do?attachment_key=1569860, 2024.
  • [5] “Kuiper Systems LLC. Application of Kuiper Systems LLC for Authority to Launch and Operate a Non-Geostationary Satellite Orbit System in Ka-band Frequencies.” https://licensing.fcc.gov/myibfs/download.do?attachment_key=1773885, 2024.
  • [6] J. space page, “Starlink statistics,” https://planet4589.org/space/con/star/stats.html, 2024.
  • [7] T. Mogg, “Spacex’s starlink internet service reaches milestone,” https://www.yahoo.com/tech/spacex-reaches-milestone-starlink-internet-032052994.html?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAAMC55FtwTqRzd8xlcxcNuLrFirz7NqDFpidjs0vdCYKcFZVdSHyr9H8VSHJg0GHdOjgwOTNui5l2hW6HhDFHtVh8bDx4B1kq2hQ1BCE6WLU7gKSDYXWBwsSZFFwDgoHL2fkNrg1kt_vsscXOoCvjAoNPul3h72WbecsefO4nrexV, 2024.
  • [8] E. Musk, https://twitter.com/elonmusk/status/1500026380704178178?ref_src=twsrc%5Etfw., 2022.
  • [9] “Russian hackers hijack satellite to steal data from thousands of hacked computers,” https://thehackernews.com/2015/09/hacking-satellite.html, 2015.
  • [10] D. R. Staff, “Russian satellite internet downed via attackers claiming ties to wagner group,” https://www.darkreading.com/cyberattacks-data-breaches/hackers-claiming-wagner-group-ties-down-russian-satellite-internet-comms-, 2023.
  • [11] R. Lemos, “Space race: Defenses emerge as satellite-focused cyberattacks ramp up,” https://www.darkreading.com/ics-ot-security/space-race-defenses-satellite-cyberattacks, 2023.
  • [12] I. Thomson, “Want to pwn a satellite? turns out it’s surprisingly easy,” https://www.theregister.com/2023/08/11/satellite_hacking_black_hat/, 2023.
  • [13] J. Naous, M. Walfish, A. Nicolosi, D. Mazières, M. Miller, and A. Seehra, “Verifying and enforcing network paths with icing,” in Proceedings of the Seventh Conference on Emerging Networking EXperiments and Technologies, 2011.
  • [14] T. H.-J. Kim, C. Basescu, L. Jia, S. B. Lee, Y.-C. Hu, and A. Perrig, “Lightweight source authentication and path validation,” in Proceedings of the 2014 ACM Conference on SIGCOMM, 2014, pp. 271–282.
  • [15] M. Legner, T. Klenze, M. Wyss, C. Sprenger, and A. Perrig, “EPIC: Every packet is checked in the data plane of a Path-Aware internet,” in 29th USENIX Security Symposium, 2020, pp. 541–558.
  • [16] D. Levin, Y. Lee, L. Valenta, Z. Li, V. Lai, C. Lumezanu, N. Spring, and B. Bhattacharjee, “Alibi routing,” in Proceedings of the 2015 SIGCOMM, 2015, pp. 611–624.
  • [17] Z. Li, S. Herwig, and D. Levin, “DeTor: Provably avoiding geographic regions in tor,” in 26th USENIX Security Symposium, 2017, pp. 343–359.
  • [18] K. Kohls, K. Jansen, D. Rupprecht, T. Holz, and C. Pöpper, “On the challenges of geographical avoidance for tor,” in Network and Distributed System Security Symposium, 2019.
  • [19] S. Agarwal and J. R. Lorch, “Matchmaking for online games and other latency-sensitive p2p systems,” in Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication, 2009, pp. 315–326.
  • [20] M. Handley, “Delay is not an option: Low latency routing in space,” in Proceedings of the 17th ACM Workshop on Hot Topics in Networks, 2018, pp. 85–91.
  • [21] Y. Li, L. Liu, H. Li, W. Liu, Y. Chen, W. Zhao, J. Wu, Q. Wu, J. Liu, and Z. Lai, “Stable hierarchical routing for operational leo networks,” in Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, 2024, pp. 296–311.
  • [22] H. B. Tanveer, M. Puchol, R. Singh, A. Bianchi, and R. Nithyanand, “Making sense of constellations: Methodologies for understanding starlink’s scheduling algorithms,” in Companion of the 19th International Conference on Emerging Networking EXperiments and Technologies, 2023, pp. 37–43.
  • [23] Z. Lai, H. Li, Y. Deng, Q. Wu, J. Liu, Y. Li, J. Li, L. Liu, W. Liu, and J. Wu, “StarryNet: Empowering researchers to evaluate futuristic integrated space and terrestrial networks,” in 20th USENIX Symposium on Networked Systems Design and Implementation, 2023, pp. 1309–1324.
  • [24] “Satellite map,” https://satellitemap.space/, 2024.
  • [25] Y. Zhang, Q. Wu, Z. Lai, and H. Li, “Enabling low-latency-capable satellite-ground topology for emerging leo satellite networks,” in IEEE Conference on Computer Communications, 2022, pp. 1329–1338.
  • [26] B. Wu, K. Xu, Q. Li, Z. Liu, Y.-C. Hu, M. J. Reed, M. Shen, and F. Yang, “Enabling efficient source and path verification via probabilistic packet marking,” in 2018 IEEE/ACM 26th International Symposium on Quality of Service, 2018, pp. 1–10.
  • [27] S. Fu, Q. Li, M. Zhu, X. Wang, S. Yao, Y. Guo, X. Du, and K. Xu, “Mask: Practical source and path verification based on multi-as-key,” IEEE/ACM Transactions on Networking, pp. 1478–1493, 2023.
  • [28] FCC.report, “Space exploration technologies corp.” https://fcc.report/company/Space-Exploration-Technologies-Corp, 2024.
  • [29] J. Kwon, J. A. García-Pardo, M. Legner, F. Wirz, M. Frei, D. Hausheer, and A. Perrig, “Scionlab: A next-generation internet testbed,” in 2020 IEEE 28th International Conference on Network Protocols, 2020, pp. 1–12.
  • [30] A. Perrig, P. Szalachowski, R. M. Reischuk, and L. Chuat, SCION: a secure Internet architecture.   Springer, 2017.
  • [31] B. Raghavan, P. Verkaik, and A. C. Snoeren, “Secure and policy-compliant source routing,” IEEE/ACM Transactions on Networking, pp. 764–777, 2009.
  • [32] J. Patents, “Low latency schedule-driven handovers,” https://patents.justia.com/patent/11949496, 2024.
  • [33] R. M. Karp, Reducibility Among Combinatorial Problems.   Springer, 2010.
  • [34] “Hashlib — Secure hashes and message digests,” https://docs.python.org/3/library/hashlib.html, 2024.
  • [35] T. N. webmasters, “The netfilter.org project,” https://netfilter.org/, 2024.
  • [36] Starlink, “Starlink availability map,” https://www.starlink.com/map, 2024.
  • [37] T. Anderson, K. Birman, R. Broberg, M. Caesar, D. Comer, C. Cotton, M. J. Freedman, A. Haeberlen, Z. G. Ives, A. Krishnamurthy et al., The nebula future internet architecture.   Springer, 2013.
  • [38] P. B. Godfrey, I. Ganichev, S. Shenker, and I. Stoica, “Pathlet routing,” SIGCOMM Comput. Commun. Rev., vol. 39, no. 4, 2009.
  • [39] M. Handley, “Using ground relays for low-latency wide-area routing in megaconstellations,” in Proceedings of the 18th ACM Workshop on Hot Topics in Networks, 2019, pp. 125–132.
  • [40] Z. Zhao, Q. Wu, H. Li, Z. Lai, and J. Liu, “Lrar: A lightweight risk-avoidance routing algorithm for leo satellite networks,” in 2021 International Wireless Communications and Mobile Computing, 2021, pp. 223–228.
  • [41] K. Lakshminarayanan, M. Caesar, M. Rangan, T. Anderson, S. Shenker, and I. Stoica, “Achieving convergence-free routing using failure-carrying packets,” in Proceedings of the 2007 SIGCOMM, 2007, pp. 241–252.
  • [42] Y. Wang, H. Wang, A. Mahimkar, R. Alimi, Y. Zhang, L. Qiu, and Y. R. Yang, “R3: resilient routing reconfiguration,” in Proceedings of the 2010 SIGCOMM, 2010, pp. 291–302.
  • [43] J. Liu, A. Panda, A. Singla, B. Godfrey, M. Schapira, and S. Shenker, “Ensuring connectivity via data plane mechanisms,” in 10th USENIX Symposium on Networked Systems Design and Implementation, 2013, pp. 113–126.
  • [44] Z. Lai, H. Li, Y. Wang, Q. Wu, Y. Deng, J. Liu, Y. Li, and J. Wu, “Achieving resilient and performance-guaranteed routing in space-terrestrial integrated networks,” in IEEE Conference on Computer Communications, 2023, pp. 1–10.