Javascript must be enabled to continue!
Survey on Security for Non-Terrestrial Networks
View through CrossRef
Non-terrestrial networks (NTN) are studied in a way that goes beyond the environmental limitations of existing terrestrial networks. In particular, it ensures connectivity in remote areas, rural areas, and areas where communication infrastructure is insufficient.NTN leverages state-of-the-art space and aviation platforms to provide highly versatile services in domains such as IoT and disaster management. These NTNs are the cornerstone of next-generation communication systems, and at the same time, they are likely to address gaps in the connectivity of communications. In this paper, we examine the latest trends related to the security of NTN, and analyze its network-specific characteristics, methodologies, and challenges. Integrating NTN with the ground infrastructure creates security challenges such as seamless handover management between satellites and ground systems, cyber threats from quantum computers, and development of encryption technologies for IoT environments with limited resources. To address these challenges, this study categorizes NTN security requirements into security requirements that apply to all network operations and security requirements for the inherent vulnerabilities of NTN. According to the analysis of NTN, it highlights the need for Post Quantum encryption algorithm, robust handover security protocol, and lightweight encryption method suitable for the dynamic and resource-limited nature of NTN. Advanced technologies such as AI-based threat detection, blockchain-based mechanisms for data integrity, and adaptive security frameworks are showing the possibility of secure and scalable NTN communication. This paper raises recommendations for the secure integration of NTN with ground network based on the results of a recent comprehensive study. This survey provides direction to aid in the development of standardized security protocol and at the same time provide NTN future oriented communication solution. Addressing these challenges will show the potential of NTN as a key component of the global communication infrastructure in the coming era.
Title: Survey on Security for Non-Terrestrial Networks
Description:
Non-terrestrial networks (NTN) are studied in a way that goes beyond the environmental limitations of existing terrestrial networks.
In particular, it ensures connectivity in remote areas, rural areas, and areas where communication infrastructure is insufficient.
NTN leverages state-of-the-art space and aviation platforms to provide highly versatile services in domains such as IoT and disaster management.
These NTNs are the cornerstone of next-generation communication systems, and at the same time, they are likely to address gaps in the connectivity of communications.
In this paper, we examine the latest trends related to the security of NTN, and analyze its network-specific characteristics, methodologies, and challenges.
Integrating NTN with the ground infrastructure creates security challenges such as seamless handover management between satellites and ground systems, cyber threats from quantum computers, and development of encryption technologies for IoT environments with limited resources.
To address these challenges, this study categorizes NTN security requirements into security requirements that apply to all network operations and security requirements for the inherent vulnerabilities of NTN.
According to the analysis of NTN, it highlights the need for Post Quantum encryption algorithm, robust handover security protocol, and lightweight encryption method suitable for the dynamic and resource-limited nature of NTN.
Advanced technologies such as AI-based threat detection, blockchain-based mechanisms for data integrity, and adaptive security frameworks are showing the possibility of secure and scalable NTN communication.
This paper raises recommendations for the secure integration of NTN with ground network based on the results of a recent comprehensive study.
This survey provides direction to aid in the development of standardized security protocol and at the same time provide NTN future oriented communication solution.
Addressing these challenges will show the potential of NTN as a key component of the global communication infrastructure in the coming era.
Related Results
A Survey Non-Terrestrial Networks in 6G/ 7G Smart Network for 2035+ and Beyond
A Survey Non-Terrestrial Networks in 6G/ 7G Smart Network for 2035+ and Beyond
3GPP TR 38.821, “Solutions for NR to support non-terrestrial networks (NTN),” Release 16, Jan. 2020. [Online]. Available: https://www.3gpp.org/.
P. K. Chowdhury, M. Atiquzzaman, W....
Adaptive Strategies of the invasive aquatic plant,
Ludwigia grandiflora
subps.
hexapetala
: Contrasting Plasticity Between Aquatic and Terrestrial Morphotypes
Adaptive Strategies of the invasive aquatic plant,
Ludwigia grandiflora
subps.
hexapetala
: Contrasting Plasticity Between Aquatic and Terrestrial Morphotypes
Abstract
Biological invasion is the fifth biggest threat to biodiversity and ecosystem processes. Invasive species are able to colonise new envir...
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...
Pitcher morphology and pitcher coloring of Nepenthes mirabilis Druce. from East Kalimantan, Indonesia
Pitcher morphology and pitcher coloring of Nepenthes mirabilis Druce. from East Kalimantan, Indonesia
Abstract. Handayani T, Hadiah JT. 2019. Pitcher morphology and pitcher coloring of Nepenthes mirabilis Druce. from East Kalimantan, Indonesia. Biodiversitas 20: 2824-2832. The shap...
Ecological Assessment of the Terrestrial Biomes for Wildlife in Iran
Ecological Assessment of the Terrestrial Biomes for Wildlife in Iran
Abstract
Man-made activities owing to damage and fragmentation of habitat are the biggest threats to the biodiversity of Iran's Terrestrial Biomes in recent years. To fully...
CYBER SECURITY UNVEILED PROTECTING THE DIGITAL FRONTIER
CYBER SECURITY UNVEILED PROTECTING THE DIGITAL FRONTIER
“CYBER SECURITY UNVEILED: PROTECTING THE DIGITAL FRONTIER” is a comprehensive guide designed to illuminate the multifaceted world of cyber security, offering both novices and exper...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
SECURITY REQUIREMENTS VALIDATION FOR MOBILE APPS: A SYSTEMATIC LITERATURE REVIEW
SECURITY REQUIREMENTS VALIDATION FOR MOBILE APPS: A SYSTEMATIC LITERATURE REVIEW
Security requirements are important to increase the confidence of mobile users to perform many online transactions, such as banking, booking and payment via mobile devices. Object...

