Session

Weekday Session 7: Advanced Technologies III

Location

Utah State University, Logan, UT

Abstract

Increased access to space has opened the door to many satellite vendors. These vendors are collecting data using a variety of sensors, including electro-optical, radio frequency, and synthetic aperture radar. Customers want true-sourced, authentic data. However, as with any lower barrier to entry, the risk of counterfeit, tampered, or low-quality products increases. In this work, we describe the key requirements for trusting imagery and present a hardware design and a system of controls that meet those requirements of trust for Earth imaging satellites. Our trusted hardware provides assurance of capture time, location, and preserves the content and origin by capturing and digitally signing the information end users need to make trust decisions about the data. Our hardware functions as an independent witness that oversees and signs off on satellite collection activities. Anti-tamper, inspection, and verification measures protect and verify the secure operation of our hardware. Satellite operators that use this approach in their satellites and operations will offer their end users greater assurance in the authenticity of the produced satellite imagery products.

Share

COinS
 
Aug 10th, 11:30 AM

On Trusting Third-party Satellite Data

Utah State University, Logan, UT

Increased access to space has opened the door to many satellite vendors. These vendors are collecting data using a variety of sensors, including electro-optical, radio frequency, and synthetic aperture radar. Customers want true-sourced, authentic data. However, as with any lower barrier to entry, the risk of counterfeit, tampered, or low-quality products increases. In this work, we describe the key requirements for trusting imagery and present a hardware design and a system of controls that meet those requirements of trust for Earth imaging satellites. Our trusted hardware provides assurance of capture time, location, and preserves the content and origin by capturing and digitally signing the information end users need to make trust decisions about the data. Our hardware functions as an independent witness that oversees and signs off on satellite collection activities. Anti-tamper, inspection, and verification measures protect and verify the secure operation of our hardware. Satellite operators that use this approach in their satellites and operations will offer their end users greater assurance in the authenticity of the produced satellite imagery products.