{"id":"https://openalex.org/W7127985629","doi":"https://doi.org/10.1007/s10207-025-01184-z","title":"Design of a resilient multi-layered security framework for satellite communications","display_name":"Design of a resilient multi-layered security framework for satellite communications","publication_year":2026,"publication_date":"2026-02-05","ids":{"openalex":"https://openalex.org/W7127985629","doi":"https://doi.org/10.1007/s10207-025-01184-z"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-025-01184-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01184-z","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01184-z.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01184-z.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5117199000","display_name":"Fadwa Belali","orcid":null},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]},{"id":"https://openalex.org/I127336678","display_name":"Ecole Mohammadia d'Ing\u00e9nieurs","ror":"https://ror.org/00md3qm14","country_code":"MA","type":"education","lineage":["https://openalex.org/I127336678"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Fadwa Belali","raw_affiliation_strings":["Smart Communications Research Team, Mohammadia School of Engineers, Mohammed V University in Rabat, Avenue Ibn Sina B.P 765, Agdal, Rabat, 10090, Morocco","University Center for Research in Space Technologies, Mohammadia School of Engineers, Mohammed V University in Rabat, Avenue Ibn Sina B.P 765, Agdal, Rabat, 10090, Morocco"],"affiliations":[{"raw_affiliation_string":"Smart Communications Research Team, Mohammadia School of Engineers, Mohammed V University in Rabat, Avenue Ibn Sina B.P 765, Agdal, Rabat, 10090, Morocco","institution_ids":["https://openalex.org/I126477371","https://openalex.org/I127336678"]},{"raw_affiliation_string":"University Center for Research in Space Technologies, Mohammadia School of Engineers, Mohammed V University in Rabat, Avenue Ibn Sina B.P 765, Agdal, Rabat, 10090, Morocco","institution_ids":["https://openalex.org/I126477371","https://openalex.org/I127336678"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5117198999","display_name":"Abdellah Essetty","orcid":null},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]},{"id":"https://openalex.org/I127336678","display_name":"Ecole Mohammadia d'Ing\u00e9nieurs","ror":"https://ror.org/00md3qm14","country_code":"MA","type":"education","lineage":["https://openalex.org/I127336678"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Abdellah Essetty","raw_affiliation_strings":["Smart Communications Research Team, Mohammadia School of Engineers, Mohammed V University in Rabat, Avenue Ibn Sina B.P 765, Agdal, Rabat, 10090, Morocco","University Center for Research in Space Technologies, Mohammadia School of Engineers, Mohammed V University in Rabat, Avenue Ibn Sina B.P 765, Agdal, Rabat, 10090, Morocco"],"affiliations":[{"raw_affiliation_string":"Smart Communications Research Team, Mohammadia School of Engineers, Mohammed V University in Rabat, Avenue Ibn Sina B.P 765, Agdal, Rabat, 10090, Morocco","institution_ids":["https://openalex.org/I126477371","https://openalex.org/I127336678"]},{"raw_affiliation_string":"University Center for Research in Space Technologies, Mohammadia School of Engineers, Mohammed V University in Rabat, Avenue Ibn Sina B.P 765, Agdal, Rabat, 10090, Morocco","institution_ids":["https://openalex.org/I126477371","https://openalex.org/I127336678"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040809962","display_name":"Slimane Bah","orcid":"https://orcid.org/0000-0002-3263-5989"},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]},{"id":"https://openalex.org/I127336678","display_name":"Ecole Mohammadia d'Ing\u00e9nieurs","ror":"https://ror.org/00md3qm14","country_code":"MA","type":"education","lineage":["https://openalex.org/I127336678"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Slimane Bah","raw_affiliation_strings":["Smart Communications Research Team, Mohammadia School of Engineers, Mohammed V University in Rabat, Avenue Ibn Sina B.P 765, Agdal, Rabat, 10090, Morocco","University Center for Research in Space Technologies, Mohammadia School of Engineers, Mohammed V University in Rabat, Avenue Ibn Sina B.P 765, Agdal, Rabat, 10090, Morocco"],"affiliations":[{"raw_affiliation_string":"Smart Communications Research Team, Mohammadia School of Engineers, Mohammed V University in Rabat, Avenue Ibn Sina B.P 765, Agdal, Rabat, 10090, Morocco","institution_ids":["https://openalex.org/I126477371","https://openalex.org/I127336678"]},{"raw_affiliation_string":"University Center for Research in Space Technologies, Mohammadia School of Engineers, Mohammed V University in Rabat, Avenue Ibn Sina B.P 765, Agdal, Rabat, 10090, Morocco","institution_ids":["https://openalex.org/I126477371","https://openalex.org/I127336678"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085960002","display_name":"Ilyas El Wafi","orcid":"https://orcid.org/0000-0003-1346-1538"},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]},{"id":"https://openalex.org/I127336678","display_name":"Ecole Mohammadia d'Ing\u00e9nieurs","ror":"https://ror.org/00md3qm14","country_code":"MA","type":"education","lineage":["https://openalex.org/I127336678"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Ilyas El Wafi","raw_affiliation_strings":["University Center for Research in Space Technologies, Mohammadia School of Engineers, Mohammed V University in Rabat, Avenue Ibn Sina B.P 765, Agdal, Rabat, 10090, Morocco"],"affiliations":[{"raw_affiliation_string":"University Center for Research in Space Technologies, Mohammadia School of Engineers, Mohammed V University in Rabat, Avenue Ibn Sina B.P 765, Agdal, Rabat, 10090, Morocco","institution_ids":["https://openalex.org/I126477371","https://openalex.org/I127336678"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028285935","display_name":"Amina Daghouri","orcid":"https://orcid.org/0000-0002-6249-0784"},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]},{"id":"https://openalex.org/I127336678","display_name":"Ecole Mohammadia d'Ing\u00e9nieurs","ror":"https://ror.org/00md3qm14","country_code":"MA","type":"education","lineage":["https://openalex.org/I127336678"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Amina Daghouri","raw_affiliation_strings":["University Center for Research in Space Technologies, Mohammadia School of Engineers, Mohammed V University in Rabat, Avenue Ibn Sina B.P 765, Agdal, Rabat, 10090, Morocco"],"affiliations":[{"raw_affiliation_string":"University Center for Research in Space Technologies, Mohammadia School of Engineers, Mohammed V University in Rabat, Avenue Ibn Sina B.P 765, Agdal, Rabat, 10090, Morocco","institution_ids":["https://openalex.org/I126477371","https://openalex.org/I127336678"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5117199000"],"corresponding_institution_ids":["https://openalex.org/I126477371","https://openalex.org/I127336678"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.39809236,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12042","display_name":"Satellite Communication Systems","score":0.4779999852180481,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12042","display_name":"Satellite Communication Systems","score":0.4779999852180481,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12717","display_name":"Space exploration and regulation","score":0.051100000739097595,"subfield":{"id":"https://openalex.org/subfields/3103","display_name":"Astronomy and Astrophysics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.04349999874830246,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4959999918937683},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4925999939441681},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.48910000920295715},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.4837999939918518},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.48350000381469727},{"id":"https://openalex.org/keywords/communications-satellite","display_name":"Communications satellite","score":0.40209999680519104},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.39320001006126404},{"id":"https://openalex.org/keywords/synchronization","display_name":"Synchronization (alternating current)","score":0.38749998807907104},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.36910000443458557},{"id":"https://openalex.org/keywords/single-point-of-failure","display_name":"Single point of failure","score":0.3628999888896942}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7940000295639038},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5430999994277954},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4959999918937683},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4925999939441681},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.48910000920295715},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.4837999939918518},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.48350000381469727},{"id":"https://openalex.org/C121308736","wikidata":"https://www.wikidata.org/wiki/Q149918","display_name":"Communications satellite","level":3,"score":0.40209999680519104},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.39320001006126404},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.38749998807907104},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.36910000443458557},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.3628999888896942},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.3522000014781952},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3458999991416931},{"id":"https://openalex.org/C2779033394","wikidata":"https://www.wikidata.org/wiki/Q5186733","display_name":"Critical infrastructure protection","level":3,"score":0.3379000127315521},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.3352999985218048},{"id":"https://openalex.org/C2780945871","wikidata":"https://www.wikidata.org/wiki/Q194274","display_name":"Backup","level":2,"score":0.3273000121116638},{"id":"https://openalex.org/C151423352","wikidata":"https://www.wikidata.org/wiki/Q5154228","display_name":"Communications security","level":3,"score":0.31790000200271606},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.31290000677108765},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.31189998984336853},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2971000075340271},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.29120001196861267},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.2856999933719635},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.28380000591278076},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.2831999957561493},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.28060001134872437},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.27570000290870667},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.27399998903274536},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.2720000147819519},{"id":"https://openalex.org/C19269812","wikidata":"https://www.wikidata.org/wiki/Q26540","display_name":"Satellite","level":2,"score":0.2619999945163727},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.26010000705718994},{"id":"https://openalex.org/C196903269","wikidata":"https://www.wikidata.org/wiki/Q6059063","display_name":"Intrusion tolerance","level":3,"score":0.2549000084400177},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.2524000108242035},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.2513999938964844},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.25130000710487366},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.25040000677108765}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-025-01184-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01184-z","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01184-z.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10207-025-01184-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01184-z","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01184-z.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.672338604927063}],"awards":[],"funders":[{"id":"https://openalex.org/F4320313991","display_name":"Universit\u00e9 Mohammed V de Rabat","ror":"https://ror.org/00r8w8f84"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7127985629.pdf"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W54751438","https://openalex.org/W147005573","https://openalex.org/W1581058907","https://openalex.org/W2018093989","https://openalex.org/W2100846830","https://openalex.org/W2146753502","https://openalex.org/W2148552777","https://openalex.org/W2154909745","https://openalex.org/W2478945892","https://openalex.org/W2501497351","https://openalex.org/W2579383323","https://openalex.org/W2694044524","https://openalex.org/W2909139152","https://openalex.org/W2966066598","https://openalex.org/W2967142103","https://openalex.org/W3008216112","https://openalex.org/W3011394151","https://openalex.org/W3024934165","https://openalex.org/W3045615609","https://openalex.org/W3157435179","https://openalex.org/W3193670233","https://openalex.org/W3210236862","https://openalex.org/W3212460484","https://openalex.org/W4205179503","https://openalex.org/W4210863149","https://openalex.org/W4237795257","https://openalex.org/W4285501141","https://openalex.org/W4293253992","https://openalex.org/W4404094142","https://openalex.org/W4404645681"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"The":[1,114,186],"rapid":[2],"advancement":[3],"of":[4,21,37,45,94,154,161,200,216],"satellite":[5,22,46,202],"technologies":[6],"driven":[7],"by":[8],"miniaturization,":[9],"automation,":[10],"and":[11,27,80,92,99,125,142,152,169],"cost-effective":[12],"manufacturing":[13],"has":[14],"a":[15,34,66,72,126,189],"significant":[16],"impact":[17],"on":[18],"the":[19,42,51,105,137,159,162,196,213],"role":[20],"systems":[23],"in":[24,110,165],"critical":[25],"infrastructure":[26],"global":[28],"communications.":[29],"However,":[30],"this":[31],"expansion":[32],"accompanies":[33],"growing":[35],"array":[36],"security":[38,68,112,192],"threats,":[39],"particularly":[40],"at":[41,211],"application":[43],"layer":[44],"communication":[47,129],"protocols":[48],"such":[49,145,183],"as":[50,146,184],"CCSDS":[52],"(Consultative":[53],"Committee":[54],"for":[55,207],"Space":[56],"Data":[57],"Systems)":[58],"File":[59],"Delivery":[60],"Protocol":[61],"(CFDP).":[62],"This":[63,86],"paper":[64,106],"proposes":[65],"novel":[67],"architecture":[69,164],"that":[70],"integrates":[71],"hybrid":[73],"cryptographic":[74],"framework":[75,139,193],"combining":[76],"Advanced":[77],"Encryption":[78],"Standard":[79],"Elliptic":[81],"Curve":[82],"Cryptography":[83],"within":[84],"CFDP.":[85],"integration":[87],"ensures":[88],"end-to-end":[89],"confidentiality,":[90],"integrity,":[91,173],"authentication":[93],"file":[95],"transfers":[96],"between":[97],"satellites":[98],"ground":[100],"stations.":[101],"In":[102],"doing":[103],"so,":[104],"addresses":[107],"emerging":[108],"vulnerabilities":[109],"current":[111],"architectures.":[113],"proposed":[115,163],"design":[116],"further":[117],"enhances":[118],"system":[119],"resilience":[120],"through":[121],"GPS-based":[122],"time":[123],"synchronization":[124],"dual-band":[127],"UHF/S-band":[128],"strategy.":[130],"A":[131],"comprehensive":[132],"threat":[133],"modeling":[134],"analysis":[135],"using":[136],"STRIDE":[138],"systematically":[140],"identifies":[141],"mitigates":[143],"risks":[144],"spoofing,":[147],"tampering,":[148],"repudiation,":[149],"information":[150],"disclosure,":[151],"elevation":[153],"privileges.":[155],"Comparative":[156],"evaluations":[157],"demonstrate":[158],"robustness":[160],"countering":[166],"cyber":[167],"intrusions":[168],"safeguarding":[170],"application-layer":[171],"data":[172],"while":[174],"also":[175],"highlighting":[176],"persistent":[177],"challenges":[178],"related":[179],"to":[180,195],"physical-layer":[181],"attacks":[182],"jamming.":[185],"results":[187],"establish":[188],"robust,":[190],"multi-layered":[191],"adapted":[194],"specific":[197],"operational":[198],"constraints":[199],"modern":[201],"systems,":[203],"offering":[204],"valuable":[205],"insights":[206],"future":[208],"research":[209],"aimed":[210],"strengthening":[212],"cybersecurity":[214],"posture":[215],"space-based":[217],"networks.":[218]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2026-02-07T00:00:00"}
