In the vast expanse of space, satellites orbit silently, serving as the connected backbone of our modern world. A fast-proliferating network of satellites forms the critical infrastructure that supports global communication, navigation, weather forecasting, defensive operations and more. Today’s global space economy is huge, forecasted to total more than $600 billion annually in 2024.
Internet of Things (IoT) components are integral to next-generation satellites. Designed to optimize efficiency and enhance functionality, IoT satellite devices and systems provide better communication, data transmission, onboard data processing, power management and more. But the interconnectedness of these space-based systems is also one of their primary vulnerabilities. Along with threats from old school signal jamming and interference from terrestrial locations, IoT components make modern spacecraft vulnerable to a new attack vector — other satellites within this massive and growing network.
Similar to how a flaw in one device can compromise an entire network in terrestrial IoT, a security breach in one satellite can have cascading effects on others to which it is connected. That opens doors for malicious actors to exploit weaknesses in satellite communication protocols, command systems or software, potentially causing disruptions or even total loss of control over these orbiting assets.
Challenges in securing satellites from IoT threats
The lack of standardized security protocols across diverse commercial, civil, and military satellite developers exacerbates this vulnerability, and many approaches to satellite cybersecurity come with their own challenges. For example, protecting satellites with onboard hardware-based security solutions is expensive, and the components are physically heavy and add costs to satellite launches and operations.
The physical nature and area of operations for satellites presents additional challenges. Unlike terrestrial devices, satellites deployed into orbit cannot be easily accessed for security updates or physical maintenance.
Additionally, due to the large increase in satellites operating closer to each other, phenomena such as Adjacent Satellite Interference (ASI), or signals from one satellite interfering with those of another due to frequency similarities, can and do occur. Such interference can lead to degraded signal quality, data corruption or complete disruption of communications. A terrestrial analogy would be experiencing interference on your car radio when two nearby radio stations broadcast on very close frequencies.
The United Nations Office for Outer Space Affairs facilitates agreements about space activities, including coordinating satellite orbits to avoid interference and conflicts among different space-faring nations. Satellite operators are also supposed to deconflict interference events through careful coordination of frequency band allocation to ensure that adjacent satellites operate on well-separated frequency ranges. In practice, since some satellite vendors are buying similar components, some ASI is almost inevitable. However, the number and duration of interference events during both uplink and downlink is rising, and not all of that can be attributed to alignment errors and equipment malfunctions.
The prospect of a satellite being targeted by other satellites as well as by terrestrial-based attacks is a disturbing reality. While historically satellites were at risk from ground-based cyberattacks and kinetic missile attacks, the emergence of cyber-based anti-satellite (ASAT) capabilities means cyber-attacks are no longer focused solely on de-orbiting or destroying satellites. Instead, cyber ASAT weapons exploit onboard IoT based systems and subsystems that are difficult to protect or secure, targeting a satellite’s battery or interfering with the deployment or alignment of solar panels to degrade satellite performance or lifespan.Â
ASAT attack vectors have the potential to disrupt, degrade, disable or destroy satellites, causing widespread chaos and severely impacting vital services that rely on them. Non-kinetic cyber attacks could be embedded within critical IoT sub-systems at launch, or injected from neighboring satellites or enemy ground stations post-launch. They can also be masked to give adversaries plausible deniability: attacks could be attributed to ASI or timed alongside meteor showers, for example.
Immediate steps to address the threat
Because the threats to satellites are diverse and complex, addressing IoT vulnerabilities requires a multifaceted approach. First and foremost, collaboration among satellite operators, governments and international organizations is crucial to establishing unified security standards and protocols. Implementing robust encryption, authentication mechanisms, and regular security audits is imperative to fortify satellite systems against potential attacks. A consortium approach, perhaps involving nonprofit space advocacy groups, to set minimum security standards for vetting suppliers of IoT-enabled components could be very helpful in raising awareness and creating a mechanism to encourage information sharing among commercial companies.
Additionally, advancements in artificial intelligence and machine learning should be approached as both a benefit to bolster satellite security and a potential tool that will escalate the threat. AI-powered systems can continuously monitor satellite networks, detect anomalies and respond in real-time to potential threats, mitigating risks and minimizing the impact of attacks or embedded malware at launch. But conversely, AI powered cyber-threats will certainly exacerbate any IoT vulnerabilities that exist in space assets.
Nations that operate spacecraft and space launch facilities also need to establish norms and agreements governing responsible behavior in space. Diplomatic efforts aimed at preventing the militarization of space and mitigating the risks posed by ASAT capabilities are vital to maintaining the stability and safety of satellite operations.
In December 2021, deputy director of the Russian foreign ministry’s Department for Non-Proliferation and Arms Konstantin Vorontsov told a United Nations committee meeting that Starlink, although a commercial system providing internet services, “might no longer be considered purely civilian” and would be considered a military target. Under that doctrine, when Ukraine uses Starlink for military command and control, or leverages commercial imagery from BlackSky Global, the Russians would consider those platforms fair game for attack.
Protecting IoT in the final frontier
The days when a kinetic ASAT issue was the primary means of interfering with space operations have long since passed — there are too many satellites in orbit, and replacing new generation low-Earth orbit assets takes months not years. Consequently, it is now more cost effective for adversaries to launch attacks from space.
As U.S. commercial and government reliance on satellites continues to grow, safeguarding IoT assets from attacks originating from other satellites becomes paramount. The collaborative effort of governments, space agencies and private entities must prioritize the development and implementation of robust security measures and trusted hardware manufacturing to ensure the continued reliability and functionality of these indispensable space-based systems.
Satellites remain a pinnacle of technological achievement, but we now stand at a crossroads where space is no longer an uncontested battleground. The threat of IoT attacks from other satellites serves as a stark reminder of the delicate balance between technological advancement and security, even in the vast expanse of the cosmos. As we navigate this evolving landscape, fortifying the defenses of our satellite infrastructure becomes an imperative mission to safeguard our connected world.
Paul Maguire is the CEO and Co-founder of Knowmadics, an innovative solutions provider addressing critical security requirements for both terrestrial and space-based assets. He is a former Naval Intelligence Officer specializing in Space Collections, and civilian Program Manager for the Air Force Space and Reconnaissance Office involved with the design of future National space systems. Mr. Maguire has also co-authored papers on Multi-Spectral Imagery (MSI) and Imagery Exploitation.Â