Abstract :
Notice of Violation of IEEE Publication Principles
"Classification and Key Management Approaches for Space Networks Security"
by Shengbo Hu, Xin Meng
in the Proceedings of the 2008 International Conference on Anti-Counterfeiting, Security and Identification, August 2008
After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE\´s Publication Principles.
This paper contains portions of original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.
"Secure Key Management for Nasa Space Communication"
by Aruna Balasubramanian Sumita Mishra, and Ramalingam Sridhar
in the Proceedings of the 2005 ICNS Conference and Workshop, May 2005
Space networks can be viewed as comprising of space sensors, ground nodes, terrestrial sensors and satellites using the wireless/satellite medium. However, these increase security risks. Additionally, space networks are heterogeneous, where the capabilities of different network entities vary. Thus, a generic security solution for all communication components may not be well suited. In this paper, we study the architecture of space networks, and present a classification for space network security. Based on this classification, we give key management approaches for space network security finally.
Keywords :
space communication links; telecommunication network management; telecommunication security; communication components; generic security solution; key management approaches; space networks security; wireless-satellite medium; Artificial satellites; Communication system security; Cryptography; Data security; Information security; Protocols; Relays; Satellite ground stations; Space technology; Wireless sensor networks; authentication; satellite; space network; terrestrial sensor;