Vai al contenuto principale della pagina
Autore: | Jahankhani Hamid |
Titolo: | Space Governance : Challenges, Threats and Countermeasures |
Pubblicazione: | Cham : , : Springer International Publishing AG, , 2024 |
©2024 | |
Edizione: | 1st ed. |
Descrizione fisica: | 1 online resource (241 pages) |
Altri autori: | KendzierskyjStefan PournouriSina PozzaMaria A |
Nota di contenuto: | Intro -- Contents -- Space Governance Frameworks and the Role of AI and Quantum Computing -- 1 Introduction -- 1.1 Space History and Current Treaties -- 1.2 Non-Binding and Binding Agreements in Space Governance -- 1.3 Role of NATO and the UN in Space -- 2 Satellite Technology and Operations -- 2.1 Ground-Based Satellite Systems -- 2.2 Satellite Communication Protocols and Standards -- 2.3 Satellite Threats -- 2.4 Privatisation and the Proliferation of Satellites -- 3 Cybersecurity AI-Based Attacks and Quantum Computing Impacts -- 3.1 Impacts of Quantum Computing on Satellite Communications -- 4 The Road to an Effective Space Governance Framework and Cybersecurity Mitigations -- 4.1 Comprehensive Cybersecurity and Overarching Space Asset Protection -- 4.2 Current Satellite Governance -- 4.3 Potential Framework Concepts -- 5 Conclusions -- References -- Defining the Maritime Cyber Adversarial Taxonomy of Tactics and Techniques -- 1 Introduction -- 2 Literature Review -- 2.1 Onboard Cyber Physical Systems -- 2.2 Electronic Chart Display and Information System (ECDIS) -- 2.3 Event Data Recorder -- 2.4 Automatic Identification System (AIS) -- 2.5 Global Navigation Safety System (GNSS) -- 2.6 The Future -- 3 Adversarial Behaviours and Modelling Techniques -- 3.1 Attack Trees -- 3.2 Lockheed Martin Cyber Kill Chain -- 3.3 MITRE ATT& -- CK & -- Navigator -- 3.4 Unified Kill Chain -- 4 Data Collection and Critical Discussions -- 5 Inclusion Criteria -- 6 Exclusion Criteria -- 6.1 Collection Methodology -- 6.2 Critical Discussion -- 7 Conclusions -- References -- Enhancing Security of Unmanned Aerial Vehicle Through Vulnerability Assessment and Penetration Testing: A Case Study on Parrot AR Drone 2.0 -- 1 Background -- 1.1 Common Security Threats to Drones -- 1.2 Related Works -- 2 Methodology -- 2.1 Research and Experiment Design. |
2.2 Vulnerability Assessment -- 2.3 Penetration Testing -- 2.4 Data Collection -- 2.5 Data Analysis -- 2.6 Evaluation -- 2.7 Ethical Considerations -- 2.8 Threats Modeling -- 2.9 Summary -- 3 Discussion -- 3.1 Comparison to Existing Research -- 3.2 Comparison of Vulnerability Types -- 3.3 Severity and Impact Comparison -- 3.4 Attack Surface Comparison -- 3.5 Unique Security Challenges -- 3.6 Contributions and Insights -- 3.7 Recommendations -- 4 Experiment Results -- 5 Conclusion and Future Research -- References -- Quantum Technologies for Space and Aerial Vehicles -- 1 Introduction -- 2 Quantum Computing Applications for Spacecraft and UAVs -- 2.1 Quantum Computing -- 2.2 Solving Optimization Problems -- 2.3 Quantum Machine Learning -- 2.4 Quantum Simulations -- 3 Quantum Optimization and Data Analytics -- 3.1 Optimized Scheduling -- 3.2 Efficient Route Planning -- 3.3 Network Optimization -- 3.4 Data Processing and Analytics -- 4 Quantum Communication -- 4.1 Quantum-Resistant Encryption -- 4.2 Protecting Sensitive Data on Satellites and UAVs -- 4.3 Quantum Cryptography -- 4.4 Quantum Key Distribution -- 4.5 QKD Experiments -- 5 Challenges -- 6 Governance, Policy, and Standardization -- 7 Conclusion -- References -- Secure and Resilient IP-Satellite Communication Infrastructure -- 1 Introduction -- 2 Literature Review -- 2.1 Cybersecurity Risks and Threats in Ground-Based Satellite Operations -- 2.2 Identification and Classification of Cyber Threats Specific to Ground-Based Satellite Operations. -- 2.3 Case Studies/Examples of Cybersecurity Incidents in Ground-Based Satellite Operations -- 2.4 Communication in Ground-Based Satellite Operations -- 2.5 Satellite Communication Protocols and Standards -- 2.6 Satellite Communication in the Age of Quantum Computing -- 3 Simulation Process -- 3.1 Practical Work. | |
3.2 Testing RSA Encryption Using Shor's Algorithm -- 3.3 Results and Implications -- 3.4 Communication Simulation -- 3.5 Comparative Analysis and Evaluation -- 4 Conclusion and Future Work -- References -- Leveraging AI and Blockchain for Space Mining -- 1 Introduction -- 2 Background and Literature Review -- 3 Overview of Existing Literature on Space Mining, Focusing on Technological, Legal, and Ethical Considerations -- 4 The Current State of AI and Blockchain Technologies in Terrestrial Mining Operations -- 5 Gaps in the Literature, Particularly Regarding the Application of These Technologies in Space Mining -- 6 The Methodological Approach for Analysing the Potential Application of AI and Blockchain in Space Mining -- 7 Description of the Comparative Analysis Framework Used to Integrate Findings From the Terrestrial Mining Sector -- 8 Potential Application of Blockchain for Secure and Transparent Record-Keeping in Space Mining Cadastres -- 9 Analysis of AI's Impact on Enhancing Operational Efficiency in Mining, With Insights From Terrestrial Mining -- 10 Exploration of AI's Potential in Optimizing Mineral Identification and Extraction Processes in Space Mining -- 11 Discussion on the Challenges and Opportunities of International Regulatory Compliance for Space Mining, Informed by the Adoption of AI and Blockchain in Zimbabwe -- 12 Ethical and Cultural Considerations in Implementing Technology-Driven Mining Solutions, With Lessons From Terrestrial Mining -- 13 Overview of Technological, Legal, and Socio-Economic Challenges in Integrating AI and Blockchain Into Space Mining -- 14 Solutions and Strategic Approaches Derived From Terrestrial Mining Experiences With These Technologies in Extra-Terrestrial Mining -- 15 Analyse Future Technological Trends Impacting Space Mining, Including Quantum Computing and Next-Gen Blockchain Solutions. | |
16 The Role of International Collaboration and Innovation in Addressing the Evolving Challenges of Space Mining -- 17 Conclusion -- References -- An Investigation into Counter Drones Digital Forensics Aided by Remote Identification -- 1 Introduction -- 2 Literature Review -- 2.1 Drones -- 2.2 Drones in the Sky -- 2.3 Drones Underwater -- 2.4 Drones Underground -- 2.5 Remote Identification (RID) -- 2.6 Remote ID Framework -- 2.7 Drones Digital Forensics -- 2.8 Rogue Drone Scenarios -- 3 Potential Future Research Opportunities -- 4 Conclusions -- References -- Unmanned Aerial Vehicles (UAVs): Forensic, Privacy, and Security Challenges in the Era of Drone Proliferation -- 1 Introduction -- 2 Background -- 2.1 UAV Uses -- 2.2 Types of UAVs -- 2.3 Terrorist Use of UAVs -- 3 Challenges Related to the Malicious Use of Drones -- 3.1 Forensic Challenges -- 3.2 Privacy and Security Concerns -- 4 Current Laws and Legislation Overseeing the Use of UAVs -- 5 Recommendations -- 6 Conclusion and the Future of Drones -- References. | |
Titolo autorizzato: | Space Governance |
ISBN: | 3-031-62228-6 |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910878989503321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |