Iridium Short Burst Data Service Developers ... - Discoverytelecom.eu
Iridium Short Burst Data Service Developers ... - Discoverytelecom.eu
Iridium Short Burst Data Service Developers ... - Discoverytelecom.eu
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Iridium</strong> Satellite LLC<br />
<strong>Short</strong> <strong>Burst</strong> <strong>Data</strong> <strong>Developers</strong> Guide V2.01<br />
7.2.2.2 K-Band Channel Security<br />
To successfully monitor a K-band feeder link channel, a fairly sophisticated monitoring device must be<br />
located in the general proximity of an <strong>Iridium</strong> gateway. The receiver must have a high-gain antenna capable<br />
of tracking SVs as they move from horizon to horizon.<br />
Again, the complexity of the feeder link interface poses a formidable technical challenge for prospective<br />
eavesdroppers. The cost of the monitoring device alone would be a strong deterrent. Among the technical<br />
complications are<br />
� Large, continually changing Doppler shifts<br />
� High capacity, 3.072 Mbps channels<br />
� High-gain tracking antenna required<br />
� Must reacquire new SV every 10 minutes<br />
7.2.3 Gateway to Vendor Application<br />
While this document focuses on the <strong>Iridium</strong> network, security should be looked at from an end-to-end<br />
solution perspective. SBD communications to and from the <strong>Iridium</strong> Gateway can be protected by two<br />
additional cost items:<br />
(A) Virtual Private Network and/or<br />
(B) Private leased line communication<br />
7.2.4 Additional Considerations<br />
Depending on the level and sensitivity of the information being communicated the application developer may<br />
require additional security. Any additional security measure would require encrypting the information before<br />
transmitting to the destination point. This is referred to generically as application level encryption and<br />
requires the developer to select and implement an encryption method that provides the required level of<br />
security for the application. Any increase in the size of the actual information being sent due to the<br />
encryption is not distinguished by the <strong>Iridium</strong> network from normal user data and the <strong>Iridium</strong> network will rate<br />
the total size of the data message sent.<br />
51<br />
<strong>Iridium</strong> Satellite LLC Proprietary & Confidential