17.10.2012 Views

Iridium Short Burst Data Service Developers ... - Discoverytelecom.eu

Iridium Short Burst Data Service Developers ... - Discoverytelecom.eu

Iridium Short Burst Data Service Developers ... - Discoverytelecom.eu

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Iridium</strong> Satellite LLC<br />

<strong>Short</strong> <strong>Burst</strong> <strong>Data</strong> <strong>Developers</strong> Guide V2.01<br />

7.2.2.2 K-Band Channel Security<br />

To successfully monitor a K-band feeder link channel, a fairly sophisticated monitoring device must be<br />

located in the general proximity of an <strong>Iridium</strong> gateway. The receiver must have a high-gain antenna capable<br />

of tracking SVs as they move from horizon to horizon.<br />

Again, the complexity of the feeder link interface poses a formidable technical challenge for prospective<br />

eavesdroppers. The cost of the monitoring device alone would be a strong deterrent. Among the technical<br />

complications are<br />

� Large, continually changing Doppler shifts<br />

� High capacity, 3.072 Mbps channels<br />

� High-gain tracking antenna required<br />

� Must reacquire new SV every 10 minutes<br />

7.2.3 Gateway to Vendor Application<br />

While this document focuses on the <strong>Iridium</strong> network, security should be looked at from an end-to-end<br />

solution perspective. SBD communications to and from the <strong>Iridium</strong> Gateway can be protected by two<br />

additional cost items:<br />

(A) Virtual Private Network and/or<br />

(B) Private leased line communication<br />

7.2.4 Additional Considerations<br />

Depending on the level and sensitivity of the information being communicated the application developer may<br />

require additional security. Any additional security measure would require encrypting the information before<br />

transmitting to the destination point. This is referred to generically as application level encryption and<br />

requires the developer to select and implement an encryption method that provides the required level of<br />

security for the application. Any increase in the size of the actual information being sent due to the<br />

encryption is not distinguished by the <strong>Iridium</strong> network from normal user data and the <strong>Iridium</strong> network will rate<br />

the total size of the data message sent.<br />

51<br />

<strong>Iridium</strong> Satellite LLC Proprietary & Confidential

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!