Paper
2 June 2000 Security of remotely operated robotic telescopes
Peter J. Surrey, Dorothy Muecke-Herzberg
Author Affiliations +
Abstract
A robotic telescope is both a complex system with many potential modes of failure, and an attractive target for computer criminals. The paper describes a systematic approach to security designed to optimize the operational continuity of such a system. This includes the development of policy guidelines, techniques for identifying the prioritizing the assets to be protected, and for assessing the threats against these assets. Commonly encountered threats are discussed, and specific security mechanisms to counter these threats described, including fault-tolerant hardware configurations, cryptographic techniques for authentication and confidentiality, and leveraging the properties of point-to-point wide-area networking links. A typical remote telescope offers multiple points of attack through its interfaces for engineering control, observation scheduling, data retrieval and routine management. A case study is presented highlighting the engineering trade-offs required to protect these interfaces, and discussing the implementation of specific countermeasures described earlier. Finally some recommendations are made for managing the human aspects of security implementations.
© (2000) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Peter J. Surrey and Dorothy Muecke-Herzberg "Security of remotely operated robotic telescopes", Proc. SPIE 4011, Advanced Global Communications Technologies for Astronomy, (2 June 2000); https://doi.org/10.1117/12.387222
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Telescopes

Information security

Local area networks

Computer security

Robotics

Internet

Network security

RELATED CONTENT

The research of security and real time based on the...
Proceedings of SPIE (March 14 2013)
Machines accessed via Internet issues and architecture
Proceedings of SPIE (November 08 1999)
Bot armies as threats to network security
Proceedings of SPIE (April 09 2007)
Remote secure observing for the Faulkes Telescopes
Proceedings of SPIE (September 15 2004)

Back to Top