Beyond the Ground: Securing Space Systems with Decentralized Trust

Author: Denis Avetisyan


A new architecture is proposed to relocate the root of trust to orbital platforms, bolstering the security of satellite networks and the workloads they support.

The Space Fabric Architecture integrates Secure Execution and Attestation Processes (SEAP) alongside trusted components of Threat Analysis (TA) and Trusted Platform Modules (TPM) to establish a robust and secure system foundation.
The Space Fabric Architecture integrates Secure Execution and Attestation Processes (SEAP) alongside trusted components of Threat Analysis (TA) and Trusted Platform Modules (TPM) to establish a robust and secure system foundation.

Space Fabric establishes a satellite-enhanced trusted execution environment leveraging post-quantum cryptography and decentralized attestation.

Existing trusted execution environments (TEEs) struggle to provide verifiable security in increasingly decentralized and physically accessible terrestrial deployments. This limitation motivates ‘Space Fabric: A Satellite-Enhanced Trusted Execution Architecture’, which presents a novel architecture relocating the root of trust to satellite infrastructure, thereby leveraging post-launch physical inaccessibility as a tamper barrier. By binding workload execution to specific satellites via a Byzantine-tolerant endorsement quorum and generating all cryptographic secrets in space, Space Fabric establishes a truly vendor-agnostic and auditable trust foundation. Could this approach unlock secure, decentralized computation for critical applications in orbital computing and beyond?


Decentralizing Trust: Addressing the Vulnerabilities of Centralized Systems

Current security protocols frequently depend on Trusted Execution Environments (TEEs) – physically protected areas within a processor – to safeguard sensitive data and operations. However, this reliance introduces significant vulnerabilities; these TEEs represent centralized points of failure, meaning a successful compromise of the enclave immediately exposes all protected assets. Supply chain attacks pose a substantial threat, as malicious actors could tamper with the hardware before deployment, bypassing software-based defenses entirely. Furthermore, sophisticated physical attacks, while demanding, remain a viable route to extract secrets or manipulate the TEE’s functionality. This centralization creates a single, high-value target for adversaries, undermining the overall resilience of the system and necessitating a shift towards more distributed trust architectures.

Current security infrastructures, heavily reliant on Trusted Execution Environments (TEEs) and similar physically secured enclaves, face escalating threats stemming from both logistical vulnerabilities and direct physical compromise. The integrity of these systems is fundamentally linked to the security of the entire supply chain – from chip design and manufacturing to distribution and deployment – creating numerous opportunities for malicious actors to introduce hardware or software alterations before a device even reaches the end user. Furthermore, even robust physical protections are not absolute; sophisticated attackers possess the capability to bypass security measures through techniques like side-channel attacks, fault injection, or even direct hardware manipulation. This combination of supply chain risks and physical attack vectors significantly limits the long-term viability of centralized trust architectures, necessitating exploration of more distributed and resilient approaches to security.

Modern computing systems are rapidly evolving into intricately layered networks of devices, services, and data flows, a complexity that fundamentally challenges traditional trust models. Relying on centralized hardware security modules or trusted execution environments creates single points of failure increasingly vulnerable to both physical compromise and large-scale logical attacks. A shift towards distributed trust architectures – where trust isn’t vested in a single entity but emerges from the consensus of many – becomes not merely advantageous, but essential. This necessitates exploring technologies like verifiable computation, zero-knowledge proofs, and blockchain-inspired consensus mechanisms to establish confidence in system integrity and data authenticity across geographically dispersed and heterogeneous environments. Ultimately, building truly resilient systems requires distributing the burden of trust, rather than concentrating it within a potentially compromised core.

SEAP, when integrated with TEERA, enables satellites to establish a secure identity by generating key pairs within a trusted hardware environment and receiving endorsements from ground stations (<span class="katex-eq" data-katex-display="false">G_s</span>) through a three-message authentication process.
SEAP, when integrated with TEERA, enables satellites to establish a secure identity by generating key pairs within a trusted hardware environment and receiving endorsements from ground stations (G_s) through a three-message authentication process.

Space Fabric: A Foundation for Trust Beyond Earth

Space Fabric implements a trust architecture natively within satellite infrastructure, shifting the foundational elements of trust establishment away from ground-based systems. Traditionally, trust has relied on Public Key Infrastructure (PKI) and Hardware Security Modules (HSMs) located on Earth, creating single points of failure and vulnerability to terrestrial attacks. Space Fabric relocates these critical functions – including key generation, storage, and signing – to dedicated hardware onboard orbiting satellites. This satellite-native approach utilizes the inherent security of the space environment and allows for cryptographic operations to occur entirely within a physically isolated and tamper-resistant domain, independent of potentially compromised terrestrial networks and infrastructure.

Space Fabric’s security model inherently minimizes the attack surface by locating critical trust infrastructure in space. Traditional Public Key Infrastructure (PKI) relies on terrestrial Certificate Authorities (CAs), which are vulnerable to physical compromise, network attacks, and insider threats. By moving the Root of Trust to a physically isolated orbital environment, Space Fabric significantly reduces the number of potential access points for malicious actors. The inherent difficulty and cost associated with physically accessing and compromising assets in space introduces a substantial barrier to attack, thereby enhancing the overall security posture and resilience of the system. This physical isolation isn’t merely a layer of defense; it fundamentally alters the threat model, requiring attackers to overcome the challenges of space access in addition to technical exploits.

A Root of Trust (RoT) implemented within Space Fabric utilizes orbital platforms to establish a hardware-based security anchor isolated from terrestrial vulnerabilities. This architecture minimizes reliance on ground-based infrastructure, which is susceptible to cyberattacks, physical compromise, and geopolitical instability. By locating the RoT in space, the system creates a significantly hardened security perimeter; compromise would require physical access to orbiting assets, a considerably more difficult undertaking than attacking terrestrial systems. This independence from Earth-based infrastructure ensures continued operation and data integrity even in the event of widespread terrestrial network failures or malicious activity, providing a resilient foundation for trust in data and operations.

A satellite's architecture integrates external communication with a communication modem connected via Ethernet to the hardware payload-such as Space Fabric-and potentially additional peripherals like storage devices.
A satellite’s architecture integrates external communication with a communication modem connected via Ethernet to the hardware payload-such as Space Fabric-and potentially additional peripherals like storage devices.

Securing Orbital Infrastructure: Mechanisms for Trust Establishment

Space Fabric employs Hardware Security Modules (HSMs) to provide a secure foundation for cryptographic key lifecycle management and cryptographic operations performed in orbit. These HSMs facilitate On-Orbit Key Genesis (OOKG), enabling the creation of cryptographic keys directly within the space infrastructure, independent of pre-launch key distribution. This approach enhances security by eliminating the risks associated with transporting and storing sensitive cryptographic material prior to launch. The HSMs are utilized for key generation, storage, and cryptographic processing, supporting functions such as digital signatures, encryption, and decryption, all performed within a tamper-resistant hardware environment. This capability is critical for establishing trust and securing communications and data for orbital assets.

Remote Attestation, facilitated by the Secure Exchange and Attestation Protocol (SEEP), establishes trust in the integrity of satellite software and configurations post-launch. This process involves the satellite cryptographically proving to a ground station that its operational software and configuration haven’t been tampered with. SEEP utilizes cryptographic signatures and challenge-response mechanisms to verify the software’s hash against a known good value, ensuring that the satellite is operating with authorized and unmodified code. Successful attestation confirms the trustworthiness of the satellite’s operations, mitigating risks associated with malicious code injection or unintentional configuration drift, and enabling secure communication and data exchange.

Secure Boot processes are implemented to verify the integrity of critical satellite components during startup, preventing the execution of unauthorized software. This is further strengthened by the deployment of Dual Secure Elements, which provide redundancy and a detailed audit trail of all cryptographic operations and configuration changes. These elements, typically implemented as tamper-resistant hardware modules, independently store and manage cryptographic keys and sensitive data, allowing for cross-validation and enhanced detection of potential compromise or malicious alteration. The dual architecture ensures that even if one Secure Element is compromised, the second provides a verifiable and trustworthy baseline for system integrity.

Radiation hardening is a suite of techniques employed to protect satellite hardware from the effects of energetic particles present in the space environment. Single Event Upsets (SEUs) occur when a particle strikes a sensitive component, altering data bits; Single Event Latchups (SELs) represent a more severe failure mode where a particle triggers a sustained, high-current state potentially causing permanent damage. Mitigation strategies include component selection with inherent radiation tolerance, shielding to physically absorb radiation, circuit design techniques like redundancy and error correction, and the implementation of software-based error detection and correction algorithms. These techniques collectively enhance the operational reliability of orbital infrastructure by minimizing the probability of radiation-induced failures and ensuring continued functionality throughout the mission lifecycle.

The implementation of fully on-orbit key genesis and attestation removes the need for pre-launch distribution and management of cryptographic secrets, enhancing security and reducing logistical complexity. Following deployment in a moderate Low Earth Orbit (LEO), certificate issuance, encompassing key generation and validation, requires approximately 6 to 12 orbital passes. This timeframe is directly influenced by the density of available ground stations for communication and the specific orbital mechanics governing satellite visibility and data transfer rates; higher ground station density and favorable orbital parameters will result in faster certificate issuance.

Data exchange bandwidth requirements for secure communications vary depending on the cryptographic algorithm utilized. Elliptic Curve Cryptography (ECC) currently necessitates 19 KB of bandwidth per exchange. Implementing a hybrid approach, combining ECC with the Falcon post-quantum signature scheme, reduces the bandwidth overhead to 6.2 KB per exchange. This represents a 4x increase in efficiency when compared to ECC alone, despite the addition of post-quantum security measures, and highlights a trade-off between algorithmic complexity and data transmission size.

Current estimations indicate a signature verification time of 200-500 milliseconds for post-quantum cryptographic algorithms, which represents a performance decrease compared to Elliptic Curve Cryptography (ECC). ECC-based per-exchange latency, encompassing cryptographic operations, currently ranges from 100 to 400 milliseconds. The increased verification time for post-quantum schemes is largely attributable to software-based implementation; hardware acceleration is a potential mitigation strategy. While ECC provides faster cryptographic processing, the shift towards post-quantum algorithms is driven by the need for long-term security against quantum computing threats.

A Raspberry Pi 5 connected to a USB Armory Mk II facilitates secure communication between normal and secure environments on a satellite platform, utilizing the Armory's SEAP client app and two Secure Elements for key storage and attestation.
A Raspberry Pi 5 connected to a USB Armory Mk II facilitates secure communication between normal and secure environments on a satellite platform, utilizing the Armory’s SEAP client app and two Secure Elements for key storage and attestation.

A Resilient System: Scalability and Security for the Future

Space Fabric fundamentally shifts away from centralized systems by distributing core functionalities across a network of interconnected nodes. This deliberate design eliminates single points of failure – a critical vulnerability in traditional infrastructures where the compromise of one component can cascade into total system collapse. Instead, if any individual node experiences disruption or attack, the network intelligently reroutes operations through remaining healthy nodes, maintaining continuous functionality and data availability. This inherent redundancy isn’t simply about backup; it’s a proactive resilience built into the system’s core, ensuring uninterrupted service and bolstering its ability to withstand a wide range of threats, from technical malfunctions to malicious cyberattacks. The result is a remarkably robust and dependable system capable of operating consistently even under adverse conditions.

Space Fabric’s design intrinsically supports the integration of satellite constellations, enabling a uniquely scalable and redundant system for establishing trust. This isn’t merely about adding more nodes; the architecture facilitates trust propagation across diverse platforms – terrestrial networks, aerial drones, and orbiting satellites – creating a web of verification. Should one platform experience disruption or compromise, trust isn’t lost; it dynamically reroutes through the constellation, maintaining continuous and secure communication. This distributed trust model moves beyond centralized authorities, fostering a highly resilient system where security isn’t dependent on a single point of control, but rather emerges from the collective verification of the network itself. The result is a security infrastructure that grows proportionally with demand, adapting seamlessly to expanding networks and increasingly complex operational environments.

Space Fabric proactively addresses the looming threat to current encryption standards by integrating post-quantum cryptography (PQC). Current public-key cryptography, relied upon for secure communication and data protection, is vulnerable to attacks from sufficiently powerful quantum computers – a reality increasingly within reach. The system incorporates PQC algorithms, specifically designed to resist attacks from both classical and quantum computers, ensuring long-term security. This isn’t simply a future-proofing measure; it’s a fundamental shift toward cryptographic agility, allowing Space Fabric to adapt to evolving threats and maintain data integrity even as computational power advances. The implementation establishes a secure foundation for sensitive data transmission and storage, protecting against potential decryption of historical and ongoing communications, and setting a new benchmark for resilience in the face of next-generation cyberattacks.

The development of Space Fabric’s security protocols isn’t simply a technological advancement, but a foundational shift in how trust is established and maintained across critical systems. By preemptively integrating post-quantum cryptography and a distributed architecture, the framework anticipates and neutralizes emerging threats, setting a new benchmark for resilience. This proactive stance extends beyond traditional cybersecurity, offering scalable solutions adaptable to the stringent demands of critical infrastructure, the complex transactions of the financial sector, and the high-stakes environment of national defense. The implications are far-reaching, promising a future where secure, reliable communication and data integrity are not reactive measures, but inherent properties of the system itself – a paradigm shift with broad applicability and lasting impact.

The identification protocol is designed to be resilient to relay attacks, where computations are maliciously offloaded to an Earth-based TEE (<span class="katex-eq" data-katex-display="false">1-a-b-c-d-2</span>) instead of correctly performed in a satellite-based TEE (<span class="katex-eq" data-katex-display="false">1-i-ii-2</span>), as both scenarios appear identical to the ground station (GS).
The identification protocol is designed to be resilient to relay attacks, where computations are maliciously offloaded to an Earth-based TEE (1-a-b-c-d-2) instead of correctly performed in a satellite-based TEE (1-i-ii-2), as both scenarios appear identical to the ground station (GS).

The pursuit of Space Fabric, as detailed in the architecture, necessitates a holistic approach to security. It isn’t simply about fortifying individual satellites, but about building a resilient, interconnected system where trust is distributed and verifiable. This echoes John McCarthy’s sentiment: “The best way to predict the future is to invent it.” The architecture actively invents a future where orbital platforms aren’t vulnerable single points of failure. By relocating the root of trust and embracing decentralized attestation, Space Fabric moves beyond merely reacting to threats; it proactively shapes a more secure and scalable orbital environment, acknowledging that a system’s behavior is fundamentally dictated by its structure – a principle central to the design.

Beyond the Horizon

The relocation of trust, as proposed by Space Fabric, is not merely a technical adjustment, but a fundamental re-evaluation of security paradigms. The architecture deftly addresses vulnerabilities inherent in terrestrial dependencies, yet introduces new complexities surrounding inter-satellite communication, orbital dynamics, and the long-term maintenance of a distributed root of trust. The immediate challenge lies not in perfecting the cryptographic mechanisms-though post-quantum resilience remains a critical, evolving target-but in establishing robust protocols for attestation and revocation within a constantly shifting network topology.

Further exploration must address the economic realities of deploying and sustaining such a system. Decentralization, while philosophically appealing, introduces overhead in consensus mechanisms and necessitates a viable incentive structure for participation. The potential for emergent behavior within a network of autonomous satellites also demands careful consideration; a system designed for verification must also account for the unpredictable consequences of distributed agency.

Ultimately, the true test of Space Fabric, or any architecture of this kind, will not be its initial elegance, but its resilience in the face of unforeseen constraints. Good architecture is invisible until it breaks, and only then is the true cost of decisions visible.


Original article: https://arxiv.org/pdf/2603.23745.pdf

Contact the author: https://www.linkedin.com/in/avetisyan/

See also:

2026-03-26 16:17