Share Email Print

Proceedings Paper

Security of remotely operated robotic telescopes
Author(s): Peter J. Surrey; Dorothy Muecke-Herzberg
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

A robotic telescope is both a complex system with many potential modes of failure, and an attractive target for computer criminals. The paper describes a systematic approach to security designed to optimize the operational continuity of such a system. This includes the development of policy guidelines, techniques for identifying the prioritizing the assets to be protected, and for assessing the threats against these assets. Commonly encountered threats are discussed, and specific security mechanisms to counter these threats described, including fault-tolerant hardware configurations, cryptographic techniques for authentication and confidentiality, and leveraging the properties of point-to-point wide-area networking links. A typical remote telescope offers multiple points of attack through its interfaces for engineering control, observation scheduling, data retrieval and routine management. A case study is presented highlighting the engineering trade-offs required to protect these interfaces, and discussing the implementation of specific countermeasures described earlier. Finally some recommendations are made for managing the human aspects of security implementations.

Paper Details

Date Published: 2 June 2000
PDF: 12 pages
Proc. SPIE 4011, Advanced Global Communications Technologies for Astronomy, (2 June 2000); doi: 10.1117/12.387222
Show Author Affiliations
Peter J. Surrey, Telegraphy Ltd. (United Kingdom)
Dorothy Muecke-Herzberg, Telescope Technologies Ltd. (United Kingdom)

Published in SPIE Proceedings Vol. 4011:
Advanced Global Communications Technologies for Astronomy
Robert I. Kibrick; Anders Wallander, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?