Discovery of Attack-Resistant Satellite Constellation Configurations via Simulation-Based Evolutionary Computing
| Metadata Field | Value | Language |
|---|---|---|
| dc.contributor.advisor | Guzzetti, Davide | |
| dc.contributor.author | Patrick, Raymond III | |
| dc.date.accessioned | 2025-12-05T20:16:27Z | |
| dc.date.available | 2025-12-05T20:16:27Z | |
| dc.date.issued | 2025-12-05 | |
| dc.identifier.uri | https://etd.auburn.edu/handle/10415/10103 | |
| dc.description.abstract | For decades, outer space was considered a geopolitical sanctuary where spacecraft faced only natural threats. A current trend in space mission planning envisions constellations with hundreds or even thousands of satellites. Today, there is a precedent for satellites to be considered legitimate military targets. While large constellation sizes reduce the mission risk posed by the loss of a single satellite, the worldwide proliferation of offensive cyber capabilities, coupled with our increasing reliance upon space systems, creates a strong threat even against these large constellations. The type of attack addressed in this research is a ground-based, RF-enabled cyberattack (e.g., a spoofed commanding signal) that can take an individual satellite out of mission-capable status. Such an attack, carried out intelligently by a capable adversary, could effectively blind a constellation to events on Earth or disrupt its service to a particular location. A method for defending against such an attack is desired. We propose the concept of a “schooling maneuver” (SM), wherein the satellites in the constellation use propulsive maneuvers to change their relative geometry, presenting a ground-based attacker with a poorer sight picture. This reconfiguration decreases the attacker’s physical access to the constellation, thereby reducing the amount of mission degradation induced by the attacks. We present a method for discovering such maneuvers given the attacker location, the reference constellation configuration, and a do-not-exceed ∆V limit. For a representative example, we demonstrate an evolutionary algorithm that discovers the best SM available within the ∆V limit and validate its performance using a brute-force search of the same configuration space. | en_US |
| dc.rights | EMBARGO_NOT_AUBURN | en_US |
| dc.subject | Aerospace Engineering | en_US |
| dc.title | Discovery of Attack-Resistant Satellite Constellation Configurations via Simulation-Based Evolutionary Computing | en_US |
| dc.type | Master's Thesis | en_US |
| dc.embargo.length | MONTHS_WITHHELD:12 | en_US |
| dc.embargo.status | EMBARGOED | en_US |
| dc.embargo.enddate | 2026-12-05 | en_US |
| dc.contributor.committee | Taheri, Ehsan | |
| dc.contributor.committee | Tauritz, Daniel | |
| dc.contributor.committee | Mulder, Samuel |
