<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<rfc
      xmlns:xi="http://www.w3.org/2001/XInclude"
      category="info"
      docName="draft-jliu-istn-savi-requirement-01"
      ipr="trust200902"
      obsoletes=""
      updates=""
      submissionType="IETF"
      xml:lang="en"
      tocInclude="true"
      tocDepth="4"
      symRefs="true"
      sortRefs="true"
      version="3">


 <front>

   <title abbrev="ISTN SAVI Problems and Requirements">Problems and Requirements of Source Address Spoofing in Integrated Space and Terrestrial Networks
</title>
    <seriesInfo name="Internet-Draft" value="draft-jliu-istn-savi-requirement-00"/>

    <author fullname="Jun Liu" initials="J." surname="Liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street/>
         <city>Beijing 100084</city>
          <region/>
          <code/>
          <country>China</country>
        </postal>
        <email>juneliu@tsinghua.edu.cn</email>
     </address>
    </author>

    <author fullname="Hewu Li" initials="H." surname="Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street/>
         <city>Beijing 100084</city>
          <region/>
          <code/>
          <country>China</country>
        </postal>
        <email>lihewu@cernet.edu.cn</email>
     </address>
     </author>

    <author fullname="Tianyu Zhang" initials="T." surname="Zhang">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street/>
         <city>Beijing 100084</city>
          <region/>
          <code/>
          <country>China</country>
        </postal>
        <email>ty-zhang20@mails.tsinghua.edu.cn</email>
     </address>
     </author>



    <author fullname="Qian Wu" initials="Q." surname="Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street/>
         <city>Beijing 100084</city>
          <region/>
          <code/>
          <country>China</country>
        </postal>
        <email>wuqian@cernet.edu.cn</email>
     </address>
     </author>


    <date year="2022"/>

   <area>General</area>
    <workgroup>Internet Area Working Group</workgroup>


   <keyword>SAVI</keyword>




   <abstract>
      <t>This document presents the detailed analysis about the problems and requirements of dealing with the threat 
      of source address spoofing in Integrated Space and Terrestrial Networks (ISTN). First, characteristics of ISTN that cause DDos 
      are identified. Secondly, it analyzes the major reasons why existing terrestrial source address validation mechanism 
      does not fit well for ISTN. Then, it outlines the major requirements for improvement on source 
      address validation mechanism for ISTN.</t>
    </abstract>
  </front>
  <middle>

<!--1.Introduction-->
    <section numbered="true" toc="default">
      <name>Introduction</name>
      <t>Mega-constellations of low-earth-orbit (LEO) satellites, such as Starlink <xref target="Starlink" format="default"></xref>, 
      Kuiper <xref target="Kuiper" format="default"></xref> and OneWeb <xref target="OneWeb" format="default"></xref> serve the area that the terrestrial networks cannot 
      reach <xref target="Networking-in-Heaven" format="default"></xref>. LEO satellites have advantage of wide 
      coverage <xref target="ITU-6G" format="default"></xref><xref target="Surrey-6G" format="default"></xref><xref target="Nttdocomo-6G" format="default"></xref> and low delay <xref target="Low-Latency-in-Space" format="default"></xref>.</t>

      <t>LEO mega-constellations have Inter Satellite Links (ISLs) ,which enable traditional attacks extend
       from one-hop in satellite communication environment to the whole satellite networks. Also, LEO’s 
       attributes, such as open access environment, limited Resources and dynamic topology, enable 
       severe security threats. These security threats yield diverse challenges on existing network security design.</t>

      <t>By analyzing security events occurred recently, we realized that typical LEO threats are Source Address Spoofing. 
      This memo outlines the major problems and requirements for improvement on source address validation mechanism in ISTN.</t>
    </section>

<!--2.Terminology-->
    <section anchor="Terminology" numbered="true" toc="default">
      <name>Terminology</name>
        <t>LEO: Low Earth Orbit</t>
        <t>GEO: Geostationary Earth Orbit</t>
        <t>LSN: LEO Satellite Networks</t>
        <t>ISL: Inter-satellite Links</t>
        <t>GS: Ground Station</t>
        <t>SAVA: Source Address Validation Architecture</t>
        <t>SAVI: Source Address Validation Improvements</t>
        <t>DHCP: Dynamic Host Configure Protocol</t>
        <t>SLACC: Stateless Address Autoconfiguration</t>
        <t>DNS: Domain Name System</t>
        <t>DDoS: Distributed Denial-of-Service Attacks</t>
        <t>CDN: Content Delivery Network</t>

    </section>


<!--4.Basic Characteristics of ISTN-->
   <section numbered="true" toc="default">
      <name>Vulnerable Characteristics of ISTN </name>
        <t>A satellite constellation is composed of one or more satellite shells. Each shell is 
        organized by a large number of satellites distributed around the earth according to 
        certain design strategies to ensure cooperative performance. Kepler elements can be 
        used to describe the orbit of a satellite. Usually, satellites with an orbital altitude 
        of 400-2000 km are called LEO satellites, and satellites with an orbital altitude of 
        2000-36000 km are MEO satellites. GEO is a satellite in geosynchronous orbit, with an 
        altitude of about 36000 km from the earth. Satellites in different orbits have their 
        own characteristics <xref target="LEO-MEO-GEO" format="default"></xref>. Table 1 exemplifies typical mega constellations in operation.</t>


<table anchor="table_leo">
        <name>Typical-mega-constellations.</name>
        <thead>
          <tr>
            <th align='center'>Constellation</th>
            <th align='center'>Altitude (km)</th>
            <th align='center'>Number of orbits</th>
            <th align='center'>Number of satellite per orbit</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="center" rowspan="5">Starlink</td>
            <td align="center">550</td>
            <td align="center">72</td>
            <td align="center">22</td>
          </tr>
          <tr>
            <td align="center">1110</td>
            <td align="center">32</td>
            <td align="center">50</td>
          </tr>
          <tr>
            <td align="center">1130</td>
            <td align="center">8</td>
            <td align="center">50</td>
          </tr>
          <tr>
            <td align="center">1275</td>
            <td align="center">5</td>
            <td align="center">75</td>
          </tr>
          <tr>
            <td align="center">1325</td>
            <td align="center">6</td>
            <td align="center">75</td>
          </tr>

          <tr>
            <td align="center" rowspan="3">Kuiper</td>
            <td align="center">590</td>
            <td align="center">28</td>
            <td align="center">28</td>
          </tr>
          <tr>
            <td align="center">610</td>
            <td align="center">36</td>
            <td align="center">36</td>
          </tr>
          <tr>
            <td align="center">630</td>
            <td align="center">34</td>
            <td align="center">34</td>
          </tr>

          <tr>
            <td align="center" rowspan="2">Telesat</td>
            <td align="center">1015</td>
            <td align="center">27</td>
            <td align="center">13</td>
          </tr>
          <tr>
            <td align="center">1325</td>
            <td align="center">40</td>
            <td align="center">33</td>
          </tr>

        </tbody>
      </table>





      <section numbered="true" toc="default">
        <name> Inter-Satellite Links (ISLs)</name>
        <t>Comparing with previous satellite communication systems,ene of the most obvious feature of the 
        mega constellation is the use of inter-satellite links. ISL can reduce the delay of satellite 
        network and improve network capacity by avoiding the ping-pong phenomenon and reducing the occupation 
        of the link between the ground station (GS) and the satellite. Although ISL is not used in the 
        initial stage of Starlink deployment, it is still an important part of the future satellite network. 
        Since the launch on September 14, 2021, the satellite version of Starlink has been upgraded to V1.5, and the load of inter satellite laser link is increased <xref target="STARLINK-ISL" format="default"></xref>. As of April 22, 2022, V1.5 satellites have been launched 13 times in total, and the proportion of in orbit Starlink satellites supporting ISL is rising rapidly.
        The performance of trans-oceanic routes in networks with and without ISL is discussed 
        in <xref target="Ground-Relays" format="default"></xref>. The conclusion is that ISL always have lower delay than ground relay. 
        The most typical configuration is to equip each satellite with four ISLs, which are respectively 
        used to link the front and rear satellites in the same orbit and the two satellites in adjacent 
        orbits <xref target="Internetworking" format="default"></xref>. In fact, ISL does not need to be restricted by grid topology. 
        It has become a new problem to design ISL configuration to maximize network bandwidth and minimize latency <xref target="Motif" format="default"></xref>.</t> 
      </section>

      <section numbered="true" toc="default">
        <name>Open Access Environment</name>
        <t>As transmission medium used by satellites, wireless microwave or laser channel, has inferior 
        transmission quality comparing to wired channel. Moreover, the communication between satellites and 
        GSs will be affected by weather, atmospheric conditions, signal attenuation. The transmission channel 
        can be disturbed easily due to the open environment. In addition, the position description information, 
        such as orbit of the satellite, is public. Therefore the motion can be accurately predicted through 
        calculation <xref target="GPS-Precision" format="default"></xref>. This will increase the possibility of premeditated attack. 
        Moreover, due to the global movement of the satellite, the majority of its cycle is in an uncontrolled 
        environment, facing a large number of malicious hosts and users distributed all over the world.</t>
      </section>

      <section numbered="true" toc="default">
        <name>Dynamic Networks</name>
        <t>Due to the extremely fast speed of LEO satellites relative to the ground,  it has short-lived coverage 
        for terrestrial users (less than 3 minutes). What's more, under the minmax connection principle, 
        a handover occurs in an average of about 40 seconds <xref target="In-Orbit-Computing" format="default"></xref>. The frequent handover 
        between user terminals and LEO satellites will cause inevitable frequent updating of the IP address.</t>


      </section>

      <section numbered="true" toc="default"> 
        <name>Limited Resources</name>
        <t>Due to the limitation of rocket capacity, cost and manufacturing technology, satellite design will be 
        subject to many restrictions. The processors on satellites also have worse performance than that of the 
        terrestrial equipment. Up-to-date onboard processor have a CPU frequency ranging from 100MHz to 500MHz, 
        much lower than commercial processors. </t>

        <t>In particular, typical performance of spatial processor are as follows. The Cobham GR740 <xref target="GR740" format="default"></xref> is 
        a 65 nm CPU with a 32-bit quad-core architecture that operates at 250 MHz with estimated power dissipation 
        of under 1.5 W. The BAE Systems RAD5545 <xref target="RAD5545" format="default"></xref> is a 45 nm CPU with a 64-bit quad-core architecture 
        that operates at 466 MHz with estimated power dissipation of under 20 W. The Boeing Maestro <xref target="Maestro" format="default"></xref> is 
        a 90 nm CPU with a 64-bit 49-core architecture that operates at 350 MHz with estimated power dissipation 
        of under 22.2 W. A space-grade 32 nm CPU HPSC <xref target="HPSC" format="default"></xref> with 64-bit dual quad-core architecture is 
        considered that is currently being developed by Boeing, which is estimated to operate at 500 MHz with 
        power dissipation of under 10 W.</t>
      </section>   


      <section numbered="true" toc="default"> 
        <name>Threat from Source Address Spoofing</name>
        <t>The report <xref target="GLOBAL-DDoS" format="default"></xref> shows that attacks occur increasingly in satellite systems. In 2019, 
        attacks on satellite systems increased 255 percent. Some hackers begun to attack the satellite constellations, 
        rather than the previous ones on satellite monomers. DDoS attacks against satellite networks have 
        feature of low-cost and low-detectability. And by congesting of the target link, or exploiting some 
        vulnerable characteristics, the satellite networks are as vulnerable to DDoS attacks as terrestrial 
        networks <xref target="ICARUS" format="default"></xref>. </t>
        
         <t>In the past, the attacks on satellite communication systems, such as eavesdropping, interference and 
         frequency blocking mainly occur in the physical layer. The use of the ISL in ISTN increases 
         the vulnerability of network layer and above. The attack object expands from satellite monomer to satellite network, and the attack method evolves from physical layer to higher layer.DDoS attack <xref target="DDoS-Attack" format="default"></xref> is one of the most common attack 
         in network layer. Cisco predicts that the number of DDoS attacks will increase to 154 million worldwide 
         in 2023 <xref target="Cisco-Report" format="default"></xref>. Through the query and test of DNS services in 62000 autonomous domains around 
         the world, it is found that more than half of the networks are in danger of being DDoS attacked 
         because they do not validate the source address of packets <xref target="Dns-Security" format="default"></xref>. </t>

         <t>Due to limited computing resource, lack of traceability, and exposure to the uncontrolled environment, 
         source address spoofing attacks in ISTN are more severe than that in the terrestrial network. </t>
      </section>

      <section numbered="true" toc="default"> 
        <name>Existing Solutions and Failure Analysis</name>
        <t>Many measures have been actually deployed on the Internet to resist DDoS attacks, but they are difficult to adapt to the new features of mega-constellations and can not work as effectively as in terrestrial networks. </t>

        <t>Professional firewall: identify and isolate the traffic according to some characteristics of the traffic to prevent malicious traffic from entering the network. Such firewalls are usually additional hardware, and their weight and volume greatly increase the cost of satellite launch. In addition, the energy consumption required for its high performance is also unbearable for satellites. </t>

        <t>Scrubbing center: transfer the flow to the scrubbing center, filter and scrub it, and then return the normal flow to the original server. Traffic will occupy a lot of link bandwidth in the process of leading out and returning, increase the probability of congestion and occupy the traffic of normal users. In addition, due to the need to transfer to the scrubbing center, this operation will bring additional detour delay depending on the deployment location of the scrubbing center. </t>

        <t>Equipment upgrade: upgrade the server, gateway and other equipment to improve the tolerance of large traffic. Once launched, the satellite will continue to move at a high speed in space, and it is difficult to upgrade its hardware in the future. Therefore, its bandwidth and processing speed, which are heavily dependent on the performance indicators of the hardware, can basically be considered as non scalable. </t>

        <t>Source address validation: filter address spoofing packets and locate malicious users in the network through the traceability of source address <xref target="RFC5210" format="default"></xref><xref target="RFC7039" format="default"></xref><xref target="RFC7513" format="default"></xref><xref target="RFC8074" format="default"></xref>. In the terrestrial network, source address validation mechanisms such as SAVI have been deployed and proved effective to a certain extent. SAVI is an endogenous security mechanism at the protocol level and has little dependence on hardware. It is one of the most promising solutions to be transplanted to the ISTN scenario. However, due to the vulnerable characteristics of satellite constellations described in 3.2, 3.3 and 3.4, SAVI mechanism cannot be used directly in ISTN. </t>
      </section>


    </section>

<!--4.Problems for Source Address Spoofing in ISTN-->
    <section numbered="true" toc="default">
      <name>Problems of Source Address Spoofing in ISTN </name>
      

      <section numbered="true" toc="default">
      <name>Understand The Necessity of Onboard Source Address Validation </name>
      
      <t>The most effective deployment scheme of SAVI is to deploy on the first hop switching device. In the 
      traditional satellite communication system, the satellite adopts "bent-pipe-only" model, that is, 
      satellites only relay terrestrial users' radio signals to the fixed ground stations without ISLs or routing. 
      As ground station location is fixed, the storage location of anchor binding information is fixed accordingly. 
      Therefore, the SAVI mechanism can take effect stably at a low cost in terrestrial networks. </t>

      <t>ISTN is in a dilemma of vast global traffic and limited ground stations. If the 
      "bent-pipe-only" model is adopted, all traffic on the network will converge to the thimbleful of ground stations. 
      This will generate traffic convergence, resulting in bottlenecks and a sharp decline in network performance. 
      That explains why ISLs are put on the Starlink agenda and routers are the most expected device in the network 
      infrastructure. Further, in such a network structure, the source address validation mechanisms are naturally deployed on satellites. </t>

      <t>The source address validation scenario for mega constellations is shown in Figure 1. It is divided into ground 
      segment and satellite segment. The ground segment includes user terminal, authentication server and ground gateway, 
      and is connected to the Internet through ground gateway. The space segment consists of satellites in the satellite 
      Internet (support SAVI and ISL). </t>

      <figure anchor="Source_address_validation_in_LSN">
      <name>The source address validation scenario for ISTN.</name>
        <artwork align="center" name="The source address validation scenario for mega constellations." type="" alt=""><![CDATA[

         +-------------------------------------------+
         | +---------+                   +---------+ |
Space    | |Satellite|       ISLs        |Satellite| |
Segment  | |  (SAVI) | <---------------> |  (SAVI) | |
         | +----+----+                   +-----+---+ |
         +------|------------------------------|----+
                |                              |
         +------|------------------------------|-----+
         | +----+----+  +--------------+   +---+---+ |   +--------+
Ground   | |   User  |  |Authentication|<->|Gateway|<--->|Internet|
Segment  | | Terminal|  |    Server    |   |Station| |   +--------+
         | +---------+  +--------------+   +-------+ |
         +-------------------------------------------+


           ]]></artwork>
        </figure>


      <t>However, in today's time-varying topology LEO satellite networks, SAVI mechanism faces the problem that the 
      anchor binding information stored on the satellite is no longer stable. The router in satellites moves at a high speed, 
      therefore the mobility mechanism in the terrestrial network is no longer effective. There are two possible terms of settlement as follows. 
      Each has its respective unacceptable weaknesses. </t>
    
      </section>


      <section numbered="true" toc="default">
      <name>Signaling Storm and Service Interruption</name>
      
      <t>Reauthentication in ISTN contains the following steps according to its network composition:</t>

      <t>1. Considering the resource limitation and information security of satellites, the authentication server 
      (such as RADIUS Server) storing user identity information needs to be accessed after reaching the GS through the ISL, </t>
      <t>2. The LEO satellite initially accessed by the user terminal acts as an authenticator to initiate an identity 
      authentication request to the authentication server and assign an address to the user terminal, </t>
      <t>3. As LEO satellites keep moving at a high-speed relative to ground, user terminals need to switch access to satellites every dozens of seconds, </t>
      <t>4. After the handover, the user needs to find a new satellite as the access point and perform the reauthentication and rebinding process to access the network. </t>
      
      <t>A. Signaling Storm </t>
      <t>First, the user sends the authentication request to the NCC on the ground through the network for reauthentication 
      process. This process requires multiple signaling interactions between the user and the access satellite, between 
      the access satellite and the NCC. Secondly, the authenticated user executes the address configuration process to 
      obtain the trusted address. In this process, multiple signaling interactions with specific servers or satellites 
      will also occur according to the address configuration mechanism. From the perspective of the whole network, 
      a large amount of users need to perform reauthentication at every moment, and each reauthentication contains a 
      large amount of signaling. Therefore, as shown in Figure 2, if the number of users rises to 97000 under the 
      scale of Starlink phase I, signaling storm occurs, which not only occupies the link bandwidth, but also generates 
      the bottlenecks of NCC and cause bad deterioration of network performance. </t>



      <figure anchor="The-bottlenecks-of-NCC">
      <name>The bottlenecks of NCC.</name>
        <artwork align="center" name="The bottlenecks of NCC." type="" alt=""><![CDATA[

  Queuing delay
    in NCC (ms)                 
        |                          
    10 -|                                    *
        |                                    *
     8 -|                                   *    
        |                                  *      
     6 -|                                 *       
        |                               *            
     4 -|                            **
        |                         **
     2 -|                     ** 
        |*******************
     0 -|-------*-------*-------*-------*-------*------>
        0     20000   40000   60000   80000  100000  Number of users
          
           ]]></artwork>
        </figure>





      <t>B. Service Interruption</t> 
      <t>The legitimacy of user identity and the authenticity of address are the premise of realizing the function 
      of upper layer protocol. During the period from the handover to the successful rebinding, the user cannot use 
      the services at the network layer or above. This will cause interruption of the user's ongoing business. 
      Users need to wait until the completion of the reauthentication process. This seriously affects user experience.</t>


      
      </section>
      
      <section numbered="true" toc="default">
      <name>Delay Deterioration and Bandwidth Occupation</name>
      <t>Tunnel forwarding in ISTN contains the following steps according to its network composition:</t>
      <t>1. After disconnecting from the access satellite, the user forwards the data traffic to the satellite where the 
      anchor binding information is located through the tunnel instead of reauthenticate or rebind, </t>
      <t>2. After receiving the data packet, the satellite with anchor binding information unpacks it to obtain the user's 
      original data packet, and then validates its source address.</t>
      
      <t>A. Delay Deterioration</t>
      
      <t>Since source address validation is required before the packet is forwarded, it needs to be forwarded to the satellite 
      where the anchor binding information is located, and then routed after validation. This causes traffic detour and 
      additional delay. Moreover, due to the periodicity of satellite movement, after disconnecting from the user, 
      the satellite will gradually move away from the user in half a cycle, and even on the other side of the earth in the 
      worst case. It can be seen from Figure 3 and Figure 4 that the number of hops and time delay from the user are 
      gradually increasing in the first half of the satellite cycle as the satellite brings the anchor binding information moves away. </t>


              <figure anchor="Number_of_hops_from_anchor">
              <name>The number of hops from anchor to the user.</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[

  Number of hops
    from anchor
        |
    35 -|
        |                        **
    30 -|                      *    *
        |                    *        *
    25 -|                  *            *
        |                *                *
    20 -|              *                    *
        |            *                        *
    15 -|          *                            *
        |        *                                * 
    10 -|      *
        |    *
     5 -|  *
        |*
     0 -|--------.-------.-------.--------.-------.---->
        0       100     200     300      400     500  Time(s)

           ]]></artwork>
        </figure>


<figure anchor="Delay_from_anchor">
<name>The delay from anchor to the user.</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[

Delay from anchor (ms)
        |
    70 -|
        |                        **
    60 -|                      *    *
        |                    *        *
    50 -|                  *            *
        |                *                *
    40 -|              *                    *
        |            *                        *
    30 -|          *                            *
        |        *                                * 
    20 -|      *
        |    *
    10 -|  *
        |*
     0 -|--------.-------.-------.--------.-------.---->
        0       100     200     300      400     500  Time(s)
        
           ]]></artwork>
        </figure>
      
      <t>The introduction of such a large additional delay has completely suppressed the low delay advantage of mega constellations.</t>


      <t>B. Capacity Deterioration</t>
      <t>From the end-to-end perspective, the detour of data traffic causes delay. From the network perspective, the detour of data 
      traffic causes additional ISLs to be used. Compared with the shortest path, tunnel forwarding needs to pass through more ISLs 
      when delivering the same amount of end-to-end traffic, therefore occupying more bandwidth. The reduction of ISL bandwidth leads 
      to the decline of the overall network capacity.</t>

      </section>

    </section>
   


<!--5.Requirements for Source Address Spoofing in ISTN-->
    <section numbered="true" toc="default">
      <name>Requirements for Improvement on Source Address Validation for ISTN </name>
      <t>In order to implement source address validation mechanism in ISTN, the following requirements for improvement should be made:</t>

      <section numbered="true" toc="default">
      <name>Scalability </name>
      <t>A reasonable source address validation mechanism should be able to deploy as many satellites and user nodes as possible in 
      ISTN. With the continuous development of constellation and user scale, the handover may occur more frequently, which increases the pressure on the processing capacity of the mechanism. The mechanism should ensure that the network performance indicators such as delay and bandwidth do not deteriorate significantly, so as to support the long-term development of the network and users. A possible focus is that the signalling interaction process involved in source address validation should avoid bottleneck nodes caused by traffic aggregation in each link.</t>
      </section>

      <section numbered="true" toc="default">
      <name>Lightweight </name>
      <t>Due to on-board resources are very limited, source address validation mechanism should be lightweight. At present, 
      more and more Internet services, such as Content Delivery Network (CDN) <xref target="CDN-ISTN" format="default"></xref>, are expected to be extended to satellites. 
      As a basic security support function, the source address validation mechanism should occupy less satellite resources and can be deployed under the limitation of existing satellite resources. Reduce the computing power and memory capacity required by the mechanism, so as to leave more available resources for upper layer services and applications..</t>
      </section>
      
      <section numbered="true" toc="default">
      <name>Functional Integrity</name>
      <t>The deployment of ISTN is a long-term work. A mega-constellation will require continuous launch and iterative version. A reasonable source address validation mechanism should be designed to ensure that its functional integrity is not limited by the current deployment completion of the constellation. The mechanism should include the processing of incremental deployment of newly launched and deployed satellites, such as database synchronization.</t>
      </section>

      <section numbered="true" toc="default">
      <name>Transparency to Users</name>
      <t>The handover of the physical layer will undoubtedly lead to the interruption of all upper layer services. The source address validation mechanism should be organically combined with the user re access related operations as much as possible to reduce additional operations, so as to ensure the transparency of the physical handover to the user. The goal is to make users unaware when handover at the bottom and running the source address validation mechanism. The delay sensitive Internet services at the top, such as video, conference and game services, can maintain continuity and the advantages of low delay and high bandwidth provided by ISTN.</t>
      </section>

      <section numbered="true" toc="default">
      <name>Cost stability</name>
      <t>The operations involved in source address validation will inevitably bring a certain amount of cost. In order to limit the cost to a controllable range, it should be decoupled from the deployment location of the ground station and the real-time location of the initial access satellite. It has been proved in experiments that if the rebinding process after handover needs to visit the ground station or the initial satellite, it will introduce great volatility to the cost.</t>
      </section>

    </section> 
  

    <section anchor="Acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
    
    </section>
    <!-- Possibly a 'Contributors' section ... -->

   <section anchor="IANA" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <!--
    <section anchor="Security" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>All drafts are required to have a security considerations section.
     See <xref target="RFC3552" format="default">RFC 3552</xref> for a guide.</t>
    </section>
    -->
  </middle>
  <!--  *****BACK MATTER ***** -->

 <back>
    <!-- References split into informative and normative -->

   <!-- There are 2 ways to insert reference entries from the citation libraries:
    1. define an ENTITY at the top, and use "ampersand character"RFC2629; here (as shown)
    2. simply use a PI "less than character"?rfc include="reference.RFC.2119.xml"?> here
       (for I-Ds: include="reference.I-D.narten-iana-considerations-rfc2434bis.xml")

    Both are cited textually in the same manner: by using xref elements.
    If you use the PI option, xml2rfc will, by default, try to find included files in the same
    directory as the including file. You can also define the XML_LIBRARY environment variable
    with a value containing a set of directories to search.  These can be either in the local
    filing system or remote ones accessed by http (http://domain/dir/... ).-->

   <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210">
        <front>
        <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
        <author initials="J." surname="Wu" fullname="J. Wu">
        <organization/>
        </author>
        <author initials="J." surname="Bi" fullname="J. Bi">
        <organization/>
        </author>
        <author initials="X." surname="Li" fullname="X. Li">
        <organization/>
        </author>
        <author initials="G." surname="Ren" fullname="G. Ren">
        <organization/>
        </author>
        <author initials="K." surname="Xu" fullname="K. Xu">
        <organization/>
        </author>
        <author initials="M." surname="Williams" fullname="M. Williams">
        <organization/>
        </author>
        <date year="2008" month="June"/>
        <abstract>
        <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
        </abstract>
        </front>
        <seriesInfo name="RFC" value="5210"/>
        <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>





        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039">
        <front>
        <title>Source Address Validation Improvement (SAVI) Framework</title>
        <author initials="J." surname="Wu" fullname="J. Wu">
        <organization/>
        </author>
        <author initials="J." surname="Bi" fullname="J. Bi">
        <organization/>
        </author>
        <author initials="M." surname="Bagnulo" fullname="M. Bagnulo">
        <organization/>
        </author>
        <author initials="F." surname="Baker" fullname="F. Baker">
        <organization/>
        </author>
        <author initials="C." surname="Vogt" fullname="C. Vogt" role="editor">
        <organization/>
        </author>
        <date year="2013" month="October"/>
        <abstract>
        <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation. This document is a framework document that describes and motivates the design of the SAVI methods. Particular SAVI methods are described in other documents.</t>
        </abstract>
        </front>
        <seriesInfo name="RFC" value="7039"/>
        <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>

        
        <reference anchor="RFC7513" target="https://www.rfc-editor.org/info/rfc7513">
        <front>
        <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
        <author initials="J." surname="Bi" fullname="J. Bi">
        <organization/>
        </author>
        <author initials="J." surname="Wu" fullname="J. Wu">
        <organization/>
        </author>
        <author initials="G." surname="Yao" fullname="G. Yao">
        <organization/>
        </author>
        <author initials="F." surname="Baker" fullname="F. Baker">
        <organization/>
        </author>
        <date year="2015" month="May"/>
        <abstract>
        <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
        </abstract>
        </front>
        <seriesInfo name="RFC" value="7513"/>
        <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>


        
        <reference anchor="RFC8074" target="https://www.rfc-editor.org/info/rfc8074">
        <front>
        <title>Source Address Validation Improvement (SAVI) for Mixed Address Assignment Methods Scenario</title>
        <author initials="J." surname="Bi" fullname="J. Bi">
        <organization/>
        </author>
        <author initials="G." surname="Yao" fullname="G. Yao">
        <organization/>
        </author>
        <author initials="J." surname="Halpern" fullname="J. Halpern">
        <organization/>
        </author>
        <author initials="E." surname="Levy-Abegnoli" fullname="E. Levy-Abegnoli" role="editor">
        <organization/>
        </author>
        <date year="2017" month="February"/>
        <abstract>
        <t>In networks that use multiple techniques for address assignment, the spoofing of addresses assigned by each technique can be prevented using the appropriate Source Address Validation Improvement (SAVI) methods. This document reviews how multiple SAVI methods can coexist in a single SAVI device and how collisions are resolved when the same binding entry is discovered by two or more methods.</t>
        </abstract>
        </front>
        <seriesInfo name="RFC" value="8074"/>
        <seriesInfo name="DOI" value="10.17487/RFC8074"/>
        </reference>

        
        

        
        
       

      </references>

      
   




      



      <references>
        <name>Informative References</name>
        <!-- Here we use entities that we defined at the beginning. -->

      
        <reference anchor="Space-Race">
          <front>
            <title>Gearing up for the 21st century space race</title>
            <author initials="D." surname="Bhattacherjee">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
        </reference>



       

        <reference anchor="Dns-Security">
          <front>
            <title>Behind closed doors: A network tale of spoofing, intrusion, and false dns security</title>
            <author initials="C." surname="Deccio">
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>

                <reference anchor="CDN-ISTN">
          <front>
            <title>A Synergic Architecture for Content Distribution in Integrated Satellite and Terrestrial Networks</title>
            <author initials="S." surname="Yang">
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>

        
        
        <reference anchor="Low-Latency-in-Space">
          <front>
            <title>Delay is not an option: Low latency routing in space</title>
            <author initials="M." surname="Handley">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
        </reference>

        <reference anchor="Networking-in-Heaven">
          <front>
            <title>Networking in heaven as on earth</title>
            <author initials="T." surname="Klenze">
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>

      

        <reference anchor="LEO-MEO-GEO">
          <front>
            <title>Analysis of LEO, MEO, and GEO Global Mobile Satellite Systems in the Presence of Interference and Fading</title>
            <author initials="F." surname="Vatalaro">
              <organization/>
            </author>
            <date year="1995"/>
          </front>
        </reference>


      <reference anchor="GLOBAL-DDoS" target="https://business.blogthinkbig.com%2Fwp-content%2Fuploads%2Fsites%2F2%2F2020%2F02%2FGTSA_Etisalat_DDoS_v2.pdf">
          <front>
            <title>GLOBAL DDoS THREAT REPORT</title>
            <author>
              <organization/>
            </author> 
            <date year="2019"/> 
          </front>
        </reference>

<reference anchor="Cisco-Report" target="https://www.cisco.com/c/en/us/solutions/collateral/executive-perspective s/annual-internet-report/white-paper-c11-741490.html">
          <front>
            <title>Cisco Annual Internet Report (2018–2023) White Paper</title>
            <author>
              <organization/>
            </author> 
            <date year="2018"/> 
          </front>
        </reference>
      

        <reference anchor="Nttdocomo-6G" target="https://www.nttdocomo.co.jp/english/binary/pdf/corporate/technology/whitepaper_6g/DOCOMO_6G_White_PaperEN_20200124.pdf">
          <front>
            <title>NTTDPCOM 6G White Paper</title>
            <author>
              <organization/>
            </author>  
          </front>
        </reference>

        <reference anchor="ITU-6G" target="https://www.itu.int/dms_pub/itu-s/opb/itujnl/S-ITUJNL-JFETF.V1I1-2020-P09-PDF-E.pdf">
          <front>
            <title>ITU 6G vision</title>
            <author>
              <organization/>
            </author>  
          </front>
        </reference>

        <reference anchor="Surrey-6G" target="https://www.surrey.ac.uk/sites/default/files/2020-11/6g-wireless-a-new-strategic-vision-paper.pdf">
          <front>
            <title>Surrey 6G vision</title>
            <author>
              <organization/>
            </author>  
          </front>
        </reference>

        <reference anchor="In-Orbit-Computing">
          <front>
            <title>In-orbit Computing: An Outlandish thought Experiment?</title>
            <author initials="D." surname="Bhattacherjee">
              <organization/>
            </author>
            <date year="2020"/>  
          </front>
        </reference>

        
        
        <reference anchor="DDoS-Attack">
          <front>
            <title>Distirbuted denial of sevrice attack and the zombie ant effect</title>
            <author initials="J." surname="Elion">
              <organization/>
            </author>
            <date year="2000"/>
          </front>
        </reference>

       


        <reference anchor="GR740">
          <front>
            <title>GR740: Rad-Hard Quadcore LEON4FT System-on-Chip</title>
            <author initials="M." surname="Hjorth">
              <organization/>
            </author>
            <date year="2017"/>
          </front>
        </reference>

        <reference anchor="RAD5545">
          <front>
            <title>Quadcore Radiation-Hardened System-on-Chip Power Architecture Processor</title>
            <author initials="R." surname="Berger">
              <organization/>
            </author>
            <date year="2015"/>
          </front>
        </reference>

        <reference anchor="Maestro">
          <front>
            <title>Implementation of Kernels on the Maestro Processor</title>
            <author initials="J." surname="Suh">
              <organization/>
            </author>
            <date year="2013"/>
          </front>
        </reference>

        <reference anchor="GPS-Precision">
          <front>
            <title>Validation of SGP4 and IS-GPS-200D Against GPS Precision Ephemerides</title>
            <author initials="T." surname="Kelso">
              <organization/>
            </author>
            <date year="2007"/>
          </front>
        </reference>



        <reference anchor="Ground-Relays">
          <front>
            <title>Using ground relays for low-latency wide-area routing in megaconstellations</title>
            <author initials="M." surname="Handley">
              <organization/>
            </author>
            <date year="2019"/>
          </front>
        </reference>

        <reference anchor="Internetworking">
          <front>
            <title>Internetworking with satellite constellations</title>
            <author initials="L." surname="Wood">
              <organization/>
            </author>
            <date year="2001"/>
          </front>
        </reference>

        <reference anchor="Motif">
          <front>
            <title>Network topology design at 27,000 km/hour</title>
            <author initials="D." surname="Bhattacherjee">
              <organization/>
            </author>
            <date year="2019"/>
          </front>
        </reference>

        <reference anchor="ICARUS">
          <front>
            <title>ICARUS: Attacking low Earth orbit satellite networks</title>
            <author initials="G." surname="Giuliari">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>

        <reference anchor="STARLINK-ISL" target="https://space.skyrocket.de/doc_sdat/starlink-v1-5.htm">
          <front>
            <title>Starlink Block v1.5 </title>
            <author>
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>


        



        <reference anchor="HPSC">
          <front>
            <title>High Performance Spaceflight Computing (HPSC) Processor Chiplet</title>
            <author>
              <organization/>
            </author>
            <date year="2017"/>
          </front>
        </reference>
        



         <reference anchor="Starlink" target="https://en.wikipedia.org/wiki/Starlink">
          <front>
            <title>Starlink</title>
            <author/>
            <date/>
          </front>
      </reference>
     <reference anchor="Kuiper" target="https://en.wikipedia.org/wiki/Kuiper_Systems">
          <front>
            <title>Kuiper</title>
            <author/>
            <date/>
          </front>
      </reference>
    
     
     
      <reference anchor="OneWeb" target="https://en.wikipedia.org/wiki/OneWeb">
          <front>
            <title>OneWeb</title>
            <author/>
            <date/>
          </front>
      </reference>




      </references>
    </references>
    

 </back>
</rfc>
