This Is AuburnElectronic Theses and Dissertations

Show simple item record

Discovery of Attack-Resistant Satellite Constellation Configurations via Simulation-Based Evolutionary Computing


Metadata FieldValueLanguage
dc.contributor.advisorGuzzetti, Davide
dc.contributor.authorPatrick, Raymond III
dc.date.accessioned2025-12-05T20:16:27Z
dc.date.available2025-12-05T20:16:27Z
dc.date.issued2025-12-05
dc.identifier.urihttps://etd.auburn.edu/handle/10415/10103
dc.description.abstractFor decades, outer space was considered a geopolitical sanctuary where spacecraft faced only natural threats. A current trend in space mission planning envisions constellations with hundreds or even thousands of satellites. Today, there is a precedent for satellites to be considered legitimate military targets. While large constellation sizes reduce the mission risk posed by the loss of a single satellite, the worldwide proliferation of offensive cyber capabilities, coupled with our increasing reliance upon space systems, creates a strong threat even against these large constellations. The type of attack addressed in this research is a ground-based, RF-enabled cyberattack (e.g., a spoofed commanding signal) that can take an individual satellite out of mission-capable status. Such an attack, carried out intelligently by a capable adversary, could effectively blind a constellation to events on Earth or disrupt its service to a particular location. A method for defending against such an attack is desired. We propose the concept of a “schooling maneuver” (SM), wherein the satellites in the constellation use propulsive maneuvers to change their relative geometry, presenting a ground-based attacker with a poorer sight picture. This reconfiguration decreases the attacker’s physical access to the constellation, thereby reducing the amount of mission degradation induced by the attacks. We present a method for discovering such maneuvers given the attacker location, the reference constellation configuration, and a do-not-exceed ∆V limit. For a representative example, we demonstrate an evolutionary algorithm that discovers the best SM available within the ∆V limit and validate its performance using a brute-force search of the same configuration space.en_US
dc.rightsEMBARGO_NOT_AUBURNen_US
dc.subjectAerospace Engineeringen_US
dc.titleDiscovery of Attack-Resistant Satellite Constellation Configurations via Simulation-Based Evolutionary Computingen_US
dc.typeMaster's Thesisen_US
dc.embargo.lengthMONTHS_WITHHELD:12en_US
dc.embargo.statusEMBARGOEDen_US
dc.embargo.enddate2026-12-05en_US
dc.contributor.committeeTaheri, Ehsan
dc.contributor.committeeTauritz, Daniel
dc.contributor.committeeMulder, Samuel

Files in this item

Show simple item record