Publications
On the Feasibility of Laser Inter-satellite Links for Low-latency High Frequency Trading
Vaibhav Singh, Akshay Gadre
Abstract
Internet satellite constellations are proliferating and enabling new applications in long-range and large-scale connectivity. One such promising application is providing low-latency communication for high frequency trading by leveraging their global coverage. While existing approaches leverage higher orbit satellites as low-latency relays for private clients, there is a new opportunity that can provide low-latency connectivity to every customer via the satellite mesh – laser inter-satellite links (LISLs).While past research has explored the capability of LISLs for enabling physical deployment and impact on the constellation topology design, this work presents a holistic empirical study on the feasibility of leveraging LISLs for low-latency high frequency trading. We evaluate the feasibility, utility and practical limits of the latency benefits of LISL-based constellations for ten large and geographically diverse financial markets across over 150 million satellite-seconds of simulation. Our empirical evaluation across two of the largest proposed satellite constellations, Starlink and Project Kuiper, demonstrates that LISLs can provide full coverage with roughly 1000 satellites and improve latency for 78.76% of link-pairs. However, these benefits decline drastically with processing delays of 4 ms to roughly 19.05% of link-pairs.
BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks
Alessandro Lotto, Vaibhav Singh, Bhaskar Ramasubramanian, Alessandro Brighente, Mauro Conti, and Radha Poovendran
Abstract
Fifth-generation (5G) cellular communication networks are being deployed on applications beyond mobile devices, including vehicular networks and industry automation. Despite their increasing popularity, 5G networks, as defined by the Third Generation Partnership Project (3GPP), have been shown to be vulnerable against fake base station (FBS) attacks. An adversary carrying out an FBS attack emulates a legitimate base station by setting up a rogue base station. This enables the adversary to control the connection of any user equipment that (inadvertently) connects with the rogue base station. Such an adversary can gather sensitive information belonging to the user. While there is a large body of work focused on the development of tools to detect FBSs, the user equipment will continue to remain vulnerable to an FBS attack. In this paper, we propose BARON, a defense methodology to enable user equipment to determine whether a target base station that it is connecting to is legitimate or rogue. BARON accomplishes this by ensuring that the user receives an authentication token from the target base station which can be computed only by a legitimate and trusted entity. As a consequence, receiving such an authentication token from a base station ensures legitimacy of the base station. We evaluate BARON through extensive experiments on the handover process between base stations in 5G networks. Our experimental results show that BARON introduces an overhead of less than 1% during handover completion, which is 10000× lower than the overhead reported by a state-of-the-art method. BARON is also effective in thwarting an FBS attack and quickly recovering connection to a legitimate base station.
Talks and Presentations
Intelligent Self-Healing Wireless Mesh Network for Sound Transit Rail Trains
Calvin Tran, Martin Nguyen, Michael Khuu, Vaibhav Singh