Conference Paper

Automating and Decentralising Satellite-based Emergency Mapping

Authors:
  • Parametry.ai
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

The quantity and diversity of stakeholders in space is increasing and centralised management of their assets is becoming more complex. New technologies in Web3 such as Decentralised Autonomous Organisations (DAOs) can bridge the communication gap with neutral and automated systems, and distribute currently centralised processes that are inherently decentralised by nature. One of these processes is Satellite-based Emergency Mapping (SEM) for Disaster Response Management (DRM). With automated decision strategies and transparent ledgers, a fairer and more accessible system can be built to handle the increase in stakeholders as well as the increasing number of natural disasters occurring. A DAO also address' the key issue with the current SEM process, such as decreasing the current three days wait, required to produce the necessary processed and analysed data for end users, after the disaster occurs. Moreover, with fleets of satellites belonging to different governmental and private organisations, a specific central authority cannot be identified to manage the process in an efficient and equitable way. The paper discusses the need for a more decentralised and automated system for DRM by presenting evidence of current bottlenecks and lays the foundations of the first DAO for on-orbit assets management and demonstrates which Web3 technologies could further improve SEM in this first phase of charter activation.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... Space DAO as a decentralized autonomous organization can host decentralized, transparent and neutral applications where a central authority would hinder development and trust. Target use-cases have the common characteristic that important information is exchanged for very high stake decisions, such as space traffic and collision avoidance mechanisms [12] or space-based automated emergency mapping in disaster response management [13]. The approach resides in creating built-in validation mechanisms within the exchange of the important information. ...
... More parameters could be added to the consensus CDM later to fuse more complex vector or matrix data such as in Space DAO Disaster Response application [13]. The Bayes filter is a widely used filter in SSA and in robotics where multiple sensors and information need to be fused to estimate the state of a system [14]. ...
Conference Paper
Full-text available
Space DAO represents a decentralized autonomous organization (DAO) and initiative designed to facilitate decentralized, transparent, and neutral applications, thereby circumventing centralized authority management. This paper addresses the need for effective space traffic management in an environment where a small number of dominant space situational awareness (SSA) companies overshadow a long tail of competitors, resulting in underutilization of expert insights and missed opportunities for valuable information confrontation. Originating as an initiative under the European Space Agency Tech Innovation, the proposed approach employs business incentives to enhance transparency, predictability, and accountability in line with current and evolving regulations. Leveraging user voting mechanisms, the rules governing applications can evolve dynamically, making it particularly suitable for space traffic management, an arena lacking established global regulations and in urgent need of a coordinated international agreement. Recognizing the orbit as a global commons, effective international negotiation in this context often assumes a business-oriented language. Within the DAO framework, applications serve as global marketplaces for insights, facilitating information exchange for space traffic management, while concurrently functioning as a global market for judgment, where the reliability of participants is evaluated based on their performance.
Article
Full-text available
Blockchain has found many applications, apart from Bitcoin, in different fields and it has the potential to be very useful in the satellite communications and space industries. Decentralized and secure protocols for processing and manipulating space transactions of satellite swarms in the form of Space Digital Tokens (SDT) can be built using blockchain technology. Tokenizing space transactions using SDTs will open the door to different new blockchain-based solutions for the advancement of constellation-based satellite communications in the space industry. Developing blockchain solutions using smart contracts could be used in securely authenticating various P2P satellite communications and transactions within/between satellite swarms. To manage and secure these transactions, using the proposed SDT concept, this paper suggested a blockchain-based protocol called Proof of Space Transactions (PoST). This protocol was adopted to manage and authenticate the transactions of satellite constellations in a P2P connection. The PoST protocol was prototyped using the Ethereum blockchain and experimented with to evaluate its performance using four metrics: read latency, read throughput, transaction latency, and transaction throughput. The simulation results clarified the efficiency of the proposed PoST protocol in processing and verifying satellite transactions in a short time according to read and transaction latency results. Moreover, the security results showed that the proposed PoST protocol is secure and efficient in verifying satellite transactions according to true positive rate (TPR), true negative rate (TNR), and accuracy metrics. These findings may shape a real attempt to develop a new generation of Blockchain-based satellite constellation systems.
Article
Full-text available
Over the past 15 years, scientists and disaster responders have increasingly used satellite-based Earth observations for global rapid assessment of disaster situations. We review global trends in satellite rapid response and emergency mapping from 2000 to 2014, analyzing more than 1000 incidents in which satellite monitoring was used for assessing major disaster situations. We provide a synthesis of spatial patterns and temporal trends in global satellite emergency mapping efforts and show that satellite-based emergency mapping is most intensively deployed in Asia and Europe and follows well the geographic, physical, and temporal distributions of global natural disasters. We present an outlook on the future use of Earth observation technology for disaster response and mitigation by putting past and current developments into context and perspective.
Article
Full-text available
Managing trust in a distributed Mobile Ad Hoc Network (MANET) is challenging when collaboration or cooperation is critical to achieving mission and system goals such as reliability, availability, scalability, and reconfigurability. In defining and managing trust in a military MANET, we must consider the interactions between the composite cognitive, social, information and communication networks, and take into account the severe resource constraints (e.g., computing power, energy, bandwidth, time), and dynamics (e.g., topology changes, node mobility, node failure, propagation channel conditions). We seek to combine the notions of "social trust" derived from social networks with "quality-of-service (QoS) trust" derived from information and communication networks to obtain a composite trust metric. We discuss the concepts and properties of trust and derive some unique characteristics of trust in MANETs, drawing upon social notions of trust. We provide a survey of trust management schemes developed for MANETs and discuss generally accepted classifications, potential attacks, performance metrics, and trust metrics in MANETs. Finally, we discuss future research areas on trust management in MANETs based on the concept of social and cognitive networks.
Conference Paper
Full-text available
Opportunistic networks enable mobile users to participate in various social interactions with applications such as content distribution and micro-blogs. Because of their distributed nature, securing user interactions relies rather on trust than hard cryptography. Trust is often based on past user interactions such as in reputation systems relying on ratings. Yet, a more fundamental trust, social trust - assessing a user is genuine with honest intentions - must be established beforehand as many identities can be created easily (i.e., sybils). By leveraging the social network structure and its dynamics (conscious secure pairing and wireless contacts), we propose two complementary approaches for social trust establishment: explicit social trust and implicit social trust. Complexity, trust propagation and security issues are evaluated using real world complex graphs, synthetic mobility models and mobility traces. We show how our approach limits the maximum number of sybils independently of the network size and is more robust against manipulation attacks compared to state-of-the-art approaches such as PGP- like certification chains and distributed community detection algorithms.
Conference Paper
Trust can be interpreted as a subjective belief resulting from past interactions that predicts the future behavior of the trustee. Trust management in distributed and resource-constraint networks, such as mobile ad hoc networks (MANETs) is much more difficult but more crucial than in traditional hierarchical architectures, such as the base station- or access point-centered wireless LANs. Generally, MANET is characterized by decentralized control. Hence no Trusted Third Parties can be used. The trust information or evidence used to evaluate trustworthiness is only provided by peers, i.e. other nodes that form the network. Due to the dynamically changing topology and limited resources (power, bandwidth, computation etc.) the trust evaluation procedure should only rely on local information. In this paper, we propose a reputation-based trust management system for detecting and preventing MANET vulnerabilities. Both active (malicious nodes) and passive (selfish nodes) attacks are investigated and our scheme cooperatively helps the nodes to exclude them from the network while tolerating transient faults. The scheme can work with any on-demand routing protocol. We evaluated the performance of our scheme in a discrete event-simulation environment. The results indicate scalability and robustness of our proposed scheme.
Article
Trust management for mobile ad hoc networks (MANETs) has emerged as an active research area as evidenced by the proliferation of trust/reputation protocols to support mobile group based applications in recent years. In this paper we address the performance issue of trust management protocol design for MANETs in two important areas: trust bias minimization and application performance maximization. By means of a novel model-based approach to model the ground truth status of mobile nodes in MANETs as the basis for design validation, we identify and validate the best trust protocol settings under which trust bias is minimized and application performance is maximized. We demonstrate the effectiveness of our approach with an integrated social and quality-of-service (QoS) trust protocol (called SQTrust) with which we identify the best trust aggregation setting under which trust bias is minimized despite the presence of malicious nodes performing slandering attacks. Furthermore, using a mission-oriented mobile group utilizing SQTrust, we identity the best trust formation protocol setting under which the application performance in terms of the system reliability of the mission-oriented mobile group is maximized.
Conference Paper
Ad Hoc network often termed as an infrastructure-less, self- organized or spontaneous network.The execution and survival of an ad-hoc network is solely dependent upon the cooperative and trusting nature of its nodes. However, this naive dependency on intermediate nodes makes the ad-hoc network vulnerable to passive and active attacks by malicious nodes and cause inflict severe damage. A number of protocols have been developed to secure ad-hoc networks using cryptographic schemes, but all rely on the presence of trust authority. Due to mobility of nodes and limitation of resources in wireless network one interesting research area in MANET is routing. This paper offers various trust models and trust based routing protocols to improve the trustworthiness of the neighborhood.Thus it helps in selecting the most secure and trustworthy route from the available ones for the data transfer.
The swirlds hashgraph consensus algorithm: Fair, fast, byzan-tine fault tolerance
  • L Baird
Are blockchains decentralized?
  • E Sultanik
  • T Brunson
Gossip protocol in distributed systems
  • P Gupta
Sybil attack in blockchain: Examples prevention
  • F Johnand
  • C Luciano