Relay-assisted satellite networks rely on multi-hop architectures that expose data integrity to malicious or compromised relays. End-to-end Message Authentication Codes (MACs) avoid trusting relays but delay error detection until the destination, incurring costly retransmissions over long-delay space links, while hop-by-hop integrity requires trusting intermediate nodes. We propose a superposition-coded integrity scheme in which the source embeds the end-to-end MAC tag directly into the physical-layer waveform, allowing the destination to recover the tag independently of relay behavior. This prevents tag forgery even when a relay possesses the end-to-end key and eliminates the need to forward authentication data through relays. We validate the approach using a three-node software-defined radio testbed and show improved authentication reliability under malicious relay scenarios.

View More Papers

Beyond Raw Bytes: Towards Large Malware Language Models

Luke Kurlandski (Rochester Institute of Technology), Harel Berger (Ariel University), Yin Pan (Rochester Institute of Technology), Matthew Wright (Rochester Institute of Technology)

Read More

Eviction Notice: Reviving and Advancing Page Cache Attacks

Sudheendra Raghav Neela (Graz University of Technology), Jonas Juffinger (Graz University of Technology), Lukas Maar (Graz University of Technology), Daniel Gruss (Graz University of Technology)

Read More

Achieving Zen: Combining Mathematical and Programmatic Deep Learning Model...

David Oygenblik (Georgia Institute of Technology), Dinko Dermendzhiev (Georgia Institute of Technology), Filippos Sofias (Georgia Institute of Technology), Mingxuan Yao (Georgia Institute of Technology), Haichuan Xu (Georgia Institute of Technology), Runze Zhang (Georgia Institute of Technology), Jeman Park (Kyung Hee University), Amit Kumar Sikder (Iowa State University), Brendan Saltaformaggio (Georgia Institute of Technology)

Read More