{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T18:48:09Z","timestamp":1776797289269,"version":"3.51.2"},"reference-count":81,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"vor","delay-in-days":298,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["92267204"],"award-info":[{"award-number":["92267204"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202355"],"award-info":[{"award-number":["62202355"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62220106004"],"award-info":[{"award-number":["62220106004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972308"],"award-info":[{"award-number":["61972308"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202354"],"award-info":[{"award-number":["62202354"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102303"],"award-info":[{"award-number":["62102303"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2021A1515111017"],"award-info":[{"award-number":["2021A1515111017"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005320","name":"Xidian University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005320","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Information Security"],"published-print":{"date-parts":[[2023,1]]},"abstract":"<jats:p>Satellite internet serves as an indispensable component of the upcoming sixth\u2010generation networks for providing global broadband internet access service. Due to the open nature of satellite\u2010ground communication, security issue in satellite internet has always been an important concern for both industry and academia. Although many researchers focus on secure communications in satellite internet, the literature is surprisingly sparse, with no comprehensive overview of the state\u2010of\u2010the\u2010art security techniques. This paper provides an in\u2010depth survey of secure communications for various satellite internet scenarios. Based on different security mechanisms, we first categorize the existing works of secure communications in satellite internet into two categories: cryptography\u2010based and physical layer security\u2010based. The former includes classical encryption\u2010based and quantum encryption\u2010based secure communication, and the latter is further divided into precoding\u2010based, cooperative jamming\u2010based, relay selection\u2010based, and physical\u2010layer authentication\u2010based secure communication depending on the applied techniques. Finally, we provide some future research directions.<\/jats:p>","DOI":"10.1049\/2023\/5604802","type":"journal-article","created":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T19:50:10Z","timestamp":1698349810000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security"],"prefix":"10.1049","volume":"2023","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-8981-9763","authenticated-orcid":false,"given":"Yu","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7677-4027","authenticated-orcid":false,"given":"Shuangrui","family":"Zhao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3640-3488","authenticated-orcid":false,"given":"Ji","family":"He","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3248-5909","authenticated-orcid":false,"given":"Yuanyu","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8448-705X","authenticated-orcid":false,"given":"Yulong","family":"Shen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9739-1930","authenticated-orcid":false,"given":"Xiaohong","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"265","published-online":{"date-parts":[[2023,10,26]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.7742"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.7742"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2271848"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/RAST.2017.8002953"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asr.2019.09.027"},{"key":"e_1_2_10_6_2","doi-asserted-by":"crossref","unstructured":"JeonS.andChoiJ. P. CFB-AES-TURBO: joint encryption and channel coding for secure satellite data transmission ICC 2019-2019 IEEE International Conference on Communications (ICC) 2019 Shanghai China IEEE 1\u20137 https:\/\/doi.org\/10.1109\/ICC.2019.8762018 2-s2.0-85070224310.","DOI":"10.1109\/ICC.2019.8762018"},{"key":"e_1_2_10_7_2","doi-asserted-by":"crossref","unstructured":"PirzadaS. J. H. MurtazaA. JianweiL. andXuT. The parallel CMAC authenticated encryption algorithm for satellite communication 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC) 2019 Beijing China IEEE 1\u20135 https:\/\/doi.org\/10.1109\/ICEIEC.2019.8784593 2-s2.0-85071097295.","DOI":"10.1109\/ICEIEC.2019.8784593"},{"key":"e_1_2_10_8_2","doi-asserted-by":"crossref","unstructured":"PirzadaS. J. H. HasanM. N. MemonZ. W. HarisM. XuT. andJianweiL. High-throughput optimizations of AES algorithm for satellites 2020 International Symposium on Recent Advances in Electrical Engineering & Computer Sciences (RAEE & CS) 2020 Islamabad Pakistan IEEE 1\u20136 https:\/\/doi.org\/10.1109\/RAEECS50817.2020.9265688.","DOI":"10.1109\/RAEECS50817.2020.9265688"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.05.002"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3080088"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2018.11.002"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.35"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-017-0031-5"},{"key":"e_1_2_10_15_2","doi-asserted-by":"publisher","DOI":"10.1364\/AOP.361502"},{"key":"e_1_2_10_16_2","doi-asserted-by":"crossref","unstructured":"XiaoK. ZhangS. MichelK. andLiC. Study of physical layer security in mmwave satellite networks 2018 IEEE International Conference on Communications (ICC) 2018 Kansas City MO USA IEEE 1\u20136 https:\/\/doi.org\/10.1109\/ICC.2018.8422916 2-s2.0-85051426124.","DOI":"10.1109\/ICC.2018.8422916"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2943900"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109246"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2902134"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIoT.6488907"},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1700043"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1800177"},{"key":"e_1_2_10_23_2","doi-asserted-by":"crossref","unstructured":"KansalS.andMittalM. Performance evaluation of various symmetric encryption algorithms 2014 International Conference on Parallel Distributed and Grid Computing 2014 Solan India IEEE 105\u2013109 https:\/\/doi.org\/10.1109\/PDGC.2014.7030724 2-s2.0-84936066345.","DOI":"10.1109\/PDGC.2014.7030724"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.08.018"},{"key":"e_1_2_10_25_2","doi-asserted-by":"crossref","unstructured":"CaparraG. CeccatoS. SturaroS. andLaurentiN. A key management architecture for GNSS open service navigation message authentication 2017 European Navigation Conference (ENC) 2017 Lausanne Switzerland IEEE 287\u2013297 https:\/\/doi.org\/10.1109\/EURONAV.2017.7954220 2-s2.0-85027976489.","DOI":"10.1109\/EURONAV.2017.7954220"},{"key":"e_1_2_10_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2978314"},{"key":"e_1_2_10_27_2","doi-asserted-by":"publisher","DOI":"10.1002\/sat.1279"},{"key":"e_1_2_10_28_2","doi-asserted-by":"publisher","DOI":"10.1038\/nature23655"},{"key":"e_1_2_10_29_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.120.030501"},{"key":"e_1_2_10_30_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41567-020-0892-y"},{"key":"e_1_2_10_31_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-020-2401-y"},{"key":"e_1_2_10_32_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.126.100501"},{"key":"e_1_2_10_33_2","doi-asserted-by":"publisher","DOI":"10.1364\/OL.44.002398"},{"key":"e_1_2_10_34_2","doi-asserted-by":"publisher","DOI":"10.1002\/que2.50"},{"key":"e_1_2_10_35_2","doi-asserted-by":"crossref","unstructured":"PanZ.andDjordjevicI. B. Security of satellite-based CV-QKD under realistic assumptions 2020 22nd International Conference on Transparent Optical Networks (ICTON) 2020 Bari Italy IEEE 1\u20134 https:\/\/doi.org\/10.1109\/ICTON51198.2020.9203397.","DOI":"10.1109\/ICTON51198.2020.9203397"},{"key":"e_1_2_10_36_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2019.0795"},{"key":"e_1_2_10_37_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-020-00336-4"},{"key":"e_1_2_10_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012314.00178"},{"key":"e_1_2_10_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2885979"},{"key":"e_1_2_10_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2944875"},{"key":"e_1_2_10_41_2","doi-asserted-by":"crossref","unstructured":"CaoW. ZouY. YangZ. andZhuJ. Secrecy outage probability of hybrid satellite-terrestrial relay networks GLOBECOM 2017-2017 IEEE Global Communications Conference 2017 Singapore IEEE 1\u20135 https:\/\/doi.org\/10.1109\/GLOCOM.2017.8254575 2-s2.0-85046450171.","DOI":"10.1109\/GLOCOM.2017.8254575"},{"key":"e_1_2_10_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/CC.6245522"},{"key":"e_1_2_10_43_2","doi-asserted-by":"crossref","unstructured":"YanY. ZhangB. GuoD. LiS. NiuH. andWangX. Joint beamforming and jamming design for secure cooperative hybrid satellite-terrestrial relay network 2016 25th Wireless and Optical Communication Conference (WOCC) 2016 Chengdu IEEE 1\u20135 https:\/\/doi.org\/10.1109\/WOCC.2016.7506598 2-s2.0-84981318256.","DOI":"10.1109\/WOCC.2016.7506598"},{"key":"e_1_2_10_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2913793"},{"key":"e_1_2_10_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2022.3190238"},{"key":"e_1_2_10_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2012.2191543"},{"key":"e_1_2_10_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2334640"},{"key":"e_1_2_10_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3024621"},{"key":"e_1_2_10_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3293231"},{"key":"e_1_2_10_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2935169"},{"key":"e_1_2_10_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2832819"},{"key":"e_1_2_10_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2021.3097583"},{"key":"e_1_2_10_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2824623"},{"key":"e_1_2_10_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2019.2952045"},{"key":"e_1_2_10_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3251342"},{"key":"e_1_2_10_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3018083"},{"key":"e_1_2_10_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2020.3026700"},{"key":"e_1_2_10_58_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-4775-1_24"},{"key":"e_1_2_10_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2021.3074909"},{"key":"e_1_2_10_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2872718"},{"key":"e_1_2_10_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2893366"},{"key":"e_1_2_10_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2921306"},{"key":"e_1_2_10_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2022.3215011"},{"key":"e_1_2_10_64_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2883144"},{"key":"e_1_2_10_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3042188"},{"key":"e_1_2_10_66_2","doi-asserted-by":"crossref","unstructured":"DuX. ShanD. ZengK. andHuieL. Physical layer challenge-response authentication in wireless networks with relay IEEE INFOCOM 2014-IEEE Conference on Computer Communications 2014 Toronto ON Canada IEEE 1276\u20131284 https:\/\/doi.org\/10.1109\/INFOCOM.2014.6848060 2-s2.0-84904439278.","DOI":"10.1109\/INFOCOM.2014.6848060"},{"key":"e_1_2_10_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3251363"},{"key":"e_1_2_10_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.10206"},{"key":"e_1_2_10_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3143222"},{"key":"e_1_2_10_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2020.3035811"},{"key":"e_1_2_10_71_2","doi-asserted-by":"crossref","unstructured":"TopalO. A.andKurtG. K. Physical layer authentication for LEO satellite constellations 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2022 Austin TX USA IEEE 1952\u20131957 https:\/\/doi.org\/10.1109\/WCNC51071.2022.9771727.","DOI":"10.1109\/WCNC51071.2022.9771727"},{"key":"e_1_2_10_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2022.3218609"},{"key":"e_1_2_10_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3219287"},{"key":"e_1_2_10_74_2","doi-asserted-by":"crossref","unstructured":"OligeriG. SciancaleporeS. andDi PietroR. GNSS spoofing detection via opportunistic IRIDIUM signals Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2020 New York NY USA Association for Computing Machinery 42\u201352 https:\/\/doi.org\/10.1145\/3395351.3399350.","DOI":"10.1145\/3395351.3399350"},{"key":"e_1_2_10_75_2","doi-asserted-by":"publisher","DOI":"10.1117\/12.2599164"},{"key":"e_1_2_10_76_2","doi-asserted-by":"publisher","DOI":"10.3390\/photonics8120544"},{"key":"e_1_2_10_77_2","unstructured":"N. S. Agency Quantum key distribution and quantum cryptography 2020 [Online]. Available:https:\/\/www.nsa.gov\/Cybersecurity\/Quantum-Key-Distribution-QKD-and-Quantum-Cryptography-QC."},{"key":"e_1_2_10_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3055965"},{"key":"e_1_2_10_79_2","doi-asserted-by":"crossref","unstructured":"NgoQ. T. PhanK. T. MahmoodA. andXiangW. Physical layer security in IRS-assisted cache-enabled satellite communication networks IEEE Transactions on Green Communications and Networking 2023 IEEE https:\/\/doi.org\/10.1109\/TGCN.2023.3280118.","DOI":"10.1109\/TGCN.2023.3280118"},{"key":"e_1_2_10_80_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2022.3155711"},{"key":"e_1_2_10_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2021.3134988"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ietis\/2023\/5604802.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/ietis\/2023\/5604802.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/2023\/5604802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T16:49:31Z","timestamp":1762361371000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/2023\/5604802"}},"subtitle":[],"editor":[{"given":"Tom","family":"Chen","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":81,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["10.1049\/2023\/5604802"],"URL":"https:\/\/doi.org\/10.1049\/2023\/5604802","archive":["Portico"],"relation":{},"ISSN":["1751-8709","1751-8717"],"issn-type":[{"value":"1751-8709","type":"print"},{"value":"1751-8717","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1]]},"assertion":[{"value":"2023-06-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-09-02","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-10-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"5604802"}}