{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:18:09Z","timestamp":1772554689217,"version":"3.50.1"},"reference-count":90,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100004052","name":"King Abdullah University of Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004052","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/ojcoms.2025.3650132","type":"journal-article","created":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T18:39:29Z","timestamp":1767292769000},"page":"328-352","source":"Crossref","is-referenced-by-count":1,"title":["Cybersecurity of High-Altitude Platform Stations: Threat Taxonomy, Attacks and Defenses With Standards Mapping\u2014DDoS Attack Use Case"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-7821-1393","authenticated-orcid":false,"given":"Chaouki","family":"Hjaiji","sequence":"first","affiliation":[{"name":"Ecole Polytechnique de Tunisie, La Marsa, Tunisia"}]},{"given":"Bassem","family":"Ouni","sequence":"additional","affiliation":[{"name":"AI and Digital Science Research Center, Technology Innovation Institute, Abu Dhabi, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4827-1793","authenticated-orcid":false,"given":"Mohamed-Slim","family":"Alouini","sequence":"additional","affiliation":[{"name":"Computer, Electrical and Mathematical Science and Engineering Division, King Abdullah University of Science and Technology, Thuwal, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3066905"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11091508"},{"key":"ref3","volume-title":"Zephyr: The high altitude pseudo satellite","year":"2020"},{"key":"ref4","volume-title":"Stratobus: Autonomous stratospheric platform","year":"2018"},{"key":"ref5","volume-title":"High altitude long endurance platform","year":"2019"},{"key":"ref6","volume-title":"Phasa-35 high altitude long endurance aircraft","year":"2020"},{"key":"ref7","volume-title":"Elevate","year":"2025"},{"key":"ref8","volume-title":"Ka-sat Network Cyber Attack Overview. Corporate Incident Report on February 24, 2022 Cyber-Attack Affecting KA-SAT Consumer Broadband Service","year":"2022"},{"key":"ref9","volume-title":"Technical and Operational Characteristics for the Fixed Service Using High Altitude Platform Stations in the Bands 27.5-28.35 GHz and 31-31.3 GHz","year":"2010"},{"key":"ref10","volume-title":"Performance and Interference Criteria for Active Spaceborne Sensors","year":"2025"},{"key":"ref11","volume-title":"Preferred Characteristics of Systems in the Fixed Service Using High Altitude Platforms Operating in the Bands 47.2-47.5 GHz and 47.9-48.2 GHz","year":"2000"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2514\/1.I011583"},{"key":"ref13","volume-title":"Stationary High Altitude Relay Platform (Sharp) Program Overview","year":"1999"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.004.2300198"},{"key":"ref15","article-title":"Study on integrated access and backhaul; overall description; summary based on study item description","year":"2018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s25113310"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3562393"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1423332"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"46927","DOI":"10.1109\/ACCESS.2021.3066778","article-title":"Survey of security protocols and vulnerabilities in unmanned aerial vehicles","volume":"9","author":"Shafique","year":"2021","journal-title":"IEEE Access"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.31943\/teknokom.v4i2.60"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3334708"},{"issue":"23","key":"ref22","doi-asserted-by":"crossref","DOI":"10.3390\/app122312441","article-title":"Distributed denial of service attacks against cloud computing environment: Survey, issues, challenges and coherent taxonomy","volume":"12","author":"Alashhab","year":"2022","journal-title":"Appl. Sci."},{"issue":"1","key":"ref23","doi-asserted-by":"crossref","first-page":"10","DOI":"10.3390\/electronics14010010","article-title":"A practically secure two-factor and mutual authentication protocol for distributed wireless sensor networks using PUF","volume":"14","author":"Mo","year":"2025","journal-title":"Electronics"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2888821"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2669976"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.3010330"},{"key":"ref27","volume-title":"Threat Landscape for Supply Chain Attacks","year":"2021"},{"key":"ref28","article-title":"Introduction to cybersecurity for commercial satellite operations","year":"2023"},{"key":"ref29","article-title":"Cybersecurity supply chain risk management practices for systems and organizations","year":"2022"},{"key":"ref30","volume-title":"Common Sense Guide to Mitigating Insider Threats, 5th Edition","year":"2016"},{"key":"ref31","volume-title":"Insider Threat Mitigation Guide","year":"2022"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3403\/00175946"},{"key":"ref33","volume-title":"Process Management for Avionics\u2014Atmospheric Radiation Effects\u2014Part 1: Accommodation of Atmospheric Radiation Effects via Single Event Effects within Avionics Electronic Equipment","year":"2016"},{"key":"ref34","volume-title":"Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications","year":"1997"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2018.2867459"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2022.3165024"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2023.3261307"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766353"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2950398"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP45357.2019.8969138"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/iros58592.2024.10802252"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/icc45041.2023.10278837"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-02945-z"},{"key":"ref44","volume-title":"Nobelium Targeting Delegated Administrative Privileges to Facilitate Broader Attacks","year":"2021"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2906147"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2025.3560009"},{"key":"ref47","article-title":"Security and privacy controls for information systems and organizations","year":"2020"},{"key":"ref48","volume-title":"Information Security, Cybersecurity and Privacy Protection\u2014Information Security Management Systems\u2014Requirements","year":"2022"},{"key":"ref49","volume-title":"Information Security, Cybersecurity and Privacy Protection\u2014Information Security Controls","year":"2022"},{"key":"ref50","article-title":"Secure software development framework (SSDF) version 1.1: Recommendations for mitigating the risk of software vulnerabilities","year":"2022"},{"key":"ref51","volume-title":"Cyber Security for Consumer Internet of Things: Baseline Requirements, V2.1.1","year":"2020"},{"key":"ref52","volume-title":"CYBER; Cyber Threat Intelligence (CTI), V1.2.1","year":"2023"},{"key":"ref53","volume-title":"Space Threat Landscape","year":"2025"},{"key":"ref54","volume-title":"DO-326A: Airworthiness Security Process Specification","year":"2014"},{"key":"ref55","volume-title":"ED-202A: Airworthiness Security Process Specification","year":"2014"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.5194\/acp-21-13571-2021"},{"key":"ref57","volume-title":"Attenuation by Atmospheric Gases and Related Effects","year":"2022"},{"key":"ref58","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-14096-4","volume-title":"Principles of Spread-Spectrum Communication Systems","author":"Torrieri","year":"2015"},{"key":"ref59","volume-title":"Software Defined Radio: Baseband Technologies for 3G Handsets and Basestations","author":"Tuttlebee","year":"2004"},{"key":"ref60","volume-title":"GPS disciplined oscillator technical specifications","year":"2018"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.comcom.2024.05.006","article-title":"Improving the precision of time synchronization protocols in ultra-wideband networks estimating the time of flight of the radio signal","volume":"223","author":"P\u00e9rez-Solano","year":"2024","journal-title":"Comput. Commun."},{"issue":"6","key":"ref62","doi-asserted-by":"crossref","first-page":"2286","DOI":"10.3390\/s22062286","article-title":"CM-LSTM based spectrum sensing","volume":"22","author":"Chen","year":"2022","journal-title":"Sensors"},{"issue":"4","key":"ref63","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1016\/j.jsse.2024.07.002","article-title":"Investigating and defining radiation dose risk factors, derived from terrestrial risk assessments, for probabilistic risk assessments for radiation exposure during very high altitude \u2019near space\u2019 flights for varying space weather conditions","volume":"11","author":"Rees","year":"2024","journal-title":"J. Space Safety Eng."},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2021-Spring51267.2021.9448899"},{"issue":"1","key":"ref65","doi-asserted-by":"crossref","first-page":"3045","DOI":"10.1038\/s41467-022-30723-8","article-title":"Jamming a terahertz wireless link","volume":"13","author":"Shrestha","year":"2022","journal-title":"Nat. Commun."},{"key":"ref66","doi-asserted-by":"crossref","DOI":"10.3389\/fphy.2024.1404236","article-title":"Cascaded multiplier-free implementation of adaptive anti-jamming filter based on GNSS receiver","volume":"12","author":"Song","year":"2024","journal-title":"Front. Phys."},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3627050.3627053"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-13453-2_12"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2867564"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.3390\/su12031035"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/iwcmc55113.2022.9824186"},{"key":"ref73","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-162","article-title":"Guide to attribute based access control (ABAC) definition and considerations","author":"Hu","year":"2014"},{"key":"ref74","article-title":"Breaking boundaries: Balancing performance and robustness in deep wireless traffic forecasting","volume-title":"Proc. Workshop Recent Adv. Resil. Trustworthy ML Syst. Auton. Netw. (ARTMAN)","author":"Ilbert"},{"key":"ref75","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref76","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv:1706.06083"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref78","first-page":"1310","article-title":"Certified adversarial robustness via randomized smoothing","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","volume":"97","author":"Cohen"},{"key":"ref79","first-page":"3353","article-title":"Adversarial training for free!","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Shafahi"},{"key":"ref80","first-page":"22999","article-title":"ODDR: Outlier detection & dimension reduction based defense against adversarial patches","volume-title":"Proc. IEEE\/CVF Int. Conf. Comput. Vis. (ICCV)","author":"Chattopadhyay"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/icc45041.2023.10279042"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM52596.2021.9652940"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3567985"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3528452"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/NSREC.2018.8584297"},{"issue":"17","key":"ref86","doi-asserted-by":"crossref","first-page":"5514","DOI":"10.3390\/s25175514","article-title":"EMBRAVE: EMBedded remote attestation and verification framework","volume":"25","author":"Bravi","year":"2025","journal-title":"Sensors"},{"key":"ref87","article-title":"Pa-boot: A formally verified authentication protocol for multiprocessor secure boot","author":"Zhang","year":"2022","journal-title":"arXiv:2209.07936"},{"key":"ref88","volume-title":"Technical Characteristics for an Automatic Identification System Using Time Division Multiple Access in the VHF Maritime Mobile Frequency Band","year":"2014"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581274"},{"key":"ref90","volume-title":"Simulation of DDoS attack on HAPS network in OMNeT+","author":"Hjaiji","year":"2025"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/11343983\/11321197.pdf?arnumber=11321197","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T06:56:49Z","timestamp":1768373809000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11321197\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":90,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2025.3650132","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}