{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T18:43:10Z","timestamp":1763059390576,"version":"build-2065373602"},"reference-count":30,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2025,7,13]],"date-time":"2025-07-13T00:00:00Z","timestamp":1752364800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>In next-generation Low-Earth-Orbit (LEO) satellite networks, securing inter-satellite communication links (ISLs) through strong authentication is essential due to the network\u2019s dynamic and distributed structure. Traditional authentication systems often struggle in these environments, leading to the adoption of Zero-Trust Security (ZTS) models. However, current ZTS protocols typically introduce high computational overhead, especially as the number of satellite nodes grows, which can impact both security and network performance. To overcome these challenges, a new bio-inspired ZTS framework called Manta Ray Foraging Cost-Optimized Zero-Trust Security (MRFCO-ZTS) has been introduced. This approach uses data-driven learning methods to enhance security across satellite communications. It continuously evaluates access requests by applying a cost function that accounts for risk level, likelihood of attack, and computational delay. The Manta Ray Foraging Optimization (MRFO) algorithm is used to minimize this cost, enabling effective classification of nodes as either trusted or malicious based on historical authentication records and real-time behavior. MRFCO-ZTS improves the accuracy of attacker detection while maintaining secure data exchange between authenticated satellites. Its effectiveness has been tested through numerical simulations under different satellite traffic conditions, with performance measured in terms of security accuracy, latency, and operational efficiency.<\/jats:p>","DOI":"10.3390\/fi17070304","type":"journal-article","created":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T09:56:54Z","timestamp":1752487014000},"page":"304","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Biologically Inspired Cost-Efficient Zero-Trust Security Approach for Attacker Detection and Classification in Inter-Satellite Communication Networks"],"prefix":"10.3390","volume":"17","author":[{"given":"Sridhar","family":"Varadala","sequence":"first","affiliation":[{"name":"Department of Electrical and Biomedical Engineering, University of Nevada, Reno, NV 89557, USA"}]},{"given":"Hao","family":"Xu","sequence":"additional","affiliation":[{"name":"Department of Electrical and Biomedical Engineering, University of Nevada, Reno, NV 89557, USA"}]}],"member":"1968","published-online":{"date-parts":[[2025,7,13]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"103817","DOI":"10.1016\/j.adhoc.2025.103817","article-title":"Zero Trust-Based Authentication for Inter-Satellite Links in NextGen Low Earth Orbit Networks","volume":"174","author":"Farreaa","year":"2025","journal-title":"Ad Hoc Netw."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"110516","DOI":"10.1016\/j.comnet.2024.110516","article-title":"Provably Secure Optimal Homomorphic Signcryption for Satellite-Based Internet of Things","volume":"250","author":"Farreaa","year":"2024","journal-title":"Comput. Netw."},{"key":"ref_3","unstructured":"Qi, M., Chen, J., and Chen, Y. (2024). A Secure Authentication with Key Agreement Scheme Using ECC for Satellite Communication Systems. Int. J. Satell. Commun. Netw., 42, In Press."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/OJVT.2022.3218609","article-title":"Authentication for Satellite Communication Systems Using Physical Characteristics","volume":"4","author":"Abdrabou","year":"2022","journal-title":"IEEE Open J. Veh. Technol."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17706\/IJCCE.2020.9.1.46-53","article-title":"A Lightweight Authentication and Key Sharing Protocol for Satellite Communication","volume":"9","author":"Murtaza","year":"2020","journal-title":"Int. J. Comput. Commun. Eng."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1080\/00051144.2020.1757966","article-title":"A Mutual Authentication and Key Update Protocol in Satellite Communication Network","volume":"61","author":"Huang","year":"2020","journal-title":"Automatika"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Pokhrel, S.R. (2024, January 4\u20138). Poster: Orbital ZTA! Secure Satellite Communication Networks with Zero Trust Architecture. Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos, New York, NY, USA.","DOI":"10.1145\/3672202.3673727"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Guo, Y., Wang, J., Geng, K., Li, Z., Li, F., and Fang, L. (2025, January 3\u20137). SEHAP: Secure and Efficient Handover Authentication Protocol in LEO Satellite Non-Terrestrial Networks. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Hyderabad, India.","DOI":"10.1109\/ICASSP49660.2025.10887616"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.comcom.2019.08.018","article-title":"Efficient Utilization of Elliptic Curve Cryptography in Design of a Three-Factor Authentication Protocol for Satellite Communications","volume":"147","author":"Nikooghadam","year":"2019","journal-title":"Comput. Commun."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/dac.4508","article-title":"Robust Three-Factor Authentication Protocol for Satellite Communication Systems","volume":"33","author":"Chen","year":"2020","journal-title":"Int. J. Commun. Syst."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"7636","DOI":"10.1109\/JIOT.2024.3497578","article-title":"NSAA: A Network Slice Access Authentication and Service Authorization Scheme for Integrated Satellite-Terrestrial Network","volume":"12","author":"Luo","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"142241","DOI":"10.1109\/ACCESS.2024.3467253","article-title":"State-of-the-Art Authentication Measures in Satellite Communication Networks: A Comprehensive Analysis","volume":"12","author":"Suhaimi","year":"2024","journal-title":"IEEE Access"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1007\/s11235-024-01199-2","article-title":"A Robust ECC-Based Authentication Protocol for Satellite-to-Satellite Communication Network","volume":"87","author":"Gautam","year":"2024","journal-title":"Telecommun. Syst."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"14647","DOI":"10.1109\/ACCESS.2024.3355196","article-title":"Designing High-Performance Identity-Based Quantum Signature Protocol with Strong Security","volume":"12","author":"Prajapat","year":"2024","journal-title":"IEEE Access"},{"key":"ref_15","first-page":"103437","article-title":"PSEEMV: Provably Secure and Efficient Emergency Message Verification Scheme Based on ECC and CRT for Space Information Network","volume":"73","author":"Guo","year":"2023","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.comcom.2022.10.028","article-title":"LK-AKA: A Lightweight Location Key-Based Authentication and Key Agreement Protocol for S2S Communication","volume":"197","author":"Yang","year":"2023","journal-title":"Comput. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"5810","DOI":"10.1109\/JIOT.2022.3152900","article-title":"A Secure and Efficient Authentication Protocol for Satellite-Terrestrial Networks","volume":"10","author":"Liu","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"898","DOI":"10.1007\/s12083-020-01050-w","article-title":"A Secure Three-Factor Anonymous Roaming Authentication Protocol Using ECC for Space Information Networks","volume":"14","author":"Guo","year":"2021","journal-title":"Peer Peer Netw. Appl."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Gunn, L., Smet, P., Arbon, E., and McDonnell, M.D. (2018, January 13\u201315). Anomaly Detection in Satellite Communications Systems Using LSTM Networks. Proceedings of the 2018 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia.","DOI":"10.1109\/MilCIS.2018.8574109"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"109246","DOI":"10.1016\/j.comnet.2022.109246","article-title":"Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research Challenges","volume":"216","author":"Tedeschi","year":"2022","journal-title":"Comput. Netw."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"109299","DOI":"10.1016\/j.comnet.2022.109358","article-title":"Intelligent Zero Trust Architecture for 5G\/6G Networks: Principles, Challenges, and the Role of Machine Learning in the Context of O-RAN","volume":"217","author":"Ramezanpour","year":"2022","journal-title":"Comput. Netw."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Peng, C., Zhou, Q., Shen, Y., He, K., Lian, Z., and Shuai, Z. (IEEE Trans. Ind. Appl., 2025). Zero-Trust Security Strategy for Renewable Power Plant Clusters Under Integrated Satellite-Terrestrial Networks, IEEE Trans. Ind. Appl., In Press.","DOI":"10.1109\/TIA.2025.3550136"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"104018","DOI":"10.1016\/j.cose.2024.104018","article-title":"Towards Zero Trust Security in Connected Vehicles: A Comprehensive Survey","volume":"145","author":"Annabi","year":"2024","journal-title":"Comput. Secur."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Fu, P., Wu, J., Lin, X., and Shen, A. (2022, January 5\u20139). ZTEI: Zero-Trust and Edge Intelligence Empowered Continuous Authentication for Satellite Networks. Proceedings of the IEEE Global Communications Conference (GLOBECOM), Rio de Janeiro, Brazil.","DOI":"10.1109\/GLOBECOM48099.2022.10000958"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Lin, C.-L., and Hsu, T.-E. (2024, January 23\u201325). A Multi-Factor Authentication Scheme Based on Zero Trust Network Access for LEO Satellite Communication Systems. Proceedings of the 2024 International Conference on Intelligent Computing and Next Generation Networks (ICNGN), Bangkok, Thailand.","DOI":"10.1109\/ICNGN63705.2024.10871794"},{"key":"ref_26","first-page":"1","article-title":"A Deep Learning Anomaly Detection Framework for Satellite Telemetry with Fake Anomalies","volume":"2022","author":"Wang","year":"2022","journal-title":"Int. J. Aerosp. Eng."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Sadr, M.A.M., Zhu, Y., and Hu, P. (June, January 28). Satellite Anomaly Detection Using Variance Based Genetic Ensemble of Neural Networks. Proceedings of the IEEE International Conference on Communications (ICC 2023), Rome, Italy.","DOI":"10.1109\/ICC45041.2023.10278933"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1007\/s10922-025-09952-x","article-title":"Hi-SAM: A High-Scalable Authentication Model for Satellite-Ground Zero-Trust System Using Mean Field Game","volume":"33","author":"Wu","year":"2025","journal-title":"J. Netw. Syst. Manag."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"128627","DOI":"10.1016\/j.eswa.2025.128627","article-title":"Anomaly Detection Method for Satellite Networks Based on Genetic Optimization Federated Learning","volume":"295","author":"Wang","year":"2025","journal-title":"Expert Syst. Appl."},{"key":"ref_30","first-page":"1234","article-title":"Secure and Energy-Efficient Beamforming for LEO Satellite Downlink via Intelligent Surfaces","volume":"72","author":"Yang","year":"2024","journal-title":"IEEE Trans. Commun."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/7\/304\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:09:22Z","timestamp":1760033362000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/7\/304"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,13]]},"references-count":30,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2025,7]]}},"alternative-id":["fi17070304"],"URL":"https:\/\/doi.org\/10.3390\/fi17070304","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2025,7,13]]}}}