{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T13:14:35Z","timestamp":1763039675118,"version":"3.45.0"},"reference-count":25,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The rapid expansion of satellite networks for advanced communication and space exploration has ensured that robust cybersecurity for inter-satellite links has become a critical challenge. Traditional security models rely on centralized trust authorities, and node-specific protections are no longer sufficient, particularly when system failures or attacks affect groups of satellites or agent clusters. To address this problem, we propose a blockchain-enabled decentralized zero-trust model based on post-quantum cryptography (BEDZTM-PQC) to improve the security of satellite communications via continuous authentication and anomaly detection. This model introduces a group-based security framework, where satellite teams operate under a zero-trust architecture (ZTA) enforced by blockchain smart contracts and threshold cryptographic mechanisms. Each group shares the responsibility for local anomaly detection and policy enforcement while maintaining decentralized coordination through hierarchical federated learning, allowing for collaborative model training without centralizing sensitive telemetry data. A post-quantum cryptography (PQC) algorithm is employed for future-proof communication and authentication protocols against quantum computing threats. Furthermore, the system enhances network reliability by incorporating redundant communication channels, consensus-based anomaly validation, and group trust scoring, thus eliminating single points of failure at both the node and team levels. The proposed BEDZTM-PQC is implemented in MATLAB, and its performance is evaluated using key metrics, including accuracy, latency, security robustness, trust management, anomaly detection accuracy, performance scalability, and security rate with respect to different numbers of input satellite users.<\/jats:p>","DOI":"10.3390\/fi17110516","type":"journal-article","created":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T12:57:13Z","timestamp":1763038633000},"page":"516","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Blockchain-Enabled Decentralized Zero-Trust Architecture for Anomaly Detection in Satellite Networks via Post-Quantum Cryptography and Federated Learning"],"prefix":"10.3390","volume":"17","author":[{"given":"Sridhar","family":"Varadala","sequence":"first","affiliation":[{"name":"Department of Electrical and Biomedical Engineering, University of Nevada, Reno, NV 89557, USA"}]},{"given":"Hao","family":"Xu","sequence":"additional","affiliation":[{"name":"Department of Electrical and Biomedical Engineering, University of Nevada, Reno, NV 89557, USA"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Pokhrel, S.R., Yang, L., Rajasegarar, S., and Li, G. (2024, January 4\u20138). Robust Zero Trust Architecture: Joint Blockchain based Federated learning and Anomaly Detection based Framework. Proceedings of the ACM SIGCOMM \u201824: ACM SIGCOMM 2024 Conference, Sydney, Australia.","DOI":"10.1145\/3672200.3673878"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Sadr, M.A.M., Zhu, Y., and Hu, P. (June, January 28). Satellite Anomaly Detection Using Variance Based Genetic Ensemble of Neural Networks. Proceedings of the ICC 2023\u2014IEEE International Conference on Communications, Rome, Italy.","DOI":"10.1109\/ICC45041.2023.10278933"},{"key":"ref_3","first-page":"1676933","article-title":"A Deep Learning Anomaly Detection Framework for Satellite Telemetry with Fake Anomalies","volume":"2022","author":"Wang","year":"2022","journal-title":"Int. J. Aerosp. Eng."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Gunn, L., Smet, P., Arbon, E., and McDonnell, M.D. (2018, January 13\u201315). Anomaly Detection in Satellite Communications Systems using LSTM Networks. Proceedings of the 2018 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia.","DOI":"10.1109\/MilCIS.2018.8574109"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Kim, J., Nakashima, M., Fan, W., Wuthier, S., Zhou, X., Kim, I., and Chang, S.-Y. (2021, January 3\u20136). Anomaly Detection based on Traffic Monitoring for Secure Blockchain Networking. Proceedings of the 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Sydney, Australia.","DOI":"10.1109\/ICBC51069.2021.9461119"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"103817","DOI":"10.1016\/j.adhoc.2025.103817","article-title":"Zero trust-based authentication for Inter-Satellite Links in NextGen Low Earth Orbit networks","volume":"174","author":"Farrea","year":"2025","journal-title":"Ad Hoc Netw."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"7857","DOI":"10.1109\/TIA.2025.3550136","article-title":"Zero-Trust Security Strategy for Renewable Power Plant Clusters Under Integrated Satellite-Terrestrial Networks","volume":"61","author":"Peng","year":"2025","journal-title":"IEEE Trans. Ind. Appl."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Pokhrel, S.R. (2024, January 4\u20138). Poster: Orbital ZTA! Secure Satellite Communication Networks with Zero Trust Architecture. Proceedings of the ACM SIGCOMM Posters and Demos \u201824: ACM SIGCOMM 2024 Conference: Posters and Demos, Sydney, Australia.","DOI":"10.1145\/3672202.3673727"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Lin, C.-L., and Hsu, T.-E. (2024, January 23\u201325). A Multi-Factor Authentication Scheme Based on Zero Trust Network Access for LEO Satellite Communication Systems. Proceedings of the 2024 International Conference on Intelligent Computing and Next Generation Networks (ICNGN), Bangkok, Thailand.","DOI":"10.1109\/ICNGN63705.2024.10871794"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"5810","DOI":"10.1109\/JIOT.2022.3152900","article-title":"A Secure and Efficient Authentication Protocol for Satellite-Terrestrial Networks","volume":"10","author":"Liu","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"14647","DOI":"10.1109\/ACCESS.2024.3355196","article-title":"Designing High-Performance Identity-Based Quantum Signature Protocol with Strong Security","volume":"12","author":"Prajapat","year":"2024","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Fu, P., Wu, J., Lin, X., and Shen, A. (2022, January 4\u20138). ZTEI: Zero-Trust and Edge Intelligence Empowered Continuous Authentication for Satellite Networks. Proceedings of the GLOBECOM 2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil.","DOI":"10.1109\/GLOBECOM48099.2022.10000958"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"3294","DOI":"10.1007\/s11431-024-2679-4","article-title":"Satellite anomaly detection based on reconstruction discrepancy theory utilizing a new dual-branch reconstruction model","volume":"67","author":"Zhao","year":"2024","journal-title":"Sci. China Technol. Sci."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Wang, Y., Chen, P., Ai, S., Liang, W., Liao, B., Mo, W., and Wang, H. (2023, January 11\u201314). Two-Stage Anomaly Detection in LEO Satellite Network. Proceedings of the Science of Cyber Security, Melbourne, Australia. Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-031-45933-7_25"},{"key":"ref_15","first-page":"1","article-title":"Intrusion Detection with Federated Learning and Conditional Generative Adversarial Network in Satellite-Terrestrial Integrated Networks","volume":"29","author":"Jiang","year":"2024","journal-title":"Mob. Netw. Appl."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"9352","DOI":"10.1109\/TMC.2025.3565509","article-title":"Hierarchical Split Federated Learning: Convergence Analysis and System Optimization","volume":"24","author":"Lin","year":"2025","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"107831","DOI":"10.1016\/j.future.2025.107831","article-title":"Prototype-based fine-tuning for mitigating data heterogeneity in federated learning","volume":"170","author":"Chai","year":"2025","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1109\/MNET.2024.3486228","article-title":"RoPe-Door: Toward Robust and Persistent Backdoor Data Poisoning Attacks in Federated Learning","volume":"39","author":"Liu","year":"2025","journal-title":"IEEE Netw."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"5282","DOI":"10.1109\/TIFS.2025.3570121","article-title":"A Unified Multi-Domain Face Normalization Framework for Cross-Domain Prototype Learning and Heterogeneous Face Recognition","volume":"20","author":"Pang","year":"2025","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Ashraf, I., Narra, M., Umer, M., Majeed, R., Sadiq, S., Javaid, F., and Rasool, N. (2022). A Deep Learning-Based Smart Framework for Cyber-Physical and Satellite System Security Threats Detection. Electronics, 11.","DOI":"10.3390\/electronics11040667"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/s10922-023-09767-8","article-title":"Deep Learning Based Hybrid Intrusion Detection Systems to Protect Satellite Networks","volume":"31","author":"Azar","year":"2023","journal-title":"J. Netw. Syst. Manag."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1002\/sat.1482","article-title":"Machine Learning and Deep Learning powered satellite communications: Enabling technologies, applications, open challenges, and future research directions","volume":"41","author":"Bhattacharyya","year":"2023","journal-title":"Int. J. Satell. Commun. Netw."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Chikhi, S., Bermak, A., Amine, A., Chaoui, A., Saidouni, D.E., and Kholladi, M.K. (2025). Evaluation of Machine Learning Methods for Anomaly Detection in Satellite Telemetry: Advantages and Limitations. Artificial Intelligence and Internet of Things. MISC 2024. Lecture Notes in Networks and Systems, Springer.","DOI":"10.1007\/978-3-031-82112-7"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Barnwal, R., Vaidya, A.S., Maram, S., Surana, C., Karteek, G.Y.S., and Kavuluru, R.K. (2024, January 6\u20137). A Demonstration of Secure Satellite Communication Using Post Quantum Cryptography. Proceedings of the 2024 International Conference on Smart Electronics and Communication Systems (ISENSE), Kottayam, India.","DOI":"10.1109\/ISENSE63713.2024.10872215"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Varadala, S., and Xu, H. (2025). A Biologically Inspired Cost-Efficient Zero-Trust Security Approach for Attacker Detection and Classification in Inter-Satellite Communication Networks. Future Internet, 17.","DOI":"10.3390\/fi17070304"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/11\/516\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T13:11:05Z","timestamp":1763039465000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/11\/516"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":25,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2025,11]]}},"alternative-id":["fi17110516"],"URL":"https:\/\/doi.org\/10.3390\/fi17110516","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,12]]}}}