Hui Qi1, Yu Zhao1, Xu Liu1, Jinhui Cao1, Yu Wang1, Pei Xiao2, Pengfei Hu3, and Chunbo Wang1,*
Chunbo Wang
1School of Computer Science and Technology, Changchun University of Science and Technology, Changchun 130022, China
2Institute for Communication Systems, University of Surrey, Guildford, UK
3School of Computer Science and Technology, Shandong University, Qingdao, Shandong, 266237, China
*Corresponding author
With the rapid development of space networks, their high dynamics and open links pose severe challenges to network security management. Traditional network simulation platforms can hardly meet the needs of space network attack-defense simulation and visualization, especially in supporting highly dynamic topologies and verifying data integrity in deep space environments. This paper proposes a modular space network attack-defense simulation and visualization platform, which consists of four modules: satellite motion simulation, network simulation, network attack-defense, and visualization, thereby enabling dynamic network topology simulation and attack-defense scenario verification. Based on this platform, an efficient integrity verification method for cached network data is proposed to address the problem of data corruption in caches caused by cosmic rays in deep space environments. By integrating a dual-signature audit mechanism and a Content Store Naming Audit Tree (CSNAT), the approach ensures the reliability of cached data and low-latency access. Experimental results show that in a simulated Earth-Moon communication scenario, the proposed scheme can reduce the average end-to-end delay by about 83.6%, while maintaining low computational and storage overhead. This research provides efficient and reliable technical support for space network security verification and the application of NDN in deep space communications, with significant theoretical and practical value.
Space Network, NDN Network, Data Security, Integrity Verification
Hui Qi, Yu Zhao, Xu Liu, Jinhui Cao, Yu Wang, Pei Xiao, Pengfei Hu, and Chunbo Wang (2025). Space Network Attack and Defense Simulation Platform and Its Application in Space NDN Networks. Journal of Networking and Network Applications, Volume 5, Issue 2, pp. 99–109. https://doi.org/10.33969/J-NaNA.2025.050205.
[1] M. Al Mamun, M. Li, and BK. Pramanik, “Development of Delay-Tolerant Networking Protocols for Reliable Data Trans-mission in Space Networks: A Simulation-Based Approach,” IEEE Access, vol. 12, pp. 178642–178658, 2024.
[2] J. Yu, D. Huang, W. Li, et al., “Adaptive Network Routing Tech-nology for Near-Moon Space Cross-Domain Transmission,” Applied Sciences, vol. 14, no. 22, 2024.
[3] IA. Lagoida, I. Astapov, and PS. Kuzmenkova, “Reconstruction of Near-Earth Cosmic Ray Fluxes from Ground-Based Neutron Monitors,” Physics of Atomic Nuclei, vol. 87, no. 12, pp. 1912–1917, 2024.
[4] XG. Long, K. Huang, RW. Yang, et al., “Pegasus: A Practical High-Speed Cross-Platform NDN Forwarder,” Computer Com-munications, vol. 269, p. 111474, 2025.
[5] Y. Fei, JQ. Yin, and LJ. Yan, “Security Verification Framework for NDN Access Control,” Scientific Reports, vol. 15, no. 1, p. 5479, 2025.
[6] SP. Devi and K. Dhanalakshmi, “MoDT: Interest Forwarding in Named Data Networking Based Vehicular Ad Hoc Networks by Predicting the Mobility Using Direction and Timer,” Ad Hoc & Sensor Wireless Networks, vol. 58, nos. 1–2, pp. 53–77, 2024.
[7] KHM. Gularte, JPJ. da Costa, JAR. Vargas, et al., “Integrating Cybersecurity in V2X: A Review of Simulation Environments,” IEEE Access, vol. 12, pp. 177946–177985, 2024.
[8] A. Mardaus, E. Biernacka, and R. W´ojcik, “Open Source Software-Defined Networking Controllers—Operational and Security Issues,” Electronics, vol. 13, no. 12, p. 2329, 2024.
[9] M. Tropea, CEQ. Aldana, EP. de Freitas, and F. De Rango, “SFEM3: A Performance Comparative Analysis for SDN-Based FANET Emulation Using Mininet-WiFi and ns-3,” Ad Hoc Networks, vol. 177, p. 103859, 2025.
[10] PA. Pan, WL. Chin, YC. Huang, et al., “Dynamic RSVP in Modern Networks for Advanced Resource Control with P4 Data Plane,” Sensors, vol. 25, no. 7, p. 2244, 2025.
[11] B. Kempton and A. Riedl, “Network Simulator for Large Low Earth Orbit Satellite Networks,” in Proc. IEEE Int. Conf. Commun. (ICC), 2021, pp. 1–6. doi:10.1109/ICC42927.2021.9500439.
[12] F. G. Lavacca, P. Salvo, L. Ferranti, et al., “Performance Evaluation of 5G Access Technologies and SDN Transport Network on an NS3 Simulator,” Computers, vol. 9, no. 2, p. 43, 2020.
[13] JL. Xu, WS. Pan, HB. Tan, et al., “An Adaptive Congestion Control Optimization Strategy in SDN-Based Data Centers,” Computers, Materials & Continua, vol. 81, no. 2, pp. 2709–2726, 2024.
[14] G. Li, H. Zhou, B. Feng, et al., “Multi-Layer Satellite Network and Earth–Moon Satellite Network Simulation,” Journal of the China Railway Society, vol. 39, no. 234, pp. 76–87, 2017.
[15] Heyu Liu, Fuchun [author], et al., “Virtual Strategy QoS Routing in Satellite Networks,” Science China: Information Sciences, vol. 59, no. 9, 2016.
[16] M. Karjalainen and T. Kokkonen, “Comprehensive Cyber Arena; The Next Generation Cyber Range,” in Proc. IEEE EuroS&PW, 2020, pp. 11–16. doi:10.1109/EuroSPW51379.2020.00011.
[17] A. Peratikou, C. Louca, S. Shiaeles, et al., “On Federated Cy-ber Range Network Interconnection,” in Proc. Int. Networking Conf., Cham, Switzerland: Springer, 2020, pp. 117–128.
[18] B. Fang, Y. Jia, A. Li, et al., “Research on Cyberspace Range Technology,” Journal of Information Security, vol. 3, p. 9, 2016.
[19] E. Mousavinejad, Eman, Yang, et al., “A Novel Cyber Attack Detection Method in Networked Control Systems,” IEEE Trans. Cybernetics, vol. 48, no. 11, pp. 3254–3264, 2018.
[20] L. Zhang, A. Afanasyev, J. Burke, V. Jacobson, P. Crowley, C. Papadopoulos, L. Wang, and B. Zhang, “Named Data Network-ing,” ACM SIGCOMM Comput. Commun. Rev., vol. 44, no. 3, pp. 66–73, 2014.
[21] T. Koponen, et al., “A Data-Oriented (and Beyond) Network Architecture,” SIGCOMM Comput. Commun. Rev., vol. 37, no. 4, pp. 181–192, 2007.
[22] S. Lederer, C. Mueller, C. Timmerer, and H. Hellwagner, “Adaptive Multimedia Streaming in Information-Centric Net-works,” IEEE Network, vol. 28, no. 6, pp. 91–96, 2014.
[23] A. Santin, M. Bagatin, R. Harboe-Sorensen, et al., “The Deep Space Radiation Probe: Development of a First Lunar Science Payload for Space Environment Studies and Capacity Building,” in Proc. IEEE Radiation Effects Data Workshop (REDW), 2022, pp. 1–6. doi:10.1109/REDW55356.2022.9917463.
[24] KL. Ryder and MJ. Campola, “The Lunar Radiation Environ-ment,” NASA Goddard Space Flight Center, Greenbelt, MD, Tech. Rep. NASA/GSFC Code 561, Apr. 27, 2022.
[25] G. Ateniese, R. Di Pietro, L. V. Mancini, et al., “Scalable and Efficient Provable Data Possession,” in Proc. 4th Int. Conf. Security and Privacy in Communication Networks, 2008, pp. 1–10.
[26] R. Kumari, K. Kaur, and A. Almogren, “C-BIVM: A Cognitive-Based Integrity Verification Model for IoT-Driven Smart Cities,” Computers, Materials & Continua, vol. 84, no. 3, pp. 5509–5525, 2025.
[27] T. Li and L. Hu, “Audit as You Go: A Smart Contract-Based Outsourced Data Integrity Auditing Scheme for Multiauditor Scenarios with One Person, One Vote,” Security and Commu-nication Networks, 2022. doi:10.1155/2022/8783952.
[28] D. Yue, R. Li, Y. Zhang, W. Tian, and Y. Huang, “Blockchain-based verification framework for data integrity in edge-cloud storage,” J. Parallel Distrib. Comput., vol. 146, pp. 1–14, 2020.
[29] F. Q. Zhang, G. Guo, Y. C. Qin, and Q. M. Chen, “Prediction of proton-induced single event effect on SRAM’s in-orbit soft error rate on typical satellite orbit,” Spacecraft Environment Engineering, vol. 35, no. 4, pp. 365–370, Aug. 2018.
[30] C. Zhang, H. Xuan, T. Wu, X. Liu, G. Yang, and L. Zhu, “Blockchain-Based Dynamic Time-Encapsulated Data Auditing for Outsourcing Storage,” IEEE Trans. Inf. Forensics Security, vol. 19, pp. 1979–1993, 2024.
[31] S. Kumari, M. Singh, R. Singh, and H. Tewari, “Signature based Merkle Hash Multiplication algorithm to secure the communication in IoT devices,” Knowledge-Based Systems, vol. 253, p. 109543, 2022.