- Farshad Rahimi Ghashghaei
- Yussuf Ahmed
- Yonghao Wang
- Farshad Rahimi Ghashghaei and Yussuf Ahmed: School of Computing and Digital Technology, Birmingham City University, Birmingham, United Kingdom
The main components of the simulation include:
- RSA Encryption and Decryption
- Quantum Key Distribution
- User Roles and Permissions
- Network Segments
- Satellite and Ground Station Communication
- Threat Detection
- Multi-Factor Authentication
- Incident Response
The RSAEncryption class handles RSA encryption and decryption using public and private keys.
The QKD class simulates QKD key generation between satellites and ground stations. It generates random qubits and bases, and matches them to produce a shared key.
Roles (admin
, user
, guest
) are defined with specific permissions. Users are assigned roles and MFA status.
Network segments (public
, internal
, sensitive
) restrict access based on user roles. Traffic is logged if users have the appropriate permissions.
Satellites establish secure communication channels with ground stations using either QKD or RSA. Data is transmitted securely, and decrypted at the receiving end.
The ThreatDetection class identifies unauthorized access attempts and logs them as threats.
The MFA class simulates MFA for users. Only users with MFA enabled can authenticate successfully.
The IncidentResponse class responds to detected threats and logs incidents.