Satellite Anomalies
Benefits of a Centralized Anomaly Database and Methods for Securely Sharing Information Among Satellite Operators
ResearchPublished Jun 2, 2014
Satellite anomalies are mission-degrading events that negatively affect on-orbit operational spacecraft. Maintaining a widely accessible and comprehensive database is one way to build an understanding of what situations are likely to result in satellite anomalies, but no such database exists. This report describes the nature and causes of satellite anomalies, and the potential benefits of a shared and centralized satellite anomaly database.
Benefits of a Centralized Anomaly Database and Methods for Securely Sharing Information Among Satellite Operators
ResearchPublished Jun 2, 2014
Satellite anomalies are mission-degrading events that negatively affect on-orbit operational spacecraft. All satellites experience anomalies of some kind during their operational lifetime. They range in severity from temporary errors in noncritical subsystems to loss-of-contact and complete mission failure. There is a range of causes for these anomalies, and investigations by the satellite operator or manufacturer to determine the cause of a specific anomaly are sometimes conducted at significant expense.
Maintaining an anomaly database is one way to build an empirical understanding of what situations are more or less likely to result in satellite anomalies, and help determine causal relationships. These databases can inform future design and orbital regimes, and can help determine measures to prolong the useful life of an on-orbit spacecraft experiencing problems. However, there is no centralized, up-to-date, detailed, and broadly available database of anomalies covering many different satellites.
This report describes the nature and causes of satellite anomalies, and the potential benefits of a shared and centralized satellite anomaly database. Findings indicate that a shared satellite anomaly database would bring significant benefits to the commercial community, and the main obstacles are reluctance to share detailed information with the broader community, as well as a lack of dedicated resources available to any trusted third party to build and manage such a database. Trusted third parties and cryptographic methods such as secure multiparty computing or differential privacy are not complete solutions, but show potential to be further tailored to help resolve the issue of securely sharing anomaly data.
This research was sponsored by DARPA and conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute, a federally funded research and development center sponsored by the Office of the Secretary of Defense, the Joint Staff, the Unified Combatant Commands, the Navy, the Marine Corps, the defense agencies, and the defense Intelligence Community.
This publication is part of the RAND research report series. Research reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND research reports undergo rigorous peer review to ensure high standards for research quality and objectivity.
This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.
RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.