Authentication permits a secure access to the resource, verifying the actor’s identity. It also protects a command or a message from spoofing or modifications. CCSDS SDLS protocol incorporates authentication through MAC. Authentication protects from attacks aiming to access unauthorized resources, to spoof legitimate users, or to manipulate data and communications. [1] [2] [3]