Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting

05/11/2023
by   Joshua Smailes, et al.
0

Due to an increase in the availability of cheap off-the-shelf radio hardware, spoofing and replay attacks on satellite ground systems have become more accessible than ever. This is particularly a problem for legacy systems, many of which do not offer cryptographic security and cannot be patched to support novel security measures. In this paper we explore radio transmitter fingerprinting in satellite systems. We introduce the SatIQ system, proposing novel techniques for authenticating transmissions using characteristics of transmitter hardware expressed as impairments on the downlinked signal. We look in particular at high sample rate fingerprinting, making fingerprints difficult to forge without similarly high sample rate transmitting hardware, thus raising the budget for attacks. We also examine the difficulty of this approach with high levels of atmospheric noise and multipath scattering, and analyze potential solutions to this problem. We focus on the Iridium satellite constellation, for which we collected 1010464 messages at a sample rate of 25 MS/s. We use this data to train a fingerprinting model consisting of an autoencoder combined with a Siamese neural network, enabling the model to learn an efficient encoding of message headers that preserves identifying information. We demonstrate the system's robustness under attack by replaying messages using a Software-Defined Radio, achieving an Equal Error Rate of 0.120, and ROC AUC of 0.946. Finally, we analyze its stability over time by introducing a time gap between training and testing data, and its extensibility by introducing new transmitters which have not been seen before. We conclude that our techniques are useful for building systems that are stable over time, can be used immediately with new transmitters without retraining, and provide robustness against spoofing and replay by raising the required budget for attacks.

READ FULL TEXT
research
06/18/2020

GNSS Spoofing Detection via Opportunistic IRIDIUM Signals

In this paper, we study the privately-own IRIDIUM satellite constellatio...
research
05/03/2019

Generative Adversarial Network for Wireless Signal Spoofing

The paper presents a novel approach of spoofing wireless signals by usin...
research
02/22/2022

DEMO: Relay/Replay Attacks on GNSS signals

Global Navigation Satellite Systems (GNSS) are ubiquitously relied upon ...
research
04/25/2022

Cryptography Is Not Enough: Relay Attacks on Authenticated GNSS Signals

Civilian-GNSS is vulnerable to signal spoofing attacks, and countermeasu...
research
02/23/2022

Distributed and Mobile Message Level Relaying/Replaying of GNSS Signals

With the introduction of Navigation Message Authentication (NMA), future...
research
03/20/2018

Dual Polarized Modulation and Reception for Next Generation Mobile Satellite Communications

This paper presents the novel application of Polarized Modulation (PMod)...
research
05/23/2020

ChirpOTLE: A Framework for Practical LoRaWAN Security Evaluation

Low-power wide-area networks (LPWANs) are becoming an integral part of t...

Please sign up or login with your details

Forgot password? Click here to reset