kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Relay/replay attacks on GNSS signals
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS.ORCID iD: 0000-0001-8919-0098
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS.ORCID iD: 0000-0002-3267-5374
2021 (English)In: WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Association for Computing Machinery (ACM) , 2021, p. 380-382Conference paper, Published paper (Refereed)
Abstract [en]

Global Navigation Satellite Systems (GNSSs) are ubiquitously relied upon for positioning and timing. Detection and prevention of attacks against GNSS have been researched over the last decades, but many of these attacks and countermeasures were evaluated based on simulation. This work contributes to the experimental investigation of GNSS vulnerabilities, implementing a relay/replay attack with off-the-shelf hardware. Operating at the signal level, this attack type is not hindered by cryptographically protected transmissions, such as Galileo's Open Service Navigation Message Authentication (OS-NMA). The attack we investigate involves two colluding adversaries, relaying signals over large distances, to effectively spoof a GNSS receiver. We demonstrate the attack using off-the-shelf hardware, we investigate the requirements for such successful colluding attacks, and how they can be enhanced, e.g., allowing for finer adversarial control over the victim receiver. 

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM) , 2021. p. 380-382
Keywords [en]
global navigation satellite systems (GNSS), meaconing, off-the-shelf hardware, replay/relay attack, spoofing, Cellular radio systems, Mobile telecommunication systems, Privacy by design, Wireless networks, Colluding attack, Experimental investigations, Global Navigation Satellite Systems, GNSS receivers, GNSS signals, Off-the-shelf hardwares, Open services, Relaying signals, Global positioning system
National Category
Signal Processing Communication Systems Other Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
URN: urn:nbn:se:kth:diva-310385DOI: 10.1145/3448300.3468256Scopus ID: 2-s2.0-85110145090OAI: oai:DiVA.org:kth-310385DiVA, id: diva2:1649282
Conference
14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2021, 28 June 2021 through 2 July 2021
Note

Part of proceedings: ISBN 978-1-4503-8349-3

QC 20220404

Available from: 2022-04-04 Created: 2022-04-04 Last updated: 2023-01-18Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Lenhart, MalteSpanghero, MarcoPapadimitratos, Panagiotis

Search in DiVA

By author/editor
Lenhart, MalteSpanghero, MarcoPapadimitratos, Panagiotis
By organisation
KTHSoftware and Computer systems, SCS
Signal ProcessingCommunication SystemsOther Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 127 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf