kth.sePublications KTH
Change search
Link to record
Permanent link

Direct link
Publications (2 of 2) Show all publications
Lenhart, M., Spanghero, M. & Papadimitratos, P. (2022). Distributed and Mobile Message Level Relaying/Replaying of GNSS Signals. In: The International Technical Meeting of the The Institute of Navigation: . Paper presented at International technical Meeting of the Institute of Navigation. Institute of Navigation
Open this publication in new window or tab >>Distributed and Mobile Message Level Relaying/Replaying of GNSS Signals
2022 (English)In: The International Technical Meeting of the The Institute of Navigation, Institute of Navigation , 2022Conference paper, Published paper (Refereed)
Abstract [en]

With the introduction of Navigation Message Authentication (NMA), future Global Navigation Satellite Systems (GNSSs) prevent spoofing by simulation, i.e., the generation of forged satellite signals based on publicly known information. However, authentication does not prevent record-and-replay attacks, commonly termed as meaconing. Meaconing attacks are less powerful in terms of adversarial control over the victim receiver location and time, but by acting at the signal level, they are not thwarted by NMA. This makes replaying/relaying attacks a significant threat for current and future GNSS. While there are numerous investigations on meaconing attacks, the vast majority does not rely on actual implementation and experimental evaluation in real-world settings. In this work, we contribute to the improvement of the experimental understanding of meaconing attacks. We design and implement a system capable of real-time, distributed, and mobile meaconing, built with off-the-shelf hardware. We extend from basic distributed meaconing attacks, with signals from different locations relayed over the Internet and replayed within range of the victim receiver(s). This basic attack form has high bandwidth requirements and thus depends on the quality of service of the available network to work. To overcome this limitation, we propose to replay on message level, i.e., to demodulate and re-generate signals before and after the transmission respectively (including the authentication part of the payload). The resultant reduced bandwidth enables the attacker to operate in mobile scenarios, as well as to replay signals from multiple GNSS constellations and/or bands simultaneously. Additionally, the attacker can delay individually selected satellite signals to potentially influence the victim position and time solution in a more fine-grained manner. Our versatile test-bench, enabling different types of replaying/relaying attacks, facilitates testing realistic scenarios towards new and improved replaying/relaying-focused countermeasures in GNSS receivers.

Place, publisher, year, edition, pages
Institute of Navigation, 2022
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-323284 (URN)10.33012/2022.18227 (DOI)2-s2.0-85147930155 (Scopus ID)
Conference
International technical Meeting of the Institute of Navigation
Note

QC 20250317

Available from: 2023-01-24 Created: 2023-01-24 Last updated: 2025-03-17Bibliographically approved
Lenhart, M., Spanghero, M. & Papadimitratos, P. (2021). Relay/replay attacks on GNSS signals. In: WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks: . Paper presented at 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2021, 28 June 2021 through 2 July 2021 (pp. 380-382). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>Relay/replay attacks on GNSS signals
2021 (English)In: WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Association for Computing Machinery (ACM) , 2021, p. 380-382Conference paper, Published paper (Refereed)
Abstract [en]

Global Navigation Satellite Systems (GNSSs) are ubiquitously relied upon for positioning and timing. Detection and prevention of attacks against GNSS have been researched over the last decades, but many of these attacks and countermeasures were evaluated based on simulation. This work contributes to the experimental investigation of GNSS vulnerabilities, implementing a relay/replay attack with off-the-shelf hardware. Operating at the signal level, this attack type is not hindered by cryptographically protected transmissions, such as Galileo's Open Service Navigation Message Authentication (OS-NMA). The attack we investigate involves two colluding adversaries, relaying signals over large distances, to effectively spoof a GNSS receiver. We demonstrate the attack using off-the-shelf hardware, we investigate the requirements for such successful colluding attacks, and how they can be enhanced, e.g., allowing for finer adversarial control over the victim receiver. 

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2021
Keywords
global navigation satellite systems (GNSS), meaconing, off-the-shelf hardware, replay/relay attack, spoofing, Cellular radio systems, Mobile telecommunication systems, Privacy by design, Wireless networks, Colluding attack, Experimental investigations, Global Navigation Satellite Systems, GNSS receivers, GNSS signals, Off-the-shelf hardwares, Open services, Relaying signals, Global positioning system
National Category
Signal Processing Communication Systems Other Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-310385 (URN)10.1145/3448300.3468256 (DOI)2-s2.0-85110145090 (Scopus ID)
Conference
14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2021, 28 June 2021 through 2 July 2021
Note

Part of proceedings: ISBN 978-1-4503-8349-3

QC 20220404

Available from: 2022-04-04 Created: 2022-04-04 Last updated: 2023-01-18Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-8846-8657

Search in DiVA

Show all publications