kth.sePublikationer KTH
Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Relay/replay attacks on GNSS signals
KTH, Skolan för elektroteknik och datavetenskap (EECS), Datavetenskap, Programvaruteknik och datorsystem, SCS.ORCID-id: 0000-0001-8919-0098
KTH, Skolan för elektroteknik och datavetenskap (EECS), Datavetenskap, Programvaruteknik och datorsystem, SCS.ORCID-id: 0000-0002-3267-5374
2021 (Engelska)Ingår i: WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Association for Computing Machinery (ACM) , 2021, s. 380-382Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Global Navigation Satellite Systems (GNSSs) are ubiquitously relied upon for positioning and timing. Detection and prevention of attacks against GNSS have been researched over the last decades, but many of these attacks and countermeasures were evaluated based on simulation. This work contributes to the experimental investigation of GNSS vulnerabilities, implementing a relay/replay attack with off-the-shelf hardware. Operating at the signal level, this attack type is not hindered by cryptographically protected transmissions, such as Galileo's Open Service Navigation Message Authentication (OS-NMA). The attack we investigate involves two colluding adversaries, relaying signals over large distances, to effectively spoof a GNSS receiver. We demonstrate the attack using off-the-shelf hardware, we investigate the requirements for such successful colluding attacks, and how they can be enhanced, e.g., allowing for finer adversarial control over the victim receiver. 

Ort, förlag, år, upplaga, sidor
Association for Computing Machinery (ACM) , 2021. s. 380-382
Nyckelord [en]
global navigation satellite systems (GNSS), meaconing, off-the-shelf hardware, replay/relay attack, spoofing, Cellular radio systems, Mobile telecommunication systems, Privacy by design, Wireless networks, Colluding attack, Experimental investigations, Global Navigation Satellite Systems, GNSS receivers, GNSS signals, Off-the-shelf hardwares, Open services, Relaying signals, Global positioning system
Nationell ämneskategori
Signalbehandling Kommunikationssystem Annan elektroteknik och elektronik
Identifikatorer
URN: urn:nbn:se:kth:diva-310385DOI: 10.1145/3448300.3468256Scopus ID: 2-s2.0-85110145090OAI: oai:DiVA.org:kth-310385DiVA, id: diva2:1649282
Konferens
14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2021, 28 June 2021 through 2 July 2021
Anmärkning

Part of proceedings: ISBN 978-1-4503-8349-3

QC 20220404

Tillgänglig från: 2022-04-04 Skapad: 2022-04-04 Senast uppdaterad: 2023-01-18Bibliografiskt granskad

Open Access i DiVA

Fulltext saknas i DiVA

Övriga länkar

Förlagets fulltextScopus

Person

Lenhart, MalteSpanghero, MarcoPapadimitratos, Panagiotis

Sök vidare i DiVA

Av författaren/redaktören
Lenhart, MalteSpanghero, MarcoPapadimitratos, Panagiotis
Av organisationen
KTHProgramvaruteknik och datorsystem, SCS
SignalbehandlingKommunikationssystemAnnan elektroteknik och elektronik

Sök vidare utanför DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetricpoäng

doi
urn-nbn
Totalt: 184 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf