Conference item
Satellite spoofing from A to Z: on the requirements of satellite downlink overshadowing attacks
- Abstract:
- Satellite communications are increasingly crucial for telecommunications, navigation, and Earth observation. However, many widely used satellites do not cryptographically secure the downlink, opening the door for radio spoofing attacks. Recent developments in software-defined radio hardware have enabled attacks on wireless systems including GNSS, which can be effectively spoofed using only cheap hardware available off the shelf. However, these conclusions do not generalize well to other satellite systems such as high data rate backhauls or satellite-to-customer connections, where the spoofing requirements are currently unknown. In this paper, we present a systematic review of spoofing attacks against satellite downlink communications systems. We establish a threat model linking attack feasibility and impact to required budget through real-world experiments and channel simulations. Our results show that nearly all evaluated satellite systems were overshadowable at a distance of 1km in the worst case, for a budget of ~2000 USD or less. We evaluate how the key challenges of antenna directionality, legitimate satellite signal presence, modulation schemes, and receiver saturation can be overcome in practice through antenna sidelobe targeting, overshadowing, and automatic gain control takeover. We also show that, surprisingly, protocols designed to be more robust against channel noise are significantly less robust against an overshadowing attacker. We conclude with a discussion of physicallayer countermeasures specifically applicable to satellite systems which can not be cryptographically upgraded.
- Publication status:
- Accepted
- Peer review status:
- Peer reviewed
Actions
Access Document
- Files:
-
-
(Preview, Accepted manuscript, pdf, 3.0MB, Terms of use)
-
- Publisher copy:
- 10.1145/3558482.3590190
Authors
- Publisher:
- Association for Computing Machinery
- Host title:
- Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2023)
- Pages:
- 341–352
- Publication date:
- 2023-06-28
- Acceptance date:
- 2023-03-29
- Event title:
- 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2023)
- Event location:
- Guildford, UK
- Event website:
- https://wisec2023.surrey.ac.uk/
- Event start date:
- 2023-05-29
- Event end date:
- 2023-06-01
- DOI:
- ISBN:
- 978-1-4503-9859-6
- Language:
-
English
- Keywords:
- Pubs id:
-
1339513
- Local pid:
-
pubs:1339513
- Deposit date:
-
2023-05-02
Terms of use
- Copyright holder:
- Salkield et al
- Copyright date:
- 2023
- Rights statement:
- © 2023 Copyright held by the owner/author(s). Publication rights licensed to ACM.
- Notes:
- This paper was presented at the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2023), 29th May - 1st June 2023, Guildford, Surrey, UK. This is the accepted manuscript version of the article. The final version is available online from the conference proceedings at: https://doi.org/10.1145/3558482.3590190
If you are the owner of this record, you can report an update to it here: Report update to this record