skip to main content
10.1145/3576915.3623135acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting

Published: 21 November 2023 Publication History

Abstract

Due to an increase in the availability of cheap off-the-shelf radio hardware, signal spoofing and replay attacks on satellite ground systems have become more accessible than ever. This is particularly a problem for legacy systems, many of which do not offer cryptographic security and cannot be patched to support novel security measures.
Therefore, in this paper we explore radio transmitter fingerprinting in the context of satellite systems. We introduce the SatIQ system, proposing novel techniques for authenticating transmissions using characteristics of the transmitter hardware expressed as impairments on the downlinked radio signal. We look in particular at high sample rate fingerprinting, making device fingerprints difficult to forge without similarly high sample rate transmitting hardware, thus raising the required budget for spoofing and replay attacks. We also examine the difficulty of this approach with high levels of atmospheric noise and multipath scattering, and analyze potential solutions to this problem.
We focus on the Iridium satellite constellation, for which we collected 1705202 messages at a sample rate of 25 MS/s. We use this data to train a fingerprinting model consisting of an autoencoder combined with a Siamese neural network, enabling the model to learn an efficient encoding of the message headers that preserves identifying information.
We demonstrate the fingerprinting system's robustness under attack by replaying messages using a Software-Defined Radio, achieving an Equal Error Rate of 0.120, and ROC AUC of 0.946. Finally, we analyze its stability over time by introducing a time gap between training and testing data, and its extensibility by introducing new transmitters which have not been seen before. We conclude that our techniques are useful for building fingerprinting systems that are stable over time, can be used immediately with new transmitters without retraining, and provide robustness against spoofing and replay attacks by raising the required budget for attacks.

References

[1]
Great Scott Gadgets. 2021. HackRF One. Retrieved Sept. 27, 2022 from https://greatscottgadgets.com/hackrf/one/.
[2]
Martin Strohmeier, Vincent Lenders, and Ivan Martinovic. 2015. On the Security of the Automatic Dependent Surveillance-Broadcast Protocol. IEEE Communications Surveys Tutorials, 17, 2, 1066--1087.
[3]
Marc Lichtman, Roger Piqueras Jover, Mina Labib, Raghunandan Rao, Vuk Marojevic, and Jeffrey H Reed. 2016. LTE/LTE-A jamming, spoofing, and sniffing: threat assessment and mitigation. IEEE Communications Magazine, 54, 4, 54--61.
[4]
Gyuhong Lee, Jihoon Lee, Jinsung Lee, Youngbin Im, Max Hollingsworth, Eric Wustrow, Dirk Grunwald, and Sangtae Ha. 2019. This is Your President Speaking: Spoofing Alerts in 4G LTE Networks. In Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, 404--416.
[5]
João Gaspar, Renato Ferreira, Pedro Sebastião, and Nuno Souto. 2020. Capture of UAVs Through GPS Spoofing Using Low-Cost SDR Platforms. Wireless Personal Communications, 115, 2729--2754.
[6]
NASA. 2022. Fire Information for Resource Management System (FIRMS). Retrieved May 3, 2022 from https://earthdata.nasa.gov/earth-observation-data/near-real-time/firms.
[7]
Esri. 2022. Esri releases updated land-cover map with new sets of global data. Retrieved May 3, 2022 from https://www.esri.com/about/newsroom/announcements/esri-releases-updated-land-cover-map-with-new-sets-of -global-data/.
[8]
Meta. 2022. High resolution population density maps. Retrieved May 3, 2022 from https://dataforgood.facebook.com/dfg/tools/high-resolution-population-density-maps.
[9]
Cloud to Street. 2022. Cloud to Street. Retrieved May 3, 2022 from https: //www.cloudtostreet.ai/.
[10]
sam210723. 2020. Receiving images from geostationary weather satellite GEO-KOMPSAT-2A. Retrieved May 9, 2022 from https://vksdr.com/xrit-rx.
[11]
sam210723. 2018. COMS-1 LRIT key decryption. Retrieved May 9, 2022 from https://vksdr.com/lrit-key-dec.
[12]
Maryam Motallebighomi, Harshad Sathaye, Mridula Singh, and Aanjhan Ranganathan. 2022. Cryptography Is Not Enough: Relay Attacks on Authenticated GNSS Signals. arXiv preprint arXiv:2204.11641. arXiv: 2204.11641.
[13]
Gabriele Oligeri, Simone Raponi, Savio Sciancalepore, and Roberto Di Pietro. 2020. PAST-AI: Physical-layer Authentication of Satellite Transmitters via Deep Learning. arXiv:2010.05470 [cs], (Oct. 2020). eprint: 2010.05470.
[14]
Marc Lichtman. 2021. IQ Sampling. In PySDR: A Guide to SDR and DSP Using Python.
[15]
NASA. 2022. X-band Direct Readout Sites Worldwide. Retrieved Sept. 27, 2022 from https://directreadout.sci.gsfc.nasa.gov/?id=dspContent%5C&cid=78.
[16]
Eric Jedermann, Martin Strohmeier, Matthias Schäfer, Jens Schmitt, and Vincent Lenders. 2021. Orbit-based authentication using tdoa signatures in satellite networks. In Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 175--180.
[17]
Mohsen Riahi Manesh, Jonathan Kenney, Wen Chen Hu, Vijaya Kumar Devabhaktuni, and Naima Kaabouch. 2019. Detection of GPS Spoofing Attacks on Unmanned Aerial Systems. In 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, 1--6. isbn: 1--5386--5553--5.
[18]
Damian Miralles, Aurelie Bornot, Paul Rouquette, Nathan Levigne, Dennis M Akos, Yu-Hsuan Chen, Sherman Lo, and Todd Walter. 2020. An Assessment of GPS Spoofing Detection Via Radio Power and Signal Quality Monitoring for Aviation Safety Operations. IEEE Intelligent Transportation Systems Magazine, 12, 3, 136--146.
[19]
Naeimeh Soltanieh, Yaser Norouzi, Yang Yang, and Nemai Chandra Karmakar. 2020. A Review of Radio Frequency Fingerprinting Techniques. IEEE Journal of Radio Frequency Identification, 4, 3, 222--233.
[20]
Jeyanthi Hall, Michel Barbeau, and Evangelos Kranakis. 2003. Detection of transient in radio frequency fingerprinting using signal phase. Wireless and Optical Communications, 13--18.
[21]
Lianfen Huang, Minghui Gao, Caidan Zhao, and Xiongpeng Wu. 2013. Detection of Wi-Fi transmitter transients using statistical method. In 2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013). IEEE, 1--5. isbn: 1-4799-1027-9.
[22]
K. J. Ellis and N. Serinken. 2001. Characteristics of radio transmitter fingerprints. Radio Science, 36, 4, (July 2001), 585--597.
[23]
Kasper Bonne Rasmussen and Srdjan Capkun. 2007. Implications of radio fingerprinting on the security of sensor networks. In 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops-SecureComm 2007. IEEE, 331--340. isbn: 1-4244-0974-8.
[24]
Mahsa Foruhandeh, Abdullah Z. Mohammed, Gregor Kildow, Paul Berges, and Ryan Gerdes. 2020. Spotr: GPS spoofing detection via device fingerprinting. In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20). Association for Computing Machinery, (July 2020), 242--253.
[25]
Irwin O Kennedy, Patricia Scanlon, Francis J Mullany, Milind M Buddhikot, Keith E Nolan, and Thomas W Rondeau. 2008. Radio transmitter fingerprinting: A steady state frequency domain approach. In 2008 IEEE 68th Vehicular Technology Conference. IEEE, 1--5. isbn: 1-4244-1722-8.
[26]
Joshua Bassey, Damilola Adesina, Xiangfang Li, Lijun Qian, Alexander Aved, and Timothy Kroecker. 2019. Intrusion detection for IoT devices based on RF fingerprinting using deep learning. In 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC). IEEE, 98--104. isbn: 1-72811-796-8.
[27]
Francesco Restuccia, Salvatore D'Oro, Amani Al-Shawabka, Mauro Belgiovine, Luca Angioloni, Stratis Ioannidis, Kaushik Chowdhury, and Tommaso Melodia. 2019. DeepRadioID: Real-time channel-resilient optimization of deep learning-based radio fingerprinting algorithms. In Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 51--60.
[28]
Kunal Sankhe, Mauro Belgiovine, Fan Zhou, Luca Angioloni, Frank Restuccia, Salvatore D'Oro, Tommaso Melodia, Stratis Ioannidis, and Kaushik Chowdhury. 2020. No Radio Left Behind: Radio Fingerprinting Through Deep Learning of Physical-Layer Hardware Impairments. IEEE Transactions on Cognitive Communications and Networking, 6, 1, (Mar. 2020), 165--178. 2019.2949308.
[29]
Oktay Üreten, and Nur Serinken. 2004. Improvement of transmitter identification system for low SNR transients. Electronics Letters, 40, 3, 182--183.
[30]
Weidong Wang and Lu Gan. 2022. Radio Frequency Fingerprinting Improved by Statistical Noise Reduction. IEEE Transactions on Cognitive Communications and Networking.
[31]
Boris Danev, Heinrich Luecken, Srdjan Capkun, and Karim El Defrawy. 2010. Attacks on physical-layer identification. In Proceedings of the Third ACM Conference on Wireless Network Security, 89--98.
[32]
Davide Chicco. 2021. Siamese Neural Networks: An Overview. Artificial Neural Networks, 73--94.
[33]
Jinting Zhu, Julian Jang-Jaccard, and Paul A Watters. 2020. Multi-Loss Siamese Neural Network With Batch Normalization Layer for Malware Detection. IEEE Access, 8, 171542--171550.
[34]
Cheng Zhang, Wu Liu, Huadong Ma, and Huiyuan Fu. 2016. Siamese Neural Network Based Gait Recognition for Human Identification. In 2016 Ieee International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2832--2836. isbn: 1-4799-9988-1.
[35]
Mingtao Pei, Bin Yan, Huiling Hao, and Meng Zhao. 2023. Person-Specific Face Spoofing Detection Based on a Siamese Network. Pattern Recognition, 135, 109148.
[36]
Kaavya Sriskandaraja, Vidhyasaharan Sethu, and Eliathamby Ambikairajah. 2018. Deep Siamese Architecture Based Replay Detection for Secure Voice Biometric. In Interspeech, 671--675.
[37]
Yu Mao, Yang-Yang Dong, Ting Sun, Xian Rao, and Chun-Xi Dong. 2021. Attentive Siamese Networks for Automatic Modulation Classification Based on Multitiming Constellation Diagrams. IEEE Transactions on Neural Networks and Learning Systems.
[38]
Louis Morge-Rollet, Frédéric Le Roy, Denis Le Jeune, and Roland Gautier. 2020. Siamese Network on I/Q Signals for RF fingerprinting. In Actes de La Conférence CAID 2020, 152.
[39]
Zachary Langford, Logan Eisenbeiser, and Matthew Vondal. 2019. Robust Signal Classification Using Siamese Networks. In Proceedings of the ACM Workshop on Wireless Security and Machine Learning, 1--5.
[40]
Kian Ahrabian and Bagher BabaAli. 2019. Usage of Autoencoders and Siamese Networks for Online Handwritten Signature Verification. Neural Computing and Applications, 31, 9321--9334.
[41]
SatNOGS. 2022. SatNOGS: Open Source global network of satellite ground-stations. Retrieved Oct. 5, 2022 from https://satnogs.org/.
[42]
Dan Veeneman. 2021. Iridium: Technical Details. Retrieved Sept. 29, 2022 from http://www.decodesystems.com/iridium.html.
[43]
Tobias Schneider and Stefan Zehl. 2022. gr-iridium: GNU Radio Iridium Out Of Tree Module. Chaos Computer Club München. (Sept. 2022).
[44]
Sarang Narkhede. 2018. Understanding AUC - ROC Curve. Towards Data Science, 26, 1, 220--227.
[45]
Bechir Hamdaoui and Abdurrahman Elmaghbub. 2022. Deep-Learning-Based Device Fingerprinting for Increased LoRa-IoT Security: Sensitivity to Network Deployment Changes. IEEE Network, 36, 3, (May 2022), 204--210.
[46]
Amani Al-Shawabka et al. 2020. Exposing the Fingerprint: Dissecting the Impact of the Wireless Channel on Radio Fingerprinting. In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications. (July 2020), 646--655.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
November 2023
3722 pages
ISBN:9798400700507
DOI:10.1145/3576915
Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 November 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. fingerprinting
  2. machine learning
  3. neural network
  4. radio security
  5. satellite security
  6. systems security

Qualifiers

  • Research-article

Conference

CCS '23
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)374
  • Downloads (Last 6 weeks)29
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media