Detecting Single-Antenna Spoofing Attacks by Correlation in Time Series of Raw Measurements

Alex Minetto, Akmal Rustamov, Fabio Dovis
{"title":"Detecting Single-Antenna Spoofing Attacks by Correlation in Time Series of Raw Measurements","authors":"Alex Minetto, Akmal Rustamov, Fabio Dovis","doi":"10.33012/2023.19205","DOIUrl":null,"url":null,"abstract":"Global Navigation Satellite System (GNSS) receivers are vulnerable to intentional radio frequency interferences, posing significant risks to their performance and reliability. Among these threats, it has been widely argued that modern GNSS-equipped Android™ smartphones are resilient to non-coherent spoofing attacks. This study challenges such a perception by highlighting the vulnerability of GNSS-equipped Android™ smartphones to single-antenna, non-coherent spoofing attacks and proposing a novel, application-level detection technique solely based on raw GNSS observables, i.e., carrier-to-noise-density time series. The analysis demonstrated the capability of successfully detecting such attacks by observing the cross-correlation among Global Navigation Satellite System (GNSS) measurements time series. Cross-correlation quantified by Pearson’s correlation coefficients shows a relevant increment during harmful spoofing attacks. Under these conditions, the proposed methodology allows to rise a spoofing alarm in about 5 seconds with a false alarm probability of 1.5%. Furthermore, the proposed technique does not require low-level signal access, making it suitable for implementation at the application layer in a large number of smart devices with limited knowledge of their low-level system architecture. A validation campaign has been performed by testing 18 different Android™ devices and chipsets, thus demonstrating the applicability of the proposed method independently from the device under test.","PeriodicalId":498211,"journal":{"name":"Proceedings of the Satellite Division's International Technical Meeting","volume":"80 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Satellite Division's International Technical Meeting","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33012/2023.19205","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Global Navigation Satellite System (GNSS) receivers are vulnerable to intentional radio frequency interferences, posing significant risks to their performance and reliability. Among these threats, it has been widely argued that modern GNSS-equipped Android™ smartphones are resilient to non-coherent spoofing attacks. This study challenges such a perception by highlighting the vulnerability of GNSS-equipped Android™ smartphones to single-antenna, non-coherent spoofing attacks and proposing a novel, application-level detection technique solely based on raw GNSS observables, i.e., carrier-to-noise-density time series. The analysis demonstrated the capability of successfully detecting such attacks by observing the cross-correlation among Global Navigation Satellite System (GNSS) measurements time series. Cross-correlation quantified by Pearson’s correlation coefficients shows a relevant increment during harmful spoofing attacks. Under these conditions, the proposed methodology allows to rise a spoofing alarm in about 5 seconds with a false alarm probability of 1.5%. Furthermore, the proposed technique does not require low-level signal access, making it suitable for implementation at the application layer in a large number of smart devices with limited knowledge of their low-level system architecture. A validation campaign has been performed by testing 18 different Android™ devices and chipsets, thus demonstrating the applicability of the proposed method independently from the device under test.
利用原始测量时间序列的相关性检测单天线欺骗攻击
全球导航卫星系统(GNSS)接收器容易受到故意的射频干扰,对其性能和可靠性构成重大风险。在这些威胁中,人们普遍认为,配备gnss的现代Android™智能手机能够抵御非相干欺骗攻击。本研究通过强调配备GNSS的Android™智能手机对单天线、非相干欺骗攻击的脆弱性,并提出了一种新颖的应用级检测技术,该技术仅基于原始GNSS可观测值,即载波-噪声密度时间序列,挑战了这种看法。分析表明,通过观察全球导航卫星系统(GNSS)测量时间序列之间的相互关系,可以成功检测此类攻击。皮尔逊相关系数量化的相互关系显示了有害欺骗攻击期间的相关增量。在这些条件下,所提出的方法允许在大约5秒内发出欺骗警报,假警报概率为1.5%。此外,所提出的技术不需要低级信号访问,使其适合在大量智能设备的应用层实现,而这些设备对其低级系统架构的了解有限。通过测试18种不同的Android™设备和芯片组进行了验证活动,从而证明了所提出的方法独立于被测试设备的适用性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信