对 5G 定位的外科手术式打击:选择性-PRS-欺骗攻击及其防御

Kaixuan Gao;Huiqiang Wang;Hongwu Lv
{"title":"对 5G 定位的外科手术式打击:选择性-PRS-欺骗攻击及其防御","authors":"Kaixuan Gao;Huiqiang Wang;Hongwu Lv","doi":"10.1109/JSAC.2024.3414592","DOIUrl":null,"url":null,"abstract":"As a solution for city-range integrated sensing and communication and intelligent positioning, 5G high-precision positioning is flooding into reality. Nevertheless, the underlying positioning security concerns have been overlooked, posing threats to more than a billion emerging 5G localization applications. In this work, we first identify a novel and far-reaching security vulnerability affecting current 5G positioning systems. Correspondingly, we introduce a threat model, called the selective-PRS-spoofing attack (SPS), which can cause substantial localization errors or even fully-hijacked positioning results at victims. The attacker first cracks the broadcast information of a 5G network and then poisons specific resource elements of the channel. Different from traditional communication-oriented 5G attacks, SPS targets the localization and exerts real-world threats. More seriously, we confirm that SPS attacks can evade multiple latest 3GPP R18 defense, and analyze its great stealthiness from its precise spoofing feature. To tackle this challenge, a Deep Learning-based defence method called in-phase quadrature intra-attention network (IQIA-Net) is proposed, which utilizes the hardware features of base stations to perform identification at the physical level, thereby thwarting SPS attacks on 5G positioning systems. Extensive experiments demonstrate the effectiveness of our method and its good robustness to noise.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"42 10","pages":"2922-2937"},"PeriodicalIF":0.0000,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Surgical Strike on 5G Positioning: Selective-PRS-Spoofing Attacks and Its Defence\",\"authors\":\"Kaixuan Gao;Huiqiang Wang;Hongwu Lv\",\"doi\":\"10.1109/JSAC.2024.3414592\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As a solution for city-range integrated sensing and communication and intelligent positioning, 5G high-precision positioning is flooding into reality. Nevertheless, the underlying positioning security concerns have been overlooked, posing threats to more than a billion emerging 5G localization applications. In this work, we first identify a novel and far-reaching security vulnerability affecting current 5G positioning systems. Correspondingly, we introduce a threat model, called the selective-PRS-spoofing attack (SPS), which can cause substantial localization errors or even fully-hijacked positioning results at victims. The attacker first cracks the broadcast information of a 5G network and then poisons specific resource elements of the channel. Different from traditional communication-oriented 5G attacks, SPS targets the localization and exerts real-world threats. More seriously, we confirm that SPS attacks can evade multiple latest 3GPP R18 defense, and analyze its great stealthiness from its precise spoofing feature. To tackle this challenge, a Deep Learning-based defence method called in-phase quadrature intra-attention network (IQIA-Net) is proposed, which utilizes the hardware features of base stations to perform identification at the physical level, thereby thwarting SPS attacks on 5G positioning systems. Extensive experiments demonstrate the effectiveness of our method and its good robustness to noise.\",\"PeriodicalId\":73294,\"journal\":{\"name\":\"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society\",\"volume\":\"42 10\",\"pages\":\"2922-2937\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-06-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10557684/\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10557684/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

作为城市范围内综合传感与通信和智能定位的解决方案,5G 高精度定位正涌入现实。然而,其背后的定位安全问题却一直被忽视,对超过十亿的新兴 5G 定位应用构成威胁。在这项工作中,我们首先发现了一个影响当前 5G 定位系统的新颖而深远的安全漏洞。相应地,我们引入了一种威胁模型,称为选择性-PRS-欺骗攻击(SPS),这种攻击会导致大量定位错误,甚至完全劫持受害者的定位结果。攻击者首先破解 5G 网络的广播信息,然后毒化信道中的特定资源元素。与传统的面向通信的 5G 攻击不同,SPS 以定位为目标,对现实世界造成威胁。更重要的是,我们证实了 SPS 攻击可以躲避多种最新的 3GPP R18 防御,并从其精确欺骗特性分析了其强大的隐蔽性。为了应对这一挑战,我们提出了一种基于深度学习的防御方法--同相正交内部注意网络(IQIA-Net),它利用基站的硬件特征在物理层进行识别,从而挫败针对5G定位系统的SPS攻击。大量实验证明了我们方法的有效性及其对噪声的良好鲁棒性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Surgical Strike on 5G Positioning: Selective-PRS-Spoofing Attacks and Its Defence
As a solution for city-range integrated sensing and communication and intelligent positioning, 5G high-precision positioning is flooding into reality. Nevertheless, the underlying positioning security concerns have been overlooked, posing threats to more than a billion emerging 5G localization applications. In this work, we first identify a novel and far-reaching security vulnerability affecting current 5G positioning systems. Correspondingly, we introduce a threat model, called the selective-PRS-spoofing attack (SPS), which can cause substantial localization errors or even fully-hijacked positioning results at victims. The attacker first cracks the broadcast information of a 5G network and then poisons specific resource elements of the channel. Different from traditional communication-oriented 5G attacks, SPS targets the localization and exerts real-world threats. More seriously, we confirm that SPS attacks can evade multiple latest 3GPP R18 defense, and analyze its great stealthiness from its precise spoofing feature. To tackle this challenge, a Deep Learning-based defence method called in-phase quadrature intra-attention network (IQIA-Net) is proposed, which utilizes the hardware features of base stations to perform identification at the physical level, thereby thwarting SPS attacks on 5G positioning systems. Extensive experiments demonstrate the effectiveness of our method and its good robustness to noise.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信