Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2020
DOI: 10.1145/3395351.3399350
|View full text |Cite
|
Sign up to set email alerts
|

GNSS spoofing detection via opportunistic IRIDIUM signals

Abstract: In this paper, we study the privately-own IRIDIUM satellite constellation, to provide a location service that is independent of the GNSS. In particular, we apply our findings to propose a new GNSS spoofing detection solution, exploiting unencrypted IRIDIUM Ring Alert (IRA) messages that are broadcast by IRIDIUM satellites.To achieve the above-introduced objective, we firstly reverseengineer many parameters of the IRIDIUM satellite constellation, such as the satellites speed, packet interarrival times, maximum … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(17 citation statements)
references
References 23 publications
0
17
0
Order By: Relevance
“…Global Navigation Satellite Systems (GNSS): GPS (US), GLONASS (Russia), Galileo (EU) and BeiDou (China) all fall under the Global Navigation Satellite Systems (GNSS) umbrella. Cyber attacks on GNSS have been-facilitated by the lack of authentication and encryption-rendering the system vulnerable to breaches [134,135]. Fake position information significantly increases the probability of collisions, and the most striking exemplars occur in the Black Sea.…”
Section: Ais Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Global Navigation Satellite Systems (GNSS): GPS (US), GLONASS (Russia), Galileo (EU) and BeiDou (China) all fall under the Global Navigation Satellite Systems (GNSS) umbrella. Cyber attacks on GNSS have been-facilitated by the lack of authentication and encryption-rendering the system vulnerable to breaches [134,135]. Fake position information significantly increases the probability of collisions, and the most striking exemplars occur in the Black Sea.…”
Section: Ais Attackmentioning
confidence: 99%
“…The highest levels of protection of location data are mandatory for the successful operation of a fleet of autonomous vessels. Therefore, a significant body of research on GNSS spoofing attack detection has been undertaken [134,[136][137][138].…”
Section: Ais Attackmentioning
confidence: 99%
“…First results based on cross-referencing within a distributed sensor network are illustrated by Strohmeier et al [50]. Oligeri et al [27] use IRIDIUM signals to validate GNSS position solutions. While Wesson et al [57] discuss solutions based on cryptography, Kim et al [21] evaluate a solution based on protocol extension with timestamps.…”
Section: Related Workmentioning
confidence: 99%
“…Satellite communications systems such as GPS and parts of Iridium are known to have security issues, most prominently being vulnerable to spoofing attacks. Various analyses [23,26] and some countermeasures [17,18] to those attacks were introduced.…”
Section: Introductionmentioning
confidence: 99%
“…With their system an accuracy between 80% and 100% was possible, depending on the underlying assumptions. In another recent work of Oligeri et al [18], the authors used unencrypted Iridium Ring Alert messages to verify their own position. Based on this independent verification, the detection of GNSS spoofing was possible.…”
Section: Introductionmentioning
confidence: 99%