Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2021
DOI: 10.1145/3448300.3468256
|View full text |Cite
|
Sign up to set email alerts
|

Relay/replay attacks on GNSS signals

Abstract: Global Navigation Satellite Systems (GNSSs) are ubiquitously relied upon for positioning and timing. Detection and prevention of attacks against GNSS have been researched over the last decades, but many of these attacks and countermeasures were evaluated based on simulation. This work contributes to the experimental investigation of GNSS vulnerabilities, implementing a relay/replay attack with off-the-shelf hardware. Operating at the signal level, this attack type is not hindered by cryptographically protected… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…However, cryptographic signatures prevent the attacker from generating navigation messages, limiting its spoofing capabilities. Prior work [30] showed the feasibility of relaying signals over long distances and spoofing the victim's location to where the signals were originally received. First, we evaluate the furthest distance an adversary can spoof a victim, assuming proximity between the attacker and the victim receiver.…”
Section: Evaluation Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…However, cryptographic signatures prevent the attacker from generating navigation messages, limiting its spoofing capabilities. Prior work [30] showed the feasibility of relaying signals over long distances and spoofing the victim's location to where the signals were originally received. First, we evaluate the furthest distance an adversary can spoof a victim, assuming proximity between the attacker and the victim receiver.…”
Section: Evaluation Resultsmentioning
confidence: 99%
“…Several researchers in the past have demonstrated the ineffectiveness of cryptographic solutions. The works that comes closest to our proposed attack are [27,30]. [30] demonstrated the feasibility of the relay attack on large distances.…”
Section: Related Workmentioning
confidence: 98%
See 1 more Smart Citation
“…Sampling frequencies as low as 1 MS/s, however, suffice for successful Record-and-Replay attacks, when combined with brief jamming intervals [21]. Also, storage requirements can be lifted if the recordings are streamed and replayed in real-time between inter-networked attacker nodes [21]. Such a setup can be used to replay GNSS signals over long distances, but is in practice limited by the available network bandwidth.…”
Section: Related Workmentioning
confidence: 99%
“…This means that it is indeed possible for the attacker to ignore the legitimate signals and use a so-called signal generation attacks, generating new GNSS signals with correct modulation formats and spreading code but fake phase and frequency. Additionally, several works have reported successful attacks even using off-the-shelf hardware [6], [7].…”
Section: Introductionmentioning
confidence: 99%