Sticky fingers: resilience of satellite fingerprinting against jamming attacks
<p>In the wake of increasing numbers of attacks on radio communication systems, a range of techniques are being deployed to increase the security of these systems. One such technique is radio fingerprinting, in which the transmitter can be identified and authenticated by observing small hardwa...
Main Authors: | , , , , , |
---|---|
Format: | Conference item |
Language: | English |
Published: |
Internet Society
2024
|
_version_ | 1797113150870388736 |
---|---|
author | Smailes, J Salkield, E Köhler, S Birnbach, S Strohmeier, M Martinovic, I |
author_facet | Smailes, J Salkield, E Köhler, S Birnbach, S Strohmeier, M Martinovic, I |
author_sort | Smailes, J |
collection | OXFORD |
description | <p>In the wake of increasing numbers of attacks on radio communication systems, a range of techniques are being deployed to increase the security of these systems. One such technique is radio fingerprinting, in which the transmitter can be identified and authenticated by observing small hardware differences expressed in the signal. Fingerprinting has been explored in particular in the defense of satellite systems, many of which are insecure and cannot be retrofitted with cryptographic security.</p>
<p>In this paper, we evaluate the effectiveness of radio fingerprinting techniques under interference and jamming attacks, usually intended to deny service. By taking a pre-trained fingerprinting model and gathering a new dataset in which different levels of Gaussian noise and tone jamming have been added to the legitimate signal, we assess the attacker power required in order to disrupt the transmitter fingerprint such that it can no longer be recognized. We compare this to Gaussian jamming on the data portion of the signal, obtaining the remarkable result that transmitter fingerprints are still recognizable even in the presence of moderate levels of noise. Through deeper analysis of the results, we conclude that it takes a similar amount of jamming power in order to disrupt the fingerprint as it does to jam the message contents itself, so it is safe to include a fingerprinting system to authenticate satellite communication without opening up the system to easier denial-of-service attacks.</p> |
first_indexed | 2024-04-09T03:59:03Z |
format | Conference item |
id | oxford-uuid:85edd9f8-7b06-4069-96ec-3ddc1042ab1b |
institution | University of Oxford |
language | English |
last_indexed | 2024-04-09T03:59:03Z |
publishDate | 2024 |
publisher | Internet Society |
record_format | dspace |
spelling | oxford-uuid:85edd9f8-7b06-4069-96ec-3ddc1042ab1b2024-04-05T16:07:17ZSticky fingers: resilience of satellite fingerprinting against jamming attacksConference itemhttp://purl.org/coar/resource_type/c_5794uuid:85edd9f8-7b06-4069-96ec-3ddc1042ab1bEnglishSymplectic ElementsInternet Society2024Smailes, JSalkield, EKöhler, SBirnbach, SStrohmeier, MMartinovic, I<p>In the wake of increasing numbers of attacks on radio communication systems, a range of techniques are being deployed to increase the security of these systems. One such technique is radio fingerprinting, in which the transmitter can be identified and authenticated by observing small hardware differences expressed in the signal. Fingerprinting has been explored in particular in the defense of satellite systems, many of which are insecure and cannot be retrofitted with cryptographic security.</p> <p>In this paper, we evaluate the effectiveness of radio fingerprinting techniques under interference and jamming attacks, usually intended to deny service. By taking a pre-trained fingerprinting model and gathering a new dataset in which different levels of Gaussian noise and tone jamming have been added to the legitimate signal, we assess the attacker power required in order to disrupt the transmitter fingerprint such that it can no longer be recognized. We compare this to Gaussian jamming on the data portion of the signal, obtaining the remarkable result that transmitter fingerprints are still recognizable even in the presence of moderate levels of noise. Through deeper analysis of the results, we conclude that it takes a similar amount of jamming power in order to disrupt the fingerprint as it does to jam the message contents itself, so it is safe to include a fingerprinting system to authenticate satellite communication without opening up the system to easier denial-of-service attacks.</p> |
spellingShingle | Smailes, J Salkield, E Köhler, S Birnbach, S Strohmeier, M Martinovic, I Sticky fingers: resilience of satellite fingerprinting against jamming attacks |
title | Sticky fingers: resilience of satellite fingerprinting against jamming attacks |
title_full | Sticky fingers: resilience of satellite fingerprinting against jamming attacks |
title_fullStr | Sticky fingers: resilience of satellite fingerprinting against jamming attacks |
title_full_unstemmed | Sticky fingers: resilience of satellite fingerprinting against jamming attacks |
title_short | Sticky fingers: resilience of satellite fingerprinting against jamming attacks |
title_sort | sticky fingers resilience of satellite fingerprinting against jamming attacks |
work_keys_str_mv | AT smailesj stickyfingersresilienceofsatellitefingerprintingagainstjammingattacks AT salkielde stickyfingersresilienceofsatellitefingerprintingagainstjammingattacks AT kohlers stickyfingersresilienceofsatellitefingerprintingagainstjammingattacks AT birnbachs stickyfingersresilienceofsatellitefingerprintingagainstjammingattacks AT strohmeierm stickyfingersresilienceofsatellitefingerprintingagainstjammingattacks AT martinovici stickyfingersresilienceofsatellitefingerprintingagainstjammingattacks |