Sticky fingers: resilience of satellite fingerprinting against jamming attacks

<p>In the wake of increasing numbers of attacks on radio communication systems, a range of techniques are being deployed to increase the security of these systems. One such technique is radio fingerprinting, in which the transmitter can be identified and authenticated by observing small hardwa...

Full description

Bibliographic Details
Main Authors: Smailes, J, Salkield, E, Köhler, S, Birnbach, S, Strohmeier, M, Martinovic, I
Format: Conference item
Language:English
Published: Internet Society 2024
_version_ 1797113150870388736
author Smailes, J
Salkield, E
Köhler, S
Birnbach, S
Strohmeier, M
Martinovic, I
author_facet Smailes, J
Salkield, E
Köhler, S
Birnbach, S
Strohmeier, M
Martinovic, I
author_sort Smailes, J
collection OXFORD
description <p>In the wake of increasing numbers of attacks on radio communication systems, a range of techniques are being deployed to increase the security of these systems. One such technique is radio fingerprinting, in which the transmitter can be identified and authenticated by observing small hardware differences expressed in the signal. Fingerprinting has been explored in particular in the defense of satellite systems, many of which are insecure and cannot be retrofitted with cryptographic security.</p> <p>In this paper, we evaluate the effectiveness of radio fingerprinting techniques under interference and jamming attacks, usually intended to deny service. By taking a pre-trained fingerprinting model and gathering a new dataset in which different levels of Gaussian noise and tone jamming have been added to the legitimate signal, we assess the attacker power required in order to disrupt the transmitter fingerprint such that it can no longer be recognized. We compare this to Gaussian jamming on the data portion of the signal, obtaining the remarkable result that transmitter fingerprints are still recognizable even in the presence of moderate levels of noise. Through deeper analysis of the results, we conclude that it takes a similar amount of jamming power in order to disrupt the fingerprint as it does to jam the message contents itself, so it is safe to include a fingerprinting system to authenticate satellite communication without opening up the system to easier denial-of-service attacks.</p>
first_indexed 2024-04-09T03:59:03Z
format Conference item
id oxford-uuid:85edd9f8-7b06-4069-96ec-3ddc1042ab1b
institution University of Oxford
language English
last_indexed 2024-04-09T03:59:03Z
publishDate 2024
publisher Internet Society
record_format dspace
spelling oxford-uuid:85edd9f8-7b06-4069-96ec-3ddc1042ab1b2024-04-05T16:07:17ZSticky fingers: resilience of satellite fingerprinting against jamming attacksConference itemhttp://purl.org/coar/resource_type/c_5794uuid:85edd9f8-7b06-4069-96ec-3ddc1042ab1bEnglishSymplectic ElementsInternet Society2024Smailes, JSalkield, EKöhler, SBirnbach, SStrohmeier, MMartinovic, I<p>In the wake of increasing numbers of attacks on radio communication systems, a range of techniques are being deployed to increase the security of these systems. One such technique is radio fingerprinting, in which the transmitter can be identified and authenticated by observing small hardware differences expressed in the signal. Fingerprinting has been explored in particular in the defense of satellite systems, many of which are insecure and cannot be retrofitted with cryptographic security.</p> <p>In this paper, we evaluate the effectiveness of radio fingerprinting techniques under interference and jamming attacks, usually intended to deny service. By taking a pre-trained fingerprinting model and gathering a new dataset in which different levels of Gaussian noise and tone jamming have been added to the legitimate signal, we assess the attacker power required in order to disrupt the transmitter fingerprint such that it can no longer be recognized. We compare this to Gaussian jamming on the data portion of the signal, obtaining the remarkable result that transmitter fingerprints are still recognizable even in the presence of moderate levels of noise. Through deeper analysis of the results, we conclude that it takes a similar amount of jamming power in order to disrupt the fingerprint as it does to jam the message contents itself, so it is safe to include a fingerprinting system to authenticate satellite communication without opening up the system to easier denial-of-service attacks.</p>
spellingShingle Smailes, J
Salkield, E
Köhler, S
Birnbach, S
Strohmeier, M
Martinovic, I
Sticky fingers: resilience of satellite fingerprinting against jamming attacks
title Sticky fingers: resilience of satellite fingerprinting against jamming attacks
title_full Sticky fingers: resilience of satellite fingerprinting against jamming attacks
title_fullStr Sticky fingers: resilience of satellite fingerprinting against jamming attacks
title_full_unstemmed Sticky fingers: resilience of satellite fingerprinting against jamming attacks
title_short Sticky fingers: resilience of satellite fingerprinting against jamming attacks
title_sort sticky fingers resilience of satellite fingerprinting against jamming attacks
work_keys_str_mv AT smailesj stickyfingersresilienceofsatellitefingerprintingagainstjammingattacks
AT salkielde stickyfingersresilienceofsatellitefingerprintingagainstjammingattacks
AT kohlers stickyfingersresilienceofsatellitefingerprintingagainstjammingattacks
AT birnbachs stickyfingersresilienceofsatellitefingerprintingagainstjammingattacks
AT strohmeierm stickyfingersresilienceofsatellitefingerprintingagainstjammingattacks
AT martinovici stickyfingersresilienceofsatellitefingerprintingagainstjammingattacks