Satellite spoofing from A to Z: on the requirements of satellite downlink overshadowing attacks
Satellite communications are increasingly crucial for telecommunications, navigation, and Earth observation. However, many widely used satellites do not cryptographically secure the downlink, opening the door for radio spoofing attacks. Recent developments in software-defined radio hardware have ena...
Main Authors: | Salkield, E, Szakály, M, Smailes, J, Kohler, S, Birnbach, S, Strohmeier, M, Martinovic, I |
---|---|
Format: | Conference item |
Language: | English |
Published: |
Association for Computing Machinery
2023
|
Similar Items
-
Firefly: spoofing Earth observation satellite data through radio overshadowing
by: Salkield, E, et al.
Published: (2023) -
Sticky fingers: resilience of satellite fingerprinting against jamming attacks
by: Smailes, J, et al.
Published: (2024) -
Watch this space: securing satellite communication through resilient transmitter fingerprinting
by: Smailes, J, et al.
Published: (2023) -
Security risks of adaptive coding and modulation in space systems
by: Salkield, E, et al.
Published: (2024) -
On the requirements for successful GPS spoofing attacks
by: Tippenhauer, N, et al.
Published: (2011)