[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3558482.3590186acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Location-independent GNSS Relay Attacks: A Lazy Attacker's Guide to Bypassing Navigation Message Authentication

Published: 28 June 2023 Publication History

Abstract

In this work, we demonstrate the possibility of spoofing a GNSS receiver to arbitrary locations without modifying the navigation messages. Due to increasing spoofing threats, Galileo and GPS are evaluating broadcast authentication techniques to validate the integrity of navigation messages. Prior work required an adversary to record the GNSS signals at the intended spoofed location and relay them to the victim receiver. Our attack demonstrates the ability of an adversary to receive signals close to the victim receiver and in real-time generate spoofing signals for an arbitrary location without modifying the navigation message contents. We exploit the essential common reception and transmission time method used to estimate pseudorange in GNSS receivers, thereby potentially rendering any cryptographic authentication useless. We build a proof-of-concept real-time spoofer capable of receiving authenticated GNSS signals and generating spoofing signals for any arbitrary location and motion without requiring any high-speed communication networks or modifying the message contents. Our evaluations show that it is possible to spoof a victim receiver to locations as far as 4000~km away from the actual location and with any dynamic motion path. This work further highlights the fundamental limitations in securing a broadcast signaling-based localization system even if all communications are cryptographically protected.

Supplementary Material

MP4 File (wisec23_fp065.mp4)
In this paper, we demonstrate the possibility of spoofing a GNSS receiver to arbitrary locations without modifying the navigation messages. Due to increasing spoofing threats, Galileo and GPS are evaluating broadcast authentication techniques to validate the integrity of navigation messages. Prior work required an adversary to record the GNSS signals at the intended spoofed location and relay them to the victim receiver. Our attack demonstrates the ability of an adversary to receive signals close to the victim receiver and in real-time generate spoofing signals for an arbitrary location without modifying the navigation message contents. We exploit the essential common reception and transmission time method used to estimate pseudorange in GNSS receivers, thereby potentially rendering any cryptographic authentication useless. We build a proof-of-concept real-time spoofer capable of receiving authenticated GNSS signals and generating spoofing signals for any arbitrary location and motion without requiring any high-speed communication networks or modifying the message contents. Our evaluations show that it is possible to spoof a victim receiver to locations as far as 4000 km away from the actual location and with any dynamic motion path. This work further highlights the fundamental limitations in securing a broadcast signaling-based localization system even if all communications are cryptographically protected.

References

[1]
[n. d.]. Ettus Research. https://www.ettus.com/products/.
[2]
[n. d.]. Galileo. https://galileognss.eu/.
[3]
[n. d.]. GLONASS. https://www.glonass-iac.ru/en/about_glonass/.
[4]
[n. d.]. GNU Radio. https://www.gnuradio.org/.
[5]
[n. d.]. GPS. https://www.gps.gov/.
[6]
[n. d.]. LabSat GPS Simulator. https://www.labsat.co.uk/.
[7]
[n. d.]. Septentrio. https://www.septentrio.com/en/products/gnss-receivers/ receivers-module/mosaic-go-clas-evaluation-kit.
[8]
2013. UT Austin Researchers Successfully Spoof an $80 million Yacht at Sea. https://news.utexas.edu/2013/07/29/ut-austin-researchers-successfullyspoof-an-80-million-yacht-at-sea/.
[9]
2015. Software-Defined GPS Signal Simulator. https://github.com/osqzss/gps-sdrsim.
[10]
2018. Crowd-gps-sec: Leveraging crowdsourcing to detect and localize gps spoofing attacks, author=Jansen, Kai and Schäfer, Matthias and Moser, Daniel and Lenders, Vincent and Pöpper, Christina and Schmitt, Jens. In IEEE Symposium on Security and Privacy (SP).
[11]
2019. Ghost ships, crop circles, and soft gold: A GPS mystery in Shanghai. https://www.technologyreview.com/s/614689/ghost-ships-crop-circlesand-soft-gold-a-gps-mystery-in-shanghai/.
[12]
2019. How Hackers Can Take Over Your Car's GPS. https://www.bloomberg.com/ news/articles/2019-06--19/threat-of-gps-spoofing-for-autonomous-cars-seenas-overblown.
[13]
2020. Mysterious GPS signals reveal GHOST SHIPS sailing in wide circles off the coast of San Francisco, despite tracking data saying they should actually be thousands of miles away. https://www.dailymail.co.uk/sciencetech/article8400397/Mysterious-GPS-signals-reveal-GHOST-SHIPS-sailing-wide-circlescoast-San-Francisco.
[14]
2021. Galileo OSNMA Information Note. https://www.gsc-europa.eu/sites/default/ files/sites/all/files/Galileo_OSNMA_Info_Note.pdf.
[15]
2021. Guidelines for Test Phase v1.0. https://www.gsc-europa.eu/sites/default/files/ sites/all/files/Galileo_OSNMA_Receiver_Guidelines_for_Test_Phase_v1.0.pdf.
[16]
2022. America Needs GPS Backup. https://www.forbes.com/sites/dianafurchtgottroth/2022/03/10/america-needs-gps-backup/.
[17]
2022. M8N, Integration manual. https://content.u-blox.com/sites/default/files/ products/documents/u-blox8-M8_ReceiverDescrProtSpec_UBX-13003221.pdf.
[18]
2022. We Need a Backup for GPS . https://www.defenseone.com/ideas/2020/12/ we-need-backup-gps-actually-we-need-several-them/170391/.
[19]
2022. ZED-F9P, Integration manual. https://content.u-blox.com/sites/default/ files/ZED-F9P_IntegrationManual_UBX-18010802.pdf.
[20]
Dennis Akos, Stephan Esterhuizen, Alexander Mitelman, R Eric Phelts, and Per Enge. 2004. High gain antenna measurements and signal characterization of the GPS satellites. In Proceedings of the 17th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS).
[21]
Dennis M Akos. 2012. Who's afraid of the spoofer? GPS/GNSS spoofing detection via automatic gain control (AGC). NAVIGATION, Journal of the Institute of Navigation.
[22]
Jon M Anderson, Katherine L Carroll, Nathan P DeVilbiss, James T Gillis, Joanna C Hinks, Brady W O'Hanlon, Joseph J Rushanan, Logan Scott, and Renee A Yazdi. 2017. Chips-message robust authentication (Chimera) for GPS civilian signals. In Proceedings of the 30th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS).
[23]
D Borio. 2011. Squaring and cross-correlation codeless tracking: analysis and generalisation. IET radar, sonar & navigation.
[24]
Gianluca Caparra, Silvia Ceccato, Nicola Laurenti, and Justan Cramer. 2017. Feasibility and limitations of self-spoofing attacks on GNSS signals with message authentication. In Proceedings of the 30th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS).
[25]
Gianluca Caparra, Nicola Laurenti, Rigas T Ioannides, and Massimo Crisci. 2014. Improving secure code estimate-replay attacks and their detection on gnss signals. Proceedings of NAVITEC.
[26]
Maxandre Coulon, Alexandre Chabory, Axel Garcia-Pena, Jérémy Vezinet, Christophe Macabiau, Philippe Estival, Pierre Ladoux, and Benoit Roturier. 2020. Characterization of meaconing and its impact on GNSS receivers. In Proceedings of the 33rd International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS).
[27]
James T Curran and Cillian O'Driscoll. 2017. Message authentication as an anti-spoofing mechanism. Working Paper.
[28]
I Fernández, V Rijmen, T Ashur, P Walker, G Seco, J Simón, C Sarto, D Burkey, and O Pozzobon. 2016. Galileo Navigation Message Authentication Specification for Signal-In-Space Testing--v1. 0. European Commission.
[29]
Ignacio Fernández-Hernández and Gonzalo Seco-Granados. 2016. Galileo NMA signal unpredictability and anti-replay protection. In International Conference on Localization and GNSS (ICL-GNSS).
[30]
Carles Fernandez-Prades, Javier Arribas, Pau Closas, Carlos Aviles, and Luis Esteve. 2011. GNSS-SDR: An open source tool for researchers and developers. In Proceedings of the 24th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS).
[31]
Francisco Gallardo and Antonio Pérez Yuste. 2020. SCER Spoofing Attacks on the Galileo Open Service and Machine Learning Techniques for End-User Protection. IEEE Access.
[32]
Joanna Hinks, James T Gillis, Perry Loveridge, Greg Myer, Joseph J Rushanan, Steve Stoyanov, et al. 2021. Signal and Data Authentication Experiments on NTS-3. In Proceedings of the 34th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS). [33] Todd E Humphreys. 2013. Detection strategy for cryptographic GNSS antispoofing. IEEE Trans. Aerospace Electron. Systems.
[33]
Todd E Humphreys, Brent M Ledvina, Mark L Psiaki, Brady W O'Hanlon, Paul M Kintner, et al. 2008. Assessing the spoofing threat: Development of a portable GPS civilian spoofer. In Proceedings of the 21st International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS).
[34]
JM. Juan Zornoza J. Sanz Subirana and M. Hernandez-Pajares. 2011. Galileo Navigation Message. https://gssc.esa.int/navipedia/index.php/Galileo_Navigation_ Message.
[35]
Martin Kotuliak, Simon Erni, Patrick Leu, Marc Roeschlin, and Srdjan ?apkun. 2022. {LTrack}: Stealthy tracking of mobile phones in {LTE}. In 31st USENIX Security Symposium.
[36]
Malte Lenhart, Marco Spanghero, and Panagiotis Papadimitratos. 2021. Relay/replay attacks on GNSS signals. In Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks.
[37]
Malte Lenhart, Marco Spanghero, and Panos Papadimitratos. 2022. Distributed and Mobile Message Level Relaying/Replaying of GNSS Signals. In International Technical Meeting of The Institute of Navigation.
[38]
Davide Margaria, Beatrice Motella, Marco Anghileri, Jean-Jacques Floch, Ignacio Fernandez-Hernandez, and Matteo Paonni. 2017. Signal structure-based authentication for civil GNSSs: Recent solutions and perspectives. IEEE signal processing magazine.
[39]
Charles E McDowell. 2007. GPS spoofer and repeater mitigation system using digital spatial nulling. US Patent 7,250,903.
[40]
Emily McMilin, David S De Lorenzo, Thomas Lee, Per Enge, et al. 2015. GPS anti-jam: A simple method of single antenna null-steering for aerial applications. In Proceedings of the ION Pacific PNT Meeting.
[41]
J Merwe, Sascha M Bartl, Cillian O'Driscoll, Alexander Rügamer, Frank Förster, Philipp Berglez, Alexander Popugaev, and Wolfgang Felber. 2020. GNSS Sequence Extraction and Reuse for Navigation. In Proceedings of the 33rd International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS).
[42]
Paul Y Montgomery. 2011. Receiver-autonomous spoofing detection: Experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer. In Radionavigation Laboratory Conference Proceedings.
[43]
NCSTITAN [n. d.]. NCS TITAN GNSS Simulator. https://www.ifen.com/products/ ncs-titan-gnss-simulator/.
[44]
Mario Nicola, Beatrice Motella, Marco Pini, and Emanuela Falletti. 2022. Galileo OSNMA Public Observation Phase: Signal Testing and Validation. IEEE Access.
[45]
Juhwan Noh, Yujin Kwon, Yunmok Son, Hocheol Shin, Dohyun Kim, Jaeyeong Choi, and Yongdae Kim. 2019. Tractor beam: Safe-hijacking of consumer drones with adaptive GPS spoofing. ACM Transactions on Privacy and Security (TOPS).
[46]
Andrew N Novick and Michael A Lombardi. 2017. A comparison of NTP servers connected to the same reference clock and the same network. In Proceedings of the 48th Annual Precise Time and Time Interval Systems and Applications Meeting.
[47]
Panagiotis Papadimitratos and Aleksandar Jovanovic. 2008. Protection and fundamental vulnerability of GNSS. In IEEE International Workshop on Satellite and Space Communications.
[48]
Adrian Perrig, Ran Canetti, J Doug Tygar, and Dawn Song. 2002. The TESLA broadcast authentication protocol. Rsa Cryptobytes.
[49]
Marco Pini, Gianluca Falco, and Letizia Lo Presti. 2012. Estimation of satelliteuser ranges through GNSS code phase measurements. Global Navigation Satellite Systems: Signal, Theory and Applications.
[50]
Anna Poltronieri, Gianluca Caparra, and Nicola Laurenti. 2018. Analysis of the Chimera Time-Binding Scheme for Authenticating GPS L1C. In ESA Workshop on Satellite NavigationTechnologies and European Workshop on GNSS Signals and Signal Processing (NAVITEC).
[51]
Mark L Psiaki and Todd E Humphreys. 2016. GNSS spoofing and detection. Proc. IEEE.
[52]
Aanjhan Ranganathan, Hildur Ólafsdóttir, and Srdjan Capkun. 2016. SPREE: A spoofing resistant gps receiver. In Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking.
[53]
Harshad Sathaye, Gerald LaMountain, Pau Closas, and Aanjhan Ranganathan. 2022. SemperFi: Anti-Spoofing GPS Receiver for UAVs. In Network and Distributed Systems Security (NDSS) Symposium.
[54]
Harshad Sathaye, Martin Strohmeier, Vincent Lenders, and Aanjhan Ranganathan. 2022. An Experimental Study of {GPS} Spoofing

Cited By

View all
  • (2023)Novel Replay Attacks Against Galileo Open Service Navigation Message AuthenticationProceedings of the 36th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2023)10.33012/2023.19397(3897-3907)Online publication date: 5-Oct-2023
  • (2023)FGI-OSNMA: An Open Source Implementation of Galileo’s Open Service Navigation Message AuthenticationProceedings of the 36th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2023)10.33012/2023.19348(3774-3785)Online publication date: 5-Oct-2023
  • (2023)Galileo-SDR-SIM: An Open-Source Tool for Generating Galileo Satellite SignalsProceedings of the 36th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2023)10.33012/2023.19254(3470-3480)Online publication date: 5-Oct-2023

Index Terms

  1. Location-independent GNSS Relay Attacks: A Lazy Attacker's Guide to Bypassing Navigation Message Authentication

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WiSec '23: Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks
    May 2023
    394 pages
    ISBN:9781450398596
    DOI:10.1145/3558482
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 June 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. delay
    2. navigation message authentication
    3. relay attack

    Qualifiers

    • Research-article

    Funding Sources

    • NSF

    Conference

    WiSec '23

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)133
    • Downloads (Last 6 weeks)12
    Reflects downloads up to 14 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Novel Replay Attacks Against Galileo Open Service Navigation Message AuthenticationProceedings of the 36th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2023)10.33012/2023.19397(3897-3907)Online publication date: 5-Oct-2023
    • (2023)FGI-OSNMA: An Open Source Implementation of Galileo’s Open Service Navigation Message AuthenticationProceedings of the 36th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2023)10.33012/2023.19348(3774-3785)Online publication date: 5-Oct-2023
    • (2023)Galileo-SDR-SIM: An Open-Source Tool for Generating Galileo Satellite SignalsProceedings of the 36th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2023)10.33012/2023.19254(3470-3480)Online publication date: 5-Oct-2023

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media