Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks
- URL: http://arxiv.org/abs/2402.05042v2
- Date: Thu, 4 Apr 2024 09:13:48 GMT
- Title: Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks
- Authors: Joshua Smailes, Edd Salkield, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic,
- Abstract summary: We evaluate the effectiveness of radio fingerprinting techniques under interference and jamming attacks.
We conclude that it takes a similar amount of jamming power in order to disrupt the fingerprint as it does to jam the message contents itself.
- Score: 13.857226688708353
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In the wake of increasing numbers of attacks on radio communication systems, a range of techniques are being deployed to increase the security of these systems. One such technique is radio fingerprinting, in which the transmitter can be identified and authenticated by observing small hardware differences expressed in the signal. Fingerprinting has been explored in particular in the defense of satellite systems, many of which are insecure and cannot be retrofitted with cryptographic security. In this paper, we evaluate the effectiveness of radio fingerprinting techniques under interference and jamming attacks, usually intended to deny service. By taking a pre-trained fingerprinting model and gathering a new dataset in which different levels of Gaussian noise and tone jamming have been added to the legitimate signal, we assess the attacker power required in order to disrupt the transmitter fingerprint such that it can no longer be recognized. We compare this to Gaussian jamming on the data portion of the signal, obtaining the remarkable result that transmitter fingerprints are still recognizable even in the presence of moderate levels of noise. Through deeper analysis of the results, we conclude that it takes a similar amount of jamming power in order to disrupt the fingerprint as it does to jam the message contents itself, so it is safe to include a fingerprinting system to authenticate satellite communication without opening up the system to easier denial-of-service attacks.
Related papers
- Preventing Radio Fingerprinting through Friendly Jamming [5.074726108522963]
Radio frequency fingerprinting enables a passive receiver to recognize and authenticate a transmitter without the need for cryptographic tools.
We examine the hostile usage of radio frequency fingerprinting, which facilitates the unauthorized tracking of wireless devices in the field by malicious entities.
We suggest a method to sanitize the transmitted signal of its fingerprint using a jammer, deployed on purpose to improve devices' anonymity on the channel.
arXiv Detail & Related papers (2024-07-11T09:01:46Z) - Erasing Radio Frequency Fingerprints via Active Adversarial Perturbation [19.88283575742985]
We consider a common RF fingerprinting scenario, where machine learning models are trained from pilot signal data for identification.
A novel adversarial attack solution is designed to generate proper perturbations, whereby the pilot signal can hide the hardware feature and misclassify the model.
Extensive experiment results demonstrate that the RF fingerprints can be effectively erased to protect the user privacy.
arXiv Detail & Related papers (2024-06-11T15:16:05Z) - AdvGPS: Adversarial GPS for Multi-Agent Perception Attack [47.59938285740803]
This study investigates whether specific GPS signals can easily mislead the multi-agent perception system.
We introduce textscAdvGPS, a method capable of generating adversarial GPS signals which are also stealthy for individual agents within the system.
Our experiments on the OPV2V dataset demonstrate that these attacks substantially undermine the performance of state-of-the-art methods.
arXiv Detail & Related papers (2024-01-30T23:13:41Z) - Task-Oriented Communications for NextG: End-to-End Deep Learning and AI
Security Aspects [78.84264189471936]
NextG communication systems are beginning to explore shifting this design paradigm to reliably executing a given task such as in task-oriented communications.
Wireless signal classification is considered as the task for the NextG Radio Access Network (RAN), where edge devices collect wireless signals for spectrum awareness and communicate with the NextG base station (gNodeB) that needs to identify the signal label.
Task-oriented communications is considered by jointly training the transmitter, receiver and classifier functionalities as an encoder-decoder pair for the edge device and the gNodeB.
arXiv Detail & Related papers (2022-12-19T17:54:36Z) - Deep-Learning-Based Device Fingerprinting for Increased LoRa-IoT
Security: Sensitivity to Network Deployment Changes [10.698553177585973]
We study and analyze the sensitivity of LoRa RF fingerprinting to various network setting changes.
We propose a new fingerprinting technique that exploits out-of-band distortion information to increase the fingerprinting accuracy.
Our results show that fingerprinting does relatively well when the learning models are trained and tested under the same settings.
arXiv Detail & Related papers (2022-08-31T16:53:05Z) - Hierarchical Perceptual Noise Injection for Social Media Fingerprint
Privacy Protection [106.5308793283895]
fingerprint leakage from social media raises a strong desire for anonymizing shared images.
To guard the fingerprint leakage, adversarial attack emerges as a solution by adding imperceptible perturbations on images.
We propose FingerSafe, a hierarchical perceptual protective noise injection framework to address the mentioned problems.
arXiv Detail & Related papers (2022-08-23T02:20:46Z) - On the vulnerability of fingerprint verification systems to fake
fingerprint attacks [57.36125468024803]
A medium-size fake fingerprint database is described and two different fingerprint verification systems are evaluated on it.
Results for an optical and a thermal sweeping sensors are given.
arXiv Detail & Related papers (2022-07-11T12:22:52Z) - SpoofGAN: Synthetic Fingerprint Spoof Images [47.87570819350573]
A major limitation to advances in fingerprint spoof detection is the lack of publicly available, large-scale fingerprint spoof datasets.
This work aims to demonstrate the utility of synthetic (both live and spoof) fingerprints in supplying these algorithms with sufficient data.
arXiv Detail & Related papers (2022-04-13T16:27:27Z) - Responsible Disclosure of Generative Models Using Scalable
Fingerprinting [70.81987741132451]
Deep generative models have achieved a qualitatively new level of performance.
There are concerns on how this technology can be misused to spoof sensors, generate deep fakes, and enable misinformation at scale.
Our work enables a responsible disclosure of such state-of-the-art generative models, that allows researchers and companies to fingerprint their models.
arXiv Detail & Related papers (2020-12-16T03:51:54Z) - Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi
via Obfuscating Radiometric Fingerprints [8.89054576694426]
The intrinsic hardware imperfection of WiFi chipsets manifests itself in the transmitted signal, leading to a unique radiometric fingerprint.
Recent works propose practical fingerprinting solutions that can be readily implemented in commercial-off-the-shelf devices.
We show analytically and experimentally that these solutions are highly vulnerable to impersonation attacks.
We propose RF-Veil, a radiometric fingerprinting solution that not only is robust against impersonation attacks but also protects user privacy.
arXiv Detail & Related papers (2020-11-25T11:10:59Z) - An Overview of Fingerprint-Based Authentication: Liveness Detection and
Beyond [0.0]
We focus on methods to detect physical liveness, defined as techniques that can be used to ensure that a living human user is attempting to authenticate on a system.
We analyze how effective these methods are at preventing attacks where a malicious entity tries to trick a fingerprint-based authentication system to accept a fake finger as a real one.
arXiv Detail & Related papers (2020-01-24T20:07:53Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.