Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks

Joshua Smailes,Edd Salkield,Sebastian Köhler,Simon Birnbach,Martin Strohmeier,Ivan Martinovic
DOI: https://doi.org/10.14722/spacesec.2024.23054
2024-04-04
Abstract:In the wake of increasing numbers of attacks on radio communication systems, a range of techniques are being deployed to increase the security of these systems. One such technique is radio fingerprinting, in which the transmitter can be identified and authenticated by observing small hardware differences expressed in the signal. Fingerprinting has been explored in particular in the defense of satellite systems, many of which are insecure and cannot be retrofitted with cryptographic security.
Computer Science
What problem does this paper attempt to address?
The problem that this paper attempts to solve is: How robust is satellite fingerprinting technology in the face of jamming and blocking attacks? Specifically, the authors evaluated the effectiveness of pre - trained fingerprinting models when different levels of Gaussian noise and tone jamming were added to the legitimate signal. They attempted to determine how much power an attacker would need to break the transmitter's fingerprint so that it could not be recognized, and compared this with the power required to traditionally jam communication content. ### Core Problems of the Paper 1. **Background**: - As the number of attacks on radio communication systems increases, in order to improve the security of these systems, researchers have explored a variety of techniques. - One of these techniques is radio fingerprinting, which identifies and verifies transmitters by observing small hardware differences in the signal. - Especially in satellite systems, many systems lack encryption security measures, so fingerprinting technology is used to enhance security. 2. **Problem Description**: - The authors are concerned with the robustness of radio fingerprinting technology in the face of jamming and blocking attacks. - Jamming and blocking attacks are usually aimed at denial - of - service, by adding noise or signals of specific frequencies to the legitimate signal, making it impossible for the receiver to correctly decode the signal. - If fingerprinting technology is used to protect terrestrial systems, an attacker can jam the fingerprint to make the incoming message rejected, thus making it easier to carry out a denial - of - service attack. 3. **Research Objectives**: - Evaluate the effectiveness of radio fingerprinting technology under different levels of jamming. - Determine how much power an attacker would need to break the transmitter's fingerprint so that it could not be recognized. - Compare this result with the power required to traditionally jam communication content to evaluate whether fingerprinting technology increases the risk of denial - of - service attacks. ### Main Contributions - **Experimental Design**: - Use the SATIQ system as a case study, focusing on the Iridium satellite constellation. - Collect 540,066 messages containing different levels of noise and create further datasets by adding synthetic jamming to clean signals through software. - **Experimental Results**: - It was found that in order to break the transmitter fingerprint through jamming, the required transmission power is similar to or greater than the power required to break the message content through traditional jamming techniques. - The results show that physical - layer satellite fingerprinting technology is highly robust against jamming attacks and does not increase the risk of denial - of - service attacks. ### Conclusion By in - depth analysis of the experimental results, the authors conclude that radio fingerprinting technology exhibits good robustness in the face of jamming attacks, and its use does not make the system more vulnerable to the impact of denial - of - service attacks. This provides an important security guarantee basis for the application of fingerprinting technology in satellite communications.