Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3448300.3469132acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
short-paper
Open access

Orbit-based authentication using TDOA signatures in satellite networks

Published: 28 June 2021 Publication History

Abstract

Given the nature of satellites orbiting the Earth on a fixed trajectory, in principle, it is interesting to investigate how this invariant can be exploited for security purposes. In particular, satellite orbit information can be retrieved from public databases. Using time difference of arrival (TDOA) measurements from multiple receivers, we can check this orbit information against a corresponding TDOA-based signature of the satellite. In that sense, we propose an orbit-based authentication scheme for down-link satellite communications in this paper. To investigate the properties and fundamentals of our novel TDOA signature scheme we study two satellite systems at different altitudes: Iridium and Starlink.
Clearly, many challenging questions with respect to the feasibility and effectiveness of this authentication scheme arise; to name some: how many receivers are necessary, how should they be distributed, and how many consecutive measurements do we need for the TDOA signatures. We address these questions by a full factorial experimental design using a simulation framework, we developed for that purpose. Besides a deep understanding about the effects of the major factors on the authentication performance, we find that in adequate configurations, even under a versatile attacker, the orbit-based authentication scheme is able to achieve low false authentication rates well below 1% at false rejection rates of about 2%, for both, Iridium and Starlink satellites.

References

[1]
Brandon Rhodes at pypi.org. sgp4: Track earth satellite TLE orbits using up-to-date 2020 version of SGP4. https://pypi.org/project/sgp4/. Accessed: 2021-03-26.
[2]
Ken Behrendt and Ken Fodero. The perfect time: An examination of time- synchronization techniques. Schweitzer Engineering Laboratories, 01 2005.
[3]
Yiu-Tong Chan, H Yau Chin Hang, and Pak-chung Ching. Exact and approximate maximum likelihood localization algorithms. IEEE Transactions on Vehicular Technology, 55(1):10--16, 2006.
[4]
Yiu-Tong Chan and KC Ho. A simple and efficient estimator for hyperbolic location. IEEE Transactions on signal processing, 42(8):1905--1915, 1994.
[5]
North American Aerospace Defense Command. Celestrac: Norad two-line element sets current data. https://www.celestrak.com/NORAD/elements/. Accessed: 2021-03-26.
[6]
Astropy community. The astropy project. https://www.astropy.org/. Accessed: 2021-03-26.
[7]
Dorothy E Denning and Peter F MacDoran. Location-based authentication: Grounding cyberspace for better security. Computer Fraud & Security, 1996(2):12--16, 1996.
[8]
Great Scott Gadgets. Hackrf one. https://greatscottgadgets.com/hackrf/one/. Accessed: 2021-03-26.
[9]
GPS.gov. Gps accuracy. https://www.gps.gov/systems/gps/performance/accuracy/. Accessed: 2021-03-26.
[10]
KC Ho and Wenwei Xu. An accurate algebraic solution for moving source location using TDOA and FDOA measurements. IEEE Transactions on Signal Processing, 52(9):2453--2463, 2004.
[11]
Kai Jansen, Nils Ole Tippenhauer, and Christina Pöpper. Multi-receiver gps spoofing detection: Error models and realization. In Proceedings of the 32nd Annual Conference on Computer Security Applications, pages 237--250, 2016.
[12]
TS Kelso et al. Validation of SGP4 and IS-GPS-200D against GPS precision ephemerides. Technical White Paper, 2007.
[13]
Creon Levit and William Marshall. Improved orbit predictions using two-line elements. Advances in Space Research, 47(7):1107--1115, 2011.
[14]
Zhixin Liu, Yongjun Zhao, Dexiu Hu, and Chengcheng Liu. A moving source localization method for distributed passive sensor using TDOA and FDOA measurements. International journal of antennas and propagation, 2016, 2016.
[15]
Shivam Lohani and Rinki Joshi. Satellite network security. In Int. Conf. on Emerging Trends in Communication, Control and Computing. IEEE, 2020.
[16]
Daniel Moser, Patrick Leu, Vincent Lenders, Aanjhan Ranganathan, Fabio Ricciato, and Srdjan Capkun. Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures. In 22nd Annual International Conference on Mobile Computing and Networking, pages 375--386, 2016.
[17]
Gabriele Oligeri, Simone Raponi, Savio Sciancalepore, and Roberto Di Pietro. Past-ai: Physical-layer authentication of satellite transmitters via deep learning. arXiv preprint arXiv:2010.05470, 2020.
[18]
Gabriele Oligeri, Savio Sciancalepore, and Roberto Di Pietro. Gnss spoofing detection via opportunistic iridium signals. In 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pages 42--52, 2020.
[19]
James Pavur, Daniel Moser, Vincent Lenders, and Ivan Martinovic. Secrets in the sky: on privacy and infrastructure security in dvb-s satellite broadband. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, pages 277--284, 2019.
[20]
Pervices. Cyan SDR. http://www.pervices.com/. Accessed: 2021-03-26.
[21]
Mark L Psiaki and Todd E Humphreys. Gnss spoofing and detection. Proceedings of the IEEE, 104(6):1258--1270, 2016.
[22]
Kathleen Riesing. Two line element sets of cubesats in leo: Accuracy assessment and estimation techniques for improvement. 29th Annual AIAA/USU Conference on Small Satellites, 2015.
[23]
Ruben Santamarta. A wake-up call for satcom security. Technical Paper, 2014.
[24]
Dave Singelee and Bart Preneel. Location verification using secure distance bounding protocols. In IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005., pages 7--pp. IEEE, 2005.
[25]
Solonet. XRAD-3200 SDR. http://www.solenet.com/products/xrad-3200.html. Accessed: 2021-03-26.
[26]
Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, and Srdjan Capkun. On the requirements for successful gps spoofing attacks. In 18th ACM conference on Computer and Communications Security, pages 75--86, 2011.
[27]
David A Vallado and Paul J Cefola. Two-line element sets-practice and use. In 63rd International Astronautical Congress, Naples, Italy, 2012.
[28]
David A Vallado, B Bastida Virgili, and Tim Flohrer. Improved ssa through orbit determination of two-line element sets. In ESA Space Debris Conference, 2013.
[29]
Johnny L Worthy III and Marcus J Holzinger. Uncued satellite initial orbit determination using signals of opportunity. In AAS/AIAA Astrodynamics Specialist Conference, 2015.
[30]
Jie Yang, Yingying Chen, Wade Trappe, and Jay Cheng. Determining the number of attackers and localizing multiple adversaries in wireless spoofing attacks. In IEEE INFOCOM 2009, pages 666--674. IEEE, 2009.

Cited By

View all
  • (2024)Securing Cislunar Missions: A Location-Based Authentication Approach2024 Security for Space Systems (3S)10.23919/3S60530.2024.10592290(1-8)Online publication date: 27-May-2024
  • (2024)Toward Intelligent Access Authentication in Integrated Satellite-Terrestrial Backhaul Networks: Focusing on Spatial-Temporal CharacteristicsICC 2024 - IEEE International Conference on Communications10.1109/ICC51166.2024.10622733(1358-1363)Online publication date: 9-Jun-2024
  • (2024)Revolutionizing Future Connectivity: A Contemporary Survey on AI-Empowered Satellite-Based Non-Terrestrial Networks in 6GIEEE Communications Surveys & Tutorials10.1109/COMST.2023.334714526:2(1279-1321)Online publication date: Oct-2025
  • Show More Cited By

Index Terms

  1. Orbit-based authentication using TDOA signatures in satellite networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
      June 2021
      412 pages
      ISBN:9781450383493
      DOI:10.1145/3448300
      Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 28 June 2021

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Short-paper

      Conference

      WiSec '21
      Sponsor:

      Acceptance Rates

      WiSec '21 Paper Acceptance Rate 34 of 121 submissions, 28%;
      Overall Acceptance Rate 98 of 338 submissions, 29%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)273
      • Downloads (Last 6 weeks)34
      Reflects downloads up to 09 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Securing Cislunar Missions: A Location-Based Authentication Approach2024 Security for Space Systems (3S)10.23919/3S60530.2024.10592290(1-8)Online publication date: 27-May-2024
      • (2024)Toward Intelligent Access Authentication in Integrated Satellite-Terrestrial Backhaul Networks: Focusing on Spatial-Temporal CharacteristicsICC 2024 - IEEE International Conference on Communications10.1109/ICC51166.2024.10622733(1358-1363)Online publication date: 9-Jun-2024
      • (2024)Revolutionizing Future Connectivity: A Contemporary Survey on AI-Empowered Satellite-Based Non-Terrestrial Networks in 6GIEEE Communications Surveys & Tutorials10.1109/COMST.2023.334714526:2(1279-1321)Online publication date: Oct-2025
      • (2024)State-of-the-Art Authentication Measures in Satellite Communication Networks: A Comprehensive AnalysisIEEE Access10.1109/ACCESS.2024.346725312(142241-142264)Online publication date: 2024
      • (2023)Space Odyssey: An Experimental Software Security Analysis of Satellites2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10351029(1-19)Online publication date: May-2023
      • (2023)Authentication for Satellite Communication Systems Using Physical CharacteristicsIEEE Open Journal of Vehicular Technology10.1109/OJVT.2022.32186094(48-60)Online publication date: 2023
      • (2022)Physical Layer Authentication for Satellite Communication Systems Using Machine LearningIEEE Open Journal of the Communications Society10.1109/OJCOMS.2022.32258463(2380-2389)Online publication date: 2022
      • (2022)Machine Learning-Based Screening and Measurement to Measurement Association for Navigation in GNSS Spoofing EnvironmentIEEE Sensors Journal10.1109/JSEN.2022.321434922:23(23423-23435)Online publication date: 1-Dec-2022
      • (2022)GPS Spoofing Detection and Mitigation for Drones Using Distributed Radar Tracking and FusionIEEE Sensors Journal10.1109/JSEN.2022.316894022:11(11122-11134)Online publication date: 1-Jun-2022
      • (2022)LEO Satellite Authentication using Physical Layer Features with Support Vector Machine2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)10.1109/COMNETSAT56033.2022.9994421(277-282)Online publication date: 3-Nov-2022
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media