skip to main content
10.1145/3317549.3319720acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Digital radio signal cancellation attacks: an experimental evaluation

Published:15 May 2019Publication History

ABSTRACT

Attacker models are the cornerstone of any security assessment. As attacker's capabilities evolve over time, it is key to re-evaluate periodically if attacker models that were deemed unrealistic in the past might not pose a possible threat today. In this work, we evaluate the threat of wireless radio signal cancellation attacks in the face of recent advancements in software-defined radio attacker capabilities. Unlike classical radio interference or jamming attacker models which add noise to the legitimate communication, signal cancellation attacks aim at interfering destructively with the legitimate signal in order to remove those signals from the spectrum. While signal cancellation attacks were deemed unrealistic in the analogue domain, we analyse the system requirements to perform such attacks digitally using SDRs and evaluate the feasibility to launch such attacks against wireless communication systems such as GPS. Our evaluation reveals that signal cancellation attacks that manage to attenuate up to 40 dB of the signal at the receiver are feasible over the air. We further show that even complex CDMA signals such as GPS can be attenuated by 30 dB, even below a receiver's noise floor. These results indicate that digital signal cancellation attacks - especially against systems like GPS - should not be considered impossible per se, but deserve consideration when assessing the threat of attacks on wireless communication systems.

References

  1. J.P. Barboux. 1994. Practical Real Time Kinematic Applications of GPS. Proceedings of DSNS 94, London, UK (1994).Google ScholarGoogle Scholar
  2. Dinesh Bharadia, Emily McMilin, and Sachin Katti. 2013. Full Duplex Radios. In Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM (SIGCOMM '13). ACM, New York, NY, USA, 375--386. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Y. R. Chien. 2015. Design of GPS Anti-Jamming Systems Using Adaptive Notch Filters. IEEE Systems Journal 9, 2 (June 2015), 451--460.Google ScholarGoogle ScholarCross RefCross Ref
  4. T. C. Clancy. 2011. Efficient OFDM Denial: Pilot Jamming and Pilot Nulling. In 2011 IEEE International Conference on Communications (ICC). 1--5.Google ScholarGoogle Scholar
  5. B. DeBruhl and P. Tague. 2013. How to jam without getting caught: Analysis and empirical study of stealthy periodic jamming. In 2013 IEEE International Conference on Sensing, Communications and Networking (SECON). 496--504.Google ScholarGoogle Scholar
  6. Philip K. Dick. 1968. Do Androids Dream Of Electric Sheep? Ballantine Books.Google ScholarGoogle Scholar
  7. Ettus Research. 2019. X300/X310 - Ettus Knowledge Base. https://kb.ettus.com/X300/X310#Option:_GPS_Disciplined.2C_Oven-Controlled_Oscillator_.28GPSDO.29 Accessed 2019-01-20.Google ScholarGoogle Scholar
  8. Yanming Feng and Jinling Wang. 2008. GPS RTK performance characteristics and analysis. Journal of Global Positioning Systems 7, 1 (2008), 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  9. C. Fernández-Prades, J. Arribas, P. Closas, C. Avilés, and L. Esteve. 2011. GNSS-SDR: An Open Source Tool For Researchers and Developers. In Proc. of the ION GNSS 2011 Conference. Portland, Oregon.Google ScholarGoogle Scholar
  10. Nirnimesh Ghose, Loukas Lazos, and Ming Li. 2017. HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 433--450. https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/ghose Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi, and Kevin Fu. 2011. They Can Hear Your Heartbeats: Non-invasive Security for Implantable Medical Devices. In Proceedings of the ACM SIGCOMM 2011 Conference (SIGCOMM '11). ACM, New York, NY, USA, 2--13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Alan Grant, Paul Williams, Nick Ward, and Sally Basker. 2009. GPS Jamming and the Impact on Maritime Navigation. Journal of Navigation 62, 2 (2009), 173--187.Google ScholarGoogle ScholarCross RefCross Ref
  13. Todd Humphreys. 2017. Springer Handbook of Global Navigation Satellite Systems. Springer International Publishing, Cham, 469--503.Google ScholarGoogle Scholar
  14. IGS. {n. d.}. IGS Products - GPS Satellite Ephemerides / Satellite & Station Clocks. http://www.igs.org/products. Accessed: 2016-12--7.Google ScholarGoogle Scholar
  15. osqzss. 2018. Software-Defined GPS Signal Simulator. https://github.com/osqzss/gps-sdr-sim Accessed 2019-01-20.Google ScholarGoogle Scholar
  16. M. Petracca, M. Vari, F. Vatalaro, and G. Lubello. 2012. Performance evaluation of GSM robustness against smart jamming attacks. In 2012 5th International Symposium on Communications, Control and Signal Processing. 1--6.Google ScholarGoogle Scholar
  17. Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, and Srdjan Capkun. 2011. Investigation of Signal and Message Manipulations on the Wireless Channel. In Proceedings of the 16th European Conference on Research in Computer Security (ESORICS'11). Springer-Verlag, Berlin, Heidelberg, 40--59. http://dl.acm.org/citation.cfm?id=2041225.2041229 Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. L. Psiaki and T. E. Humphreys. 2016. GNSS Spoofing and Detection. Proc. IEEE 104, 6 (June 2016), 1258--1270.Google ScholarGoogle ScholarCross RefCross Ref
  19. Aanjhan Ranganathan, Hildur Ólafsdóttir, and Srdjan Capkun. 2016. SPREE: A Spoofing Resistant GPS Receiver. In Proceedings of the 22Nd Annual International Conference on Mobile Computing and Networking (MobiCom '16). ACM, New York, NY, USA, 348--360. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J.S. Subirana, J.M.J. Zornoza, M. Hernández-Pajares, European Space Agency, and K. Fletcher. 2013. GNSS Data Processing. ESA Communications.Google ScholarGoogle Scholar
  21. US Department of Defence. 2008. GPS SPS Performance Standard. Online: https://www.gps.gov/technical/ps/2008-SPS-performance-standard.pdf.Google ScholarGoogle Scholar
  22. David L. M. Warren and John F. Raquet. 2003. "Broadcast vs. precise GPS ephemerides: a historical perspective". GPS Solutions 7, 3 (2003), 151--156.Google ScholarGoogle ScholarCross RefCross Ref
  23. Kyle D. Wesson, Jason N. Gross, Todd E. Humphreys, and Brian L. Evans. 2017. GNSS Signal Authentication via Power and Distortion Monitoring. arXiv:arXiv:1702.06554Google ScholarGoogle Scholar
  24. Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt, and Vincent Lenders. 2011. Reactive Jamming in Wireless Networks: How Realistic is the Threat?. In Proceedings of the Fourth ACM Conference on Wireless Network Security (WiSec '11). ACM, New York, NY, USA, 47--52. http://dl.acm.org/authorize?431905 Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. L. Xiao, T. Chen, J. Liu, and H. Dai. 2015. Anti-Jamming Transmission Stackelberg Game With Observation Errors. IEEE Communications Letters 19, 6 (June 2015), 949--952.Google ScholarGoogle ScholarCross RefCross Ref
  26. Wenyuan Xu, Ke Ma, W. Trappe, and Yanyong Zhang. 2006. Jamming sensor networks: attack and defense strategies. IEEE Network 20, 3 (May 2006), 41--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. S. Yubo, Z. Kan, Y. Bingxin, and C. Xi. 2010. A GSM/UMTS Selective Jamming System. In 2010 International Conference on Multimedia Information Networking and Security. 813--815. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks
    May 2019
    359 pages
    ISBN:9781450367264
    DOI:10.1145/3317549

    Copyright © 2019 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 15 May 2019

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate98of338submissions,29%

    Upcoming Conference

    WiSec '24

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader