Civilian-GNSS is vulnerable to signal spoofing attacks, and countermeasures based on cryptographic authentication are being proposed to protect against these attacks. Both Galileo and GPS are currently testing broadcast authentication techniques based on the delayed key disclosure to validate the integrity of navigation messages. These authentication mechanisms have proven secure against record now and replay later attacks, as navigation messages become invalid after keys are released. This work analyzes the security guarantees of cryptographically protected GNSS signals and shows the possibility of spoofing a receiver to an arbitrary location without breaking any cryptographic operation. In contrast to prior work, we demonstrate the ability of an attacker to receive signals close to the victim receiver and generate spoofing signals for a different target location without modifying the navigation message contents. Our strategy exploits the essential common reception and transmission time method used to estimate pseudorange in GNSS receivers, thereby rendering any cryptographic authentication useless. We evaluate our attack on a commercial receiver (ublox M9N) and a software-defined GNSS receiver (GNSS-SDR) using a combination of open-source tools, commercial GNSS signal generators, and software-defined radio hardware platforms. Our results show that it is possible to spoof a victim receiver to locations around 4000 km away from the true location without requiring any high-speed communication networks or modifying the message contents. Through this work, we further highlight the fundamental limitations in securing a broadcast signaling-based localization system even if all communications are cryptographically protected.
翻译:民用导航卫星系统很容易受到信号威胁的攻击,而且正在提议基于加密认证的反措施来防范这些攻击。伽利略和全球定位系统目前正在根据延迟的关键披露对广播认证技术进行测试,以验证导航信息的完整性。这些认证机制现已证明有防范记录的安全,并随着导航信息在钥匙发布后变得无效而重新播放以后的攻击。这项工作分析了加密保护的全球导航卫星系统信号的安全保障,并表明有可能在不中断任何加密操作的情况下将接收器潜入任意地点。与以前的工作不同,我们展示了攻击者在不修改导航信息内容的情况下,能够接收靠近受害者接收器的信号,并为不同目标地点生成假信号。我们的战略利用了用于估计全球导航卫星系统接收器的伪体的基本通用接收和传输时间方法,从而使任何加密认证毫无用处。我们用公开源工具组合、商用全球导航卫星系统信号发电机和软件定义的全球导航卫星系统接收器(GNSS-SDR)在不中断任何加密的通信工具、商业导航卫星系统信号生成器和软件定位的定位系统在40公里以外的基本通信站点,我们的成果显示有可能在高频轨道上对数据库进行安全修正。我们通过高清晰的通信平台。我们的成果显示,要求在40公里上的所有无线电定位服务器定位定位上进行安全。