Global Navigation Satellite Systems (GNSS) are ubiquitously relied upon for positioning and timing. Detection and prevention of attacks against GNSS have been researched over the last decades, but many of these attacks and countermeasures were evaluated based on simulation. This work contributes to the experimental investigation of GNSS vulnerabilities, implementing a relay/replay attack with off-the-shelf hardware. Operating at the signal level, this attack type is not hindered by cryptographically protected transmissions, such as Galileo's Open Signals Navigation Message Authentication (OS-NMA). The attack we investigate involves two colluding adversaries, relaying signals over large distances, to effectively spoof a GNSS receiver. We demonstrate the attack using off-the-shelf hardware, we investigate the requirements for such successful colluding attacks, and how they can be enhanced, e.g., allowing for finer adversarial control over the victim receiver.
翻译:全球导航卫星系统(GNSS)在定位和授时方面被普遍依赖。过去几十年来一直在研究对全球导航卫星系统的攻击的探测和预防,但其中许多攻击和反措施都是以模拟为基础的评价,这项工作有助于对全球导航卫星系统的脆弱性进行实验性调查,用现成的硬件进行中继/回弹攻击。在信号一级操作,这种攻击类型不受加密保护的传输的阻碍,例如伽利略的开放信号导航信息验证(OS-NMA)等。我们调查的攻击涉及两个串通对手,在很远的距离上传递信号,以有效击败全球导航卫星系统接收器。我们用现成的硬件演示攻击,我们调查这种成功串通攻击的要求,以及如何加强这些要求,例如,允许对受害者接收器进行较严格的对抗控制。