论文标题
密码学还不够:继电器攻击对身份验证的GNSS信号
Cryptography Is Not Enough: Relay Attacks on Authenticated GNSS Signals
论文作者
论文摘要
平民 - gnss很容易受到信号欺骗攻击的攻击,并且提出了基于加密身份验证的对策,以防止这些攻击。 Galileo和GPS目前都根据延迟的密钥披露来测试广播身份验证技术,以验证导航消息的完整性。这些身份验证机制已被证明是安全的,现在可以防止记录并重播攻击,因为释放键后导航消息无效。这项工作分析了受密码保护的GNS信号的安全保证,并显示了将接收器欺骗到任意位置而不会破坏任何加密操作的可能性。与先前的工作相反,我们证明了攻击者接收靠近受害者接收器的信号并为不同目标位置生成欺骗信号的能力,而无需修改导航消息内容。我们的策略利用了用于估计GNSS接收器中伪曲的必不可少的常见接收和传输时间方法,从而使任何无用的认证毫无用处。我们使用开源工具,商用GNSS信号生成器以及软件定义的无线电硬件平台来评估对商业接收器(UBLOX M9N)和软件定义的GNSS接收器(GNSS-SDR)的攻击。我们的结果表明,可以将受害者接收器欺骗到距离真实位置约4000公里的位置,而无需任何高速通信网络或修改消息内容。通过这项工作,我们进一步强调了确保基于广播信号的本地化系统的基本限制,即使所有通信受到密码保护。
Civilian-GNSS is vulnerable to signal spoofing attacks, and countermeasures based on cryptographic authentication are being proposed to protect against these attacks. Both Galileo and GPS are currently testing broadcast authentication techniques based on the delayed key disclosure to validate the integrity of navigation messages. These authentication mechanisms have proven secure against record now and replay later attacks, as navigation messages become invalid after keys are released. This work analyzes the security guarantees of cryptographically protected GNSS signals and shows the possibility of spoofing a receiver to an arbitrary location without breaking any cryptographic operation. In contrast to prior work, we demonstrate the ability of an attacker to receive signals close to the victim receiver and generate spoofing signals for a different target location without modifying the navigation message contents. Our strategy exploits the essential common reception and transmission time method used to estimate pseudorange in GNSS receivers, thereby rendering any cryptographic authentication useless. We evaluate our attack on a commercial receiver (ublox M9N) and a software-defined GNSS receiver (GNSS-SDR) using a combination of open-source tools, commercial GNSS signal generators, and software-defined radio hardware platforms. Our results show that it is possible to spoof a victim receiver to locations around 4000 km away from the true location without requiring any high-speed communication networks or modifying the message contents. Through this work, we further highlight the fundamental limitations in securing a broadcast signaling-based localization system even if all communications are cryptographically protected.