TY - GEN
T1 - SatPrint
T2 - 39th Annual ACM Symposium on Applied Computing, SAC 2024
AU - Oligeri, Gabriele
AU - Sciancalepore, Savio
AU - Sadighian, Alireza
N1 - Publisher Copyright:
© 2024 Copyright held by the owner/author(s).
PY - 2024/4/8
Y1 - 2024/4/8
N2 - Detecting spoofing attacks on a satellite infrastructure is a challenging task, due to the wide coverage, the low received power from the satellite beams and finally the opportunistic nature of radio broadcasting. Although message authentication can be implemented at several communication layers, only a few solutions have been provided at the physical layer - -this one exposing features that are invaluable for authentication purposes. Currently available solutions provide physical-layer authentication of the transmitter by combining deep learning and physical-layer features, thus requiring a long and computationally-intensive training process for any new transmitter joining the network. In this work, we propose SatPrint, a solution capable of detecting satellite spoofing attacks by fingerprinting the noise fading process associated with the satellite communication channel. Indeed, the fading of a satellite link is different from the one of a terrestrial link - -used very often to launch spoofing attacks - -thus allowing one to discriminate between the two. SatPrint does not require retraining when new transducers join the network, and does not rely on hardware impairments of both the transmitter and the receiver. SatPrint has been tested with real satellite and spoofed terrestrial radio measurements, under several different scenario configurations. We prove that SatPrint can effectively discriminate between a satellite transmitter and a fake terrestrial one, with an accuracy greater than 0.99 for all the considered configurations.
AB - Detecting spoofing attacks on a satellite infrastructure is a challenging task, due to the wide coverage, the low received power from the satellite beams and finally the opportunistic nature of radio broadcasting. Although message authentication can be implemented at several communication layers, only a few solutions have been provided at the physical layer - -this one exposing features that are invaluable for authentication purposes. Currently available solutions provide physical-layer authentication of the transmitter by combining deep learning and physical-layer features, thus requiring a long and computationally-intensive training process for any new transmitter joining the network. In this work, we propose SatPrint, a solution capable of detecting satellite spoofing attacks by fingerprinting the noise fading process associated with the satellite communication channel. Indeed, the fading of a satellite link is different from the one of a terrestrial link - -used very often to launch spoofing attacks - -thus allowing one to discriminate between the two. SatPrint does not require retraining when new transducers join the network, and does not rely on hardware impairments of both the transmitter and the receiver. SatPrint has been tested with real satellite and spoofed terrestrial radio measurements, under several different scenario configurations. We prove that SatPrint can effectively discriminate between a satellite transmitter and a fake terrestrial one, with an accuracy greater than 0.99 for all the considered configurations.
KW - ACM proceedings
KW - LATEX
KW - text tagging
UR - http://www.scopus.com/inward/record.url?scp=85197724112&partnerID=8YFLogxK
U2 - 10.1145/3605098.3636011
DO - 10.1145/3605098.3636011
M3 - Conference contribution
AN - SCOPUS:85197724112
T3 - Proceedings of the ACM Symposium on Applied Computing
SP - 177
EP - 185
BT - 39th Annual ACM Symposium on Applied Computing, SAC 2024
PB - Association for Computing Machinery
Y2 - 8 April 2024 through 12 April 2024
ER -