Orbit-based authentication using TDOA signatures in satellite networks

Given the nature of satellites orbiting the Earth on a fixed trajectory, in principle, it is interesting to investigate how this invariant can be exploited for security purposes. In particular, satellite orbit information can be retrieved from public databases. Using time difference of arrival (TDOA) measurements from multiple receivers, we can check this orbit information against a corresponding TDOA-based signature of the satellite. In that sense, we propose an orbit-based authentication scheme for down-link satellite communications in this paper. To investigate the properties and fundamentals of our novel TDOA signature scheme we study two satellite systems at different altitudes: Iridium and Starlink. Clearly, many challenging questions with respect to the feasibility and effectiveness of this authentication scheme arise; to name some: how many receivers are necessary, how should they be distributed, and how many consecutive measurements do we need for the TDOA signatures. We address these questions by a full factorial experimental design using a simulation framework, we developed for that purpose. Besides a deep understanding about the effects of the major factors on the authentication performance, we find that in adequate configurations, even under a versatile attacker, the orbit-based authentication scheme is able to achieve low false authentication rates well below 1% at false rejection rates of about 2%, for both, Iridium and Starlink satellites.

[1]  Roberto Di Pietro,et al.  GNSS spoofing detection via opportunistic IRIDIUM signals , 2020, WISEC.

[2]  Todd E. Humphreys,et al.  GNSS Spoofing and Detection , 2016, Proceedings of the IEEE.

[3]  K. C. Ho,et al.  A simple and efficient estimator for hyperbolic location , 1994, IEEE Trans. Signal Process..

[4]  Srdjan Capkun,et al.  On the requirements for successful GPS spoofing attacks , 2011, CCS '11.

[5]  Dorothy E. Denning,et al.  Location-based authentication: Grounding cyberspace for better security , 1996 .

[6]  Srdjan Capkun,et al.  Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures , 2016, MobiCom.

[7]  Roberto Di Pietro,et al.  PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning , 2020, IEEE Transactions on Information Forensics and Security.

[8]  Benjamin Bastida Virgili,et al.  Improved SSA Through Orbit Determination of Two-Line Element Sets , 2013 .

[9]  Johnny L. Worthy,et al.  ( Preprint ) AAS 15-738 UNCUED SATELLITE INITIAL ORBIT DETERMINATION USING SIGNALS OF OPPORTUNITY , 2015 .

[10]  T. S. Cssi Kelso,et al.  Validation of SGP4 and IS-GPS-200D Against GPS Precision Ephemerides , 2007 .

[11]  Jie Yang,et al.  Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks , 2009, IEEE INFOCOM 2009.

[12]  William Marshall,et al.  Improved orbit predictions using two-line elements , 2010, 1002.2277.

[13]  Chengcheng Liu,et al.  A Moving Source Localization Method for Distributed Passive Sensor Using TDOA and FDOA Measurements , 2016 .

[14]  K. Behrendt,et al.  The Perfect Time: An Examination of Time- Synchronization Techniques , 2006 .

[15]  Marlyn Kemper Littman Satellite Network Security , 2009 .

[16]  Adrian M. Price-Whelan,et al.  The astropy project , 2018 .

[17]  Yiu-Tong Chan,et al.  Exact and approximate maximum likelihood localization algorithms , 2006, IEEE Trans. Veh. Technol..

[18]  K. C. Ho,et al.  An accurate algebraic solution for moving source location using TDOA and FDOA measurements , 2004, IEEE Transactions on Signal Processing.

[19]  Vincent Lenders,et al.  Secrets in the sky: on privacy and infrastructure security in DVB-S satellite broadband , 2019, WiSec.

[20]  Bart Preneel,et al.  Location verification using secure distance bounding protocols , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[21]  Nils Ole Tippenhauer,et al.  Multi-receiver GPS spoofing detection: error models and realization , 2016, ACSAC.