Samenvatting
Detecting spoofing attacks to Low-Earth-Orbit (LEO) satellite systems is a cornerstone to assessing the authenticity of the received information and guaranteeing robust service delivery in several application domains. The solutions available today for spoofing detection either rely on additional communication systems, receivers, and antennas, or require mobile deployments. Detection systems working at the Physical (PHY) layer of the satellite communication link also require time-consuming and energy-hungry training processes on all satellites of the constellation, and rely on the availability of spoofed data, which are often challenging to collect. Moreover, none of such contributions investigate the feasibility of aerial spoofing attacks launched via drones operating at various altitudes. In this paper, we first show experimentally the viability and effectiveness of spoofing attacks to LEO satellite systems using aerial attackers deployed on drones. We also propose a new spoofing detection technique, relying on pre-processing raw physical-layer signals into images and then applying anomaly detection on such images via autoencoders. We validate our solution through an extensive measurement campaign involving the deployment of an actual spoofer (Software-Defined Radio) installed on a drone and injecting rogue IRIDIUM messages while flying at different altitudes with various movement patterns. Our results demonstrate that the proposed technique can reliably detect LEO spoofing attacks launched at different altitudes, while state-of-the-art competing approaches simply fail. We also release the collected data as open source, fostering further research on satellite security.
Originele taal-2 | Engels |
---|---|
Artikelnummer | 111408 |
Aantal pagina's | 11 |
Tijdschrift | Computer Networks |
Volume | 269 |
DOI's | |
Status | Gepubliceerd - sep. 2025 |
Bibliografische nota
Publisher Copyright:© 2025 The Authors