{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:06:58Z","timestamp":1772726818756,"version":"3.50.1"},"reference-count":56,"publisher":"Association for Computing Machinery (ACM)","issue":"1","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2026,2,28]]},"abstract":"<jats:p>As satellite systems become a greater part of critical infrastructure, they have become a significantly more appealing target for attacks. The availability of cheap off-the-shelf radio hardware has made signal spoofing and physical layer attacks more accessible than ever to a wide range of adversaries, from hobbyists to nation-state actors. Legacy systems are particularly vulnerable due to their lack of cryptographic security, and cannot be patched to support novel security measures.<\/jats:p>\n                  <jats:p>\n                    In this article, we use radio transmitter fingerprinting to authenticate satellite downlinks, using characteristics of the transmitter hardware expressed as impairments on the physical layer radio signal. Our\n                    <jats:sc>SatIQ<\/jats:sc>\n                    system employs a Siamese neural network and an autoencoder to extract an efficient encoding of message headers that preserves identifying information. We focus on high sample rate fingerprinting, making device fingerprints difficult to forge without similarly high sample rate transmitting hardware.\n                  <\/jats:p>\n                  <jats:p>\n                    We collected 10290000\u00a0messages from the Iridium satellite constellation at 25 MS\/s, and demonstrate that the\n                    <jats:sc>SatIQ<\/jats:sc>\n                    model trained on this data maintains performance over time without retraining, and can be used on new transmitters with no impact on performance. We analyze the system\u2019s robustness against weather and signal factors, and demonstrate its effectiveness under attack, achieving an Equal Error Rate of\u00a00.072 and ROC AUC of\u00a00.960. We conclude that our techniques are useful for building fingerprinting systems that are effective at authenticating satellite communication, maintain performance over time and across satellite replacement, and provide robustness against spoofing and replay by raising the required budget for attacks.\n                  <\/jats:p>","DOI":"10.1145\/3768619","type":"journal-article","created":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T11:36:52Z","timestamp":1758195412000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["SatIQ: Extensible and Stable Satellite Authentication using Hardware Fingerprinting"],"prefix":"10.1145","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2200-1066","authenticated-orcid":false,"given":"Joshua","family":"Smailes","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Oxford","place":["Oxford, United Kingdom of Great Britain and Northern Ireland"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7957-7766","authenticated-orcid":false,"given":"Sebastian","family":"K\u00f6hler","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Oxford","place":["Oxford, United Kingdom of Great Britain and Northern Ireland"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2275-7026","authenticated-orcid":false,"given":"Simon","family":"Birnbach","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Oxford","place":["Oxford, United Kingdom of Great Britain and Northern Ireland"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1936-0933","authenticated-orcid":false,"given":"Martin","family":"Strohmeier","sequence":"additional","affiliation":[{"name":"armasuisse, Science + Technology","place":["Zurich, Switzerland"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2340-3040","authenticated-orcid":false,"given":"Ivan","family":"Martinovic","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Oxford","place":["Oxford, United Kingdom of Great Britain and Northern Ireland"]}]}],"member":"320","published-online":{"date-parts":[[2025,11,29]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623135"},{"key":"e_1_3_2_3_2","unstructured":"Great Scott Gadgets. 2021. HackRF One. (2021). Retrieved September 30 2025 from https:\/\/greatscottgadgets.com\/hackrf\/one\/"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2365951"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7452266"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326082"},{"key":"e_1_3_2_7_2","doi-asserted-by":"crossref","first-page":"2729","DOI":"10.1007\/s11277-020-07211-7","article-title":"Capture of UAVs through GPS spoofing using low-cost SDR platforms","author":"Gaspar Jo\u00e3o","year":"2020","unstructured":"Jo\u00e3o Gaspar, Renato Ferreira, Pedro Sebasti\u00e3o, and Nuno Souto. 2020. Capture of UAVs through GPS spoofing using low-cost SDR platforms. Wireless Personal Communications 115, 4 (2020), 2729\u20132754.","journal-title":"Wireless Personal Communications"},{"key":"e_1_3_2_8_2","unstructured":"NASA. 2022. Fire Information for Resource Management System (FIRMS). (2022). Retrieved September 30 2025 from https:\/\/earthdata.nasa.gov\/earth-observation-data\/near-real-time\/firms"},{"key":"e_1_3_2_9_2","unstructured":"Esri. 2022. Esri Releases Updated Land-Cover Map with New Sets of Global Data. (2022). Retrieved September 30 2025 from https:\/\/www.esri.com\/about\/newsroom\/announcements\/esri-releases-updated-land-cover-map-with-new-sets-of-global-data\/"},{"key":"e_1_3_2_10_2","unstructured":"Meta. 2022. High Resolution Population Density Maps. (2022). Retrieved September 30 2025 from https:\/\/dataforgood.facebook.com\/dfg\/tools\/high-resolution-population-density-maps"},{"key":"e_1_3_2_11_2","unstructured":"Cloud to Street. 2022. Cloud to Street. (2022). Retrieved September 30 2025 from https:\/\/www.cloudtostreet.ai\/"},{"key":"e_1_3_2_12_2","unstructured":"sam210723. 2020. Receiving Images from Geostationary Weather Satellite GEO-KOMPSAT-2A. (2020). Retrieved September 30 2025 from https:\/\/vksdr.com\/xrit-rx"},{"key":"e_1_3_2_13_2","unstructured":"sam210723. 2018. COMS-1 LRIT Key Decryption. (2018). Retrieved September 30 2025 from https:\/\/vksdr.com\/lrit-key-dec"},{"key":"e_1_3_2_14_2","unstructured":"Maryam Motallebighomi Harshad Sathaye Mridula Singh and Aanjhan Ranganathan. 2022. Cryptography is not enough: Relay attacks on authenticated GNSS signals. arxiv:2204.11641. Retrieved from https:\/\/arxiv.org\/abs\/2204.11641"},{"key":"e_1_3_2_15_2","volume-title":"PySDR: A Guide to SDR and DSP Using Python","author":"Lichtman Marc","year":"2021","unstructured":"Marc Lichtman. 2021. IQ sampling. In PySDR: A Guide to SDR and DSP Using Python. https:\/\/pysdr.org\/content\/sampling.html"},{"key":"e_1_3_2_16_2","unstructured":"NASA. 2022. X-Band Direct Readout Sites Worldwide. (2022). Retrieved September 30 2025 from https:\/\/directreadout.sci.gsfc.nasa.gov\/?id=dspContent&cid=78"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3469132"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2019.8651804"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2020.2994117"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/JRFID.2020.2968369"},{"key":"e_1_3_2_21_2","first-page":"13","article-title":"Detection of transient in radio frequency fingerprinting using signal phase","author":"Hall Jeyanthi","year":"2003","unstructured":"Jeyanthi Hall, Michel Barbeau, and Evangelos Kranakis. 2003. Detection of transient in radio frequency fingerprinting using signal phase. Wireless and Optical Communications 9 (2003), 13\u201318. https:\/\/scholar.google.com\/scholar?cluster=14122771568642364504&hl=en&as_sdt=7,39)","journal-title":"Wireless and Optical Communications"},{"key":"e_1_3_2_22_2","first-page":"1","volume-title":"Proceedings of the 2013 IEEE International Conference on Signal Processing, Communication and Computing.","author":"Huang Lianfen","year":"2013","unstructured":"Lianfen Huang, Minghui Gao, Caidan Zhao, and Xiongpeng Wu. 2013. Detection of Wi-Fi transmitter transients using statistical method. In Proceedings of the 2013 IEEE International Conference on Signal Processing, Communication and Computing. IEEE, 1\u20135."},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1029\/2000RS002345"},{"key":"e_1_3_2_24_2","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1109\/SECCOM.2007.4550352","volume-title":"Proceedings of the 2007 3rd International Conference on Security and Privacy in Communications Networks and the Workshops-SecureComm 2007","author":"Rasmussen Kasper Bonne","year":"2007","unstructured":"Kasper Bonne Rasmussen and Srdjan Capkun. 2007. Implications of radio fingerprinting on the security of sensor networks. In Proceedings of the 2007 3rd International Conference on Security and Privacy in Communications Networks and the Workshops-SecureComm 2007. IEEE, 331\u2013340."},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399353"},{"key":"e_1_3_2_26_2","first-page":"1","volume-title":"Proceedings of the 2023 IEEE\/AIAA 42nd Digital Avionics Systems Conference.","author":"Birnbach Simon","year":"2023","unstructured":"Simon Birnbach, Joshua Smailes, Richard Baker, and Ivan Martinovic. 2023. Adaptable hardware fingerprinting for radio data links and avionics buses in adversarial settings. In Proceedings of the 2023 IEEE\/AIAA 42nd Digital Avionics Systems Conference.IEEE, 1\u201310."},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3219287"},{"key":"e_1_3_2_28_2","first-page":"1","volume-title":"Proceedings of the 2008 IEEE 68th Vehicular Technology Conference","author":"Kennedy Irwin O.","year":"2008","unstructured":"Irwin O. Kennedy, Patricia Scanlon, Francis J. Mullany, Milind M. Buddhikot, Keith E. Nolan, and Thomas W. Rondeau. 2008. Radio transmitter fingerprinting: A steady state frequency domain approach. In Proceedings of the 2008 IEEE 68th Vehicular Technology Conference. IEEE, 1\u20135."},{"key":"e_1_3_2_29_2","first-page":"98","volume-title":"Proceedings of the 2019 4th International Conference on Fog and Mobile Edge Computing","author":"Bassey Joshua","year":"2019","unstructured":"Joshua Bassey, Damilola Adesina, Xiangfang Li, Lijun Qian, Alexander Aved, and Timothy Kroecker. 2019. Intrusion detection for IoT devices based on RF fingerprinting using deep learning. In Proceedings of the 2019 4th International Conference on Fog and Mobile Edge Computing. IEEE, 98\u2013104."},{"key":"e_1_3_2_30_2","first-page":"51","volume-title":"Proceedings of the 20th ACM International Symposium on Mobile Ad Hoc Networking and Computing","author":"Restuccia Francesco","year":"2019","unstructured":"Francesco Restuccia, Salvatore D\u2019Oro, Amani Al-Shawabka, Mauro Belgiovine, Luca Angioloni, Stratis Ioannidis, Kaushik Chowdhury, and Tommaso Melodia. 2019. DeepRadioID: Real-time channel-resilient optimization of deep learning-based radio fingerprinting algorithms. In Proceedings of the 20th ACM International Symposium on Mobile Ad Hoc Networking and Computing. 51\u201360."},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2949308"},{"issue":"3","key":"e_1_3_2_32_2","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1049\/el:20040160","article-title":"Improvement of transmitter identification system for low SNR transients","volume":"40","author":"Tekba\u015f \u00d6H","year":"2004","unstructured":"\u00d6H Tekba\u015f, Oktay \u00dcreten, and Nur Serinken. 2004. Improvement of transmitter identification system for low SNR transients. Electronics Letters 40, 3 (2004), 182\u2013183.","journal-title":"Electronics Letters"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2022.3171792"},{"key":"e_1_3_2_34_2","unstructured":"Dan Veeneman. 2021. Iridium: Technical Details. (2021). Retrieved September 30 2025 from http:\/\/www.decodesystems.com\/iridium.html"},{"key":"e_1_3_2_35_2","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1145\/1741866.1741882","volume-title":"Proceedings of the 3rd ACM Conference on Wireless Network Security","author":"Danev Boris","year":"2010","unstructured":"Boris Danev, Heinrich Luecken, Srdjan Capkun, and Karim El Defrawy. 2010. Attacks on physical-layer identification. In Proceedings of the 3rd ACM Conference on Wireless Network Security. 89\u201398."},{"key":"e_1_3_2_36_2","volume-title":"Proceedings of the Workshop on Security of Space and Satellite Systems","author":"Smailes Joshua","year":"2024","unstructured":"Joshua Smailes, Edd Salkield, Sebastian K\u00f6hler, Simon Birnbach, Martin Strohmeier, and Ivan Martinovic. 2024. Sticky fingers: Resilience of satellite fingerprinting against jamming attacks. In Proceedings of the Workshop on Security of Space and Satellite Systems."},{"key":"e_1_3_2_37_2","first-page":"1","volume-title":"Proceedings of the 2019 International Conference on Wireless and Mobile Computing, Networking and Communications.","author":"Yu Jiabao","year":"2019","unstructured":"Jiabao Yu, Aiqun Hu, Fen Zhou, Yuexiu Xing, Yi Yu, Guyue Li, and Linning Peng. 2019. Radio frequency fingerprint identification based on denoising autoencoders. In Proceedings of the 2019 International Conference on Wireless and Mobile Computing, Networking and Communications.IEEE, 1\u20136."},{"key":"e_1_3_2_38_2","unstructured":"Joshua Bassey Xiangfang Li and Lijun Qian. 2020. Device authentication codes based on RF fingerprinting using deep learning. arXiv:2004.08742. Retrieved from https:\/\/arxiv.org\/abs\/2004.08742"},{"key":"e_1_3_2_39_2","article-title":"Radio frequency fingerprint identification based on variational autoencoder for GNSS","author":"Jiang Qi","year":"2024","unstructured":"Qi Jiang and Jin Sha. 2024. Radio frequency fingerprint identification based on variational autoencoder for GNSS. IEEE Geoscience and Remote Sensing Letters 21 (2024), 1\u20134. https:\/\/ieeexplore.ieee.org\/abstract\/document\/10556578","journal-title":"IEEE Geoscience and Remote Sensing Letters"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-0716-0826-5_3"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3024991"},{"key":"e_1_3_2_42_2","first-page":"2832","volume-title":"Proceedings of the 2016 IEEEE International Conference on Acoustics, Speech and Signal Processing","author":"Zhang Cheng","year":"2016","unstructured":"Cheng Zhang, Wu Liu, Huadong Ma, and Huiyuan Fu. 2016. Siamese neural network based gait recognition for human identification. In Proceedings of the 2016 IEEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, 2832\u20132836."},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.109148"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1819"},{"key":"e_1_3_2_45_2","article-title":"Attentive siamese networks for automatic modulation classification based on multitiming constellation diagrams","author":"Mao Yu","year":"2021","unstructured":"Yu Mao, Yang-Yang Dong, Ting Sun, Xian Rao, and Chun-Xi Dong. 2021. Attentive siamese networks for automatic modulation classification based on multitiming constellation diagrams. IEEE Transactions on Neural Networks and Learning Systems 34, 9 (2021), 5988\u20136002.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"e_1_3_2_46_2","first-page":"152","volume-title":"Proceedings of the Actes de La Conf\u00e9rence CAID 2020","author":"Morge-Rollet Louis","year":"2020","unstructured":"Louis Morge-Rollet, Fr\u00e9d\u00e9ric Le Roy, Denis Le Jeune, and Roland Gautier. 2020. Siamese network on I\/Q signals for RF fingerprinting. In Proceedings of the Actes de La Conf\u00e9rence CAID 2020. 152."},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3324921.3328781"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3844-z"},{"key":"e_1_3_2_49_2","unstructured":"SatNOGS. 2022. SatNOGS: Open Source global network of satellite ground-stations. (2022). Retrieved September 30 2025 from https:\/\/satnogs.org\/"},{"key":"e_1_3_2_50_2","article-title":"gr-iridium: GNU Radio Iridium Out Of Tree Module","author":"Schneider Tobias","year":"2022","unstructured":"Tobias Schneider and Stefan Zehl. 2022. gr-iridium: GNU Radio Iridium Out Of Tree Module. Chaos Computer Club M\u00fcnchen. (Sept.2022).","journal-title":"Chaos Computer Club M\u00fcnchen"},{"issue":"1","key":"e_1_3_2_51_2","first-page":"220","article-title":"Understanding AUC - ROC Curve","volume":"26","author":"Narkhede Sarang","year":"2018","unstructured":"Sarang Narkhede. 2018. Understanding AUC - ROC Curve. Towards Data Science 26, 1 (2018), 220\u2013227.","journal-title":"Towards Data Science"},{"key":"e_1_3_2_52_2","unstructured":"Diederik P. Kingma and Max Welling. 2013. Auto-encoding variational bayes. arXiv:1312.6114. Retrieved from https:\/\/arxiv.org\/abs\/1312.6114"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.2100553"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155259"},{"key":"e_1_3_2_55_2","unstructured":"Visual Crossing Corporation. 2024. Visual Crossing Weather. (2024). Retrieved September 30 2025 from https:\/\/www.visualcrossing.com\/"},{"key":"e_1_3_2_56_2","unstructured":"Jonathan McDowell. 2024. Starlink Statistics. (2024). Retrieved September 30 2025 from https:\/\/planet4589.org\/space\/con\/star\/stats.html"},{"key":"e_1_3_2_57_2","unstructured":"Gabriele Oligeri and Savio Sciancalepore. 2022. Physical Layer Data Acquisition of IRIDIUM Satellites Broadcast Messages. (2022). Retrieved September 30 2025 from https:\/\/data.mendeley.com\/datasets\/xcxspv8c2r\/1"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3768619","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T11:12:48Z","timestamp":1764414768000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3768619"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,29]]},"references-count":56,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2,28]]}},"alternative-id":["10.1145\/3768619"],"URL":"https:\/\/doi.org\/10.1145\/3768619","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"value":"2471-2566","type":"print"},{"value":"2471-2574","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,29]]},"assertion":[{"value":"2024-10-23","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-18","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-11-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}