HomeSoftware EngineeringCan You Actually Hack a Radio Sign?

Can You Actually Hack a Radio Sign?


In 2017, a malicious actor exploited the alerts in Dallas’s emergency siren system and set off alarms for over 90 minutes. Some of these assaults can have an effect on units that use radio frequency (RF) know-how, from sensible safety techniques to plane. RF additionally performs a crucial function in lots of army techniques corresponding to navigation, radar, and communication techniques. Widespread DoD use circumstances embody satellite tv for pc communication (SATCOM), radar, and tactical information hyperlinks that assist coordinate troop actions, sign place details about a goal, or assist keep communication between plane and drones. A latest report indicated the DoD is prone to potential RF assault vectors, indicating the necessity to higher perceive and stop vulnerabilities.

On this RF 101 information, we discover a few of the fundamentals of radio frequency communication, delve into the generalities of protocols and system interactions, focus on widespread RF instruments, and uncover methods malicious actors can assault techniques. We summarize the fundamentals of RF know-how and the dangers related to it, and we focus on how the SEI helps to safe wi-fi communications.

RF Fundamentals

The electromagnetic spectrum covers the complete vary of electromagnetic waves from very lengthy radio waves to seen gentle to very quick, high-energy radiation corresponding to X-rays and gamma rays. The radio spectrum is a subset of the broader electromagnetic spectrum and ranges in frequency from 3 Hz to three,000 GHz. The flexibility of RF waves to propagate, or journey by totally different mediums, together with the vacuum of area, permits wi-fi communication with out the necessity for bodily connection. RF alerts are elementary to fashionable communication techniques, which allow lots of at the moment’s applied sciences together with tv, radio broadcasts, mobile communication, and Wi-Fi connections. Wi-fi RF communication additionally performs a significant function in area domains, corresponding to satellite tv for pc communication to floor stations, which allow transmission of telemetry information, GPS, and different alerts. The radio spectrum might be divided into standardized bands starting from extraordinarily low frequency (ELF) to tremendously excessive frequency (THF) as seen beneath.

figure1_06162025

Determine 1: The Electromagnetic Spectrum

figure2_06162025

Determine 2: Frequency Spectrum

What Are Protocols and RF Modules?

RF modules are small digital units which are used to transmit and obtain radio alerts between two units which are bodily separated. Transmitters are accountable for transmitting radio waves that carry analog or digital data, and receivers obtain the radio waves and get well the knowledge. That is the idea of a wi-fi communications channel, the open-space path by which data is transmitted by way of electromagnetic waves with out using bodily connections corresponding to wires or cables. The general sign is constructed of the service sign, a periodic waveform that conveys data by way of modulations that encode the analog or digital data. Modulation is the method of various a service sign to encode information then demodulating that obtained sign to decode information. Modulation methods decide how data is transmitted over radio waves, affecting the effectivity and high quality of communication.

figure3_06162025

Determine 3: Block Diagram of Digital Communication System

There are totally different ways in which the knowledge might be modulated. Widespread analog modulations embody amplitude modulation (AM) and frequency modulation (FM). AM modulates a better frequency service with a decrease frequency sign by adjusting the amplitude of the service sign. The frequency of the service is unaltered, however the amplitude varies continually. FM modulates by making comparatively small changes to the frequency of the service. These two strategies characterize the sorts of RF alerts on the acquainted AM and FM radio bands. Widespread digital modulations, constructing on AM and FM, embody amplitude shift keying (ASK) and frequency shift keying (FSK).

Inside a system, transmitters and receivers might be packaged collectively as transceivers, which carry out each capabilities. Moreover, system on a chip (SoC) configurations combine microcontrollers with the transceiver to permit protocol administration corresponding to information packetization.

figure4_06162025

Determine 4: Illustration of Indicators

Communication protocols are units of guidelines for the change of knowledge between the transmitter and receiver. They guarantee information is transmitted in a constant format, permitting units from totally different producers to speak effectively in the event that they respect the protocol. There are numerous totally different sorts of protocols in use. Essentially the most immediately recognizable communication protocol for a lot of is mobile wi-fi.

Mobile wi-fi is the business driver of the digital wi-fi communication revolution. From its business introduction greater than 30 years in the past for cellular voice communication, digital wi-fi know-how has advanced, extending the web to our cellular units. At a look:

The continued evolution of the world-wide mobile information community is pushed by two organizations filling distinct however interconnected roles. The Worldwide Telecommunication Union (ITU), units the general necessities and pointers for worldwide cellular telecommunications (IMT) requirements. The third Technology partnership Challenge (3GPP), a worldwide collaboration of economic, requirements, and different organizations, performs research after which develops technical specs for cellular communication applied sciences. The ITU guides, opinions, and approves 3GPP’s specs as worldwide requirements, guaranteeing they meet world necessities.

The 3GPP parallel research and specification course of has maintained a cadence of a specification launch each one to 2 years since 1990. These embody packet-switched information, which offers “all the time on” connection, eliminating dial up and enhancing entry to e mail and net providers. LTE Launch 8 applied an adaptation utilizing QPSK, 16QAM, and 64QAM modulation. Later releases included extra modulations. A timeline of commercially recognizable releases is offered within the desk beneath:

A Timeline of Cell Wi-fi Requirements

Yr

Launch

Identify

Options

Modulation / Entry

Downlink Knowledge Charge (bits/sec)

1992

Phase1

2G / GSM

GSM Commercially Provided DCS-1800

GMSK/TDMA

9.6 ok

1997

96

2G / GSM

Circuit Switched Consumer Knowledge

GMSK/TDMA

14.4 ok

1998

97

2.5G / GPRS

Packet Switched Consumer Knowledge

GMSK/TDMA

56-114k

1999

98

2.75G / EDGE

Enhanced GPRS

8PSK/TDMA

384 ok (max)

2000

99

3G / UMTS

W-CDMA  Interface

QPSK/W-CDMA

384 ok

2002

5

3G / UMTS

HSDPA

16QAM/W-CDMA

2-12 M

2008

8

4G / LTE

LTE Launched

OFDMA

5-100M

2018

15

5G / NR

NR Launched

OFDMA

100-1000M

Some extra regularly used wi-fi protocols embody:

  • Wi-Fi: That is the acquainted wi-fi IEEE 802.11-based protocol that operates within the 2.4 GHz ISM Band with 14 channels spaced 5 MHz aside. In the US, channels 1 by 11 are generally used, particularly channels 1, 6 and 11, that are the one non-overlapping channels. Wi-Fi is utilized in properties, metropolis infrastructures, geolocation, industrial environments, and Web of Issues (IoT) purposes.
  • Bluetooth low vitality: That is the acquainted low-power protocol utilized by various units for close-proximity communication. It operates within the 2.4 GHz ISM Band. Frequency-hopping unfold spectrum (FHSS) is the modulation approach used, and its band is split into 40 2-MHz channels. It’s utilized in sensible residence units, healthcare purposes, location-based providers, and extra.
  • Zigbee: This low-power wi-fi mesh community protocol is underneath the IEEE 802.15.4 radio specification. It operates on the 868 MHz radio band in Europe, the 915 MHz radio band in North America and Australia, and globally at 2.4 GHz. It could possibly transmit over a distance of as much as 100 meters (line of sight) and may obtain uncooked information throughput charges as much as 500 kbps. Zigbee operates on 16 fastened channels which are 5 MHz aside within the 2.4 GHz band. It’s primarily utilized in residence automation, sensible vitality, wi-fi sensing and industrial automation.

figure5_06162025

Determine 5: Wi-Fi and Zigbee Channels

How Do Units Talk with One One other?

Units talk by encoding information into modulated alerts on a service wave at a selected frequency. As seen in Determine 5, two Zigbee radios speaking on channel 19 could be speaking on the frequency of 2445 MHz.

Antennas are required in wi-fi communication since they’re accountable for radiating alerts into the air (i.e., transmitter) and receiving the incoming alerts (i.e., receiver). Antenna designs are decided by the character of the communication utility, the supposed frequencies and modulation methodology, and high quality components corresponding to vary, bandwidth, and working setting.

Multiplexing is a technique that enables a number of transmitted alerts or streams of knowledge to be shared over a single shared communication channel. Frequency division multiplexing permits a number of customers to ship information by a single communication channel by dividing the whole channel into a number of sub-channels with non-overlapping service frequencies. These sub-channels are allotted to separate customers or units. For instance, Zigbee, as famous above, operates on 16 channels within the 2.4 GHz vary. Time division multiplexing schemes assist handle entry to a channel by allocating particular person customers or units a selected timeslot for data transfers on the identical shared service frequency to keep away from colliding transmissions. Customers or units transmit in speedy succession, every with their very own timeslot. There are additionally extra advanced approaches to multiplexing corresponding to code division multiplexing which use superior methods like direct sequence unfold spectrum or frequency-hopping unfold spectrum to permit customers entry to the complete bandwidth for the complete period of transmission by assigning every system/person a singular, orthogonal code.

RF Assaults

RF assaults exploit vulnerabilities to intercept, disrupt, or manipulate techniques and related protocols. The implications of RF assaults can vary from information breaches and lack of confidentiality to denial of service and disruption of crucial communications. An instance that illustrates RF safety dangers is railroad and prepare jacking, as within the latest Poland railway assault stopped 20 trains in 2023. As wi-fi know-how grows, so do the assault area and threats.

What Are Widespread Sorts of RF Assaults?

A number of widespread RF assault vectors exploit weaknesses in wi-fi communications. Widespread vectors embody the next:

  • Eavesdropping entails intercepting and listening to wi-fi communications with out authorization. This could permit a malicious actor to realize entry to delicate data corresponding to passwords, authentication processes, private data, or import system processes. Attackers can make the most of software-defined radios (SDRs) to seize and decode transmitted information in a versatile method, enabling attackers to quickly adapt as they study extra about frequencies, modulation methods, and protocols.
  • Replay assaults, that are analogous to man-in-the-middle (MITM) assaults in cybersecurity, happen when an attacker captures legitimate transmissions after which retransmits them to impersonate a official system or person. These assaults can bypass authentication or achieve unauthorized entry to techniques. For instance, a malicious actor may sniff the transmissions that carry the code from a sensible lock to unlock/lock a door or sniff and replay the rolling code from a car’s key fob to acquire entrance to a automobile.
  • Relay assaults improve a legitimate radio sign and use it to entry a legitimate goal. Not like a replay assault, which captures and resends the sign, a relay assault permits a sign to journey farther and be used at longer distances. Good fobs and keys are prone to one of these assault.
  • Jamming is a denial-of-service assault the place the attacker transmits radio alerts on the identical frequency because the focused communication, successfully disrupting or blocking the official alerts. This could stop units from speaking, which may result in service outages or operational disruptions.

RF Vulnerabilities

On this part, we analyze latest examples of notable RF assaults which have been written about within the public press.

Replay Assault

Keyless entry techniques have modified how folks use automobile keys and entry safe areas, changing previous bodily keys with key fobs. Nonetheless, these techniques are susceptible to RF assaults. Automotive key fobs use RF alerts to ship a code to automobiles, permitting them to be unlocked and even began. From the late Eighties to early 2000s, keyless entry techniques emerged as a premium on a whole lot of vehicles. Like a storage door opener, a button could be pressed on the keyless entry system, transmitting an RF sign to the automobile, and a code would permit the automobile to be locked or unlocked. With little-to-no safety included of their preliminary design, early keyless entry techniques have been susceptible to cloning and replay assaults. Because the know-how turned extra plentiful, safety elevated, including primary encryption to keyless entry units and options such because the rolling key methodology. Within the rolling key methodology, a brand new code is generated every time a button is pressed on the important thing fob. With the introduction of rolling keys, primary replay assaults not labored as a result of the captured and replayed code didn’t match the newly generated code.

In response to this stronger protection, two new sorts of replay assaults emerged, the RollBack assault and the RollJam assault. RollBack captures two alerts: when a secret’s pressed, the primary sign is jammed, and the second sign is allowed. The primary sign is then replayed, after which inside 5 seconds, the second sign is replayed to permit entry. Just like the RollBack assault, the RollJam assault captures two alerts. Not like RollBack, each alerts one and two are jammed, after which sign one is replayed rapidly, permitting the proprietor entry to the automobile. Then the second sign is replayed later by the attacker.

figure6_06162025

Determine 6: RollJam and RollBack Assaults on Keyless Automobile Techniques

Automobile theft is a well-liked use of replay assaults. Nonetheless, residence automation techniques will also be victims of some of these assaults. RF doorbell alerts might be cloned and replayed, as proven on this demonstration.

Relay Assault

Keyless entry techniques at the moment are widespread options on most vehicles, and a brand new premium function has emerged. With keyless automobile fobs, a sign from the important thing fob is all the time transmitting and the proprietor doesn’t have to hit a button to unlock the automobile. Just like the replay assault, relay assaults use a tool to seize a radio sign. As an alternative of copying the sign, the system boosts the sign to a second system to make it appear to be a key fob is close to the automobile. This assault often requires two folks. The primary thief stands near the automobile, whereas the second thief is close to the home attempting to pay attention for the always-transmitted sign from the important thing fob. As soon as the second thief can get the sign from the important thing fob, they replay that sign to the primary thief. As soon as the primary thief is within the automobile, the second thief will relay one other sign to the primary thief, who’s now in a position to begin the automobile.

figure7_06162025

Determine 7: Instruments utilized in replay and relay assaults

Compounding the difficulty, all communication alerts that use radio frequency should register with the Federal Communication Fee (FCC). Key fobs have an FCC ID, which tells the frequency used. There are business instruments accessible that permit an attacker to make use of the ID to set the frequency on their system, simplifying the method since they don’t have to make use of different instruments to scan RF alerts and decide the frequency.

Affiliation Flood Assault

In an affiliation flood assault, an attacker exploits the method by which a brand new Zigbee node joins a community. In a Zigbee community, there’s a coordinator (grasp of the community), a router, and endpoints. The assault begins when a malicious actor replicates the becoming a member of procedures, the place a brand new node sends a beacon request to the coordinator of the community, adopted by an affiliation request. By flooding the coordinator with quite a few pretend requests, the attacker can overwhelm the community. This enables the malicious actor to realize unauthorized entry in a community of residence or workplace units to delicate information, management units, or simply typically trigger disruptions to the Zigbee community.

figure8_06162025

Determine 8: Zigbee Mesh Community Topology

RF Vulnerabilities in Protection Purposes

RF know-how is closely utilized in protection purposes since superior radio know-how is used to hold out operations. Wi-fi communications have performed an integral function in tactical missions and normal warfare and protection operations. Safe alerts are used to guard voice and information communications throughout operations. For instance, Single Channel Floor and Airborne Radio Techniques (SINCGARS) are army techniques that present voice and information to command-and-control operations. There are military-specific GPS alerts which are designed to withstand jamming and assist management the operational setting. Spectrum utilization within the army area is an important a part of fashionable army operations that assist assist coordination and administration. Whether or not offering voice, information, or cellular ad-hoc networking capabilities to warfighters, RF helps the monitoring of kit or automobiles or coordinating models with plane and drones. It’s an important instrument for battle planning.

Spoofing and Jamming in GPS and Radar Techniques

GPS alerts, essential for navigation and sustaining dependable positioning information for operations, are an integral part of army operations. Nonetheless, there was an increase of GPS assaults inside the previous few years, as these techniques might be spoofed or jammed by adversaries. Spoofing entails creating counterfeit alerts that may deceive receivers, corresponding to giving an incorrect location. GPS and radar techniques are prone to affiliation flood assaults, making the complete community imagine there are extra legitimate nodes then there actually are. The confusion created can be utilized to mislead drones or unmanned aerial automobiles (UAV) to a unsuitable vacation spot.

GPS spoofing in army operations is conceptually much like the automobile key fob assault described above. In a GPS spoofing assault, an adversary would possibly use ground-based techniques to broadcast false GPS alerts that deceive army GPS receivers, main them to navigate to incorrect coordinates. Simply as a automobile might be tricked into accepting a replayed key fob sign, army techniques counting on GPS might be misled by a replayed or pretend sign. Equally, an adversary may use an RF jamming system to intervene with a radar system, stopping it from detecting incoming plane and deceptive radar operators into pondering an incoming plane is coming from a special location.

In these circumstances, the vulnerability lies within the transmission of RF alerts with out correct safeguards in opposition to interception, replay, or manipulation. Additional analysis into safeguarding and securing these techniques in opposition to dangers with extra anti-jamming methods, superior encryptions, or different pathways will assist guarantee nationwide safety.

Work with the SEI

Understanding RF vulnerabilities and dangers is step one in studying how one can mitigate them. Right here on the SEI, we’re growing instruments and processes to securely harness the facility of RF. For instance, we’re growing machine studying (ML) methods to foretell RF sign power and modulation varieties to assist speed up the potential of conventional physics-based modeling and simulation. This elevated pace can allow purposes at present not possible, corresponding to large-scale threat evaluation with uncertainty quantification, design optimization over very massive determination areas, and extra real looking real-time war-gaming.

Moreover, the SEI is working to modernize present processes, information, and digital infrastructure by growing software program instruments and information pipelines that assist RF spectrum operations because the disciplines of wi-fi communications and conventional cybersecurity operations proceed to maneuver in the direction of convergence. If you’re fascinated by studying extra about this work or collaborating with the SEI, please contact us.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments