recentpopularlog in

pierredv : sdr   77

Using a COTS SDR as a 5G Development Platform | 2019-02-08 | Microwave Journal
This article is intended to familiarize radio engineers with the use of a multi-purpose commercial off-the-shelf (COTS) platform for software-defined radio (SDR) that can reduce development time for 5G.

COTS SDR has been traditionally used in military radar and communications applications for high performance and design flexibility. The latest COTS SDR products offer solutions with integrated I/O, ARM processors and large FPGAs that also include intellectual property (IP) for accessing, routing and processing digital data. These attributes, combined with superior signal integrity, phase-coherent sampling and multi-channel transceivers, make a COTS SDR system an ideal choice for a 5G development platform.
MicrowaveJournal  COTS  SDR  5G 
march 2019 by pierredv
Stakeholders not keen on EC’s reconfigurable radio systems proposal | PolicyTracker: Mar 2019
"A European Commission (EC) proposal to ensure that software uploaded onto radio equipment doesn't harm spectrum access, interoperability, safety or access to emergency services has drawn a mostly negative reaction from stakeholders who fear the rule could stifle innovation and competition. The EC said in its initial impact assessment that it is mulling a regulation on reconfigurable radio systems (RRS) under the EU Radio Equipment Directive (RED)."

"The EC laid out five options:

maintain the current situation in which device makers aren’t required to implement any specific measures (Option 0)
industry self-regulation to ensure that software doesn’t compromise initial compliance (Option 1)
adopt a regulation under Article 4 of the RED to require that manufacturers of radio equipment, or of software allowing radio equipment to be used as intended, inform member states and the EC about how the intended combination will comply before the software can be uploaded (Option 2)
adopt a regulation under Article 3(3)(i) of the RED to require that radio equipment support certain features in order to ensure that software can only be uploaded into it where the compliance of the combination of the equipment and software has been demonstrated for the purposes of market access (Option 3)
adopt a regulation requiring that both Options 2 and 3 be demonstrated before equipment is allowed on the market (Option 4).

"The 276 feedback messages received showed strong opposition to any option but doing nothing or allowing industry self-regulation."
PolicyTracker  SDR  EC  EuropeanCommission  spectrum  regulation 
march 2019 by pierredv
Your USB Serial Adapter Just Became a SDR | Hackaday, Dec 2018
"With a Python script, a length of wire attached to the TX pin, and a mastery of the electron that we mere mortals can only hope to achieve, [Ted] has demonstrated using a common USB to serial adapter as an SDR transmitter."
hacking  SDR  cybersecurity  USB  RF 
december 2018 by pierredv
Will Software-Defined Satellites Take Off? - NSR Nov 2018
"... new architectures, multiple forms of heightened risk taking, and adoption of low or no heritage technologies. SES is pushing this process even further with proposals for a standard-build, software-defined satellite that could be purchased off the shelf for use in any orbital slot by any operator. Yet, with buy-in needed from both manufacturers and competing operators, will the idea take off?"

"The ability to change frequency bands, coverage areas, power allocation, and architecture (widebeam vs HTS, for example) on-demand, at any point in satellite lifetime, enables an operator to capture diverse markets. It can address new applications as they emerge, compensating if the initial target market falters, or more simply respond to a rebalancing of demand. Standard-build satellites also add flexibility to an operator’s fleet, making satellites interchangeable in the case of anomaly or shifting priorities."

"as is the case with any generalist/specialist tradeoff, a standard-build satellite will be able to address a broader overall array of demand but might not address individual markets as competitively as a tailored satellite."

"not only are standard-build/software-defined satellites on the table, but very high throughput satellites (e.g. ViaSat-3), smallsats in GEO (e.g. Astranis), condosats (e.g. GeoShare), blended GEO/MEO/LEO constellations, and in-orbit servicing and assembly, amid other budding ideas, are feasible pathways as well"

"While this cost and risk must be resolved, in principal standard-build satellites dovetail with what manufacturers have been considering for years: standardization as a way to cut costs and reduce production timelines."
SDR  NSR  satellites  SES  standards 
november 2018 by pierredv
Threat Landscape and Good Practice Guide for Software Defined Networks/5G — ENISA Jan 2016
"This study reviews threats and potential compromises related to the security of SDN/5G networks. More specifically, this report has identified related network assets and the security threats, challenges and risks arising for these assets. Driven by the identified threats and risks, existing security mechanism and and good practices for SDN/5G/NFV has been identified. Finally based in the collated information technical, policy and organizational recommendations for proactively enhancing the security of SDN/5G is provided."

January 27, 2016
security  cybersecurity  cellular  SDR  5G  ENISA  EU 
september 2018 by pierredv
Icoboard Software Defined Radio Platform | Hackaday Mar 2018
Via Dale hatfield

"The Icoboard is a plug-in for the Raspberry Pi with a Lattice iCE FPGA onboard. Combined with a cheap A/D converter, [OpenTechLab] build a software-defined radio using all open source tools. He found some inexpensive converters that cost about $25 and were fast enough (32 MHz) for the purpose at hand. The boards also had a digital to analog converter and he was able to find the data sheets. You can see a video with the whole project covered, below."
march 2018 by pierredv
SDR's Hard Side Shown in DARPA Hackfest | EE Times Mar 2018
"During the hackfest, we saw teams struggle to master the combination of SDR and UAV technology against the background of real-world phenomenon. Teams found that no matter how much FOSS is applied, they still had to confront a diversity of challenges, among them uncertainty and latency in moving the UAVs, computational limitations of embedded systems, different processor capabilities, and various issues with radio signals.

Teams experienced such challenges throughout the event. For example, the indoor environment by the range itself fluctuated as the doors opened and closed, or as people moved around. That led to ugly radio frequency propagation issues from the concrete walls that surrounded the radios. Using an automatic system for power control or executing similar adaptive behaviors could have helped overcome the environmental changes."
SDR  EETimes  DARPA  UAS  drones 
march 2018 by pierredv
How to Track Government Aircraft 200 Miles Away with a Raspberry Pi « Null Byte :: WonderHowTo
Aircraft equipped with ADS-B are constantly shouting their location into the radio void, along with other useful unauthenticated and unencrypted data. In this guide, we will make an ADS-B receiver using a Raspberry Pi with a software-defined radio (SDR) dongle, which we can use to track aircraft anywhere in real time.
RaspberryPi  ADS-B  SDR  howto  aviation 
september 2017 by pierredv
Linksys WRT routers won’t block open source firmware despite FCC rules | Ars Technica
"Linksys has been collaborating with chipmaker Marvell and the makers of OpenWrt to make sure its latest WRT routers can comply with the new rules without blocking open source firmware, company officials told Ars."
Linksys  WRT  DD-WRT  OSS  SDR  FCC  ArsTechnica 
september 2016 by pierredv
IEEE Xplore Document - LTE/LTE-A jamming, spoofing, and sniffing: threat assessment and mitigation
Abstract: LTE is currently being proposed for use in a nationwide wireless broadband public safety network in the United States as well as for other critical applications where reliable communication is essential for safety. Unfortunately, like any wireless technology, disruption of these networks is possible through radio jamming. This article investigates the extent to which LTE is vulnerable to RF jamming, spoofing, and sniffing, and assesses different physical layer threats that could affect next-generation critical communication networks. In addition, we examine how sniffing the LTE broadcast messages can aid an adversary in an attack. The weakest links of LTE are identified and used to establish an overall threat assessment. Lastly, we provide a survey of LTE jamming and spoofing mitigation techniques that have been proposed in the open literature.
"more effective jamming methods can be realized by exploiting the specific protocol features of LTE"
"it is clear that LTE is highly vulnerable to adversarial jamming"
“even the most complex attacks can easily be implemented with widely available open source libraries, low-cost software radio hardware with a budget under $1500, and basic Linux programming skills.”
IEEE  IEEECommMag  LTE  jamming  spoofing  threat  SDR 
september 2016 by pierredv
Drone Hack: Spoofing Attack Demonstration on a Civilian Unmanned Aerial Vehicle : GPS World Aug 2012
By Daniel Shepard, Jahshan A. Bhatti, and Todd E. Humphreys

"A radio signal sent from a half-mile away deceived the GPS receiver of a UAV into thinking that it was rising straight up. In this way, the UAV’s dependence on civil GPS allowed the spoofer operator to force the UAV vertically downward in dramatic fashion as part of multiple capture demonstrations."
"The spoofer is implemented on a portable software-defined radio platform with a digital signal processor (DSP) at its core"
"These tests have demonstrated that civilian UAVs will be vulnerable to control by malefactors with a civil GPS spoofer looking to hijack or crash these UAVs unless their vulnerability to GPS spoofing is addressed. "
"Constructing from scratch a sophisticated GPS spoofer like the one developed by UT is not easy, nor is it within the capability of the average anonymous hacker."
GPSWorld  GPS  drones  spoofing  SDR 
september 2016 by pierredv
New App Detects Government Stingray Cell Phone Trackers - Slashdot - Jan 2015
"SnoopSnitch scans for radio signals that indicate a transition to a stingray from a legitimate cell tower. "SnoopSnitch collects and analyzes mobile radio data to make you aware of your mobile network security and to warn you about threats like fake base stations (IMSI catchers), user tracking and over-the-air updates." say German security researchers Alex Senier, Karsten Nohl, and Tobias Engel, creators of the app which is available now only for Android. The app can't protect people's phones from connecting to stingrays in the first place, but it can at least let them know that there is surveillance happening in a given area."
SDR  hacking  cellular  IMSI-catchers  Stingray  Slashdot 
august 2016 by pierredv
How To Detect And Find Rogue Cell Towers | Hackaday Aug 2016
"From what we saw at HOPE in New York a few weeks ago, we’re just months away from being able to put a femtocell in a desktop computer for under $3,000. In less than a year, evil, bad hackers could be tapping into your cell phone or reading your text message from the comfort of a van parked across the street. You should be scared, even though police departments everywhere and every government agency already has this capability."
"For the last few months [Eric Escobar] has been working on a simple device that allows anyone to detect when one of these Stingrays or IMSI catchers turns on. With several of these devices connected together, he can even tell where these rogue cell towers are."
"To build his rogue-cell-site detector, [Eric] is logging this information to a device consisting of a Raspberry Pi, SIM900 GSM module, an Adafruit GPS module, and a TV-tuner Software Defined Radio dongle."
SDR  Hackaday  cellular  IMSI-catchers  Stingray  hacking 
august 2016 by pierredv
Hacker Spoofs Cell Phone Tower to Intercept Calls | WIRED Jul 2010
"A security researcher created a cell phone base station that tricks cell phones into routing their outbound calls through his device, allowing someone to intercept even encrypted calls in the clear."
Only works for 2G GSM
SDR  cellular  IMSI-catchers  Stingray  Wired  GSM  hacking 
august 2016 by pierredv
HOPE Hacker Conference Shows Off New Tricks - IEEE Spectrum
"Another session focused on reverse engineering the Iridium satellite communications network. Stefan Zehl and “Schneider” from the Munich Chaos Computer Club (CCC) used software-defined radio systems to look at and decode the signals streaming down from orbit. Each Iridium satellite uses beam antennas to illuminate roughly 400-kilometer-wide spots as it passes over the Earth, so a message intended for a recipient anywhere in that area is broadcast over the entire spot. When Iridium was originally designed in the 1990s, the difficulty of receiving signals without the network’s own hardware made amateur surveillance impossible, so much of the traffic on the network is not encrypted. But now the CCC hackers claim a modified GPS antenna and a software radio is all that’s required to pick up and demodulate signals. By studying packets on a byte-by-byte basis, they were able to identify and decode a number of the different types of messages transmitted by the satellite constellation—including pager messages, emails, and even voice calls, albeit not yet in real time—and presented several samples of each. (Iridium will soon begin launching a new generation of satellites, but they will be backward compatible with existing equipment, so a lot of unencrypted traffic is still likely to flow over the network.)"
IEEE-Spectrum  Iridium  SDR  hacking 
august 2016 by pierredv
A New Wireless Hack Can Unlock 100 Million Volkswagens | WIRED - Aug 2016
"Garcia and a new team of researchers are back with another paper that shows how Volkswagen left not only its ignition vulnerable but the keyless entry system that unlocks the vehicle’s doors, too. And this time, they say, the flaw applies to practically every car Volkswagen has sold since 1995."
"Both attacks use a cheap, easily available piece of radio hardware to intercept signals from a victim’s key fob, then employ those signals to clone the key. The attacks, the researchers say, can be performed with a software defined radio connected to a laptop, or in a cheaper and stealthier package, an Arduino board with an attached radio receiver that can be purchased for $40."
"Plenty of evidence suggests that sort of digitally enabled car theft is already occurring. Police have been stumped by videos of cars being stolen with little more than a mystery electronic device."
Volkswagen  SDR  cryptography  theft  hacking 
august 2016 by pierredv
GPS Under Attack as Crooks, Rogue Workers Wage Electronic War - NBC News
"Predictably, criminals have found ways to profit from GPS weaknesses with illegal jamming devices. The devices, once available only to those with considerable technical savvy, are now widely advertised on the internet for $50 or less and require no expertise to operate."
"The closest thing to official confirmation of a criminal spoofing incident came when a Homeland Security Department official said at a security conference in December that Mexican drug cartels were trying to jam and spoof GPS signals to interfere with U.S. government drones patrolling the border."
GPS  jamming  FBI  theft  crime  spoofing  NBC  SDR 
august 2016 by pierredv
Updates on using an RTL-SDR for GPS on a High Powered Rocket -
"Back in April we posted about Philip Hahn and Paul Breed’s experiments to use an RTL-SDR for GPS logging on their high powered small rockets. As GPS is owned by the US military, a standard GPS module cannot be used on a rocket like this, as they are designed to fail if the GPS device breaches the COCOM limit, which is when it calculates that it is moving faster than 1,900 kmph/1,200 mph and/or higher than 18,000 m/59,000 ft. The idea is that this makes it harder for GPS to be used in non-USA or home made intercontinental missiles. As SDR GPS decoders are usually programmed in open source software, there is no need for the programmers to add in these artificial limits."
SDR  GPS  rockets 
august 2016 by pierredv
2-DAY TRAINING 2: Hacking the IoT with Software Defined Radio « HITBSecConf2016 – Amsterdam
"One of the key attributes of the Internet of Things (IoT) is that it makes heavy use of wireless communications to allow for mobility and easy-of-installation. It is important to note this is not just Wi-Fi, but all manner of other Radio Frequency (RF) protocols: Bluetooth, BTLE, ZigBee, Z-Wave – to name just a few. The increasing ubiquity of such devices and networks promises to make life easier (smart fridges, …), however manufactures often overlook the security in the implementation of this RF communication systems.

This course will teach you the fundamentals of how to use Software Defined Radio (SDR) to analyse, demodulate and decode RF signals used in the wireless IoT, and then how you can perform your own research and penetration testing to test whether a system is secure, or vulnerable to attack."
IoT  hacking  SDR  training 
july 2016 by pierredv
Clearing the Air on Wi-Fi Software Updates | Federal Communications Commission blog Nov 2015
Commentary on rulemaking ET 15-170, NPRM FCC-15-92
"One immediate outcome of this ongoing dialogue is a step we’ve taken to clarify our guidance on rules the Commission adopted last year in the U-NII proceeding. Our original lab guidance document released pursuant to that Order asked manufacturers to explain “how [its] device is protected from ‘flashing’ and the installation of third-party firmware such as DD-WRT”. This particular question prompted a fair bit of confusion – were we mandating wholesale blocking of Open Source firmware modifications?"
"So, today we released a revision to that guidance to clarify that our instructions were narrowly-focused on modifications that would take a device out of compliance. "
FCC  Julius-Knapp  SDR  DD-WRT  rulemaking  rules  blogs 
july 2016 by pierredv
The Problem with Software Defined Radio | Hackaday - Jul 2016
"SDR’s biggest problem is one of bandwidth and processing. With a simple USB TV Tuner, you can listen in on aircraft, grab Landsat images from hundreds of miles up, or sniff the low-power radios used in Internet of Things things. What you can’t do is make your own WiFi adapter, and you can’t create your own LTE wireless network. This is simply a problem of getting bits from the air to a computer for processing.

At HOPE last weekend, the folks behind the very capable LimeSDR and a new company working with Lime’s hardware laid out the possibilities of what software defined radio can do if you make a link to a computer very fast, and add some processing on the SDR itself."
Hackaday  LimeSDR  SDR 
july 2016 by pierredv
Cheating at Pokémon Go with a HackRF and GPS Spoofing -
Since the game is GPS based, Stefan Kiese decided to see if he could cheat at the game by spoofing his GPS location using a HackRF software defined radio. When playing the game, players often walk from Pokéstop to Pokéstop, collecting Pokémon along the way, and replenishing their items. By spoofing the GPS signal he is able to simulate walking around in the physical world, potentially automating the collection of Pokémon and replenishment of items at Pokéstops.
Pokemon  GPS  SDR  HackRF  hacking  spoofing 
july 2016 by pierredv
Introducing OpenCellular: An open source wireless access platform | Engineering Blog | Facebook Code
"Today we're announcing that Facebook has designed and tested an open source and cost-effective, software-defined wireless access platform aimed to improve connectivity in remote areas of the world."
Facebook  SDR  cellular 
july 2016 by pierredv
Stealing a Drone with Software Defined Radio -
PHDays (Positive Hack Days) is a yearly forum with a focus on ethical hacking and security. During this years forum which took place in June, the organizers set up a competition where the goal was to “steal” or take control of a Syma X8C quadcopter drone. The drone runs on the nRF24L01 module, which from previous posts we have seen can easily be sniffed and decoded with an RTL-SDR or other SDR.

To reverse engineer the drones wireless communications system the teams used software defined radios like the HackRF and BladeRF, and also an alternative method involving just using an Arduino and nRF24L01+ receiver chip.
RTL-SDR  drones  hacking  SDR 
june 2016 by pierredv
Spectrum Analysis using MATLAB and GNU Radio | Nutaq
"Matlab and GNU Radio are very commonly used platforms for post-processing of the received data. As such, Nutaq products support both MATLAB and GNU Radio. The purpose of this brief application note is to compare and contrast the design flow with Matlab as well as GNU Radio and to demonstrate how the signal processing tasks can be distributed between the host machine and the FPGA. To this end, we will utilize Nutaq’s GSM Channelizer Demo which was originally designed to work with GNU Radio, and see how we can achieve similar functionalities in MATLAB."
MATLAB  GNURadio  spectrum-analysis  Nutaq  SDR 
may 2016 by pierredv
Software Defined Radio App Store | Hackaday
" LimeSDR is an open source SDR with a crowdfunding campaign. By itself, that’s not anything special. There are plenty of SDR devices available. What makes LimeSDR interesting is that it is using Snappy Ubuntu Core as a sort of app store. Developers can make code available, and end-users can easily download and install that code."
SDR  apps 
may 2016 by pierredv
"Back in 2014 the author of did a final year project for his wireless security class on hacking home alarm systems. His presentation was titled “How we broke into your house”. In his research the author used both an RTL-SDR and a simple RFcat wireless transmitter and performs a simple replay attack on a cheap $50 alarm system. "
RTL-SDR  home-security  hacking  sdr 
march 2016 by pierredv
Military spectrum management & EW challenges drive wireless monitoring tech - Cambridge Network
" As you can imagine if someone paid $48 billon for spectrum commercial enterprise they would want to recoup that cost. For example if a military platform is turned on and blanks out service to their customer base this would be unacceptable."
"For instance it is reported that the National Oceanic Atmospheric Administration (NOAA) has experienced interference issues on satellite weather data resulting in periodic data loss affecting their ability to continuously monitor regional weather events."
CRFS  spectrum  SDR  NOAA  interference  AWS-3  jamming  radar  ELINT  EW 
march 2016 by pierredv
Manufacturers start to lock down Wi-Fi router firmware. Thanks, FCC. - Feb 2016
"The part of this rule making that concerns us is that the FCC was planning to require manufacturers to lock down the software and firmware on systems with radio devices (Wi-Fi, Bluetooth, Zigbee, etc.) to prevent wireless products from being used in ways that would violate FCC rules, such as exceeding mandated maximum power output or using unauthorized frequency bands." "So, in an attempt to cure problems that have never been widespread, to wit, wireless routers being modified to transmit at higher power levels than allowed or on unauthorized frequencies, the FCC has successfully made life harder and more complex for thousands of people. What’s even more ridiculous is that, without doubt, users will figure out how to hack most of these locked-down wireless routers."
march 2016 by pierredv
TP-Link has started to lock its routers to prevent installing DD-WRT and Tomato - Feb 2016
"Router manufacturer TP-Link has started to lock its routers in the United States so users can no longer install modified firmware on them such a DD-WRT and Tomato. The company does so to comply with new regulations of the Federal Communications Commission (FCC). These ban firmware modifications for radio systems in WiFi routers and other wireless devices operating in the 5 GHz range."
DD-WRT  SDR  TP-Link  Wi-Fi 
march 2016 by pierredv
594280 Section 15.202 Software Configuration Control, Country Code Selection, Professional Installers Part 15C
"Question: What are the software security requirements for non-SDR devices and what limitations apply to software configuration control for such devices? Answer: Attachment 594280 D01 Configuration Control provides guidance on permissible options and restrictions on configuration controls for devices not approved as Software Defined Radios. Further, the Commission revised (FCC 14-30, ET Docket No. 13-39) the rules (effective June 2, 2014) for U-NII devices operating under Part 15 rules to require all devices to implement software security to ensure that the devices operate as authorized and cannot be modified. Attachment 594280 D02 UNII Device Security provides guidance on the information that must be provided in the application filing to show that proper security is implemented in the device."
march 2016 by pierredv
NPSTC SDR WG - Cognitive and Software Radio: A Public Safety Regulatory Perspective (pdf)
By John S. Powell, Chair NPSTC Software Defined Radio Working Group "NPSTC argued that the FCC’s real security concern should not be that a particular radio can be modified to operate in violation of FCC rules. Rather, the concern should be that large numbers of radios could be modified simultaneously, such as through ..."
march 2016 by pierredv
How White Hat Hackers Stole Crypto Keys from an Offline Laptop in Another Room | Motherboard
via Bruce Schneier and Blake Reid "researchers from Tel Aviv University and Technion have gone a step further than past efforts, and found a way to steal data from air-gapped machines while their equipment is in another room." “During the decryption of the chosen ciphertext, we measure the EM leakage of the target laptop, focusing on a narrow frequency band,” the paper reads. The signal is then processed, and “a clean trace is produced which reveals information about the operands used in the elliptic curve cryptography,” it continues, which in turn “is used in order to reveal the secret key.” The equipment used included an antenna, amplifiers, a software-defined radio, and a laptop. This process was being carried out through a 15cm thick wall, reinforced with metal studs, according to the paper.
cybersecurity  SDR  TEMPEST  hacking 
march 2016 by pierredv
Practical TEMPEST Attack - Schneier on Security Feb 2016
"Four researchers have demonstrated a TEMPEST attack against a laptop, recovering its keys by listening to its electrical emanations. The cost for the attack hardware was about $3,000." "The equipment used included an antenna, amplifiers, a software-defined radio, and a laptop. This process was being carried out through a 15cm thick wall, reinforced with metal studs, according to the paper."
TEMPEST  cybersecurity  Bruce-Schneier  SDR 
march 2016 by pierredv
Reverse Engineering the SimpliSafe Wireless Burglar Alarm - Feb 2016
SimpliSafe is a home security system that relies on wireless radio communications between its various sensors and control panels. They claim that their system is installed in over 300,000 homes in North America. Unfortunately for SimpliSafe, earlier this week Dr. Andrew Zonenberg of IOActive Labs published an article showing how easy it is for an attacker to remotely disable their system. By using a logic analyser he was able to ... discover which packets were the “PIN entered” packets. He then created a small electronic device out of a microcontroller that would passively listen for the PIN entered packet, save the packet into RAM, and then replay it on demand, disarming the alarm. A few days later Micheal Ossmann (wireless security researcher and creator of the HackRF SDR and YardStick One) decided to have a go at this himself, using a YARD Stick One and a HackRF SDR.... he is able to recover the actual PIN number entered by a home owner from a distance ...
home-security  SDR  RTL-SDR  hacking 
february 2016 by pierredv
Lost in Space: How secure is the Future of Mobile Positioning? | IEEE Communications Society
"The secret to our device being both lower cost and more sophisticated (for spoofing) than an off-the-shelf signal simulator was that it was built as a software-defined radio" "But a software-defined spoofer also has a significant downside: if the code were ever leaked to the public, then anyone who had read our papers, knew the basics of programming, and could wire together a few circuit boards could replicate our box. It wouldn’t take years and a team of PhDs like the first time."
GPS  spoofing  SDR 
february 2016 by pierredv
Testing a frequency synthesizer with an RTL-SDR -
"Harris Butler is designing his own software defined radio out of a Cypress PSOC5 (processor and ADC), an RF mixer, LNA and a frequency synthesizer (for use as a local oscillator) all purchased from eBay. "
february 2016 by pierredv
Review: Airspy vs. SDRplay RSP vs. HackRF -
"When people consider upgrading from the RTL-SDR, there are three mid priced software defined radios that come to most peoples minds: The Airspy, the SDRplay RSP and the HackRF. These three are all in the price range of $150 to $300 USD. In this post we will review the three units and compare them against each other on various tests."
SDR  reviews  RTL-SDR 
february 2016 by pierredv
FCC Enforcement in Action: The Mysterious AT&T San Juan Case | SpectrumTalk - The MSS Blog March 2011
quotes "The original software defined radio (SDR) rules adopted in Docket 00-47 in September 2001 had the following requirement: 2.932(e) Manufacturers must take steps to ensure that only software that has been approved with a software defined radio can be loaded into such a radio."
Mike-Marcus  FCC  enforcement  SDR 
february 2016 by pierredv
SDR Rulemaking FINALLY Resolved | SpectrumTalk - The MSS Blog Feb 2010
"At the recent SDRForum conference in Arlington (now called the Wireless Innovation Forum) I was on a panel discussion and someone in the audience asked why doesn’t FCC do more about the security of the software in software defined radios."
Mike-Marcus  SDR  rulemaking  FCC 
february 2016 by pierredv
Threat Analysis of GNU Software Radio (pdf) 2007
Via Google search "sdr threat" Raquel L. Hill, Suvda Myagmar, Roy Campbell "Software defined radio (SDR) technology implements some of the functional modules of a radio system in software enabling highly flexible handsets. SDR devices may be reconfigured dynamically via the download of new software modules. Malicious or malfunctioning downloaded software present serious security risks to SDR devices and networks in which they operate. In this paper, we analyze threats pertaining to the secure execution of downloaded software. We base our analysis on the open-source implementation of GNU Software Radio. We propose mechanisms to provide the secure execution of software modules that implement radio functionality "
SDR  threat 
february 2016 by pierredv
Mobile menace: why SDR poses such a threat
Via Google search on "sdr threat" Abstract: "The low price point of Software Defined Radio (SDR) has made it possible for a budding hacker to tap into any form of wireless-based communication. GSM, wifi, wimax and DECT are all at risk. SDR threatens to expose not only our mobile networks to attack but even the point-to-point systems used to control our critical infrastructure. The results could be a subtle as intercepting a single user's mobile phone call to his or her bank and as devastating as bringing critical communications for a major city to a standstill. So what can be done to mitigate this threat, asks Greg Jones of Digital Assurance."
SDR  threat 
february 2016 by pierredv
Software Defined Radio (SDR) as a Security Threat - 2012
Via Google search on "sdr threat" "These systems could, for example, transmit false GPS information, replay wireless transmitter signals, or mimic a wireless host or monitoring system. Many older wireless platforms use little or no security for transmission validation, and even those that do may be susceptible to certain types of attacks – such as brute forcing and jamming. Of course, the technology to interfere with wireless transmissions is already available, but it is generally cost prohibitive and complicated to operate."
SDR  threat 
february 2016 by pierredv
Bypassing Rolling Code Systems - CodeGrabbing/RollJam -
"A while back we posted about Samy Kamkars popular “RollJam” device, which was a $32 home made device that was able to defeat rolling code based wireless security systems such as those used on modern cars. Wireless security researcher Andrew Macpherson became interested in RollJam and has now written up a post showing how to create a similar device using the YardStickOne and RFcat wireless tools. In his post Andrew shows how he automates the replay attack side of things using a Python script and two RFcat devices"
SDR  cyberspace  IOT  automobile  hacking 
february 2016 by pierredv RTL-SDR Blog R820T2 RTL2832U 1PPM TCXO SMA Software Defined Radio (Dongle Only): Electronics
See "Great for many applications including general radio scanning, air traffic control, public safety radio, ADSB, AIS, ACARS, trunked radio, P25 digital voice, POCSAG, weather balloons, APRS, NOAA APT weather satellites, radio astronomy, meteor scatter monitoring, DAB, or for use as a low cost panadapter with a traditional ham radio."
SDR  dongle 
february 2016 by pierredv
FCC Changes Stance on Open-Source Security - commLawBlog Jan 2010
"For the last few years, the FCC has been playing a Bob-like role. Not about mechanical locks, of course, but over security precautions for software defined radios (SDRs)." "That critique of open source elements is a slap in the face to the Alices of the world. One such group, the SDR Forum, asked the FCC to drop the last sentence quoted above, and to allow free publication of security mechanisms, so long as there is no intent to defeat the FCC rules. Surprisingly, at least to us, the FCC dismissed the request on a technicality. "
CommLawBlog  FCC  Mitchell-Lazarus  SDR  opensource 
january 2016 by pierredv
Software defined radio | SpectrumTalk - The MSS Blog February 02, 2010
"Mitchell Lazarus writes in the Fletcher, Heald & Hildreth CommLawBlog this week about the end of the FCC’s software defined radio (SDR) rulemaking, Docket 03-108. " "While I was at FCC some of us were concerned about this and considered safeguards. But the SDR Forum and its major members were very insistent that they were responsible people and would only sell SDR units that were difficult//impossible to load with malicious unauthorized software. I am certain that this was and still is the intent of the legitimate companies that are members of the SDR Form and its successor. BUT. FCC Rules do not apply just to them. The same rules apply to anyone who manufacturers or imports SDRs."
MarcusSpectrumBlog  SDR  FCC  security  Mike-Marcus 
january 2016 by pierredv
Clearing the Air on Wi-Fi Software Updates | Federal Communications Commission
by Julie Knapp "This week marked the closing of the reply comment period in the Commission’s radio device approval modernization rulemaking. The comments and replies are largely supportive of the Commission’s proposals, but one particular element generated thousands of comments from individuals concerned that the proposal would encourage manufacturers to prevent modifications or updates to the software used in devices such as wireless local area networks (e.g., Wi-Fi routers). I’m pleased that this issue attracted considerable attention and thoughtful submissions into the record and would like to make it clear that the proposal is not intended to encourage manufacturers to prevent all modifications or updates to device software." "One of our key goals is to protect against harmful interference by calling on manufacturers to secure their devices against third party software modifications that would take a device out of its RF compliance. Yet, as the record shows, there is concern that"
FCC  SDR  Julius-Knapp  Wi-Fi 
january 2016 by pierredv
FCC: We aren’t banning DD-WRT on Wi-Fi routers | Ars Technica Nov 2015
"It's still possible for manufacturers to comply by preventing loading of any third-party firmware, but the new language could reduce the likelihood of that happening."
Wi-Fi  DD-WRT  SDR  ArsTechnica  FCC 
november 2015 by pierredv
FCC Rules on FOSS and Software-Defined Radio - Software Freedom Law Center 2007
"The Software Freedom Law Center (SFLC) has examined the Federal Communication Commission’s (FCC) rules, which go into effect today, governing Software Defined Radio (SDR) devices and concluded that the rules do not restrict the activities of independent developers and distributors of Free and Open Source Software (FOSS) designed for use with SDR devices. While the FCC’s position on FOSS is more conservative than is necessary, the FCC has given a qualified endorsement to the use of FOSS by SDR manufacturers by recognizing the benefits of using FOSS in wireless products. The FCC’s SDR rules create an opportunity for wireless hardware manufacturers, the FOSS community, and the FCC to communicate openly and productively about the ability of public disclosure and open standards to strengthen the security and robustness of wireless devices."
FCC  rules  rulemaking  SDR 
october 2015 by pierredv
FCC accused of locking down Wi-Fi routers, but the truth is a bit murkier | Ars Technica Sep 2015
"FCC plan to prevent wireless interference could have unintended consequences." Summary of state of play halfway through the consultation period
ArsTechnica  FCC  Wi-Fi  SDR 
september 2015 by pierredv
"A WebSDR is a Software-Defined Radio receiver connected to the internet, allowing many listeners to listen and tune it simultaneously. SDR technology makes it possible that all listeners tune independently, and thus listen to different signals; this is in contrast to the many classical receivers that are already available via the internet."
sdr  ham  radio 
february 2014 by pierredv
Is there a (commercial) future for Software Defined Radios ? | The Unwired People
Listening to the talks at the SDR Europe today in Brussels on developments of Software Defined Radios makes me somewhat skeptical. Reprogramming the radios to be able to quickly change the radio access waveforms and protocol sounded like a great idea 10 years ago when there were many competing “3G” air interfaces for mobile communication. As we now see a clear convergence of massproduced equipment to two interfaces, one LTE-typ interface for wide area systems and one that will somehow be containing the numbers “802″ and “11″, for short range communication, there seems to be little space for the use of SDR:s. The industry clearly went the other way and smartphones today contain 6-7 different (non-programmable) radios... SDR:s do not solve the spectrum issue – it is still very hard to build a radio (RF front ends), programmable or not, that can operate over an octave of frequency with reasonable performance.
SDR  spectrum  RF 
december 2013 by pierredv
SE43 – Cognitive radio systems - White spaces (470 - 790 MHz) = ERO
Terms of reference
== define technical and operational requirements for the operation of cognitive radio systems in the white spaces of the UHF broadcasting band (470-790 MHz) to ensure the protection of incumbent radio services/systems and investigate the consequential amount of spectrum potentially available as “white space”;
== provide, if required, technical assistance on further issues related to white spaces and cognitive radio systems that ECC may identify in the future;
== liaise directly with relevant groups within ECC and ETSI as necessar
whitespaces  cognitiveradio  SDR 
july 2009 by pierredv
ARRLWeb: FCC Adopts Software Defined Radio Rulemaking Proposal
FCC's Notice of Proposed Rulemaking (ET Docket 00-47) on SDR
june 2009 by pierredv
FCC Rules on FOSS and Software-Defined Radio - Software Freedom Law Center
"The Software Freedom Law Center (SFLC) has examined the Federal Communication Commission’s (FCC) rules, which go into effect today, governing Software Defined Radio (SDR) devices and concluded that the rules do not restrict the activities of independent developers and distributors of Free and Open Source Software (FOSS) designed for use with SDR devices"
FCC  SDR  oss 
june 2009 by pierredv
OET - ET Docket No. 03-108 -- Cognitive Radio
project page, with links to workshops and orders
FCC  SDR  cognitiveradio 
june 2009 by pierredv
GNU Radio: Tools for Exploring the Radio Frequency Spectrum
June 2004 article in Linux Journal by Eric Blossom
hardware  radio  rf  SDR 
june 2009 by pierredv
Sora: High Performance Software Radio Using General Purpose Multi-core Processors - Microsoft Research
Kun Tan, Jiansong Zhang, Ji Fang, He Liu, Yusheng Ye, Shen Wang, Yongguang Zhang, Haitao Wu, Wei Wang, and Geoffrey M. Voelker, Sora: High Performance Software Radio Using General Purpose Multi-core Processors, in 6th USENIX Symposium on Networked Systems Design & Implementation 2009, USENIX, 2009
radio  SDR  research  rf 
june 2009 by pierredv

Copy this bookmark:

to read