TAG: GNSS spoofing

Research Online: Narrowband interference mitigation, spoofing interference classification

February 27, 2017By
Spectrum of the Adaptive Notch Filter output signal for various interference levels

Get a rundown on two GNSS presentations: one on narrowband interference mitigation and on on spoofing, jamming and multipath interference classification. read more

GNSS spoofing will attain virus status, warns expert

November 29, 2016By

As manufacturers convert machines and appliances into remotely controllable objects (the Internet of Things), the potential for spoofing expands, perhaps exponentially. Hackers could interfere with the data supplied to autonomous cars or tracks, remotely forcing them to crash. Although the dangers of GPS spoofing have been pointedly discussed in may technical papers and articles in GPS World since the early... read more

Expert Advice: Low-End Jam Resilience May Not Be Desirable

May 29, 2015By
Jan Wendel

At the European Navigation Conference held in Bordeaux, France, April 7–10, a keynote session and ensuing panel discussion addressed the issue of “GNSS Resilience for Terrestrial and Naval Applications.” During the discussion, two questions from the floor drew these responses from panelist Jan Wendel of Airbus Defence & Space GmbH, a leading European aerospace company. read more

This article is tagged with , , , , , , and posted in GNSS, Opinions

Mitre Product Detects Timing Spoofing Attacks

August 4, 2014By

Mitre’s new Time Anomaly Detection Appliqué (TADA) protects modern digital systems from spoofing attacks that can corrupt time source signals. Successful spoofing attacks could result in navigational systems going haywire and grounding airplanes, jumbling of buying and selling orders, a shutdown of the stock market, or power-grid failures. Infrastructure and defense systems often rely on GPS’s unencrypted position, navigation, and timing (PNT) signal as their source of accurate time,... read more

This article is tagged with , , , , and posted in Defense, Latest News, Mobile

Innovation: GNSS Spoofing Detection

June 1, 2013By
In-opener

It's a hostile (electronic) world out there, people. Our wired and radio-based communication systems are constantly under attack from evil doers. We are all familiar with computer viruses and worms hiding in malicious software or malware distributed over the Internet or by infected USB flash drives. Trojan horses are particularly insidious. These are programs concealing harmful code that can lead to many undesirable effects such as deleting a user’s files or installing additional harmful software. Such programs pass themselves off as benign, just like the “gift” the Greeks delivered to the Trojans as reported in Virgil’s Aeneid. This was a very early example of spoofing. read more

This article is tagged with , , , , and posted in From the Magazine, Innovation, OEM