Summary

Simulation for Jamming and Spoofing

Including case studies


Free 60-Minute Webinar

Date: Thursday, November 17, 2016
Time: 1 p.m. EST / 10 a.m. PST / 7 p.m. CET
Sponsor: Jackson Labs

Summary:

Vulnerabilities of GNSS positioning, navigation and timing are a consequence of a signals' very low received power. Those vulnerabilities include RF interference, atmospheric effects, jamming and spoofing. All cases should be tested for all GNSS equipment, not solely those whose applications or cargoes might draw criminal or terrorist attention, but because jamming or spoofing directed at another target can still affect any receiver in the vicinity.

The one-hour webinar also will include a follow-up Q&A session with the speakers.

Speakers:

Paul Crampton
Senior Systems Engineer, Spirent Federal
Crampton has been involved with the GPS industry for 29 years. He provides engineering and sales support for all GNSS simulation products at Spirent Federal. He has a bachelor's degree (honors) in information technology from Leicester Polytechnic, now known as De Montfort University, in the U.K.

Subtopic: Tests of the robustness of commercial GNSS devices against threats show that different receivers behave differently in the presence of the same threats. A risk-assessment framework for PNT systems can gauge real-world threat vectors, then the most appropriate and cost-effective mitigation can be selected. Characterization of receiver performance, to specific segments within the real world, can save either development time and cost or prevent poor performance in real deployments.

John Fischer
CTO, Spectracom
Fischer is CTO of Spectracom, a supplier of GPS-based time and frequency equipment and part of the Orolia Group of companies. He received his MSEE and BSEE degrees from SUNY at Buffalo and has more than 30 years experience creating navigation and communications systems.

Subtopic: Relatively speaking, jamming is easier for a receiver to detect than spoofing, and while it can disrupt the receiver, it cannot re-locate it. Spoofing can be used as an attack on systems that use GPS for navigation, or even for precise time transfer, to misguide a valuable asset for malicious intent. A vulnerability test system (VTS) can be used to understand how a system using a GPS receiver, and the overall system integration will react to spoofing in order to develop mitigation techniques and countermeasures. Understanding the behavior of the receiver when faced with a spoofing attack is key to hardening applications for resilient position, navigation and timing.

Gregor Said Jackson
Co-Founder and President, Jackson Labs Technologies Inc.
Jackson is co-founder and president of Jackson Labs Technologies Inc., a supplier of GNSS timing and frequency equipment. Focusing on hardware development, sales support and embedded firmware design, he has been developing industrial and military products with GPS receivers since 1994. Jackson holds a BSDIC degree in computer science and electrical engineering from the University of Massachusetts Amherst.

Subtopic: Most commercially available GNSS simulators target positioning applications, and are not specifically designed for timing applications. Critical infrastructure timing-related GNSS applications such as financial transaction timing, power generation, battlefield communications and cell-phone small-cell synchronization are becoming more and more important and vulnerable to GNSS spoofing/jamming. GNSS simulators that allow nanosecond-level synchronization to Live Sky signals can enable such testing. In the past, GNSS simulator costs have proven cost-prohibitive for smaller companies, and for simulating spoofing using paralleled multi-simulator setups. Low-cost simulators can enable testing with multiple simultaneous spoofers/jammers.

Moderator:

Alan Cameron
Editor-in-Chief and Publisher, GPS World
Cameron is editor-in-chief and publisher of GPS World magazine, where he has worked since 2000. He also writes the monthly GNSS Design & Test newsletter and the Wide Awake blog.

Brought to you by:

sponsors

Register

* First Name

* Last Name

* Company Name

* E-mail Address

* Business Street Address

Suite/Unit

* City

* Country 

* What is your organization's primary business? 

* What is your job title? 

* Are you involved with autonomous navigation, whether UAV, UAS, air, land or sea? 

* Your Question for the Speaker 

North Coast Media, LLC | Privacy Policy | © 2014