GNSS signal spoofing: How to evaluate the risks
Spoofing is a growing threat for GNSS-enabled equipment. Understanding how spoofing works and how to mitigate the potential impact of an attack is a key concern for developers of both commercial and military/government applications.
Highlights of the white paper include:
What GNSS spoofing is
How spoofing attacks work
What mitigation strategies are available to developers and integrators
How to test a system for spoofing robustness
Don’t wait to get your copy of GNSS Signal Spoofing.
Download the White Paper
What's inside the white paper
A review of the threats to users of commercial GNSS receivers from spoofing at the RF level
An explanation of how developers and integrators of GNSS receivers can assess the risks to their products and to their end-users’ operations
Advice on implementing and testing spoofing detection and mitigation measures
A sample test that shows how a receiver’s vulnerability to spoofing can be assessed in the lab