Spirent circle logo

GNSS signal spoofing: How to evaluate the risks

Spoofing is a growing threat for GNSS-enabled equipment. Understanding how spoofing works and how to mitigate the potential impact of an attack is a key concern for developers of both commercial and military/government applications.

Highlights of the white paper include:

  • What GNSS spoofing is

  • How spoofing attacks work

  • What mitigation strategies are available to developers and integrators

  • How to test a system for spoofing robustness

Don’t wait to get your copy of GNSS Signal Spoofing.

Download the White Paper

What's inside the white paper

  • A review of the threats to users of commercial GNSS receivers from spoofing at the RF level

  • An explanation of how developers and integrators of GNSS receivers can assess the risks to their products and to their end-users’ operations

  • Advice on implementing and testing spoofing detection and mitigation measures

  • A sample test that shows how a receiver’s vulnerability to spoofing can be assessed in the lab