Microchip: Protect Your Critical Infrastructure from GNSS Spoofing and Jamming

While the use of GNSS based time has become more vital for critical infrastructure operations, the security of the GNSS signal itself has become increasingly vulnerable to a wide range of jamming and spoofing threats, both intentional and unintentional. Given the inherently fragile nature of the GNSS signal, an important way in which reception of the GNSS signal can be guarded is through better visibility of the GNSS signal characteristics in real-time.

Security hardening of a GNSS system is a continual process due to the constant emergence of new threats. Like network security vulnerabilities, new GNSS vulnerabilities are on the rise and “GNSS signal visibility” is a vital capability for helping to determine the root cause of a GNSS vulnerability, especially before a minor disruption becomes a more serious outage.

Security has become the most important requirement for critical infrastructure operations. Any device connected to critical infrastructure can become a target for exploitation and needs to be as secure as possible.

Security hardening of a GNSS system is a continual process due to the constant emergence of new threats. Like network security vulnerabilities, new GNSS vulnerabilities are on the rise and “GNSS signal visibility” is a vital capability for helping to determine the root cause of a GNSS vulnerability, especially before a minor disruption becomes a more serious outage.

When a GNSS vulnerability is detected, BlueSky Performance Monitoring provides surveillance of GNSS reception quality and enables critical infrastructure operators to identify if the problem is specific to a location or affecting a larger geographical area. Further, having visibility of key performance metrics enables the operator to take quick and cost-effective action. Dispatching network operations personnel to a roof-top on a high rise building to unnecessarily check on a GNSS antenna is expensive. “GNSS visibility” using BlueSky Performance Monitoring prevents these costly mistakes.

Contact TeleScience to learn more

It's only fair to share...Email this to someone
email
Share on Facebook
Facebook
Share on LinkedIn
Linkedin
admin