TY - GEN N2 - Put simply, ‘spoofing’ is a means of controlling the reported position and time of a GNSS receiver. Spoofing has now been well demonstrated in the experimental context, but until a few years ago it was regarded as “…a bit like UFOs: much speculation, occasional alarms at suspected instances, but little real-world evidence of its existence” (Ref. 1). In the intervening years spoofing has transformed from a research laboratory into an emerging threat. In this paper we focus on radio-frequency attack as the primary method of spoofing. However there is also the possibility of cyber-attack on GNSS systems, in which there is interception and modification of computed position between the receiver and application. It had perhaps previously been considered that the technology and know-how “barrier to entry” to produce an effective spoofer was itself a significant deterrent. However, the commercial availability of inexpensive (sub £250) software defined radio systems, low-cost computing and open-source GNSS signal generator software has all but eliminated this barrier. This paper will consider various methods of spoofing, means of detecting spoofing through analysis of signal anomalies and also mitigation of spoofing at the physical layer via the antenna and signal processing and at the software application layer through the detection of anomalies. AB - Put simply, ‘spoofing’ is a means of controlling the reported position and time of a GNSS receiver. Spoofing has now been well demonstrated in the experimental context, but until a few years ago it was regarded as “…a bit like UFOs: much speculation, occasional alarms at suspected instances, but little real-world evidence of its existence” (Ref. 1). In the intervening years spoofing has transformed from a research laboratory into an emerging threat. In this paper we focus on radio-frequency attack as the primary method of spoofing. However there is also the possibility of cyber-attack on GNSS systems, in which there is interception and modification of computed position between the receiver and application. It had perhaps previously been considered that the technology and know-how “barrier to entry” to produce an effective spoofer was itself a significant deterrent. However, the commercial availability of inexpensive (sub £250) software defined radio systems, low-cost computing and open-source GNSS signal generator software has all but eliminated this barrier. This paper will consider various methods of spoofing, means of detecting spoofing through analysis of signal anomalies and also mitigation of spoofing at the physical layer via the antenna and signal processing and at the software application layer through the detection of anomalies. AD - BMT, UK AD - University of Bath, UK. T1 - Spoofing and Jamming of GNSS Signals: Are They Real and What Can We Do About Them? DA - 2020-10-05 AU - Meggs, RW AU - Watson, RJ L1 - https://library.imarest.org/record/7744/files/iSCSS_2020_Paper_8.pdf JF - Conference Proceedings of iSCSS VL - iSCSS 2020 PY - 2020-10-05 ID - 7744 L4 - https://library.imarest.org/record/7744/files/iSCSS_2020_Paper_8.pdf KW - Satellite navigation KW - jamming KW - denial of service KW - radio frequency KW - ship systems KW - safety TI - Spoofing and Jamming of GNSS Signals: Are They Real and What Can We Do About Them? Y1 - 2020-10-05 L2 - https://library.imarest.org/record/7744/files/iSCSS_2020_Paper_8.pdf LK - https://www.imarest.org/events/inec-2020/iscss-2020 LK - https://library.imarest.org/record/7744/files/iSCSS_2020_Paper_8.pdf UR - https://www.imarest.org/events/inec-2020/iscss-2020 UR - https://library.imarest.org/record/7744/files/iSCSS_2020_Paper_8.pdf ER -