000007744 001__ 7744 000007744 005__ 20240626123055.0 000007744 02470 $$2doi$$a10.24868/issn.2631-8741.2020.005 000007744 035__ $$a4468048 000007744 037__ $$aGENERAL 000007744 245__ $$aSpoofing and Jamming of GNSS Signals: Are They Real and What Can We Do About Them? 000007744 269__ $$a2020-10-05 000007744 336__ $$aConference Proceedings 000007744 520__ $$aPut simply, ‘spoofing’ is a means of controlling the reported position and time of a GNSS receiver. Spoofing has now been well demonstrated in the experimental context, but until a few years ago it was regarded as “…a bit like UFOs: much speculation, occasional alarms at suspected instances, but little real-world evidence of its existence” (Ref. 1). In the intervening years spoofing has transformed from a research laboratory into an emerging threat. In this paper we focus on radio-frequency attack as the primary method of spoofing. However there is also the possibility of cyber-attack on GNSS systems, in which there is interception and modification of computed position between the receiver and application. It had perhaps previously been considered that the technology and know-how “barrier to entry” to produce an effective spoofer was itself a significant deterrent. However, the commercial availability of inexpensive (sub £250) software defined radio systems, low-cost computing and open-source GNSS signal generator software has all but eliminated this barrier. This paper will consider various methods of spoofing, means of detecting spoofing through analysis of signal anomalies and also mitigation of spoofing at the physical layer via the antenna and signal processing and at the software application layer through the detection of anomalies. 000007744 542__ $$fCC-BY-4.0 000007744 6531_ $$aSatellite navigation 000007744 6531_ $$ajamming 000007744 6531_ $$adenial of service 000007744 6531_ $$aradio frequency 000007744 6531_ $$aship systems 000007744 6531_ $$asafety 000007744 7001_ $$aMeggs, RW$$uBMT, UK 000007744 7001_ $$aWatson, RJ$$uUniversity of Bath, UK. 000007744 773__ $$tConference Proceedings of iSCSS 000007744 773__ $$jiSCSS 2020 000007744 789__ $$whttps://zenodo.org/record/4468048$$2URL$$eIsIdenticalTo 000007744 85641 $$uhttps://www.imarest.org/events/inec-2020/iscss-2020$$yConference website 000007744 8564_ $$9b8e7b6ee-709e-4959-a927-b823ecc95faf$$s1001401$$uhttps://library.imarest.org/record/7744/files/iSCSS_2020_Paper_8.pdf