matthew ahrens* December, 12th, 2014

Size: px
Start display at page:

Download "matthew ahrens* December, 12th, 2014"

Transcription

1 G P S A N D W I R E L E S S S I G N A L J A M M I N G : AT TA C K S A N D D E F E N S E S matthew ahrens* December, 12th, 2014 contents 1 Introduction History of GPS What is the need for security of GPS? How GPS Works Attacks Signal Jamming Signal Spoofing Examples: University of Texas Examples: Carnegie Mellon Defenses Detection Prevention GPS Alternatives Conclusion 10 For Comp116, Intro. to Computer Security, with Prof. Ming Chow * Department of Computer Science, Tufts University, Medford, MA 1

2 introduction 2 1 introduction 1.1 History of GPS GPS, Global Positioning System, is a type of Global Navigation Satellite System 1 that currently consists of 27 satellites that orbit around fixed points on the earth. Originally designed for military use, GPS was not used for commercial and civilian applications until early 1980s.[Glo14] In 2000, the U.S. government disabled the GPS protocol selective availability. This feature was the intentional degradation of quality for specific uses of GPS in some regions. Selective availability was implemented originally as a security measure against malicious use of tracking.[gov14a] The user benefits of turning selective availability off are obvious, higher accuracy for civilian applications. 1.2 What is the need for security of GPS? Government programs are moving forward with three new dedicated civilian layers of GPS signal.[gov14b] They include: L2C: A 1227 MHz signal for civilian needs at military accuracy or better L1C: A 1575 MHz signal for the interoperability of GPS with other GNSS systems for urban use L5: A 1176MHz signal for use on dedicated life safety systems such as transit, commercial aircraft, and emergency transport In analyzing precursory information about these signal bands, security is only mentioned once in protecting the L1C signal translation between US GPS systems and EU systems like Galileo 2 from normal urban noise. There is no mention of even the possibility of malicious attacks. The description of L5 is the most interesting in the scope of security. Added control measures by the Department of Defense are being added. These measures are to 1 Abbv. GNSS 2 Galileo is the European GPS equivalent run by civilians for general use.

3 introduction 3 insure that from the new wave of GPS satellites, to the control stations, communication is robust and redundant.[od14] The definition of what a healthy data set looks like shows a continuous integrated approach by the DoD, the air force, and the USDOT to collaborate for a higher quality of service 3. The bigger question is What about security? Currently there are little to no guarantees that any aspect of the GPS protocol can guarantee correctness at the level of the consuming client. Given the wide variety of GPS client manufacturers, how do you assure quality is maintained in the face of malious attacks, not just common noise and interference. One of the inherit benefits of putting life safety systems on their own band is less interference and higher QoS for these integral systems. But, by signaling them out, it becomes easier for attackers to target critical systems while going undetected since other GPS enabled systems would show no symptoms. Also, unlike their military counterparts, the authentication mechanisms for civilian GPS bands are unencrypted. This leaves them open to vulnerabilities and attacks. In order to understand how these attacks against critical clients would work, we will look at how GPS trasmission and reception works, and how security is more difficult with GPS than other wireless systems. 1.3 How GPS Works Client GPS systems receive signals from a collection of the 27 satellites that fly in medium Earth orbit. Using tuples of signal from any three (but typically for or more for accuracy) satellites the client can use trilateration to find the Latitudinal and Longitudinal intersection around three fixed points, giving a precise location on the Earths surface. The signal data contains a payload of an atomic timestamp, the location of the satellite, and optionally a checksum. Since radio waves travel near the speed of light when ignoring interference, clients use the timestamp to calculate the distance of the satellite. If the checksum is implemented client side, and the current GPS satellite supports it, then the quality that the signal is not malformed due to noise is insured. Checksum can then be thought of as proving the integrity of the signal; however, it does not insure the authenticity of the 3 These agencies are working together on the open standard for this band and the L2C band.

4 attacks 4 signal. Generally, client systems treat any signal that correctly forms to the NMEA 4 standard as being authentic and from an approved source satellite or otherwise. How these client systems tell satellites apart from one another is through their coarse acquisition code 5. This code is a pseudorandom number stream that is unique to that satellite and is public. There is no guarantees on verifying that a signal broadcasted with a specific C/A code originated from that satellite.[nld + 12] GPS is similar to its wireless brethren WiMax 6 In this way where the physical layer is unencrypted and unauthenticated by design.[mb08] 2 attacks There are two major types of attacks that have been commonly used in the past. Signal Jamming is the transmission of noise over the GPS frequency band which acts as a Denial-of-Service 7 attack against the clients. Signal Spoofing is transmitting false data using a satellite s C/A code to cause clients to make incorrect pseudo ranges or other estimates of where the satellite is currently. The threat model is growing as more robust attack services are being made. Building on these two attack vectors, researchers have been able to make attack systems that can affect the control layer 8 that are inexpensive to construct and are hard to find the origin of or trace. 2.1 Signal Jamming Jamming is very simplistic of an attack. Like WiFi, WiMax, and cellular signals such as 3G and 4G, GPS is susceptible to noise and interference. Unlike these signals, the size of the data packet is known and the rhythm in which synchronization data is also known by definition. Blanket jamming attackers, where an attack outputs noise on the GPS frequency band is the 4 National Marine Electronics Associationhttp:// 5 Abbv. C/A code 6 Known as the IEEE standard 7 abbv. DoS 8 The intermediate layer that guarantees communication between satellites and major stations.

5 attacks 5 common and simple version of this attack. This attack comes at a grave risk to attackers, as it is easy to trace a spaming signal and is highly illegal. As signal Jamming is a very disruptive attack to life systems such as police and medical transport, as well as large commercial systems such as transit and airports, the FCC has made it explicitly illegal to buy, sell, market, or operate jamming equipment.[fcc14] The rhythmic nature of GPS allows attackers focusing on jammer attacks to be sneakier than those trying to avoid police radar or disable wifi. Because GPS clients need to sync against a satellites C/A code and then calculate the offset in time to find position, an attacker needs to only spam signals during the time when the code is broadcasted, and not block out every GPS transmission. Secondly, since there is no feedback from GPS clients, a jammer can be very far away from the clients it is attacking and cover a large area easily. For the casual, accidental attack, such as the employee trying to obfuscate his location from his employeer[mat13], a small jammer running off of the auxiliary of a 12 volt battery can disrupt the operation of a service such as an air traffic control tower from a major road more than two-thousand feet away. While this attack is just a crude example that most networks are susceptible too, more insidious attacks that are harder to trace and have more detrimental effects exist. 2.2 Signal Spoofing One of the major problems of GPS clients is that they treat well-formed input as trusted source. This is equivalent to trusting that well-formed text input from a client application does not contain malicious values such as with code injection or cross-site scripting. Traditional spoofing attacks can attack one of two systems that clients take from GPS signal input. They can attack the clock or they can attack the position. Attacking either will induce error in the core functionality of the client, the pseudorange for the satellite will be incorrect. If the time is attacked, then the cycles the client must shift in order to calculate distance will be wrong. The position will simply be referenced to an incorrect value of the position is spoofed. Spoofing the position is

6 attacks 6 easier to detect and correct for, a correct position will overwrite an incorrect one as position history would typically not be kept in the calculation. By attacking the time, though, the client s history of input from the satellite will be off and take many cycles to correct if it gets corrected at all. Simple attacks use GPS simulators, which are commercial devices used to test the performance of GPS receivers. Simulators generate the L1 signal using either default data, or the user can upload the specification of a signal in a standard format, e.g., Spirent uses NMEA. The main purpose of simulators is offline testing. Simulators for a constellation of satellites typically cost several thousand dollars. In 2002 researchers rented a simulator, added an amplifier, and showed that nearby receivers would lock onto the signal.[nld + 12] 2.3 Examples: University of Texas In a more sophisticated attack, researchers from Todd Humphreys lab at University of Texas showed that buy spoofing civilian GPS signals 9, they were able to convince the ship to change course and that it was in vital danger i.e. trick it into thinking its altitude was under sea level.[neu13] The tests showed that this spoofing signal worked from as far as thirty kilometers away. So, while casual users are deterred by aforementioned US laws and penalties for repeat offense in blocking signals where the likelihood of being caught is high one time attackers looking to overtake specific systems for only a few attacks can easily falsify the system, gain control, and be harder to trace. 2.4 Examples: Carnegie Mellon In showing the viability of organized, sophisticated attacks while still being easy and inexpensive, Researchers from Carnegie Mellon sought to make a Phase-coherent Signal Synthesizer to perform stealthy spoofing-like attacks 9 Specifically the L1 band

7 defenses 7 Figure 1: Carnegie Mellon s DSP diagram for the functionality of their Phasecoherent Signal Synthesizer against the civilain GPS band. Using a standard DSP pipeline, they build a robust signal processor and producer for under $2,500 USD which they say is comparible to a high-end laptop and all parts are available to the general public. This device works by receiving legitmate signals broadcasted from GPS satellites and syntheses new GPS signals with the injected payloads in real time. If a target is defined, then the device can account for the delay relaying the signal would add and account for it in the navigation payload, thus cloaking its location of origin which preserves the attacker and makes the signal s authenticity more believable which mitigates defenses. [NLD + 12] These experiments show in great detail how attacking a GPS can have large detrimental affects, and as we sanction out bands it is likely to become attractive to integrate the data from GPS signals such as positioning and atomic time into core systems of other devices. As we embedded GPS into phones, cars, trains, plains, medical transport, and other things where guarantee of delivery and robustness are the assurances we are given, we are leaving ourselves open to a new line of vulnerabilities up the chain. 3 defenses The simpler versions of these attacks can be easily mitaged if client GPS systems become wary of the origins of their signal input. Much like with Web programming, GPS client programmers need to sanitize input. This is harder since it is very simple to see malformed textual input that harbores

8 defenses 8 malicious code, but GPS signal input must already adhere to a data protocol. Statistical and Differential techniques can be used to mitigate jamming and spoofing, and these techniques fall into the two categories common to most security applications: Detection and Prevention. 3.1 Detection On the client level and more easy to adopt GPS should borrow from some of the approaches of security of Wireless Sensor Networks 10 and use the fact that GPS systems are typically embedded as a stength and not a weakness. Much like Wireless Sensor Networks do periodic history authenitcation using a base station or some other localization [PVC09], GPS systems could network together to verify the authenticity. Several GPS devices could communicate with eachother through some other transmission medium (TCP/IP, RF, etc.) that has its own encryption, authentication, or other handshaking. They can then share notes and compare signals received for a given satellite s C/A code. If a device has a significant amount of signal history that does not agree with the results of its correspondence, it: Has detected an attack Can begin defending, reporting, or otherwise trying to mitigate that attack If communication to networked devices is unavailable or dangerous i.e. behind enemy lines or in other time of crisis then the quality of the data signal should be scrutinized in real time by its frequency, its offset, and its predictability. Given the current location, and the basic acceleration reading of any cheap sensor, a device should be able to predict its next location with some small margin of error. By doing online calculation of where it thinks the satelite should be given some assumed valid past data, if an attacker tries to inject into the system, it could easily be noticed as an outlier. This fails though, as attacks such as the ones researched by Carnegie Mellon become more sophisticated and minimize difference. This also fails if the 10 abbv. WSNs

9 defenses 9 area is already compromised by fake signals, but is still better than trusting the input as valid by default. 3.2 Prevention 3.3 GPS Alternatives At a systemic level, the best way to detect (and prevent) jammers and spoofers would be to add encryption to the C/A code much like the military GPS signals already have. Other prevention measures that do not include detection first must mean that data is supplemented from other positioning sources Local Positioning Systems Specifically in the cases of urban and suburban GPS security of transit and medical systems, there is an abundance of freely broadcasted data that can be used to prevent attacks from succeeding. A GPS client now is typically a full stack application with access to an OS, hardrive, and other nicities that allow it to interact with a broader array of sensors. Similar to how the accelerometer detection would work online, the GPS client could take in BSSID data hardware mac addresses of nearby wifi (and 3G/4G cell towers) and associate it with some location either by supervised input or GPS automation if the data at that time is assumed to be valid. The client could then do a localized 2D trilateration inbetween GPS signals to confirm within some strong confidence that the GPS data is accurate. The assumptions made here are that: Wifi routers are not likely to change position Wifi routers are not likely to appear / disappear In these cases, where any given household or corporate office in a densly populated area is producing and consuming broadcasted wifi signal, not only can locally positioning based off of wifi routers help authenticate validity of position, but also can provide faster and more accurate positioning than processing GPS data alone. The major drawback to this is that clients

10 conclusion 10 would need to collect data beforehand / offline before being able to use this feature, but two ways to overcompensate for that are (1) to trust GPS data is valid the first time in an area and collect data at that step or (2) communicate with other networked devices and share data in order to not recompute / store rundundant information where you would also need to trust the validity of that data. Many major carriers and mapping providers e.g. Google, Apple already do this and it is proven effective in general at providing reliable, valid data through mixed mode validation. 4 conclusion As GPS evolves into more specific, life critical applications both on the system side and the client side, we as developers need to think about how to mitigate the risks and potential for attacks by not blindly trusting the input just because it is well-formed. As we have seen, even though a signal can conform the standard set by NMEA and adhere to the robustness of the three new Civil bands for GPS, research has shone that GPS is one of the most suseptible wireless data protocols out there for civilians due to lack of encryption, authentication, and the increasing ability to stealthily jam and spoof signals. We have presented some mitigation and detection techniques that we hope to see in future commericial standards that take advantage of the fact that GPSes being embedded in smarter systems should be more resilliant, not more compromisable. references [FCC14] The FCC. Jammer Enforcement fcc encyclopedia, [Glo14] Mio Global. History of gps, [Gov14a] U.S. Government. Gps, [Gov14b] U.S. Government. New Civil Signals modernization, 2014.

11 references 11 [Mat13] Chris Matuszczyk. Truck driver has gps jammer, accidentally jams newark airport, [MB08] Siddharth Maru and Timothy X Brown. Denial of service vulnerabilities in the protocol. In Proceedings of the 4th Annual International Conference on Wireless Internet, WICON 08, pages 37:1 37:9, ICST, Brussels, Belgium, Belgium, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering). [Neu13] Peter G. Neumann. Risks to the public. SIGSOFT Softw. Eng. Notes, 38(6):21 28, November [NLD + 12] Tyler Nighswander, Brent Ledvina, Jonathan Diamond, Robert Brumley, and David Brumley. Gps software attacks. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 12, pages , New York, NY, USA, ACM. [od14] Department of Defense. Dod announces start of civil navigation message broadcasting, [PVC09] Josep Paradells, Jordi Vilaseca, and Jordi Casademont. Improving security applications using indoor location systems on wireless sensor networks. In Proceedings of the International Conference on Advances in Computing, Communication and Control, ICAC3 09, pages , New York, NY, USA, ACM.

Mobile Security Fall 2015

Mobile Security Fall 2015 Mobile Security Fall 2015 Patrick Tague #8: Location Services 1 Class #8 Location services for mobile phones Cellular localization WiFi localization GPS / GNSS 2 Mobile Location Mobile location has become

More information

Jamming and Spoofing of GNSS Signals An Underestimated Risk?!

Jamming and Spoofing of GNSS Signals An Underestimated Risk?! Jamming and Spoofing of GNSS Signals An Underestimated Risk?! Alexander Rügamer Dirk Kowalewski Fraunhofer IIS NavXperience GmbH Fraunhofer IIS 1 Source: http://securityaffairs.co/wordpress/wpcontent/uploads/2012/02/spoofing.jpg

More information

Surviving and Operating Through GPS Denial and Deception Attack. Nathan Shults Kiewit Engineering Group Aaron Fansler AMPEX Intelligent Systems

Surviving and Operating Through GPS Denial and Deception Attack. Nathan Shults Kiewit Engineering Group Aaron Fansler AMPEX Intelligent Systems Surviving and Operating Through GPS Denial and Deception Attack Nathan Shults Kiewit Engineering Group Aaron Fansler AMPEX Intelligent Systems How GPS Works GPS Satellite sends exact time (~3 nanoseconds)

More information

Security of Global Navigation Satellite Systems (GNSS) GPS Fundamentals GPS Signal Spoofing Attack Spoofing Detection Techniques

Security of Global Navigation Satellite Systems (GNSS) GPS Fundamentals GPS Signal Spoofing Attack Spoofing Detection Techniques Security of Global Navigation Satellite Systems (GNSS) GPS Fundamentals GPS Signal Spoofing Attack Spoofing Detection Techniques Global Navigation Satellite Systems (GNSS) Umbrella term for navigation

More information

RESPONSE TO THE HOUSE OF COMMONS TRANSPORT SELECT COMMITTEE INQUIRY INTO GALILEO. Memorandum submitted by The Royal Academy of Engineering

RESPONSE TO THE HOUSE OF COMMONS TRANSPORT SELECT COMMITTEE INQUIRY INTO GALILEO. Memorandum submitted by The Royal Academy of Engineering RESPONSE TO THE HOUSE OF COMMONS TRANSPORT SELECT COMMITTEE INQUIRY INTO GALILEO Memorandum submitted by The Royal Academy of Engineering September 2004 Executive Summary The Royal Academy of Engineering

More information

Assessing the likelihood of GNSS spoofing attacks on RPAS

Assessing the likelihood of GNSS spoofing attacks on RPAS Assessing the likelihood of GNSS spoofing attacks on RPAS Mike Maarse UvA/NLR 30-06-2016 Mike Maarse (UvA/NLR) RP2 Presentation 30-06-2016 1 / 25 Introduction Motivation/relevance Growing number of RPAS

More information

Extreme space weather: Geomagnetic storms, GNSS disruptions and the impact on vital functions in society

Extreme space weather: Geomagnetic storms, GNSS disruptions and the impact on vital functions in society Extreme space weather: Geomagnetic storms, GNSS disruptions and the impact on vital functions in society Fredrik Marsten Eklöf FOI, Informationssystem fredrik.eklof@foi.se, 0709-277426 Global Navigation

More information

The Next Generation of Secure Position, Navigation and Timing Technology

The Next Generation of Secure Position, Navigation and Timing Technology Navigation and Timing Technology November 2017 Contents Executive Summary 2 GPS on the Battlefield 2 Vulnerabilities of GPS 2 Staying Ahead of the Threat 3 Innovating For More Resilient PNT 3 Innovative,

More information

Basics of Satellite Navigation an Elementary Introduction Prof. Dr. Bernhard Hofmann-Wellenhof Graz, University of Technology, Austria

Basics of Satellite Navigation an Elementary Introduction Prof. Dr. Bernhard Hofmann-Wellenhof Graz, University of Technology, Austria Basics of Satellite Navigation an Elementary Introduction Prof. Dr. Bernhard Hofmann-Wellenhof Graz, University of Technology, Austria CONCEPT OF GPS Prof. Dr. Bernhard Hofmann-Wellenhof Graz, University

More information

Implementation and Performance Evaluation of a Fast Relocation Method in a GPS/SINS/CSAC Integrated Navigation System Hardware Prototype

Implementation and Performance Evaluation of a Fast Relocation Method in a GPS/SINS/CSAC Integrated Navigation System Hardware Prototype This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. Implementation and Performance Evaluation of a Fast Relocation Method in a GPS/SINS/CSAC

More information

Evaluating OTDOA Technology for VoLTE E911 Indoors

Evaluating OTDOA Technology for VoLTE E911 Indoors Evaluating OTDOA Technology for VoLTE E911 Indoors Introduction As mobile device usage becomes more and more ubiquitous, there is an increasing need for location accuracy, especially in the event of an

More information

Time Firewall: Securing the GNSS receivers against Spoofing/Jamming. Shemi Prazot AccuBeat

Time Firewall: Securing the GNSS receivers against Spoofing/Jamming. Shemi Prazot AccuBeat Time Firewall: Securing the GNSS receivers against Spoofing/Jamming Shemi Prazot AccuBeat 1 The need The GNSS systems are widely used for both navigation and timing in civilian infrastructures and military

More information

A Review of Vulnerabilities of ADS-B

A Review of Vulnerabilities of ADS-B A Review of Vulnerabilities of ADS-B S. Sudha Rani 1, R. Hemalatha 2 Post Graduate Student, Dept. of ECE, Osmania University, 1 Asst. Professor, Dept. of ECE, Osmania University 2 Email: ssrani.me.ou@gmail.com

More information

S a t e l l i t e T i m e a n d L o c a t i o n. N o v e m b e r John Fischer VP Advanced R&D

S a t e l l i t e T i m e a n d L o c a t i o n. N o v e m b e r John Fischer VP Advanced R&D STL - S a t e l l i t e T i m e a n d L o c a t i o n N o v e m b e r 2 0 1 7 John Fischer VP Advanced R&D jfischer@orolia.com 11/28/201 1 7 WHY AUGMENT GNSS? Recent UK Study Economic Input to UK of a

More information

HOW TO RECEIVE UTC AND HOW TO PROVE ACCURACY

HOW TO RECEIVE UTC AND HOW TO PROVE ACCURACY HOW TO RECEIVE UTC AND HOW TO PROVE ACCURACY Marc Weiss, Ph.D. Independent Consultant to Booz Allen Hamilton Weiss_Marc@ne.bah.com Innovation center, Washington, D.C. JANUARY 23, 2018 HOW DO YOU GET UTC

More information

CARRIER PHASE VS. CODE PHASE

CARRIER PHASE VS. CODE PHASE DIFFERENTIAL CORRECTION Code phase processing- GPS measurements based on the pseudo random code (C/A or P) as opposed to the carrier of that code. (1-5 meter accuracy) Carrier phase processing- GPS measurements

More information

Experience with Radio Navigation Satellite Service (RNSS)

Experience with Radio Navigation Satellite Service (RNSS) Experience with Radio Navigation Satellite Service (RNSS) International Satellite Communication Symposium International Telecommunication Union (ITU) Geneva, 13-14 June 2016 MITOME, Takahiro Co-Chair of

More information

GLOBAL POSITIONING SYSTEMS

GLOBAL POSITIONING SYSTEMS GLOBAL POSITIONING SYSTEMS GPS & GIS Fall 2017 Global Positioning Systems GPS is a general term for the navigation system consisting of 24-32 satellites orbiting the Earth, broadcasting data that allows

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like

More information

Power Utilities Mitigating GPS Vulnerabilities and Protecting Power Utility Network Timing

Power Utilities Mitigating GPS Vulnerabilities and Protecting Power Utility Network Timing Mitigating GPS Vulnerabilities and Protecting Power Utility Network Timing Introduction The Global Positioning System (GPS) is ubiquitous as a source of precise timing for utility data networks and power

More information

TACOT Project. Trusted multi Application receiver for Trucks. Bordeaux, 4 June 2014

TACOT Project. Trusted multi Application receiver for Trucks. Bordeaux, 4 June 2014 TACOT Project Trusted multi Application receiver for Trucks Bordeaux, 4 June 2014 Agenda TACOT Context & Solution Technical developments Test & Validation results Conclusions GNSS ease our lives GNSS is

More information

GALILEO Research and Development Activities. Second Call. Area 3. Statement of Work

GALILEO Research and Development Activities. Second Call. Area 3. Statement of Work GALILEO Research and Development Activities Second Call Area 3 Innovation by Small and Medium Enterprises Statement of Work Rue du Luxembourg, 3 B 1000 Brussels Tel +32 2 507 80 00 Fax +32 2 507 80 01

More information

Challenges and Solutions for GPS Receiver Test

Challenges and Solutions for GPS Receiver Test Challenges and Solutions for GPS Receiver Test Presenter: Mirin Lew January 28, 2010 Agenda GPS technology concepts GPS and GNSS overview Assisted GPS (A-GPS) Basic tests required for GPS receiver verification

More information

The GLOBAL POSITIONING SYSTEM James R. Clynch February 2006

The GLOBAL POSITIONING SYSTEM James R. Clynch February 2006 The GLOBAL POSITIONING SYSTEM James R. Clynch February 2006 I. Introduction What is GPS The Global Positioning System, or GPS, is a satellite based navigation system developed by the United States Defense

More information

Proceedings of Al-Azhar Engineering 7 th International Conference Cairo, April 7-10, 2003.

Proceedings of Al-Azhar Engineering 7 th International Conference Cairo, April 7-10, 2003. Proceedings of Al-Azhar Engineering 7 th International Conference Cairo, April 7-10, 2003. MODERNIZATION PLAN OF GPS IN 21 st CENTURY AND ITS IMPACTS ON SURVEYING APPLICATIONS G. M. Dawod Survey Research

More information

GSS8000. Highlights of the GSS8000 series. Multiple Signals Combined. Comprehensive Modelling. Unmatched Pedigree and Support

GSS8000. Highlights of the GSS8000 series. Multiple Signals Combined. Comprehensive Modelling. Unmatched Pedigree and Support GSS8000 SERIES GSS8000 Highlights of the GSS8000 series The GSS8000 series has been designed to meet all the demanding requirements of research and development teams involved in satellite navigation and

More information

Engr 1202 ECE. Clean Room Project

Engr 1202 ECE. Clean Room Project Engr 1202 ECE Clean Room Project Dilbert the engineer gets special recognition September 2005 2014 Version does not even have my name! AC vs. DC Circuits DC and AC devices in everyday life DC Devices

More information

Spectrum Management. Justin Taylor ATS systems

Spectrum Management. Justin Taylor ATS systems Spectrum Management Justin Taylor ATS systems What Is Spectrum Management Spectrum management refers to the process of regulating the RF spectrum, either for an entire country or at a particular location

More information

DEFINING THE FUTURE OF SATELLITE SURVEYING WITH TRIMBLE R-TRACK TECHNOLOGY

DEFINING THE FUTURE OF SATELLITE SURVEYING WITH TRIMBLE R-TRACK TECHNOLOGY DEFINING THE FUTURE OF SATELLITE SURVEYING WITH TRIMBLE R-TRACK TECHNOLOGY EDMOND NORSE, GNSS PORTFOLIO MANAGER, TRIMBLE SURVEY DIVISION WESTMINSTER, CO USA ABSTRACT In September 2003 Trimble introduced

More information

Introduction. Global Positioning System. GPS - Intro. Space Segment. GPS - Intro. Space Segment - Contd..

Introduction. Global Positioning System. GPS - Intro. Space Segment. GPS - Intro. Space Segment - Contd.. Introduction Global Positioning System Prof. D. Nagesh Kumar Dept. of Civil Engg., IISc, Bangalore 560 012, India URL: http://www.civil.iisc.ernet.in/~nagesh GPS is funded and controlled by U. S. Department

More information

DYNAMICALLY RECONFIGURABLE SOFTWARE DEFINED RADIO FOR GNSS APPLICATIONS

DYNAMICALLY RECONFIGURABLE SOFTWARE DEFINED RADIO FOR GNSS APPLICATIONS DYNAMICALLY RECONFIGURABLE SOFTWARE DEFINED RADIO FOR GNSS APPLICATIONS Alison K. Brown (NAVSYS Corporation, Colorado Springs, Colorado, USA, abrown@navsys.com); Nigel Thompson (NAVSYS Corporation, Colorado

More information

Location Discovery in Sensor Network

Location Discovery in Sensor Network Location Discovery in Sensor Network Pin Nie Telecommunications Software and Multimedia Laboratory Helsinki University of Technology niepin@cc.hut.fi Abstract One established trend in electronics is micromation.

More information

Global Navigation Satellite System (GNSS) GPS Serves Over 400 Million Users Today. GPS is used throughout our society

Global Navigation Satellite System (GNSS) GPS Serves Over 400 Million Users Today. GPS is used throughout our society Global avigation Satellite System (GSS) For freshmen at CKU AA December 10th, 2009 by Shau-Shiun Jan ICA & IAA, CKU Global avigation Satellite System (GSS) GSS (Global Positioning System, GPS) Basics Today

More information

Next Generation Positioning Infrastructure

Next Generation Positioning Infrastructure Next Generation Positioning Infrastructure The GNSS Network in the 21 st Century Joel VAN CRANENBROECK & Partners Beyond East & West GeoSensing Community 1 INFRASTRUCTURE "The installations that form the

More information

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

Developing a GNSS resiliency framework for timing receivers. By Guy Buesnel and Adam Price Spirent Communications, October 2017

Developing a GNSS resiliency framework for timing receivers. By Guy Buesnel and Adam Price Spirent Communications, October 2017 Developing a GNSS resiliency framework for timing receivers By Guy Buesnel and Adam Price, October 2017 Overview of Spirent Positioning and Timing Mobile Devices Military Applications Commercial Air Travel

More information

Dimov Stojče Ilčev. CNS Systems

Dimov Stojče Ilčev. CNS Systems Stratospheric Platform Systems (SPS) Presentation by: Dimov Stojče Ilčev Durban University of Technology (DUT) Space Science Centre (SSC) CNS Systems August 2011 SPS for Mobile CNS Applications Stratospheric

More information

Working Party 5B DRAFT NEW RECOMMENDATION ITU-R M.[500KHZ]

Working Party 5B DRAFT NEW RECOMMENDATION ITU-R M.[500KHZ] Radiocommunication Study Groups Source: Subject: Document 5B/TEMP/376 Draft new Recommendation ITU-R M.[500kHz] Document 17 November 2011 English only Working Party 5B DRAFT NEW RECOMMENDATION ITU-R M.[500KHZ]

More information

Ensuring Robust Precision Time: Hardened GNSS, Multiband, and Atomic Clocks. Lee Cosart WSTS 2018

Ensuring Robust Precision Time: Hardened GNSS, Multiband, and Atomic Clocks. Lee Cosart WSTS 2018 Power Matters. Ensuring Robust Precision Time: Hardened GNSS, Multiband, and Atomic Clocks Lee Cosart lee.cosart@microsemi.com WSTS 2018 Outline Introduction The Challenge Time requirements increasingly

More information

Jamming Wireless Networks: Attack and Defense Strategies

Jamming Wireless Networks: Attack and Defense Strategies Jamming Wireless Networks: Attack and Defense Strategies Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang, WINLAB, Rutgers University IAB, Dec. 6 th, 2005 Roadmap Introduction and Motivation Jammer Models

More information

Wireless systems. includes issues of

Wireless systems. includes issues of Wireless systems includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs. digital, bits & bytes software applications, operating system organization

More information

Quartz Lock Loop (QLL) For Robust GNSS Operation in High Vibration Environments

Quartz Lock Loop (QLL) For Robust GNSS Operation in High Vibration Environments Quartz Lock Loop (QLL) For Robust GNSS Operation in High Vibration Environments A Topcon white paper written by Doug Langen Topcon Positioning Systems, Inc. 7400 National Drive Livermore, CA 94550 USA

More information

Wireless Sensor Networks

Wireless Sensor Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia June 19, 2007 Wireless

More information

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia Wireless Sensor Networks

More information

Tracking New Signals from Space GPS Modernization and Trimble R-Track Technology

Tracking New Signals from Space GPS Modernization and Trimble R-Track Technology Tracking New Signals from Space GPS Modernization and Trimble R-Track Technology Edmond T. Norse Trimble Integrated Surveying Group, Westminster, Colorado U.S. TRIMBLE 2 Tracking New Signals from Space

More information

Applying Defence-in-depth to counter RF interferences over GNSS

Applying Defence-in-depth to counter RF interferences over GNSS Applying Defence-in-depth to counter RF interferences over GNSS IET 5th Oct. 2011 Xavier Bertinchamps - GSA Objective of this presentation Understand Jamming threat on GNSS Propose a comprehensive strategy

More information

Galileo Aktueller Stand der Entwicklung

Galileo Aktueller Stand der Entwicklung Galileo Aktueller Stand der Entwicklung Is there a positive perspective for Galileo? Dr. Philipp Berglez TeleConsult Austria GmbH GSV-Forum Galileo das europäische Satellitennavigationssystem eine neue

More information

Get in Sync and Stay that Way

Get in Sync and Stay that Way Get in Sync and Stay that Way CHOOSING THE RIGHT FREQUENCY FOR YOUR WIRELESS TIMEKEEPING SOLUTION Prepared by Primex Wireless 965 Wells Street Lake Geneva, WI 53147 U.S. 800-537-0464 Canada 800-330-1459

More information

Entity Tracking and Surveillance using the Modified Biometric System, GPS-3

Entity Tracking and Surveillance using the Modified Biometric System, GPS-3 Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 9 (2013), pp. 1115-1120 Research India Publications http://www.ripublication.com/aeee.htm Entity Tracking and Surveillance

More information

Principles of. Principles of GPS 9/12/2011

Principles of. Principles of GPS 9/12/2011 Principles of GPS How the Global Positioning System works is, conceptually, really very simple The GPS system is based on a distance measuring (satellite ranging) system That means that we find our position

More information

What is a GPS How does GPS work? GPS Segments GPS P osition Position Position Accuracy Accuracy Accuracy GPS A pplications Applications Applications

What is a GPS How does GPS work? GPS Segments GPS P osition Position Position Accuracy Accuracy Accuracy GPS A pplications Applications Applications What is GPS? What is a GPS How does GPS work? GPS Segments GPS Position Accuracy GPS Applications What is GPS? The Global Positioning System (GPS) is a precise worldwide radio-navigation system, and consists

More information

Proposal # xxxxxxxxxxxx. Intercept Jammer. Date:

Proposal # xxxxxxxxxxxx. Intercept Jammer. Date: Proposal # xxxxxxxxxxxx Intercept Jammer Date: Presented From: HSS Development 75 S. Broadway White Plains, NY 060 Office: 94-304-4333 www.secintel.com New York Disclaimers: All descriptions of HSS products

More information

White Paper. GPS Jamming. Increasing system resilience to counteract intentional and unintentional GPS signal interferences

White Paper. GPS Jamming. Increasing system resilience to counteract intentional and unintentional GPS signal interferences White Paper GPS Jamming Increasing system resilience to counteract intentional and unintentional GPS signal interferences Mark Hendrick, Engineering Program Manager 07/2011 1474-002 RevA White Paper GPS

More information

Canadian Coast Guard Review to Implement a Resilient Position, Navigation and Timing Solution for Canada. Mariners Workshop January 31 st, 2018

Canadian Coast Guard Review to Implement a Resilient Position, Navigation and Timing Solution for Canada. Mariners Workshop January 31 st, 2018 Canadian Coast Guard Review to Implement a Resilient Position, Navigation and Timing Solution for Canada Mariners Workshop January 31 st, 2018 Outline Overview of GNSS use in the marine sector CCG Activities

More information

Using GPS in Embedded Applications Pascal Stang Stanford University - EE281 November 28, 2000

Using GPS in Embedded Applications Pascal Stang Stanford University - EE281 November 28, 2000 Using GPS in Embedded Applications Pascal Stang Stanford University - EE281 INTRODUCTION Brief history of GPS Transit System NavStar (what we now call GPS) Started development in 1973 First four satellites

More information

GPS Modernization and Program Update

GPS Modernization and Program Update GPS Modernization and Program Update GPS Update to ION Southern California Chapter 22 Feb 2011 Colonel Bernie Gruber Director Global Positioning Systems Directorate Contents Current Constellation Modernization

More information

RECOMMENDATION ITU-R BS

RECOMMENDATION ITU-R BS Rec. ITU-R BS.1350-1 1 RECOMMENDATION ITU-R BS.1350-1 SYSTEMS REQUIREMENTS FOR MULTIPLEXING (FM) SOUND BROADCASTING WITH A SUB-CARRIER DATA CHANNEL HAVING A RELATIVELY LARGE TRANSMISSION CAPACITY FOR STATIONARY

More information

The Effect of Radio Frequency Interference on GNSS Signals and Mitigation Techniques Presented by Dr. Tarek Attia

The Effect of Radio Frequency Interference on GNSS Signals and Mitigation Techniques Presented by Dr. Tarek Attia International Conference and Exhibition Melaha2016 GNSS WAY Ahead 25-27 April2016, Cairo, Egypt The Effect of Radio Frequency Interference on GNSS Signals and Mitigation Techniques Presented by Dr. Tarek

More information

ELECTRONIC BULLETIN For information only

ELECTRONIC BULLETIN For information only International Civil Aviation Organization ELECTRONIC BULLETIN For information only EB 2011/56 AN 7/5 21 November 2011 INTERFERENCE TO GLOBAL NAVIGATION SATELLITE SYSTEM (GNSS) SIGNALS 1. Aviation operations

More information

Where Next for GNSS?

Where Next for GNSS? Where Next for GNSS? Professor Terry Moore Professor of Satellite Navigation Nottingham The University of Nottingham Where Next for GNSS Back to the Future? Professor Terry Moore Professor of Satellite

More information

GPS Global Positioning System

GPS Global Positioning System GPS Global Positioning System 10.04.2012 1 Agenda What is GPS? Basic consept History GPS receivers How they work Comunication Message format Satellite frequencies Sources of GPS signal errors 10.04.2012

More information

MHz. Figure 1: spectrum plot of the L1 band without interference with the GPS L1C/A central frequency indicated

MHz. Figure 1: spectrum plot of the L1 band without interference with the GPS L1C/A central frequency indicated White paper Internet or Positioning? Abstract Centimetre-level RTK or PPP positioning requires high quality GNSS measurements. By virtue of their low power however, GNSS signals are prone to interference

More information

GNSS Jamming: A Short Survival Guide

GNSS Jamming: A Short Survival Guide GNSS Jamming: A Short Survival Guide Daniele Borio 15-16 November 2016 International Technical Symposium on Navigation and Timing (ITSN 2016) The European Commission s science and knowledge service 1 Joint

More information

INVESTIGATION OVER JAMMING IN THE ASPECT OF THE CONSTRUCTION OF THE GNSS RECEIVER

INVESTIGATION OVER JAMMING IN THE ASPECT OF THE CONSTRUCTION OF THE GNSS RECEIVER INVESTIGATION OVER JAMMING IN THE ASPECT OF THE CONSTRUCTION OF THE GNSS RECEIVER Andrzej Felski 1), Aleksander Nowak 2), Marta Gortad 3) 1) Polish Naval Academy, Gdynia, Poland, a.felski@amw.gdynia.pl

More information

Civil GPS Systems and Potential Vulnerabilities

Civil GPS Systems and Potential Vulnerabilities Civil GPS Systems and Potential Vulnerabilities Major David Hoey, 746 th Test Squadron Paul Benshoof, 746 th Test Squadron Distribution A: Approved for public release; distribution unlimited. AAC/PA 09-01-05-348

More information

The Importance of Bit Depth in GNSS Record and Playback Testing

The Importance of Bit Depth in GNSS Record and Playback Testing The Importance of Bit Depth in GNSS Record and Playback Testing Why bit depth quantisation matters when recording real-world signals for playback in the lab Record and Playback Testing: Why Bit Depth Matters

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication

More information

The Case for Recording IF Data for GNSS Signal Forensic Analysis Using a SDR

The Case for Recording IF Data for GNSS Signal Forensic Analysis Using a SDR The Case for Recording IF Data for GNSS Signal Forensic Analysis Using a SDR Professor Gérard Lachapelle & Dr. Ali Broumandan PLAN Group, University of Calgary PLAN.geomatics.ucalgary.ca IGAW 2016-GNSS

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties

More information

Lecture-1 CHAPTER 2 INTRODUCTION TO GPS

Lecture-1 CHAPTER 2 INTRODUCTION TO GPS Lecture-1 CHAPTER 2 INTRODUCTION TO GPS 2.1 History of GPS GPS is a global navigation satellite system (GNSS). It is the commonly used acronym of NAVSTAR (NAVigation System with Time And Ranging) GPS (Global

More information

Why (Special Agent) Johnny (Still) Can t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System

Why (Special Agent) Johnny (Still) Can t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System Why (Special Agent) Johnny (Still) Can t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System Sandy Clark Travis Goodspeed Perry Metzger Zachary Wasserman Kevin Xu Matt Blaze Usenix

More information

Primer on GPS Operations

Primer on GPS Operations MP Rugged Wireless Modem Primer on GPS Operations 2130313 Rev 1.0 Cover illustration by Emma Jantz-Lee (age 11). An Introduction to GPS This primer is intended to provide the foundation for understanding

More information

Introduction GNSS RF interference. Jan-Joris van Es (NLR) January 2018

Introduction GNSS RF interference. Jan-Joris van Es (NLR) January 2018 Introduction GNSS RF interference Jan-Joris van Es (NLR) January 2018 Contents Introduction Definition of RF Interference Types of RF interference Mitigation introduction GNSS RF interference, January

More information

RF Management in SonicOS 4.0 Enhanced

RF Management in SonicOS 4.0 Enhanced RF Management in SonicOS 4.0 Enhanced Document Scope This document describes how to plan, design, implement, and maintain the RF Management feature in SonicWALL SonicOS 4.0 Enhanced. This document contains

More information

GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GNSS RFI/Spoofing: Detection, Localization, & Mitigation GNSS RFI/Spoofing: Detection, Localization, & Mitigation Stanford's 2012 PNT Challenges and Opportunities Symposium 14 - November - 2012 Dennis M. Akos University of Colorado/Stanford University with contributions

More information

A Simple Demonstration that the Global Positioning System (GPS) is Vulnerable to Spoofing

A Simple Demonstration that the Global Positioning System (GPS) is Vulnerable to Spoofing LAUR-03-2384 The Journal of Security Administration 25, 19-28 (2002). A Simple Demonstration that the Global Positioning System (GPS) is Vulnerable to Spoofing Jon S. Warner, Ph.D. and Roger G. Johnston,

More information

Galileo System and Signal Evolution

Galileo System and Signal Evolution Galileo System and Signal Evolution Stefan Wallner GNSS/Galileo Evolutions Programme ITSNT, 15/11/2017 HOW TO DESIGN A GNSS SYSTEM FOR THE YEAR 2040 15/11/2017 Slide 2 Navigation Exponential Evolution

More information

GPS/QZSS Signal Authentication Concept

GPS/QZSS Signal Authentication Concept GPS/QZSS Signal Authentication Concept Dinesh Manandhar, Koichi Chino, Ryosuke Shibasaki The University of Tokyo Satoshi Kogure, Jiro Yamashita, Hiroaki Tateshita Japan Aerospace Exploration Agency (JAXA)

More information

Report of the Working Group B: Enhancement of Global Navigation Satellite Systems (GNSS) Services Performance

Report of the Working Group B: Enhancement of Global Navigation Satellite Systems (GNSS) Services Performance Report of the Working Group B: Enhancement of Global Navigation Satellite Systems (GNSS) Services Performance 1. The Working Group on Enhancement of Global Navigation Satellite Systems (GNSS) Service Performance

More information

Future Dual Systems for Landing. The DGNSS PALS opportunity Marco Donfrancesco Intelligence & Cyber EW Sales & Mktg

Future Dual Systems for Landing. The DGNSS PALS opportunity Marco Donfrancesco Intelligence & Cyber EW Sales & Mktg Future Dual Systems for Landing. The DGNSS PALS opportunity Marco Donfrancesco Intelligence & Cyber EW Sales & Mktg SG-175 DGNSS PALS study The study shall provide technical advice on the data link capabilities

More information

GPS Interference Detection & Mitigation

GPS Interference Detection & Mitigation GPS Interference Detection & Mitigation GAARDIAN GNSS AVAILABILITY ACCURACY RELIABILITY and INTEGRITY ASSESSMENT for TIMING and NAVIGATION A Technology Strategy Board funded collaboration Charles Curry,

More information

Update on GPS L1C Signal Modernization. Tom Stansell Aerospace Consultant GPS Wing

Update on GPS L1C Signal Modernization. Tom Stansell Aerospace Consultant GPS Wing Update on GPS L1C Signal Modernization Tom Stansell Aerospace Consultant GPS Wing Glossary BOC = Binary Offset Carrier modulation C/A = GPS Coarse/Acquisition code dbw = 10 x log(signal Power/1 Watt) E1

More information

European GNSS: Galileo and EGNOS for next generation Road Charging

European GNSS: Galileo and EGNOS for next generation Road Charging European GNSS: Galileo and EGNOS for next generation Road Charging 20 th October 2014 Gian Gherardo Calini European GNSS Agency (GSA) GNSS have made a huge impact in our society it is key in Road transportation

More information

GPS Adjacent Band Compatibility Assessment

GPS Adjacent Band Compatibility Assessment GPS Adjacent Band Compatibility Assessment Space-Based PNT Advisory Board Meeting May 18, 2016 EXCOM Co-Chair Letter to NTIA... without affecting existing and evolving uses of space-based PNT services

More information

GLOBAL NAVIGATION SATELLITE SYSTEMS (GNSS) ECE 2526E Tuesday, 24 April 2018

GLOBAL NAVIGATION SATELLITE SYSTEMS (GNSS) ECE 2526E Tuesday, 24 April 2018 GLOBAL NAVIGATION SATELLITE SYSTEMS (GNSS) ECE 2526E Tuesday, 24 April 2018 MAJOR GLOBAL NAVIGATION SATELLITE SYSTEMS (GNSS) Global Navigation Satellite System (GNSS) includes: 1. Global Position System

More information

Making Military PNT Systems Resilient Against Threats: Recent Advances

Making Military PNT Systems Resilient Against Threats: Recent Advances Making Military PNT Systems Resilient Against Threats: Recent Advances Spectracom White Paper By John Fischer, VP, Advanced R&D and Hendrik van Edig, Documentation Engineer Oct. 2017 Executive Summary

More information

FieldGenius Technical Notes GPS Terminology

FieldGenius Technical Notes GPS Terminology FieldGenius Technical Notes GPS Terminology Almanac A set of Keplerian orbital parameters which allow the satellite positions to be predicted into the future. Ambiguity An integer value of the number of

More information

Public or Private (2)

Public or Private (2) // Public or Private () CCST90 Mar, 0 Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering The Making of Google Street View Google Street View Systematically capture photos of the

More information

GNSS Technologies. GNSS Acquisition Dr. Zahidul Bhuiyan Finnish Geospatial Research Institute, National Land Survey

GNSS Technologies. GNSS Acquisition Dr. Zahidul Bhuiyan Finnish Geospatial Research Institute, National Land Survey GNSS Acquisition 25.1.2016 Dr. Zahidul Bhuiyan Finnish Geospatial Research Institute, National Land Survey Content GNSS signal background Binary phase shift keying (BPSK) modulation Binary offset carrier

More information

GNSS for UAV Navigation. Sandy Kennedy Nov.15, 2016 ITSNT

GNSS for UAV Navigation. Sandy Kennedy Nov.15, 2016 ITSNT GNSS for UAV Navigation Sandy Kennedy Nov.15, 2016 ITSNT Sounds Easy Enough Probably clear open sky conditions?» Maybe not on take off and landing Straight and level flight?» Not a valid assumption for

More information

What s new in satellite navigation for road. Fiammetta Diani, Deputy Head Market Development Department European GNSS Agency

What s new in satellite navigation for road. Fiammetta Diani, Deputy Head Market Development Department European GNSS Agency What s new in satellite navigation for road Fiammetta Diani, Deputy Head Market Development Department European GNSS Agency May 2017 Why location (and satellite navigation) matters? 2 Galileo is the Satellite

More information

(In)security of smart transportation at sea

(In)security of smart transportation at sea Application Security: internet, mobile ed oltre (In)security of smart transportation at sea Dr. Marco Balduzzi Venezia, 3 ottobre 2014 (In)security of smart transportation at sea - DR. MARCO BALDUZZI 3.10.2014

More information

GNSS VULNERABILITY AND CRITICAL INFRASTRUCTURE

GNSS VULNERABILITY AND CRITICAL INFRASTRUCTURE GNSS VULNERABILITY AND CRITICAL INFRASTRUCTURE NNF CONFERENCE 24 MAY 2012 Brynjar Hansen Senior adviser Norwegian Space Centre Lars Giske Senior adviser Norwegian Space Centre MULTI GNSS EXTERNAL COOPERATION

More information

King AbdulAziz University. Faculty of Environmental Design. Geomatics Department. Mobile GIS GEOM 427. Lecture 3

King AbdulAziz University. Faculty of Environmental Design. Geomatics Department. Mobile GIS GEOM 427. Lecture 3 King AbdulAziz University Faculty of Environmental Design Geomatics Department Mobile GIS GEOM 427 Lecture 3 Ahmed Baik, Ph.D. Email: abaik@kau.edu.sa Eng. Fisal Basheeh Email: fbasaheeh@kau.edu.sa GNSS

More information

Heidi Robinson Today, I m going to talk to you about resiliency. Resiliency is not a term that is easily defined nor is it easily achievable. As I con

Heidi Robinson Today, I m going to talk to you about resiliency. Resiliency is not a term that is easily defined nor is it easily achievable. As I con Heidi Robinson Today, I m going to talk to you about resiliency. Resiliency is not a term that is easily defined nor is it easily achievable. As I continue to talk to you today, I will introduce some more

More information

Wireless technologies Test systems

Wireless technologies Test systems Wireless technologies Test systems 8 Test systems for V2X communications Future automated vehicles will be wirelessly networked with their environment and will therefore be able to preventively respond

More information

Method, algorithm and implementation of vehicles GNSS information protection with help of anti-jamming and anti-spoofing

Method, algorithm and implementation of vehicles GNSS information protection with help of anti-jamming and anti-spoofing Method, algorithm and implementation of vehicles GNSS information protection with help of anti-jamming and anti-spoofing Larisa Dobryakova 1, Lukasz Lemieszewski 2 and Evgeny Ochin 3 1 West Pomeranian

More information

Software Defined Radio. Listening to the Bleeps and Bloops around you

Software Defined Radio. Listening to the Bleeps and Bloops around you Software Defined Radio Listening to the Bleeps and Bloops around you Software Defined Radio in a nutshell Like a FM radio, but can receive a wider radio spectrum range Quick Peek at Radio Frequencies

More information

Localization: Algorithms and System

Localization: Algorithms and System Localization: Algorithms and System Applications of Location Information Location aware information services e.g., E911, location-based search, target advertisement, tour guide, inventory management, traffic

More information