Cómo detectar, proteger y prevenir la interrupción de señales y fuentes de GPS / GNSS / PNT

Durante las últimas dos décadas, la dependencia del GPS / GNSS para el posicionamiento, la navegación y la sincronización (PNT) por parte de aplicaciones civiles ha sido un éxito abrumador, proporcionando información PNT cada vez más precisa y confiable en todas partes de forma gratuita.
Sin embargo, en los últimos años, han surgido amenazas maliciosas que exponen el talón de Aquiles del GPS / GNSS: su potencia débil y su formato de señal sin cifrar lo hacen vulnerable a interferencias y falsificacionesLa pérdida de información PNT puede resultar en eventos raros pero catastróficos, paralizando la infraestructura crítica que es necesaria para nuestra supervivencia.

Afortunadamente, existen muchas tecnologías alternativas disponibles para aumentar el GPS y proporcionar información PNT precisa y confiable incluso en condiciones extremadamente adversas.


For the last two decades, reliance upon GPS/GNSS for positioning, navigation and timing (PNT) by civilian applications has been an overwhelming success, providing increasingly accurate and reliable PNT information everywhere for free. However, in recent years, malicious threats have emerged that exposed the Achilles heel of GPS/GNSS: Its weak power and unencrypted signal format leave it vulnerable to jamming and spoofing. The loss of PNT information can result in rare but catastrophic events, crippling critical infrastructure that is necessary for our survival.

Fortunately, there are many alternative technologies available to augment GPS and provide accurate and reliable PNT information even under extremely adverse conditions. These include:

  • Low Earth Orbit (LEO) PNT satellite signals — operating close to the Earth, with signal strengths ~1000x stronger than GPS, to overcome jamming. And, encrypted to prevent spoofing.
  • Miniaturized, affordable atomic clocks to provide precise time internally – which is the foundation of every positioning system — without connection to, or reliance on, outside sources which could corrupt the precision.
  • Fiber optic network time distribution via secure, high accuracy protocols.

In this white paper, we will discuss these alternative technologies and offer recommendations for procedures and processes to manage and avoid the risks of cyberattacks, applying the best practices known today. We will focus on Resilient PNT and describe the strategies, technologies and procedures to avoid these cybersecurity risks and ensure the continuity of any critical operation.

Fuente: https://www.orolia.com