{"id":6493,"date":"2020-09-08T15:54:10","date_gmt":"2020-09-08T18:54:10","guid":{"rendered":"http:\/\/www.fie.undef.edu.ar\/ceptm\/?p=6493"},"modified":"2020-09-08T15:54:10","modified_gmt":"2020-09-08T18:54:10","slug":"como-detectar-proteger-y-prevenir-la-interrupcion-de-senales-y-fuentes-de-gps-gnss-pnt","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=6493","title":{"rendered":"C\u00f3mo detectar, proteger y prevenir la interrupci\u00f3n de se\u00f1ales y fuentes de GPS \/ GNSS \/ PNT"},"content":{"rendered":"<div>\n<div><span>Durante las \u00faltimas dos d\u00e9cadas, la dependencia del GPS \/ GNSS para el posicionamiento, la navegaci\u00f3n y la sincronizaci\u00f3n (PNT) por parte de aplicaciones civiles ha sido un \u00e9xito abrumador, proporcionando informaci\u00f3n PNT cada vez m\u00e1s precisa y confiable en todas partes de forma gratuita.<\/span><\/div>\n<div><span>Sin embargo, en los \u00faltimos a\u00f1os, han surgido amenazas maliciosas que exponen el tal\u00f3n de Aquiles del GPS \/ GNSS: <b>su potencia d\u00e9bil y su formato de se\u00f1al sin cifrar lo hacen vulnerable a interferencias y falsificaciones<\/b>.\u00a0<\/span><span>La p\u00e9rdida de informaci\u00f3n PNT puede resultar en eventos raros pero catastr\u00f3ficos, paralizando la infraestructura cr\u00edtica que es necesaria para nuestra supervivencia.<\/span><\/div>\n<\/div>\n<div>\n<p>Afortunadamente, existen muchas tecnolog\u00edas alternativas disponibles para aumentar el GPS y proporcionar informaci\u00f3n PNT precisa y confiable incluso en condiciones extremadamente adversas.<\/p>\n<hr \/>\n<\/div>\n<p>For the last two decades, reliance upon GPS\/GNSS for positioning, navigation and timing (PNT) by civilian applications has been an overwhelming success, providing increasingly accurate and reliable PNT information everywhere for free. However, in recent years, malicious threats have emerged that exposed the Achilles heel of GPS\/GNSS: Its weak power and unencrypted signal format leave it vulnerable to jamming and spoofing. The loss of PNT information can result in rare but catastrophic events, crippling critical infrastructure that is necessary for our survival.<\/p>\n<p>Fortunately, there are many alternative technologies available to augment GPS and provide accurate and reliable PNT information even under extremely adverse conditions. These include:<\/p>\n<ul>\n<li>Low Earth Orbit (LEO) PNT satellite signals \u2014 operating close to the Earth, with signal strengths ~1000x stronger than GPS, to overcome jamming. And, encrypted to prevent spoofing.<\/li>\n<li>Miniaturized, affordable atomic clocks to provide precise time internally \u2013 which is the foundation of every positioning system \u2014 without connection to, or reliance on, outside sources which could corrupt the precision.<\/li>\n<li>Fiber optic network time distribution via secure, high accuracy protocols.<\/li>\n<\/ul>\n<p>In this white paper, we will discuss these alternative technologies and offer recommendations for procedures and processes to manage and avoid the risks of cyberattacks, applying the best practices known today. We will focus on Resilient PNT and describe the strategies, technologies and procedures to avoid these cybersecurity risks and ensure the continuity of any critical operation.<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.orolia.com\/resources\/white-papers\/resilient-pnt-detect-protect-prevent-disruption?utm_source=GPS%20World&amp;utm_medium=Eblast&amp;utm_campaign=2020-09-03%20RPNT%20WP%20and%20NIST%20Webinar&amp;utm_content=2020-09-03%20RPNT%20WP%20and%20NIST%20Webinar%20via%20GPS%20World%20Eblast\" target=\"_blank\" rel=\"noopener noreferrer\"><em>https:\/\/www.orolia.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Durante las \u00faltimas dos d\u00e9cadas, la dependencia del GPS \/ GNSS para el posicionamiento, la navegaci\u00f3n y la sincronizaci\u00f3n (PNT) por parte de aplicaciones civiles&hellip; <\/p>\n","protected":false},"author":1,"featured_media":6494,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,35],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/6493"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6493"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/6493\/revisions"}],"predecessor-version":[{"id":6495,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/6493\/revisions\/6495"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/6494"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}