GNSS Vulnerability: A Taxonomy

GNSS Vulnerability: A Taxonomy

Andrew G. Dempster
Copyright: © 2018 |Pages: 17
DOI: 10.4018/978-1-5225-3528-7.ch013
OnDemand:
(Individual Chapters)
Available
$33.75
List Price: $37.50
10% Discount:-$3.75
TOTAL SAVINGS: $3.75

Abstract

This chapter examines sources of global navigation satellite system (GNSS) vulnerability, identifying the broad range of topics that comes under this heading, and cites some key references in each category area. GNSS vulnerability has been a very productive area for GNSS researchers in recent years and this chapter sets out to be a comprehensive review of the different ways that the operation of GNSS can be degraded by outside influences, from the high (system) to the low (receiver component) level.
Chapter Preview
Top

Sources Of Gnss Vulnerability

The categories of vulnerability are shown in Figure 1, with arrows indicating a breakdown of more general categories into lower level categories. Figure 1 does not indicate the overall structure of the chapter, because the highest level of Figure 1 includes vulnerabilities to systems that use and augment GNSS. However, it is important here to acknowledge that these vulnerabilities exist, and are important to users and integrators of GNSS systems. Augmentation systems such as space-based augmentation systems (SBAS), continuously operating reference station (CORS) networks, real-time kinematic (RTK) systems, differential GPS (DGPS), and assisted GPS (AGPS) all have vulnerabilities of their own, but are not considered further here. Similarly, systems that integrate GPS can suffer where reported GPS positions can be intercepted and modified (spoofed) (Hackett, 2015). This type of vulnerability is also not considered further here.

We first consider the three segments of a GNSS system: the space segment, the control segment and the user segment. When speaking about GNSS vulnerability, most people think only of signal interference in the user segment. This will be dealt with in a later section. Here we consider the control and space segments.

Figure 1.

High-level Categories of where GNSS vulnerability can occur. In other words, vulnerabilities occur at system and segment levels, as well as the better known examples at lower levels. The box at the bottom right is expanded further in Figure 2.

978-1-5225-3528-7.ch013.f01

Complete Chapter List

Search this Book:
Reset