AIM+ Anti-Spoofing Protection

What is GPS/GNSS spoofing and how to secure my receiver?

AIM+ Anti-Spoofing technology protects devices such as drones.

Spoofing occurs when a malicious attacker transmits fake signals into a GNSS receiver to hijack its positioning. To avoid the trap of spoofing Septentrio receivers are equipped with AIM+ Anti-Spoofing technology on both software and hardware levels. Protection from spoofers is important not only for critical applications, but also for reliable operation of autonomous machines and other systems. AIM+ offers:

  • Anti-spoofing security at the GNSS core, ensuring resilience of your whole system
  • Leveraging cryptographic methods available on certain satellite signals, including OSNMA
  • Implementation of two decades of expertise in anti-spoofing and anti-jamming technology, that Septentrio is known for
  • All-in-one anti-spoofing solution, no extra hardware needed
  • Continuous improvement of anti-spoofing technologies and algorithms
MT-Everest-example-of-GNSS-Spoofing

Spoofing, not as complex at it used to be

Spoofing occurs when a GPS receiver reports wrong positioning because it has received GNSS signals with intentionally incorrect positional information sent by a 3rd party. Spoofing devices can be used to hijack autonomous vehicles or drones and send them on alternate routes. This article describes how several ships in the Red Sea had their GPS receiver reporting a position at a faraway airport. The reason why spoofing is becoming more commonplace is because spoofing devices such as Software Defined Radios or SDRs have become more affordable and readily available for purchase online. Couple that with easily accessible open-source simulator software and you have a recipe for a DIY spoofer. For more information see What is spoofing and how to ensure GPS security.

 

Illustrative-GNSS-spoofer-hacker

There are many ways to spoof

A spoofing attack can be carried out in different ways, depending on the attacker’s knowledge and equipment. Easily accessible hardware and open-source software make it trivial to insinuate an asynchronous or a meaconing (signal repeater) attack. Synchronous or covered spoofing attacks on the other hand are more sophisticated and are even more complex to detect and mitigate since they very closely mimic real GNSS signals.

GNSS-data-servers

Protecting GNSS receivers on many levels

Septentrio receivers have several approaches to combat spoofing:

  • Algorithms that look for signal anomalies. These sophisticated integrity algorithms are derived and fine-tuned on a vast amount of real-world data. The triple-band multi constellation technology allows for inter-constellation consistency checks and numerous signal fallbacks.
  • Cryptography and authentication of certain GNSS signals which have a built-in mechanism for spoofing detection and prevention. The Galileo OSNMA authentication is available on Septentrio receivers.