Securing PNT as Used by Critical Infrastructure
GNSS-based errors, whether intentional or unintentional, can quickly impact a vast geography and widely dispersed locations. Additionally, a large variety of operational environments must be accounted for that not only includes outside deployment with a clear view of the sky, but highly obstructed locations, urban canyons, and in-building and in-cabinet scenarios.
The following are three main objectives to consider when constructing a secure PNT infrastructure:
Detection—early sensing of threats, both intentional or unintentional
Resiliency—continuous operation until threats are mitigated and resolved
Visibility—measurements and analytics for ongoing PNT health monitoring
This solution for securing PNT focuses on a network approach based on layers of resiliency that can be deployed cost effectively across infrastructure with 10s, 100s, 1000s, or even 10,000s of nodes. These layers are built using a broad array of technologies, including GNSS anti-jamming and anti-spoofing technology, time transport protocols, atomic clocks, and software management and monitoring
The following sections describe the solution with focus primarily on the use of time in Critical Infrastructure. Additionally, although the detection, resiliency, and visibility provided by this solution are applicable to both mobile and stationary applications, the primary target markets for this solution are stationary Critical Infrastructure, such as telecom networks, power grids, enterprise, and transportation networks and data centers.
Read the whitepaper on this page to learn about a complete network architecture for protecting your valuable PNT data.
Watch the video on this page and learn how to quickly and easily get started with Microsemi’s BlueSky(TM) product.
Please contact me (Greg.Wolff@Microsemi.com) personally for more information or if I may be of assistance. Connect with me on LinkedIn too.
Tags: GNSS, GNSS Security, GPS, GPS Vulnerabilities, PNT
Leave a Reply
You must be logged in to post a comment.