Protect Your Critical Infrastructure from GNSS Spoofing and Jamming

While the use of GNSS based time has become more vital for critical infrastructure operations, the security of the GNSS signal itself has become increasingly vulnerable to a wide range of jamming and spoofing threats, both intentional and unintentional. Given the inherently fragile nature of the GNSS signal, an important way in which reception of the GNSS signal can be guarded is through better visibility of the GNSS signal characteristics in real-time.

Security hardening of a GNSS system is a continual process due to the constant emergence of new threats. Like network security vulnerabilities, new GNSS vulnerabilities are on the rise and “GNSS signal visibility” is a vital capability for helping to determine the root cause of a GNSS vulnerability, especially before a minor disruption becomes a more serious outage.

When a GNSS vulnerability is detected, BlueSky Performance Monitoring provides surveillance of GNSS reception quality and enables critical infrastructure operators to identify if the problem is specific to a location or affecting a larger geographical area. Further, having visibility of key performance metrics enables the operator to take quick and cost-effective action. Dispatching network operations personnel to a roof-top on a high rise building to unnecessarily check on a GNSS antenna is expensive. “GNSS visibility” using BlueSky Performance Monitoring prevents these costly mistakes.

Download the BlueSky™ Performance Monitoring White Paper for a comprehensive overview of  how BlueSky™ Performance Monitoring, which is a set of functionality built into Microchip’s TimePictra® software, delivers a solution for monitoring and characterizing live-sky GNSS signals to provide signal visibility for better protection and security of GNSS reception.

Please contact me ( personally for more information or if I may be of assistance. Connect with me on LinkedIn too.

Tags: , , , , , ,

This entry was posted by Greg Wolff on at and is filed under Timing & Synchronization. You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.

Comments are closed.