From 19 to 23 September 2022, the Norwegian Public Roads Administration, the National Communications Authority, and the Norwegian Defense Research Institute hosted “JammerTest2022” in northern Norway. In our opinion, this is the biggest civilian GNSS jamming/spoofing testing we know about and where we participated.
Over five days, a wide range of GNSS interference was generated to test GNSS equipment resilience. From basic L1 jamming to sophisticated spoofing scenarios.
GPSPATRON’s team has recorded all the interference in the GP-Cloud database and is making it open to the community!
- Unauthorized long-term jamming on the first day of testing was detected.
- Under the influence of a certain type of jamming, a GNSS receiver can produce coordinates with errors of tens of kilometers. What should we call spoofing or jamming?
- At the end of the third day, unauthorized spoofing was detected. The guys from the Norwegian Metrology Service were practicing before the upcoming spoofing tests with their GNSS simulator with conducted connection to the DUT. However, improper RF accessories led to fake signal leakage.
- Our system successfully detected all spoofing scenarios! Our method with 3 antennas and spatial signal processing demonstrated excellent performance.
GPSPATRON Equipment Used
|Probe name||Operating time|
|Reference Probe||Nonstop from September 18 to September 23|
|Bleik||Five days during the testing. Usually from 9 a.m. to 6 p.m.|
|Bleik2||The last two days during the spoofing tests.|
|In-car Probe||It was turned off from time to time.|
The system supports two modes of interference detection optimization. The “Bleik2” sensor was in “Low Latency Optimisation” mode. Other sensors were in the “False Positive Optimisation” mode. The “Low Latency Optimisation” mode triggers faster and is more sensitive, but demonstrates a higher false-positive detection rate.
To detect jamming, the system can analyze power in band or degradation of signal-to-noise ratio and number of visible satellites. The first option is too simple, so all probes were configured for SNR analysis. However, this analysis requires a 24-hour pre-calibration for better performance.
All probes were connected to the Internet via the built-in 4G modem. In the middle of the fourth day, there was a connection failure and we lost some data.
The event was conducted within five days. Jammers were launched the first three days, then there were different spoofing scenarios.
The links below provide the official testing program and technical specifications of the GNSS jammers used.
To view the results of the test as well as to request access to the data recorded by the GPSPATRON interference monitoring system during JAMMERTEST2022 you need to follow the link below:
Credit to: GPSPATRON