ZED-F9R-Integration manual
Threat u-blox solution
Receiver configuration lock
Table 26: u-blox security options
3.11.1 Spoofing detection / monitoring
Spoofing is the process where a counterfeit GNSS signal is transmitted locally to prevent the true
signal from being used and so produce an erroneous position fix and/or time solution.
The spoofing detection algorithm monitors multiple observed signal parameters for suspicious
changes to identify external manipulation.
A detection is successful when a signal is observed to transition from an initially genuine one to a
spoofed version. Hence detection is not possible if the receiver is started under spoofing conditions.
The detection algorithms rely on availability of signals from multiple GNSS constellations.
Furthermore, with HPS 1.30 the receiver supports sensor based spoofing detection. So if the
sensors are initialized, it detects the presence of spoofing by comparing GNSS information against
the sensor data.
Currently, the ZED-F9R only utilizies the wheel tick (odometer input) sensor for the spoofing
detection.
In conclusion, with ZED-F9R there are two strategies to detect spoofing attempts: purely GNSS for
clues to spoofing and sensor data for consistency checks.
The alerts for the users to potential spoofing activity is reported in the two messages UBX-SEC-SIG
and UBX-SEC-SIGLOG.
If the sensors are not calibrated and spoofing is detected, the spoofing detection flag may
not be sustained for a long period of time.
3.11.2 Jamming interference-Detection and Monitoring
The GNSS receivers can be subject to intentional and/or un-intentional Jammer which can degrade
the quality of GNSS signals and receiver performance. All the u-blox receivers have the capability to
both detect and monitor jamming and to report it to the user. This monitoring function is always
enabled and it reports if either the RF bands and/or the constellations have been affected by external
threats.
The information about jamming detection is reported in the two messages UBX-SEC-SIG and UBX-
SEC-SIGLOG, which also contain information about detected spoofing. The UBX-SEC-SIG
4
message
provides a direct method for monitoring the current security status to alert a host about potential
jamming or spoofing threats. The UBX-SEC-SIGLOG message provides a log of past signal security
events where an event is triggered by the detection logic, thus allowing a review of up to 16 past
occurances of possible jamming or spoofing episodes. See the applicable interface description [2].
3.11.3 UBX-SEC-SIG message description
The UBX-SEC-SIG message can be used to check if the Jamming/Spoofing has been detected or
suspected by the receiver.
It also inicates if the Jamming has been detected in the different bands as shown in the following
table:
4
HPS 1.30 FW onwards
UBX-20039643 - R06
3 Receiver functionality Page 75 of 119
C1-Public