Abstract
GNSS jamming and spoofing are among the most critical threats to UAV flight safety today. Septentrio receivers address these challenges through built-in, multi-layered protection — combining multi-frequency GNSS technology, intelligent heuristic algorithms, and satellite signal authentication (OSNMA). The AIM+ (Advanced Interference Mitigation and Anti-Spoofing) technology provides endogenous protection at the receiver core, requiring no additional hardware to detect, resist, and alert on jamming and spoofing attacks in real time.
Anti-Jamming and Anti-Spoofing Technologies Safeguard Flight Safety
In today’s world, where UAV and manned aviation flight safety is paramount, GNSS jamming and spoofing have become hidden yet severe threats. To ensure the absolute safety of every flight, it is essential to build inherent protection capabilities at the very core of the navigation system — the receiver level. Through deep integration of multi-frequency GNSS technology, intelligent heuristic algorithms, and satellite signal encryption/authentication, Septentrio can distinguish genuine from fake signals at the source in real time, resist interference, and provide accurate, reliable security alerts when spoofing occurs.
Analysis of GNSS Jamming and Spoofing
About Jamming
Jamming is a signal disruptor in the field of GNSS navigation. It emits powerful radio noise, acting like an invisible barrier that directly drowns out the weak signals from satellites. When jamming occurs, the receiver does not see an erroneous position but rather a complete loss of signal — the positioning icon freezes, time information is lost, and navigation functions are completely interrupted. Whether caused by unintentional electromagnetic interference or deliberate suppression attacks, the essence of jamming is the violent suppression of signals. Its disruption is direct and rapid, capable of instantly “blinding” systems reliant on GNSS.
About Spoofing
Spoofing is a master of deception in the GNSS domain. It does not disrupt signals but meticulously forges a set of “cloned” signals almost identical to genuine satellite signals, stealthily “injecting” them into the receiver. The receiver decodes and calculates these fake signals as if they were real, ultimately outputting information — position, velocity, or time — that appears completely normal but is actually entirely wrong. More dangerously, advanced spoofing can achieve gradual “slow-burn” manipulation, causing the target to deviate from its course unknowingly.
Spoofing often accompanies jamming. Jamming suppresses GNSS signals with “white noise” to disable them, breaking the receiver’s lock and making it more likely to lock onto false signals. Therefore, the first line of defense against spoofing is built-in robust anti-jamming technology in the receiver, such as AIM+ Advanced Interference Mitigation.
Different Forms of Spoofing
Elementary Imitation — Non-Coherent Attack
Non-coherent attacks are the most basic form of spoofing. The attacker uses inexpensive software-defined radio (SDR) equipment and open-source software to directly transmit forged signals with power far stronger than genuine satellite signals. This attack is often accompanied by brief jamming, first breaking the receiver’s original signal lock and then “violently taking over” with stronger fake signals. Although the implementation barrier is low, with costs under a thousand dollars, the flaws are most apparent — the signals lack precise synchronization, exhibit abnormal power characteristics, and positioning results often show abrupt jumps.
Precise Camouflage — Coherent Attack
Coherent attacks represent an intermediate form of spoofing technology. The attacker uses professional-grade GNSS simulators, first synchronizing the forged signals with genuine satellite signals in time and phase, and then gradually and imperceptibly “pulling away” the receiver’s tracking loops. The entire process is smooth and covert, not triggering traditional jump alarms, causing the target system to deviate from the correct trajectory unknowingly. This “slow-burn” type of attack requires professional knowledge and equipment worth tens of thousands of dollars, making it effective against basic detection methods.
Perfect Replication — Meaconing Attack
Meaconing (signal rebroadcast) attacks are a special advanced form of spoofing that does not “forge” but “replicates” genuine signals. The attacker receives genuine satellite signals and rebroadcasts them after a short delay, causing the receiver to calculate an erroneous position. Since the rebroadcast signal content is completely genuine, conventional code pattern analysis and message validation cannot identify this attack. This is the most challenging type to detect and defend against.
Types of Interference Protected by AIM+
Spurious Peaks from Radio Amateurs and Digital TV
Non-malicious signal-emitting devices such as amateur radio stations and TV transmitters may generate unintended strong signal peaks (spurious emissions) outside their operating bands. These strong peaks can overwhelm weak satellite navigation signals, causing receiver loss of lock. The built-in AIM+ technology in the mosaic-G5 P3H provides robust navigation signal security for PX4 systems.
Signals from Inmarsat and Iridium Satellite Systems
The frequency bands used by Inmarsat and Iridium satellite systems are adjacent to or partially overlap with GNSS bands. Their powerful downlink signals can cause out-of-band blocking interference or adjacent-channel interference to nearby GNSS receivers.
DME Pulse Interference Around Airports
DME (Distance Measuring Equipment) is an aeronautical navigation device operating in the 960-1215 MHz band, overlapping with the GPS L5 band. The high-power pulse pairs it emits severely interfere with satellite signals, causing frequent satellite loss and unreliable positioning for receivers near airports.
Wideband Interference from “Chirp” Jammers
“Chirp” jammers are a common type of malicious jamming device that rapidly and periodically scan a wide frequency band, generating powerful, transient interference covering the full GNSS band. Traditional static filters struggle to cope, effectively paralyzing most commercial receivers.
Septentrio Solutions
Core Protection Philosophy: Endogenous, Multi-Layered, Full-Stack
Septentrio’s protection philosophy emphasizes that spoofing protection capability begins at the receiver core, opposing post-hoc remedial “patchwork” solutions. The most efficient and cost-effective protection must be built into the receiver chip and firmware level, constructing native resilience at the very front end of signal processing.
Four-in-One Core Technology System
Septentrio has built a four-layer collaborative protection system from the signal reception source to the system application layer:
Multi-Frequency / Multi-Constellation Technology
Simultaneously receives and processes signals from multiple frequency bands (GPS L1/L2/L5, Galileo E1/E5) and multiple satellite systems. This forces attackers to simultaneously and consistently forge signals across all frequency bands, greatly increasing the technical difficulty and cost of spoofing.
Advanced Heuristic Algorithms
Develops proprietary intelligent algorithms based on massive data accumulated from over 20 years of field operation, continuously monitoring hundreds of signal parameters (power, timing, consistency) to detect the subtlest abnormal patterns. These algorithms can detect complex spoofing including covert “pull-off” attacks with minimal false positives.
Cryptographic Authentication Support
Supports and integrates future satellite signal authentication services such as Galileo’s OSNMA and GPS’s Chimera. By verifying digital signatures from satellites, it confirms signal authenticity at the source, providing a cryptographically-grounded trust anchor.
System-Level Sensor Fusion Interface
Designs open interfaces for the receiver to facilitate deep integration with Inertial Measurement Units (IMU), visual sensors, and LiDAR. This adds a cross-sensor verification layer for autonomous driving and other high-safety-requirement scenarios.
AIM+ (Advanced Interference Mitigation and Anti-Spoofing) Technology
- Anti-Jamming First — Recognizing that jamming often accompanies spoofing, AIM+ first possesses robust anti-wideband and narrowband jamming capabilities, ensuring the receiver maintains lock on genuine signals in complex electromagnetic environments. This is the first line of defense against spoofing.
- Deep Hardware-Software Integration — As a built-in technology, AIM+ requires no additional hardware, calibration, or special antennas, reducing system complexity, cost, and integration difficulty.
- Comprehensive Response — Can simultaneously utilize multi-frequency detection, heuristic algorithms, and cryptographic information for real-time detection and mitigation of various spoofing attacks.
Summary of Core Solution Advantages
- Resilience from Core to System — Protection begins at the receiver chip level, ensuring the foundation of the entire positioning system is solid.
- Validated by Twenty Years of Experience — Algorithms and thresholds are trained based on long-term real-world operational data, not just laboratory theory.
- High-Accuracy Threat Awareness — Capable of generating accurate spoofing flags, avoiding safety risks caused by false positives or false negatives.
- Optimal Cost-Effectiveness — Built-in design avoids expensive additional hardware, providing the highest cost-performance system-level protection.
- Future-Oriented — Proactively supports next-generation security standards like satellite signal authentication, protecting customers’ long-term investment.
Conclusion
In the era of booming UAV and manned aircraft development, flight safety has become a non-negotiable bottom line. From simple signal suppression to meticulously designed “pull-off” attacks, these threats are sufficient to misdirect navigation, disrupt formations, or cause catastrophic consequences. As Septentrio advocates, true protection capability begins at the receiver core — advanced multi-frequency GNSS technology, intelligent heuristic algorithms, and satellite signal authentication (OSNMA) must be deeply integrated into the receiver chip and firmware to distinguish genuine from fake signals in real time.
Related GNSS Products
- HB21 GNSS Box Receiver — All-in-one RTK receiver with integrated 4G LTE, heading, and data logging
- HB6 GNSS Box Receiver — Compact quad-constellation RTK receiver powered by Septentrio Mosaic X5
- EV322 GNSS Receiver — Lightweight RTK receiver for UAVs and autonomous systems
- AIM+ Anti-Jamming Technology — Military-grade interference and spoofing protection
Browse our full GNSS receiver collection for professional UAV applications.
Frequently Asked Questions
What is GNSS anti-jamming technology and how does it protect drones?
GNSS anti-jamming technology detects and mitigates RF interference that would otherwise overwhelm the weak GNSS signals reaching the receiver. Septentrio’s AIM+ uses adaptive notch filtering, pulse blanking, and spectral analysis to identify and remove both narrowband interference (from nearby transmitters) and wideband/pulsed interference (from radar or jammers), maintaining position lock.
What is GNSS spoofing and how can receivers defend against it?
GNSS spoofing transmits fake satellite signals to trick a receiver into calculating a false position. Defense techniques include: signal authentication (OSNMA for Galileo), dual-frequency consistency checking, RAIM-based anomaly detection, signal power monitoring, and inertial integration that detects position jumps inconsistent with vehicle dynamics.
Why is anti-jamming the first line of defense against spoofing?
Spoofing attacks almost always accompany jamming. Jamming first suppresses genuine GNSS signals with noise, causing the receiver to lose lock and become more susceptible to takeover by false signals. If the receiver lacks robust anti-jamming capability, it cannot hold onto genuine signals during an attack. AIM+ technology embodies this principle by providing powerful anti-wideband and narrowband jamming as the first line of defense.
Which Septentrio receivers include anti-jamming and anti-spoofing features?
All modern Septentrio receivers — including the mosaic-X5, mosaic-G5 series, and AsteRx series — include AIM+ anti-jamming as standard. Anti-spoofing features are available through firmware upgrades, including OSNMA support for Galileo signal authentication and advanced RAIM algorithms.
Which application scenarios are most vulnerable to GNSS spoofing attacks?
UAVs and drones can be lured into no-fly zones or hijacked via spoofing. Maritime navigation faces AIS spoofing leading to deviation or collisions. Data centers and financial systems relying on GNSS timing can suffer network outages or transaction errors. Autonomous vehicles can be forced to suddenly decelerate or deviate lanes, causing accidents. Robust anti-spoofing protection is critical across all these applications.









