MGSA: Mobile GNSS Situational Awareness
Global Navigation Satellite System (GNSS) spoofing and meaconing is the act of deceiving nearby GNSS users of their true location by transmitting a stronger bogus signal. On the other hand, GNSS jamming is the act of denying nearby users from using GNSS to obtain positioning, navigation or timing (PNT). The transmitters of these malicious signals are called spoofers and jammers, and it is the aim of this project to efficiently obtain accurate geolocation information and intelligence of spoofers and jammers via a reconnaissance platform by employing modern techniques. Conventionally, multiple angle of arrivals estimated by a network of Phased Arrays can be used to accurately geolocate a jammer/spoofer. In this project, we will consider each Phased Array to be mounted on a mobile platform (e.g. sea vessel), to be simply known as Mobile Sensor Node (MSN).
The project addresses the defence need to be situationally aware of its Electro-Magnetic (EM) environment. This is especially true as more and more devices onboard mobile platforms (e.g. navy ship, aircraft and land vehicles) depend on GNSS for communications, position authentication and/or navigation. It also aligns with two of the Next Generation Technology Fund’s (NGTF) two priority areas: Integrated intelligence surveillance and reconnaissance and Trusted Autonomous Systems (TAS)
This project will deliver effective situational awareness of GNSS jammers and spoofers using a mobile platform. That is, geographical regions of occurring GNSS denial of service.
The project will address the following research challenges:
- Carrying out continuous calibration of passive RF phased arrays while being mobile.
- Carrying out continuous calibration of passive RF phased arrays while being affected by interference.
- Utilising a single traversing MSN (i.e. vessel) to identify geographical regions where there is a denial of service to GPS.
All three research challenges mentioned above will require verification by means of a field test.
The PhD student will be able to leverage on existing algorithms and hardware developed at Australia Center for Space Engineering Research (ACSER) University of New South Wales (UNSW) and the GRIFFIN platform developed at GPSat to carry out field experiments at a Defence Spectrum Office - authorised jamming/spoofing testing ground belonging to GPSat. Hence, the PhD student will:
- Demonstrate the calibration of the phased array while the MSN is roving.
- Demonstrate the identification of geographical regions where there is a denial of service to GNSS using a roving MSN.
- Demonstrate the capabilities at the GPSat testing ground using moving platforms.