In our previous article, we examined the alarming escalation of GNSS spoofing and jamming attacks in 2025-2026. With ~1,000 daily incidents globally and real-world disasters like the Adalynn-Front Eagle tanker collision, the question is no longer if your GNSS signal will be compromised—but when.
But here’s the good news: we’re not defenseless. A new generation of anti-spoofing technologies is emerging, ranging from cryptographic authentication to AI-powered detection. This article explores five defensive technologies that can protect your navigation systems.
1. Galileo OSNMA: Cryptographic Authentication Goes Live
What It Is
The Open Service Navigation Message Authentication (OSNMA) is the world’s first free-to-air civilian GNSS authentication system. It became fully operational on July 24, 2025, marking a historic milestone in navigation security.
How It Works
OSNMA uses a TESLA-based delayed key disclosure protocol:
- Satellites transmit navigation messages with 40-bit authentication tags
- Keys are disclosed with ~30 second delay
- Receivers verify the message authenticity using the disclosed key
- If verification fails, the receiver rejects the signal as potentially spoofed
Real-World Performance
According to Taoglas and other industry sources, OSNMA provides:
- Protection against message modification – Attackers cannot forge valid authentication tags
- Backward compatibility – Legacy receivers still work (they just don’t verify)
- Free access – No subscription or special authorization required
Limitations
- 30-second latency – Brief spoofing attacks can succeed before detection
- Doesn’t protect signal acquisition – Only authenticates navigation messages
- Requires receiver support – Not all GNSS receivers implement OSNMA verification
Best For
Maritime navigation, aviation, critical infrastructure where 30-second delay is acceptable
2. Multi-Constellation, Multi-Frequency Receivers
What It Is
Instead of relying on GPS alone, modern receivers can simultaneously track:
- GPS (USA) – L1, L2, L5 frequencies
- Galileo (EU) – E1, E5a, E5b frequencies
- BeiDou (China) – B1, B2, B3 frequencies
- GLONASS (Russia) – L1, L2 frequencies
Why It Helps
A spoofing attack must now:
- Generate valid signals for multiple constellations simultaneously
- Match the correct frequency bands for each
- Maintain consistent timing and positioning across all signals
This increases attack complexity exponentially.
Real-World Performance
According to Septentrio’s AIM+ technology demonstrations:
- Multi-constellation receivers maintain positioning when single-constellation receivers fail
- Cross-constellation consistency checks can detect spoofing even without cryptographic authentication
- Signal diversity provides redundancy when one constellation is jammed
Best For
All applications – this is now the baseline for any serious GNSS receiver
3. CRPA Antennas: Military-Grade Protection Goes Civilian
What It Is
Controlled Reception Pattern Antennas (CRPAs) use multiple antenna elements to:
- Detect the direction of incoming signals
- Identify signals coming from unexpected directions (ground-based spoofers)
- Null out interference sources adaptively
Game-Changing News
Beginning September 15, 2025, CRPAs are no longer covered by ITAR (International Traffic in Arms Regulations). This means:
- Civilian companies can now purchase CRPA technology
- Prices are expected to drop significantly
- Integration into commercial systems is now feasible
Performance
- Can reject jamming signals 40-60 dB stronger than legitimate GNSS signals
- Detects ground-based spoofers by their angle of arrival
- Provides situational awareness of the RF environment
Trade-Offs
- Larger physical size than standard antennas
- Higher cost (though decreasing)
- Requires compatible receiver
Best For
High-value assets: commercial aircraft, ships, critical infrastructure, defense contractors
4. Inertial Navigation + Sensor Fusion
What It Is
Inertial Navigation Systems (INS) use accelerometers and gyroscopes to calculate position without external signals. When combined with GNSS through sensor fusion, the result is:
- Continuous positioning during GNSS outages
- Cross-validation to detect GNSS anomalies
- Smooth transitions when GNSS is compromised
Advanced Implementations
Safran’s BlackNaute system integrates:
- HRG (Hemispherical Resonator Gyro) dual-core inertial navigation
- Multi-mode GNSS receiver
- Atomic clock for precise timing
- Advanced anti-jamming/anti-spoofing algorithms
This system has been validated in over 16,000 operational cases.
Performance
- High-quality INS can maintain meter-level accuracy for hours without GNSS
- Atomic clocks maintain timing for secure communications
- Sensor fusion detects inconsistencies between GNSS and inertial data
Best For
Aviation, maritime, autonomous vehicles, military operations
5. AI-Powered Anomaly Detection
What It Is
Machine learning algorithms analyze GNSS signal characteristics in real-time to detect anomalies that indicate spoofing or jamming:
- Signal power variations
- Code-carrier divergence
- Unexpected Doppler shifts
- Correlation peak distortions
Recent Advances
NovAtel’s GRIT (GNSS Resilience and Integrity Technology) in OEM7 receivers uses AI to:
- Classify interference types (jamming vs. spoofing)
- Identify specific jammer signatures
- Adapt mitigation strategies in real-time
Academic Research
Recent papers (Frontiers in Physics, January 2026; Scientific Reports, August 2025) demonstrate:
- Weighted moving average bias correction for spoofing detection
- Deep learning models achieving 95%+ detection accuracy
- Real-time classification of jamming waveforms
Advantages
- No hardware changes required (firmware upgrade)
- Continuously improves with more data
- Can detect novel attack patterns
Best For
Existing receiver fleets (via firmware update), cost-sensitive applications
Comparison Matrix
| Technology | Cost | Effectiveness | Deployment | Latency |
|---|---|---|---|---|
| OSNMA | Free | High | Receiver firmware | ~30 seconds |
| Multi-Constellation | Low | Medium-High | New receiver | None |
| CRPA | High | Very High | Antenna + receiver | None |
| INS + Fusion | Medium-High | High | System integration | None |
| AI Detection | Low-Medium | Medium-High | Firmware update | Real-time |
Recommendations by Application
Maritime (Commercial Shipping)
- Multi-constellation receiver (minimum)
- OSNMA verification
- INS backup for chokepoint transits
- CRPA for high-risk routes (Strait of Hormuz, Black Sea)
Aviation
- Multi-constellation, multi-frequency
- OSNMA + BeiDou authentication
- INS integration (already standard in most aircraft)
- RAIM (Receiver Autonomous Integrity Monitoring)
Critical Infrastructure (Power Grids, Telecom)
- OSNMA verification
- Atomic clock backup
- Ground-based eLoran (where available)
- AI-powered monitoring
Autonomous Vehicles
- Multi-constellation + multi-frequency
- INS + visual odometry + LiDAR fusion
- AI anomaly detection
- V2X communication for crowd-sourced threat detection
Consumer Devices
- Multi-constellation (now standard in smartphones)
- OSNMA support (emerging)
- Cross-check with cellular/WiFi positioning
The Path Forward: Defense in Depth
No single technology provides complete protection. The key is layered defense:
Layer 1: Signal-Level Protection
- Use authenticated signals (OSNMA, BeiDou B2C)
- Track multiple constellations and frequencies
Layer 2: Receiver-Level Protection
- AI-powered anomaly detection
- CRPA for high-value applications
- RAIM and integrity monitoring
Layer 3: System-Level Protection
- INS backup
- Sensor fusion
- Alternative PNT sources (eLoran, cellular, LEO satellites)
Layer 4: Operational Protection
- Real-time threat monitoring (Windward AI, GPSPATRON)
- Route planning to avoid known interference zones
- Training for operators to recognize GNSS anomalies
Conclusion: The Arms Race Continues
GNSS spoofing and anti-spoofing are engaged in a classic security arms race. As defensive technologies mature, attackers will develop new techniques. But the gap is narrowing:
- 2025-2026 saw the first operational civilian authentication (OSNMA)
- CRPA technology is now available to civilian markets
- AI detection is being deployed via firmware updates
- Multi-constellation receivers are becoming the standard
The question for operators is no longer can I afford to implement anti-spoofing protection? but rather can I afford not to?
With thousands of vessels and aircraft experiencing GNSS interference annually, and with geopolitical tensions showing no signs of abating, the time to act is now.
This article is Part 3 of our GNSS Security Technologies series. Part 1 covered the threat landscape, Part 2 examined signal structure vulnerabilities, and this installment focuses on defensive technologies. Next: Real-World Case Studies – Lessons from Actual Spoofing Incidents.
Sources: Taoglas, GPS World, Frontiers in Physics, Scientific Reports, NovAtel, Septentrio, Safran, ArduSimple, MDPI