GNSS systems are susceptible to radio interference despite then operating in a spread spectrum. The commerce jammers power up to 2 watts that can block the receiver function at a distance of up to 15 kilometers in free space. Two original methods for GNSS receiver testing were developed. The first method is based on the usage of a GNSS simulator for generation of the satellite signals and a vector signal RF generator for generating different types of interference signals. The second software radio method is based on a software GNSS simulator and a signal processing in Matlab. The receivers were tested for narrowband CW interference, FM modulated signal and chirp jamming signals and scenarios. The signal to noise ratio usually drops down to 27 dBc-Hz while the jamming to signal ratio is different for different types of interference. The chirp signal is very effective. The jammer signal is well propagated in free space while in the real mobile urban and suburban environment it is usually strongly attenuated.
Visible Light Communication (VLC) is a technique for high-speed, low-cost wireless data transmission based on LED luminaries. Wireless LAN environments are a major application of VLC. In these environments, VLC is used in place of traditional systems such as Wi-Fi. Because of the physical characteristics of visible light, VLC is considered to be superior to traditional radio-based communication in terms of security. However, as in all wireless systems, the security of VLC with respect to eavesdropping, signal jamming and modification must be analyzed. This paper focuses on the aspect of jamming in VLC networks. In environments where multiple VLC transmitters are used, there is the possibility that one or more transmitters will be hostile (or “rogue”). This leads to communication disruption, and in some cases, the hijacking of the legitimate data stream. In this paper we present the theoretical system model that is used in simulations to evaluate various rogue transmission scenarios in a typical indoor environment. The typical approach used so far in jamming analysis assumes that all disruptive transmissions may be modeled as Gaussian noise, but this assumption may be too simplistic. We analyze and compare two models of VLC jamming: the simplified Gaussian and the exact model, where the full characteristics of the interfering signal are taken into account. Our aim is to determine which methodology is adequate for studying signal jamming in VLC systems.