M-Code GPS Receiver Testing

M-Code GPS Receiver Testing

Prepare for Public Law 111-383 Requiring M-Code Compatible User Equipment after FY17

A major component of GPS modernization, M-Code offers further improvement to the anti-jamming and secure access of radio-navigation signals to the armed forces.

Integrators of navigation systems have a few options to ensure successful transition from previous generation SAASM GPS receivers to those supporting M-Code. One technique is to use AES encryption for testing proper operation in L1 and L2 bands.

Testing Using AES Encryption

Spectracom GPS simulators currently support one of the three techniques for testing M-Code receivers by using the AES-encryption.

In a simulation scenario M-Code with AES encryption generates the complete M-Code signal but rather than using the classified encryption, it uses the Advanced Encryption Standard, a publicly known method used to encrypt electronic data. An AES encryption key is generated by the simulator and the same key is loaded into the receiver. This allows the receiver to receive and use M-Code GPS signals generated by the simulator. The benefit of this method is to allow full testing of an M-Code receiver in an unclassified environment.

M-Code Testing Methods
   M-Noise   AES   SDS 
Testing commercial receivers in the presence of M-Code X    
Testing M-Code receivers and M-Code integrated systems   X  
Testing M-Code encryption algorithms     X


Product Details

The M-Code testing feature is a standard feature in BroadSim Defense. AES-M is available on L1 and L2 on both the Encrypted and Unencrypted Defense models of BroadSim. MNSA-M is in development and will be a future paid option for BroadSim Encrypted Defense.

Related Products