2012
DOI: 10.1155/2012/127072
|View full text |Cite
|
Sign up to set email alerts
|

GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques

Abstract: GPS-dependent positioning, navigation, and timing synchronization procedures have a significant impact on everyday life. Therefore, such a widely used system increasingly becomes an attractive target for illicit exploitation by terrorists and hackers for various motives. As such, spoofing and antispoofing algorithms have become an important research topic within the GPS discipline. This paper will provide a review of recent research in the field of GPS spoofing/anti-spoofing. The vulnerability of GPS to a spoo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
164
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 299 publications
(181 citation statements)
references
References 9 publications
0
164
0
Order By: Relevance
“…In both cases, such an attack most likely affects the power and/or the noise of the signal. Hence, various spoofing detection methods are based on signal power monitoring as for example, absolute power monitoring, signal-to-noise ratio (SNR or C/N 0 ) monitoring, or received power variations versus receiver movement [15,25,28].…”
Section: Gps Spoofingmentioning
confidence: 99%
“…In both cases, such an attack most likely affects the power and/or the noise of the signal. Hence, various spoofing detection methods are based on signal power monitoring as for example, absolute power monitoring, signal-to-noise ratio (SNR or C/N 0 ) monitoring, or received power variations versus receiver movement [15,25,28].…”
Section: Gps Spoofingmentioning
confidence: 99%
“…The problematic areas are especially parking structures and tunnels, bridges, city centers with narrow streets and high buildings, narrow valleys, etc. GNSS is also vulnerable to spoofing and jamming attacks [8,9] that can prevent its correct operation. To avoid the loss of communications in case of unavailable or unreliable positioning services, clustering and other low-level communications should function independently.…”
Section: Related Workmentioning
confidence: 99%
“…[23] seems to have investigated spoofing and spoofing countermeasures in detail in a internal memorandum for he MITRE Corporation. Some antispoofing techniques are being used to detect GNSS spoofers based on signal simulator: amplitude monitoring, time-of-arrival discriminator and consistency checks among different measurements [24].…”
Section: Fifth Strategy: Spoofing and Meaconing Mitigationmentioning
confidence: 99%