Review Article

GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques

Figure 1

Repeater spoofer block diagram (modified after [3]).
127072.fig.001