Review Article

GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques

Figure 8

Distribution of prompt correlator output power for authentic signals and authentic-spoofing interaction for different spoofing powers [19].
127072.fig.008