|
Anti-Spoofing method | Spoofing feature | Complexity | Effectiveness | Receiver required capability | Spoofing scenario generality |
|
monitoring | Higher | Low | Medium | monitoring | Medium |
Absolute power monitoring | Higher amplitude | Low | Medium | Absolute power monitoring | High |
Power variation versus receiver movement | Higher power variations due to proximity | Low | Low | Antenna movement/ monitoring | Low |
L1/L2 power comparison | No L2 signal for spoofer | Medium | Low | L2 reception capability | Low |
Direction of arrival comparison | Spoofing signals coming from the same direction | High | High | Multiple receiver antennas | High |
Pairwise correlation in synthetic array | Spoofing signals coming from the same direction | Low | High | Measuring correlation coefficient | High |
TOA discrimination | Inevitable delay of spoofing signal | Medium | Medium | TOA analysis | Low |
Signal quality monitoring | Deviated shape of authentic correlation peak | Medium | Medium | Multiple correlators | Low |
Distribution analysis of the correlator output | Perturbed amplitude distribution due to spoofing-authentic interaction | Low | Medium | Distribution analysis of correlator outputs | Medium |
Consistency check with other solutions | Inconsistency of spoofing solution | High | High | Different navigation sensors | High |
Cryptographic authentication | Not authenticated | High | High | Authentication | High |
Code and phase rate consistency check | Mismatch between artificial code and phase rate | Low | Low | ā | Low |
GPS clock consistency check | Spoofing/authentic clock inconsistency | Low | Medium | ā | Medium |
|