Review Article

GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques

Table 1

Summary of spoofing detection techniques.

Anti-Spoofing methodSpoofing featureComplexityEffectivenessReceiver required capabilitySpoofing scenario generality

monitoringHigher LowMedium monitoringMedium
Absolute power monitoringHigher amplitudeLowMediumAbsolute power monitoringHigh
Power variation versus receiver movementHigher power variations due to proximityLowLowAntenna movement/ monitoringLow
L1/L2 power comparisonNo L2 signal for spooferMediumLowL2 reception capabilityLow
Direction of arrival comparisonSpoofing signals coming from the same directionHighHighMultiple receiver antennasHigh
Pairwise correlation in synthetic arraySpoofing signals coming from the same directionLowHighMeasuring correlation coefficientHigh
TOA discriminationInevitable delay of spoofing signalMediumMediumTOA analysisLow
Signal quality monitoringDeviated shape of authentic correlation peakMediumMediumMultiple correlatorsLow
Distribution analysis of the correlator outputPerturbed amplitude distribution due to spoofing-authentic interactionLowMediumDistribution analysis of correlator outputsMedium
Consistency check with other solutionsInconsistency of spoofing solutionHighHighDifferent navigation sensorsHigh
Cryptographic authenticationNot authenticatedHighHighAuthenticationHigh
Code and phase rate consistency checkMismatch between artificial code and phase rateLowLowā€”Low
GPS clock consistency checkSpoofing/authentic clock inconsistencyLowMediumā€”Medium