Review Article
GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques
Table 2
Summary of spoofing mitigation techniques.
| Anti-spoofing method | Spoofing feature | Complexity | Effectiveness | Receiver required capability | Spoofing scenario generality |
| Vestigial signal detection | The authentic signal is still present and can be detected | High | Medium | Multiple receive channels | Medium | Multi-antenna null steering | Spoofing signals coming from the Same direction | Medium | High | Multiple receiver antennas | High | RAIM | Higher residuals for spoofed measurements | Medium | Medium | ā | Medium |
|
|