Review Article

GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques

Table 2

Summary of spoofing mitigation techniques.

Anti-spoofing methodSpoofing featureComplexityEffectivenessReceiver required capabilitySpoofing scenario generality

Vestigial signal detectionThe authentic signal is still present and can be detectedHighMediumMultiple receive channelsMedium
Multi-antenna null steeringSpoofing signals coming from the Same directionMediumHighMultiple receiver antennasHigh
RAIMHigher residuals for spoofed measurementsMediumMediumā€”Medium