International Journal of Navigation and Observation / 2012 / Article / Tab 2

Review Article

GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques

Table 2

Summary of spoofing mitigation techniques.

Anti-spoofing methodSpoofing featureComplexityEffectivenessReceiver required capabilitySpoofing scenario generality

Vestigial signal detectionThe authentic signal is still present and can be detectedHighMediumMultiple receive channelsMedium
Multi-antenna null steeringSpoofing signals coming from the Same directionMediumHighMultiple receiver antennasHigh
RAIMHigher residuals for spoofed measurementsMediumMediumMedium

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19.