GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques

GPS-dependent positioning, navigation, and timing synchronization procedures have a significant impact on everyday life. Therefore, such a widely used system increasingly becomes an attractive target for illicit exploitation by terrorists and hackers for various motives. As such, spoofing and antisp...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of navigation and observation Vol. 2012; no. 2012; pp. 1 - 16
Main Authors Jafarnia-Jahromi, Ali, Broumandan, Ali, Nielsen, John, Lachapelle, Gérard
Format Journal Article
LanguageEnglish
Published Cairo, Egypt Hindawi Puplishing Corporation 2012
Hindawi Publishing Corporation
Hindawi Limited
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:GPS-dependent positioning, navigation, and timing synchronization procedures have a significant impact on everyday life. Therefore, such a widely used system increasingly becomes an attractive target for illicit exploitation by terrorists and hackers for various motives. As such, spoofing and antispoofing algorithms have become an important research topic within the GPS discipline. This paper will provide a review of recent research in the field of GPS spoofing/anti-spoofing. The vulnerability of GPS to a spoofing attack will be investigated and then different spoofing generation techniques will be discussed. After introducing spoofing signal model, a brief review of recently proposed anti-spoofing techniques and their performance in terms of spoofing detection and spoofing mitigation will be provided. Limitations of anti-spoofing algorithms will be discussed and some methods will be introduced to ameliorate these limitations. In addition, testing the spoofing/anti-spoofing methods is a challenging topic that encounters some limitations due to stringent emission regulations. This paper will also provide a review of different test scenarios that have been adopted for testing anti-spoofing techniques.
Bibliography:ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ISSN:1687-5990
1687-6008
DOI:10.1155/2012/127072