Ch 25. Civilian GNSS Spoofing, Detection, and Recovery

Mark Psiaki, Todd Humphreys

Chapter Overview:

This chapter reviews the fundamental approaches that can be used for GNSS spoofing and spoofing detection. It discusses progress in these areas and defines the state of the art at the time of writing. It is divided into five sections. Section 25.2, GNSS Spoofing Attack Methods, describes various types of spoofing attacks and the technology used to mount them. Section 25.3, Methods for the Detection of Spoofing Attacks, discusses the hardware and algorithms of spoofing detection systems that are capable of detecting various of the defined attack types of Section 25.2. Section 25.4, Methods for Recovery of Authentic PNT Services During a Spoofing Attack, outlines methods for recovering authentic navigation fixes after an attack has been detected. Section 25.5, Testing of Defenses, reviews methods for evaluating the effectiveness of spoofing defenses.

From this page you can:

  • Download hi-res images, for use with attribution.

  • Submit feedback about the chapter.

Figure 25.3 Receiver‐spoofer attack mode.

Figure 25.4 Evolution of a spoofed signal’s amplitude and code‐phase offset during the initial stages of a receiver‐spoofer attack. Spoofed signal: black dash‐dotted curve; sum of spoofed and authentic signals: blue solid curve; receiver tracking points: red dots [19, 26]