This article describes a wide range of spoofing attack scenarios and their features, as well as the results in test-ing against these scenarios. Spoofing can occur by changing relative signal power, synchronizing signals to those of...
More
This article describes a wide range of spoofing attack scenarios and their features, as well as the results in test-ing against these scenarios. Spoofing can occur by changing relative signal power, synchronizing signals to those of authentic ones, and capitalizing on the availability of authentic signals.
Written by Ali Broumandan, Sandy Kennedy and John Schleppe. Originally published in Inside GNSS July/August 2020.
Less