Skip to main content

REVIEW article

Front. Phys.
Sec. Space Physics
Volume 12 - 2024 | doi: 10.3389/fphy.2024.1428544
This article is part of the Research Topic Frontiers in Multi-Source Positioning, Navigation and Timing (PNT) View all 3 articles

Overview of satellite nav spoofing and anti-spoofing techniques

Provisionally accepted
  • National University of Defense Technology, Changsha, China

The final, formatted version of the article will be published soon.

    In recent years, satellite navigation systems have witnessed widespread adoption across diverse fields, including military surveillance, precision agriculture, traffic monitoring, resource exploration, and disaster assessment. However, navigation signals are susceptible to interference, with deceptive interference posing the most significant threat to navigation systems. This paper provides a comprehensive overview of satellite navigation spoofing and anti-spoofing techniques. It reviews the current state of spoofing and anti-spoofing technologies, analysing advancements in spoofing techniques and the evolution of countermeasures. Furthermore, the paper elaborates on the impact of spoofing interference on receiver performance, examining its effects on positioning, timing, and velocity estimations. A detailed analysis of various anti-spoofing methods is presented, categorizing them into detection, identification, suppression, and localization techniques. This review aims to provide a thorough understanding of the evolving landscape of satellite navigation spoofing and antispoofing technologies, fostering further research and development efforts to ensure the integrity and resilience of satellite navigation systems in the face of sophisticated threats.

    Keywords: satellite navigation1, generative spoofing jamming2, induced deceptive jamming3, induced deceptive jamming monitoring4, Induced spoofing interference suppression5

    Received: 06 May 2024; Accepted: 23 Sep 2024.

    Copyright: © 2024 卢. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

    * Correspondence: 呈 卢, National University of Defense Technology, Changsha, China

    Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.