Skip to Content

590 Results Found

  • Review
  • Open Access
101 Citations
23,271 Views
24 Pages

A Survey of GNSS Spoofing and Anti-Spoofing Technology

  • Lianxiao Meng,
  • Lin Yang,
  • Wu Yang and
  • Long Zhang

27 September 2022

With the development of satellite navigation technology, the research focus of GNSS has shifted from improving positioning accuracy to expanding system application and improving system performance. At the same time, improving the survivability of sat...

  • Technical Note
  • Open Access
7 Citations
3,368 Views
15 Pages

Research on Detection Technology of Spoofing under the Mixed Narrowband and Spoofing Interference

  • Long Huang,
  • Zukun Lu,
  • Chao Ren,
  • Zhe Liu,
  • Zhibin Xiao,
  • Jie Song and
  • Baiyu Li

23 May 2022

The global navigation satellite system has achieved great success in the civil and military fields and is an important resource for space-time information services. However, spoof interference has always been one of the main threats to the applicatio...

  • Article
  • Open Access
2 Citations
2,879 Views
19 Pages

14 June 2022

When satellite navigation terminal sensors encounter malicious signal spoofing or interference, if attention is not paid to improving their anti-spoofing ability, the performance of the sensors will be seriously affected. The global navigation satell...

  • Article
  • Open Access
6 Citations
3,248 Views
16 Pages

30 June 2023

Highly deceptive deepfake technologies have caused much controversy, e.g., artificial intelligence-based software can automatically generate nude photos and deepfake images of anyone. This brings considerable threats to both individuals and society....

  • Article
  • Open Access
7 Citations
4,619 Views
22 Pages

Spoofing Attack Results Determination in Code Domain Using a Spoofing Process Equation

  • Beomju Shin,
  • Minhuck Park,
  • Sanghoon Jeon,
  • Hyoungmin So,
  • Gapjin Kim and
  • Changdon Kee

12 January 2019

When a user receiver is tracking an authentic signal, a spoofing signal can be transmitted to the user antenna. The question is under what conditions does the tracking point of the receiver move from the authentic signal to the spoofing signal? In th...

  • Article
  • Open Access
1 Citations
3,583 Views
30 Pages

24 February 2025

Spoofing events are increasingly affecting the performance of devices and operations relying on Global Navigation Satellite Systems (GNSSs). Developing powerful and robust GNSS spoofing detection and mitigation algorithms is an important endeavor in...

  • Proceeding Paper
  • Open Access
4 Citations
1,291 Views
9 Pages

This paper delves into the distributed GNSS spoofing threat, a sophisticated deployment structure wherein multiple spoofing antennas each emit a single spoofing signal to the victim receiver. This study analyzes the challenges associated with executi...

  • Article
  • Open Access
21 Citations
7,119 Views
20 Pages

23 October 2016

Spoofing is becoming a serious threat to various Global Navigation Satellite System (GNSS) applications, especially for those that require high reliability and security such as power grid synchronization and applications related to first responders a...

  • Article
  • Open Access
1,198 Views
22 Pages

4 August 2025

Achieving reliable navigation is critical for GNSS receivers subject to spoofing attacks. Utilizing the inherent sparsity and inconsistency of spoofing signals, this paper proposes an anti-spoofing framework for GNSS receivers to detect, classify, an...

  • Article
  • Open Access
13 Citations
2,755 Views
25 Pages

GNSS Spoofing Detection Using Q Channel Energy

  • Jiaqi Wang,
  • Xiaomei Tang,
  • Pengcheng Ma,
  • Jian Wu,
  • Chunjiang Ma and
  • Guangfu Sun

13 November 2023

Spoofing interference poses a significant challenge to the Global Navigation Satellite System (GNSS). To effectively combat intermediate spoofing signals, this paper presents an enhanced spoofing detection method based on abnormal energy of the quadr...

  • Article
  • Open Access
32 Citations
5,804 Views
17 Pages

Detection of Induced GNSS Spoofing Using S-Curve-Bias

  • Wenyi Wang,
  • Na Li,
  • Renbiao Wu and
  • Pau Closas

22 February 2019

In Global Navigation Satellite System (GNSS), a spoofing attack consists of forged signals which possibly cause the attacked receivers to deduce a false position, a false clock, or both. In contrast to simplistic spoofing, the induced spoofing captur...

  • Article
  • Open Access
49 Citations
8,692 Views
21 Pages

30 June 2017

Spoofing attacks are threatening the global navigation satellite system (GNSS). The maximum likelihood estimation (MLE)-based positioning technique is a direct positioning method originally developed for multipath rejection and weak signal processing...

  • Article
  • Open Access
70 Citations
8,292 Views
20 Pages

20 February 2020

The vulnerability of the Global Navigation Satellite System (GNSS) open service signals to spoofing and meaconing poses a risk to the users of safety-of-life applications. This risk consists of using manipulated GNSS data for generating a position-ve...

  • Article
  • Open Access
6 Citations
1,795 Views
27 Pages

Spoofing Traction Strategy Based on the Generation of Traction Code

  • Ning Ji,
  • Yongnan Rao,
  • Xue Wang,
  • Decai Zou,
  • Xiaofei Chen and
  • Yao Guo

14 January 2023

Traction spoofing is an important component of Global Navigation Satellite System (GNSS) intermediate attacks, and the traction scheme directly determines the concealment of spoofing. However, spoofing via conventional traction strategies can be easi...

  • Article
  • Open Access
22 Citations
4,942 Views
20 Pages

Spoofing Detection Algorithm Based on Pseudorange Differences

  • Ke Liu,
  • Wenqi Wu,
  • Zhijia Wu,
  • Lei He and
  • Kanghua Tang

21 September 2018

Intentional spoofing interference can cause damage to the navigation terminal and threaten the security of a global navigation satellite system (GNSS). For spoofing interference, an anti-spoofing algorithm based on pseudorange differences for a singl...

  • Article
  • Open Access
28 Citations
5,615 Views
16 Pages

Development of a Model for Spoofing Attacks in Internet of Things

  • Faheem Khan,
  • Abdullah A. Al-Atawi,
  • Abdullah Alomari,
  • Amjad Alsirhani,
  • Mohammed Mujib Alshahrani,
  • Jawad Khan and
  • Youngmoon Lee

8 October 2022

Internet of Things (IoT) allows the integration of the physical world with network devices for proper privacy and security in a healthcare system. IoT in a healthcare system is vulnerable to spoofing attacks that can easily represent themselves as a...

  • Article
  • Open Access
5 Citations
2,565 Views
17 Pages

MPC-Based Dynamic Trajectory Spoofing for UAVs

  • Bo Hou,
  • Zhongjie Yin,
  • Xiaolong Jin,
  • Zhiliang Fan and
  • Haiyang Wang

19 October 2024

Navigation spoofing has been widely utilized in unmanned aircraft vehicle (UAV) countermeasures, due to its advantages of covertness, effectiveness, and dynamic trajectory control ability. However, existing research faces two primary challenges. Firs...

  • Article
  • Open Access
17 Citations
3,345 Views
23 Pages

25 November 2022

Visual/Inertial/GNSS (VIG) integrated navigation and positioning systems are widely used in unmanned vehicles and other systems. This VIG system is vulnerable to of GNSS spoofing attacks. Relevant research on the harm that spoofing causes to the syst...

  • Article
  • Open Access
13 Citations
5,121 Views
18 Pages

GANBA: Generative Adversarial Network for Biometric Anti-Spoofing

  • Alejandro Gomez-Alanis,
  • Jose A. Gonzalez-Lopez and
  • Antonio M. Peinado

29 January 2022

Automatic speaker verification (ASV) is a voice biometric technology whose security might be compromised by spoofing attacks. To increase the robustness against spoofing attacks, presentation attack detection (PAD) or anti-spoofing systems for detect...

  • Article
  • Open Access
40 Citations
5,648 Views
17 Pages

27 May 2019

This article presents a method for detecting and mitigating intermediate GNSS spoofing. In this type of attack, at its early stage, a spoofer transmits counterfeit signals which have slight time offsets compared to true signals arriving from satellit...

  • Article
  • Open Access
9 Citations
24,366 Views
17 Pages

IP Spoofing In and Out of the Public Cloud: From Policy to Practice

  • Natalija Vlajic,
  • Mashruf Chowdhury and
  • Marin Litoiu

9 November 2019

In recent years, a trend that has been gaining particular popularity among cybercriminals is the use of public Cloud to orchestrate and launch distributed denial of service (DDoS) attacks. One of the suspected catalysts for this trend appears to be t...

  • Article
  • Open Access
11 Citations
5,904 Views
21 Pages

15 June 2020

Spoofing attacks using imitations of fingerprints of legal users constitute a serious threat. In this study, a terahertz time domain spectroscopy (TDS) setup in a reflection configuration was used for the non-intrusive detection of fingerprint spoofi...

  • Article
  • Open Access
7 Citations
7,894 Views
15 Pages

21 July 2016

In this paper, a smart face liveness detector is proposed to prevent the biometric system from being “deceived” by the video or picture of a valid user that the counterfeiter took with a high definition handheld device (e.g., iPad with retina display...

  • Article
  • Open Access
9 Citations
4,099 Views
23 Pages

Localization of GNSS Spoofing Interference Source Based on a Moving Array Antenna

  • Rui Liu,
  • Zhiwei Yang,
  • Qidong Chen,
  • Guisheng Liao and
  • Qinglin Zhu

25 November 2023

GNSS spoofing interference utilizes falsified navigation signals to launch attacks on GNSS systems, posing a significant threat to applications that rely on GNSS signals for positioning, navigation, and time services. Therefore, achieving effective l...

  • Article
  • Open Access
59 Citations
5,335 Views
23 Pages

Spoofing Detection of Civilian UAVs Using Visual Odometry

  • Masood Varshosaz,
  • Alireza Afary,
  • Barat Mojaradi,
  • Mohammad Saadatseresht and
  • Ebadat Ghanbari Parmehr

Spoofing of Unmanned Aerial Vehicles (UAV) is generally carried out through spoofing of the UAV’s Global Positioning System (GPS) receiver. This paper presents a vision-based UAV spoofing detection method that utilizes Visual Odometry (VO). Thi...

  • Article
  • Open Access
16 Citations
4,856 Views
20 Pages

4 November 2021

Human Activity Recognition (HAR) has become increasingly crucial in several applications, ranging from motion-driven virtual games to automated video surveillance systems. In these applications, sensors such as smart phone cameras, web cameras or CCT...

  • Article
  • Open Access
15 Citations
5,355 Views
18 Pages

19 December 2016

The spoofing attack is one of the security threats of systems depending on the Global Navigation Satellite System (GNSS). There have been many GNSS spoofing detection methods, and each of them focuses on a characteristic of the GNSS signal or a measu...

  • Article
  • Open Access
17 Citations
4,215 Views
15 Pages

25 March 2020

Global Navigation Satellite System (GNSS) meaconing and spoofing are being considered as the key threats to the Safety-of-Life (SoL) applications that mostly rely upon the use of open service (OS) signals without signal or data-level protection. Whil...

  • Article
  • Open Access
10 Citations
4,664 Views
17 Pages

Face recognition is a representative biometric that can be easily used; however, spoofing attacks threaten the security of face biometric systems by generating fake faces. Thus, it is not advisable to only consider sophisticated spoofing cases, such...

  • Article
  • Open Access
31 Citations
5,560 Views
22 Pages

12 October 2021

Spoofing attacks are one of the severest threats for global navigation satellite systems (GNSSs). This kind of attack can damage the navigation systems of unmanned air vehicles (UAVs) and other unmanned vehicles (UVs), which are highly dependent on G...

  • Article
  • Open Access
1 Citations
2,426 Views
18 Pages

Generalized Replay Spoofing Countermeasure Based on Combining Local Subclassification Models

  • Sarah Mohammed Altuwayjiri,
  • Ouiem Bchir and
  • Mohamed Maher Ben Ismail

18 November 2022

Automatic speaker verification (ASV) systems play a prominent role in the security field due to the usability of voice biometrics compared to alternative biometric authentication modalities. Nevertheless, ASV systems are susceptible to malicious voic...

  • Proceeding Paper
  • Open Access
2 Citations
1,829 Views
12 Pages

Recently, the vulnerability of automatic speaker recognition systems to spoofing attacks has received significant interest among researchers. A robust speaker recognition system demands not only high recognition accuracy but also robustness to spoofi...

  • Article
  • Open Access
2 Citations
2,290 Views
23 Pages

2 October 2025

GPS spoofing remains a critical threat in the use of autonomous vehicles. Machine-learning-based detection systems, particularly support vector machines (SVMs), demonstrate high accuracy in their defense against conventional spoofing attacks. However...

  • Proceeding Paper
  • Open Access
3 Citations
3,448 Views
9 Pages

Jammertest 2022: Jamming and Spoofing Lessons Learned

  • Aiden Morrison,
  • Nadezda Sokolova,
  • Anders Solberg,
  • Nicolai Gerrard,
  • Anders Rødningsby,
  • Harald Hauglin,
  • Thomas Rødningen and
  • Tor Dahlø

29 October 2023

Jammertest 2022 was a week-long series of satellite navigation and timing signal jamming and spoofing exercises carried out on the Norwegian island of Andøya in September of 2022. Organized via a collaboration between the Norwegian spectrum ma...

  • Review
  • Open Access
64 Citations
27,388 Views
28 Pages

Recent Advances on Jamming and Spoofing Detection in GNSS

  • Katarina Radoš,
  • Marta Brkić and
  • Dinko Begušić

28 June 2024

Increased interest in the development and integration of navigation and positioning services into a wide range of receivers makes them susceptible to a variety of security attacks such as Global Navigation Satellite Systems (GNSS) jamming and spoofin...

  • Article
  • Open Access
2,443 Views
15 Pages

Facial Anti-Spoofing Using “Clue Maps”

  • Liang Yu Gong,
  • Xue Jun Li and
  • Peter Han Joo Chong

29 November 2024

Spoofing attacks (or Presentation Attacks) are easily accessible to facial recognition systems, making the online financial system vulnerable. Thus, it is urgent to develop an anti-spoofing solution with superior generalization ability due to the hig...

  • Article
  • Open Access
33 Citations
5,206 Views
23 Pages

ConstDet: Control Semantics-Based Detection for GPS Spoofing Attacks on UAVs

  • Xiaomin Wei,
  • Cong Sun,
  • Minjie Lyu,
  • Qipeng Song and
  • Yue Li

5 November 2022

UAVs are widely used in agriculture, the military, and industry. However, it is easy to perform GPS spoofing attacks on UAVs, which can lead to catastrophic consequences. In this paper, we propose ConstDet, a control semantics-based detection approac...

  • Article
  • Open Access
7 Citations
6,492 Views
24 Pages

A GPS-Adaptive Spoofing Detection Method for the Small UAV Cluster

  • Lianxiao Meng,
  • Long Zhang ,
  • Lin Yang and
  • Wu Yang

11 July 2023

The small UAV (unmanned aerial vehicle) cluster has become an important trend in the development of UAVs because it has the advantages of being unmanned, having a small size and low cost, and ability to complete many collaborative tasks. Meanwhile, t...

  • Article
  • Open Access
77 Citations
22,779 Views
25 Pages

AIS Data Vulnerability Indicated by a Spoofing Case-Study

  • Andrej Androjna,
  • Marko Perkovič,
  • Ivica Pavic and
  • Jakša Mišković

28 May 2021

This paper takes a close look at the landscape of the Automatic Identification System (AIS) as a major source of information for maritime situational awareness (MSA) and identifies its vulnerabilities and challenges for safe navigation and shipping....

  • Article
  • Open Access
13 Citations
6,739 Views
25 Pages

A GNSS Spoofing Detection and Direction-Finding Method Based on Low-Cost Commercial Board Components

  • Pengrui Mao,
  • Hong Yuan,
  • Xiao Chen,
  • Yingkui Gong,
  • Shuhui Li,
  • Ran Li,
  • Ruidan Luo,
  • Guangyao Zhao,
  • Chengang Fu and
  • Jiajia Xu

26 May 2023

The Global Navigation Satellite System (GNSS) is vulnerable to deliberate spoofing signal attacks. Once the user wrongly locks on the spoofing signal, the wrong position, velocity, and time (PVT) information will be calculated, which will harm the us...

  • Article
  • Open Access
728 Views
25 Pages

To address the issue that existing GNSS spoofing detection methods are not suitable for intermittent minor spoofing detection and spoofing duration identification, this paper theoretically analyzes the shortcomings of existing detection algorithms in...

  • Article
  • Open Access
4 Citations
4,045 Views
18 Pages

5 August 2024

Compared to conventional spoofing, emerging spoofing attacks pose a heightened threat to security applications within the global navigation satellite system (GNSS) due to their subtly designed signal structures. In response, a novel spoofing detectio...

  • Article
  • Open Access
10 Citations
4,224 Views
19 Pages

Adaptive Spoofing Suppression Algorithm for GNSS Based on Multiple Antennas Array

  • Guangwei Fan,
  • Xingli Gan,
  • Baoguo Yu,
  • Qiang Rong and
  • Chuanzhen Sheng

18 February 2020

The signals of navigation satellites are easily affected by spoofing interference, causing the wrong position, speed or Universal Time Coordinate of the receiver to be calculated. Traditional detection and suppression algorithms are used only to elim...

  • Article
  • Open Access
32 Citations
7,553 Views
18 Pages

A GPS Spoofing Generator Using an Open Sourced Vector Tracking-Based Receiver

  • Qian Meng,
  • Li-Ta Hsu,
  • Bing Xu,
  • Xiapu Luo and
  • Ahmed El-Mowafy

16 September 2019

Spoofing can seriously threaten the use of the Global Positioning System (GPS) in critical applications such as positioning and navigation of autonomous vehicles. Research into spoofing generation will contribute to assessment of the threat of possib...

  • Article
  • Open Access
84 Citations
8,844 Views
18 Pages

24 April 2018

Location information is one of the most vital information required to achieve intelligent and context-aware capability for various applications such as driverless cars. However, related security and privacy threats are a major holdback. With increasi...

  • Article
  • Open Access
3 Citations
2,628 Views
21 Pages

31 August 2022

Satellite navigation spoofing technology has become a hotspot of interference technology research because of its significant threat and high concealment. In a spoofing scenario, suppressive interference is typically used to ensure that the target rec...

  • Article
  • Open Access
1 Citations
1,763 Views
17 Pages

IP Spoofing Detection Using Deep Learning

  • İsmet Kaan Çekiş,
  • Buğra Ayrancı,
  • Fezayim Numan Salman and
  • İlker Özçelik

29 August 2025

IP spoofing is a critical component in many cyberattacks, enabling attackers to evade detection and conceal their identities. This study rigorously compares eight deep learning models—LSTM, GRU, CNN, MLP, DNN, RNN, ResNet1D, and xLSTM—for...

  • Article
  • Open Access
22 Citations
5,367 Views
17 Pages

New Acoustic Features for Synthetic and Replay Spoofing Attack Detection

  • Linqiang Wei,
  • Yanhua Long,
  • Haoran Wei and
  • Yijie Li

29 January 2022

With the rapid development of intelligent speech technologies, automatic speaker verification (ASV) has become one of the most natural and convenient biometric speaker recognition approaches. However, most state-of-the-art ASV systems are vulnerable...

  • Article
  • Open Access
27 Citations
5,452 Views
25 Pages

Spoofing Attacks on FMCW Radars with Low-Cost Backscatter Tags

  • Antonio Lazaro,
  • Arnau Porcel,
  • Marc Lazaro,
  • Ramon Villarino and
  • David Girbau

10 March 2022

This work studies the feasibility of using backscatter-modulated tags to introduce false information into a signal received by a frequency-modulated continuous-wave (FMCW) radar. A proof-of-concept spoofing device was designed in the 24 GHz ISM band....

  • Article
  • Open Access
2 Citations
3,251 Views
21 Pages

Detection of Access Point Spoofing in the Wi-Fi Fingerprinting Based Positioning

  • Juraj Machaj,
  • Clément Safon,
  • Slavomír Matúška and
  • Peter Brída

28 November 2024

Indoor positioning based on Wi-Fi signals has gained a lot of attention lately. There are many advantages related to the use of Wi-Fi signals for positioning, including the availability of Wi-Fi access points in indoor environments and the integratio...

of 12