On the requirements for successful GPS spoofing attacks
An increasing number of wireless applications rely on GPS signals for localization, navigation, and time synchronization. However, civilian GPS signals are known to be susceptible to spoofing attacks which make GPS receivers in range believe that they reside at locations different than their real ph...
Main Authors: | , , , |
---|---|
Format: | Conference item |
Published: |
ACM
2011
|