Skip to main content Skip to secondary navigation

Anti-Spoofing

Main content start

A GPS spoofing attack attempts to “deceive” a GPS receiver by broadcasting counterfeit GPS signals, structured to resemble a set of normal GPS signals, or by rebroadcasting genuine signals captured elsewhere or at a different time. These spoofed signals may be modified in such a way as to cause the receiver to estimate its position to be somewhere other than where it actually is, or to be located where it is but at a different time, as determined by the attacker.

Anti-spoofing graphic image

Spoofing attacks have become increasingly common since 2023. One of the earliest suspected cases was the capture of a Lockheed RQ-170 drone aircraft in northeastern Iranin December 2011, that likely was the result of such an attack. Currently, multiple spoofing events are detected are detected daily using ADS-B reports from aircraft.

For a number of years, Stanford has been performing research on how to make GPS and GPS receivers more robust against spoofing attacks. Current research includes the following techniques:

  • Using WAAS message authentication
  • Time of arrival techniques
  • Use of antenna to distinguish direction of arrival
  • Using and comparing encrypted PY code

The FAA has supported Stanford’s research in this area.

View Inside GNSS Article (PDF): A Multi-Antenna Defense Receiver-Autonomous GPS Spoofing Detectionby Paul Montgomery (Novariant, Inc), Todd Humphreys (University of Texas at Austin), Brent Ledvina (Virginia Tech), March/April 2009.