No longer the preserve of powerful state actors, spoofing is a growing threat for GNSS-enabled equipment. Understanding how spoofing works and how to mitigate the potential impact of an attack is a key concern for developers of both commercial and military/government applications.
In this paper, Spirent considers: