An Inherent Limitative Parameter in Spoofing GNSS-Based Navigation Clients

Main Article Content

A. Esmaeilkhah


Deception of navigational subsystems of a client, ranging from a hunting GPS receiver to the military-class GNSS receiver onboard of a Cruise Missile, is one of the probable electronic attacks. One of the simplest and practical way too deceive these receivers is to re-broadcast the delayed navigational signals. The authors were studied the feasibility of this method in the “Best” attainable conditions while the generality of study retained. The results from introduced geometrical and mathematical models were used to define the minimum and maximum operational range of Repeater Deception System parametrically. Then the parameters were substituted by information of various GNSS constellations. Investigation of reliability of selected EW scenario concluded the article.


Download data is not yet available.

Article Details

How to Cite
Esmaeilkhah, A. (2019). An Inherent Limitative Parameter in Spoofing GNSS-Based Navigation Clients. Advanced Electromagnetics, 8(3), 29–35.
Research Articles


Giles. Sun Tzu on the Art of War, Abingdon, Oxon: Routledge, 2013.

View Article

Homer, The Iliad, Edited by: R. Lattimore, R. A. Lattimore, ISNB: 0226469409, University of Chicago Press, 1961.

Ch. F. Bond, M. Robinson, The evolution of deception, Journal of Nonverbal Behavior 12(4):295-30, December 1988.

View Article

Y. Bassil, Steganography & the Art of Deception: A Comprehensive Survey, Int. Journal on Latest Trends Computing, Vol‐4 No. 3: 128-138, September 2013.

M. A. Peters, The History and Practice of Lying in Public Life, Review of Contemporary Philosophy, Vol. 14:47-61, 2015, ISSN 1841-5261.

T. E. Humphreys, et al. "Assessing the spoofing threat: Development of a portable GPS civilian spoofer." Proceedings of the ION GNSS international technical meeting of the satellite division. Vol. 55. 2008.

T. E. Humphreys, "Statement on the vulnerability of civil unmanned aerial vehicles and other systems to civil GPS spoofing." University of Texas at Austin (July 18, 2012).

Kerns, Andrew J., et al. "Unmanned aircraft capture and control via GPS spoofing." Journal of Field Robotics 31.4 (2014): 617-636.

View Article

A. Jafarnia-Jahromi, et al., "GPS Vulnerability to Spoofing Threats and a Review of Anti spoofing Techniques," International Journal of Navigation and Observation, vol. 2012, Article ID 127072, 16 pages, 2012.

View Article

W.L. Garfield, TACAN: a navigation system for aircraft, Proceedings of the IEE - Part B: Radio and Electronic Engineering, Volume: 105, Issue: 9, March 1958.

View Article

W. Zhang, K Zhang, B. Wu and H. Suh, "Simulation and Analysis Acquisition of GPS C/A Code Signals in GPS System", International Symposium on Computer Network and Multimedia Technology,. CNMT 2009, ISBN: 978-1-4244-5272-9, Wuhan, China, 2009.

View Article

D. Hambling, "Ships fooled in GPS spoofing attack suggest Russian cyber weapon", New Scientists, vol. 3139, 19 August 2017.

J. Bao, Y. Tsui, "GPS C/A Code Signal Structure", Fundamentals of Global Positioning System Receivers: A Software Approach", Ch. 5, John Wiley & Sons, Inc. ISBN 0-471-38154-3, 2000.

G. Blewitt, "Basics of the GPS Technique: Observation Equations", Geodetic Applications of GPS, the Swedish Land Survey, 1997.

Y.B. LIU, et al. "Efficiency Analysis of Repeater Deception Jamming GPS Repeater [J]." Journal of Air Force Radar Academy 4 (2004): 001.

M. E. Johnson, et al. "Comparison of measured data with IF-77 propagation model predictions". National Telecommunications and Information Administration Boulder Co Institute for Telecommunication Sciences, 1979.

A. Esmaeilkhah and N. Lavasani, "Jamming Efficacy of Variable Altitude GPS Jammer against Airborne GPS Receiver, Theoretical Study and Parametric Simulation", AEM, vol. 7, no. 1, pp. 57-64, Feb. 2018.

View Article