A
spoofing attack occurs when a person with no authority tries to masquerade an authorized person by falsifying the data captured by acquisition sensors [5].
Next, by combining multiscale, local, phase quantization representation, the robustness of the
spoofing attack detector can be further improved.
Unfortunately, in 2013, Kumari and Khan [13] pointed out that Chen et al.'s scheme cannot withstand user impersonation attack, server
spoofing attack, and offline password guessing attack.
An ARP
spoofing attack is an attack in which the media access control (MAC) address of a computer is masqueraded as that of another.
If a service request lacks the security header--for example, a
spoofing attack with an authentic login but no accompanying header--it will be denied.
Unlike a
spoofing attack, both the user and the GPS receiver understand that satellite signals from space are not being received.
Moreover, our proposal can avoid the server
spoofing attack since the verification process relies on the server's private key.