It has been widely demonstrated that GNSS-based localization technologies are vulnerable to signal jamming and spoofing/replay attacks, where a receiver can be either denied positioning or deceived to compute a forged PVT solution. Today, it is possible to spoof a GNSS receiver to any arbitrary loca