A low-cost replica-based distance-spoofing attack on Mmwave FMCW radar

18Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.

Abstract

This paper presents a low-cost distance-spoofing attack on a mmWave Frequency Modulated Continuous Wave (FMCW) radar. It uses only a replica radar chipset and a single compact microcontroller board both in mass production. No expensive and bulky test instrument is required, and hence a low-cost and lightweight attack setup is developed. Even with the limited hardware resource in this setup, the replica radar can be precisely synchronized with the target radar for distance-spoofing capability. A half-chirp modulation scheme enables timing compensation between crystal oscillators on the replica and the target radar boards. A two-step delay insertion scheme precisely controls relative delay difference between two radars at ns-order, and as a result the attacker can manipulate distance measured at target radar with only around ±10m ranging error. This demonstrates potential feasibility of low-cost malicious attack on the commercial FMCW radar as a physical security threat. A countermeasure employing random-chirp modulation is proposed and its security level is evaluated under the proposed attack for secure and safe radar ranging.

Cite

CITATION STYLE

APA

Miura, N., Machida, T., Matsuda, K., Nagata, M., Nashimoto, S., & Suzuki, D. (2019). A low-cost replica-based distance-spoofing attack on Mmwave FMCW radar. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 95–100). Association for Computing Machinery. https://doi.org/10.1145/3338508.3359567

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free