Spoofing Attacks on FMCW Radars with Low-Cost Backscatter Tags

26Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.

Abstract

This work studies the feasibility of using backscatter-modulated tags to introduce false information into a signal received by a frequency-modulated continuous-wave (FMCW) radar. A proof-of-concept spoofing device was designed in the 24 GHz ISM band. The spoofing device was based on an amplifier connected between two antennas, and modulation was carried out by switching the amplifier bias. The use of an amplifier allowed us to increase the level of spoofing signal compared with other modulated backscattering methods. The simulated and experimental results show that our method has the ability to generate a pair of false targets at different ranges and velocities depending on the modulation frequency of the chosen tag, since sidebands appear due to this modulation. Countermeasures to detect the spoofing attack based on changes in the slope of the frequency sweep between frames are also proposed.

Cite

CITATION STYLE

APA

Lazaro, A., Porcel, A., Lazaro, M., Villarino, R., & Girbau, D. (2022). Spoofing Attacks on FMCW Radars with Low-Cost Backscatter Tags. Sensors, 22(6). https://doi.org/10.3390/s22062145

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free