A Low-Cost Replica-Based Distance-Spoofing Attack on mmWave FMCW Radar
暂无分享,去创建一个
This paper presents a low-cost distance-spoofing attack on a mmWave Frequency Modulated Continuous Wave (FMCW) radar. It uses only a replica radar chipset and a single compact microcontroller board both in mass production. No expensive and bulky test instrument is required, and hence a low-cost and light-weight attack setup is developed. Even with the limited hardware resource in this setup, the replica radar can be precisely synchronized with the target radar for distance-spoofing capability. A half-chirp modulation scheme enables timing compensation between crystal oscillators on the replica and the target radar boards. A two-step delay insertion scheme precisely controls relative delay difference between two radars at ns-order, and as a result the attacker can manipulate distance measured at target radar with only around ±10m ranging error. This demonstrates potential feasibility of low-cost malicious attack on the commercial FMCW radar as a physical security threat. A countermeasure employing random-chirp modulation is proposed and its security level is evaluated under the proposed attack for secure and safe radar ranging.
[1] Srdjan Capkun,et al. Physical-layer attacks on chirp-based ranging systems , 2012, WISEC '12.
[2] Ruchir Chauhan,et al. A platform for false data injection in frequency modulated continuous wave radar , 2014 .
[3] Charles A. Kamhoua,et al. Estimation of safe sensor measurements of autonomous system under attack , 2017, 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC).
[4] Hung-Ruei Chen,et al. FMCW radar jamming techniques and analysis , 2013 .