Spoofing attacks against vehicular FMCW radar

被引:0
|
作者
Komissarov, Rony [1 ]
Vaisman, Sharon [1 ]
Wool, Avishai [1 ]
机构
[1] Tel Aviv Univ, Tel Aviv, Israel
关键词
Vehicular FMCW; Radar spoofing; ADAS; PBAD;
D O I
10.1007/s13389-023-00321-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The safety and security of the passengers in vehicles in the face of cyber attacks is a key concern in the automotive industry, especially with the emergence of the Advanced driver assistance systems and the vast improvement in autonomous vehicles. Such platforms use various sensors, including cameras, LiDAR and mmWave radar. These sensors themselves may present a potential security hazard if exploited by an attacker. In this paper we propose a system to attack an automotive FMCW mmWave radar, that uses fast chirp modulation. Using a single rogue radar, our attack system is capable of spoofing the distance and velocity measured by the victim vehicle simultaneously, presenting phantom measurements coherent with the laws of physics governing vehicle motion. The attacking radar controls the delay in order to spoof its distance, and uses phase compensation and control in order to spoof its velocity. After developing the attack theory, we demonstrate the spoofing attack by building a proof-of-concept hardware-based system, using a Software Defined Radio. We successfully demonstrate two real-world scenarios in which the victim radar is spoofed to detect either a phantom emergency stop or a phantom acceleration, while measuring coherent range and velocity. We also discuss several countermeasures that can mitigate the described attack.
引用
收藏
页码:473 / 484
页数:12
相关论文
共 50 条
  • [41] PREVIR: Fortifying Vehicular Networks Against Denial of Service Attacks
    Verma, Amandeep
    Saha, Rahul
    Kumar, Gulshan
    Conti, Mauro
    Kim, Tai-Hoon
    IEEE ACCESS, 2024, 12 : 48301 - 48320
  • [42] Hypothesis testing methods to detect spoofing attacks: a test against the TEXBAT datasets
    Micaela Troglia Gamba
    Minh Duc Truong
    Beatrice Motella
    Emanuela Falletti
    Tung Hai Ta
    GPS Solutions, 2017, 21 : 577 - 589
  • [43] FMCW INSTRUMENTATION RADAR
    STOVE, AG
    MICROWAVE JOURNAL, 1984, 27 (08) : 73 - 73
  • [44] A Fuzzy Approach for Detecting and Defending Against Spoofing Attacks on Low Interaction Honeypots
    Naik, Nitin
    Jenkins, Paul
    2018 21ST INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2018, : 904 - 910
  • [45] Securing Autonomous Vehicles Against GPS Spoofing Attacks: A Deep Learning Approach
    Shabbir, Maliha
    Kamal, Mohsin
    Ullah, Zahid
    Khan, Maqsood Muhammad
    IEEE ACCESS, 2023, 11 : 105513 - 105526
  • [46] Hypothesis testing methods to detect spoofing attacks: a test against the TEXBAT datasets
    Gamba, Micaela Troglia
    Minh Duc Truong
    Motella, Beatrice
    Falletti, Emanuela
    Tung Hai Ta
    GPS SOLUTIONS, 2017, 21 (02) : 577 - 589
  • [47] A Countermeasure against Face-Spoofing Attacks Using an Interaction Video Framework
    Kong, Kam
    Hei, Xiali
    Zeng, Ting
    Ling, Caijin
    Zhang, Chao
    Song, Binheng
    Cao, Hui
    Peays, Michael
    2017 IEEE 3RD INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC), 2017, : 758 - 763
  • [48] Spatio-Temporal Characterization of Synchrophasor Data Against Spoofing Attacks in Smart Grids
    Cui, Yi
    Bai, Feifei
    Liu, Yilu
    Fuhr, Peter L.
    Morales-Rodriguez, Marissa E.
    IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (05) : 5807 - 5818
  • [49] On a security scheme against collusive attacks in vehicular ad hoc networks
    Fan, Na
    Wu, Chase
    Benabdallah, Slimane
    Li, Jialong
    Gao, Yuxin
    Wang, Qinglong
    VEHICULAR COMMUNICATIONS, 2024, 49
  • [50] SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View
    Xu, Yuan
    Han, Xingshuo
    Deng, Gelei
    Li, Jiwei
    Liu, Yang
    Zhang, Tianwei
    2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 1082 - 1100