Next Article in Journal
Multiple-Actuator Fault Isolation Using a Minimal 1-Norm Solution with Applications in Overactuated Electric Vehicles
Next Article in Special Issue
Robust RFID Tag Identification
Previous Article in Journal
Permittivity-Based Water Content Calibration Measurement in Wood-Based Cultural Heritage: A Preliminary Study
Previous Article in Special Issue
Design Guidelines for Sensors Based on Spiral Resonators
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Spoofing Attacks on FMCW Radars with Low-Cost Backscatter Tags

Department of Electronics, Electrics and Automatic Control Engineering, Rovira i Virgili University, 43007 Tarragona, Spain
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(6), 2145; https://doi.org/10.3390/s22062145
Submission received: 23 January 2022 / Revised: 4 March 2022 / Accepted: 8 March 2022 / Published: 10 March 2022
(This article belongs to the Special Issue RFID and Zero-Power Backscatter Sensors)

Abstract

:
This work studies the feasibility of using backscatter-modulated tags to introduce false information into a signal received by a frequency-modulated continuous-wave (FMCW) radar. A proof-of-concept spoofing device was designed in the 24 GHz ISM band. The spoofing device was based on an amplifier connected between two antennas, and modulation was carried out by switching the amplifier bias. The use of an amplifier allowed us to increase the level of spoofing signal compared with other modulated backscattering methods. The simulated and experimental results show that our method has the ability to generate a pair of false targets at different ranges and velocities depending on the modulation frequency of the chosen tag, since sidebands appear due to this modulation. Countermeasures to detect the spoofing attack based on changes in the slope of the frequency sweep between frames are also proposed.

Graphical Abstract

1. Introduction

1.1. Background and Motivation

Frequency-modulated continuous-wave (FMCW) radars are widely used in short-range applications as an alternative to pulsed radars. Compared with continuous-wave (CW) radars, these radars allow a user to also determine the distance. The range of applications for FMCW radars has increased significantly in recent years to different fields. Some of these applications include altimeters for unmanned aerial vehicles (UAV) [1] and aircrafts, drone detection, traffic radars, remote monitoring of human vital signs [2], accurate distance measurements [3], human activity classification [4], gesture recognition [5], and in-vehicle occupancy sensors [6]. However, one of the most significant applications is its use in the automotive field.
Automotive radars include technologies that are part of modern advanced driver assistance systems (ADAS), camera-based computer vision systems, or, recently, LiDARS. Radars have some advantages, such as the signal not being affected by bad weather conditions (e.g., rain or fog) or dust, especially in computer vision systems or LiDARS [7]. Therefore, these systems are complementary, and automotive radars are considered a key technology in autonomous driving as they detect surrounding obstacles. Automotive radars available on the market operate in the millimeter-wave (mm wave) band. Short-range radars operate at the 24 GHz band, although lately, they are also moving to the 79–81 GHz band. Medium- and long-range radars operate at 77–81 GHz and 76–77 GHz, respectively. Most automotive radars are based on frequency-modulated continuous-wave (FMCW) radars that are capable of measuring the range and velocity of targets. Moreover, modern automotive radars use beam-forming and MIMO techniques [8] to detect the angle of arrival, thus allowing for an improvement in the positioning of objects. The use of the mm wave band offers the possibility of reaching a high bandwidth, which translates into a higher resolution range. As a consequence of the development of millimeter-wave band technology for automotive radars and new mobile generations, the cost of these radars has been significantly reduced and their use has been extended to other industrial applications using alternative frequency bands such as the 24 GHz ISM band. Another consequence of operating in the mm wave region of the spectrum is that automotive radars are currently not significantly affected by interference from other systems. These radars use a part of the spectrum that other communication systems do not use. This technology will become more widespread in the future, and both interference and attacks will become a major security concern that should be addressed. Automotive radars are safety elements in vehicles. Therefore, any cyberattack on these systems can pose a significant risk to safety. These concerns will become more important when automatic vehicles become commercially available.
These cyberattacks intentionally target the malfunctioning of radars. They can be classified into three main types [9]. The first type is radio jamming, which is the intentional transmission of radio frequency signals to saturate or block the receiver by decreasing the signal-to-noise ratio [10]. A transmitter, tuned to the same frequency band, sends signals with enough power to the radar. The most common types of jamming signals are continuous-wave (CW) signals, random noise, or modulated signals [11,12]. The purpose of jamming in communication systems is to inhibit the reception of signals. Radar jamming has been extensively studied in the literature [13,14] and is usually linked to electronic warfare (EW) [15], which has recently attracted interest in blocking transmissions from drones that invade restricted areas such as airports [16,17,18,19]. Jamming attacks on an automotive radar are described in [20].
The second type of attack is interferences, which are the introduction of unwanted signals into the radar band from other systems. The difference from radio jamming is that interferences are unintentional, and, in this case, the interference comes from communication signals of other users, e.g., from other systems sharing the same frequency band. Some differences in the automotive field can be seen when compared with other radar systems (such as military or aeronautic radars) due to the specificity of vehicular networks [21]. The interference of other vehicles equipped with a radar that works at the same frequency band [22] (see Figure 1) is a potential source of interference that has been addressed in the literature [23,24,25]. A solution that avoids this type of interference is the use of different modulation strategies that make the interference uncorrelated with the radar signal itself [26], or beamforming methods [27,28].
Finally, the third type of attack is known as spoofing, which is the retransmission of radar signals to provide false information to the radar, misleading it in target detection, and increasing the risk of collision [29]. Figure 1 illustrates a typical road scenario showing the three types of attacks on a victim radar that can confuse the detection of the real target. Since automotive radars have a direction-of-arrival detection capability, for a spoofing attack to be damaging, the spoofing device should be placed in the same lane as the victim radar. For example, Figure 2 shows a spoofing attack on the car-following model, where the victim radar is located behind the attacker’s vehicle. The attacker has the ability to generate an artificial target less than a safe distance away, perform the attack, and cause an alarm in the victim’s anti-collision system. A spoofing attack from a different lane is detectable due to the wider angle of arrival.
In this work, jamming attacks are not considered since modern radars are designed to minimize their impact. In addition, jamming is relatively easy to detect. Thus, this work is focused on attacks caused by spoofing.

1.2. Related Work

Studies on cyberattacks on FMCW radars, especially in the automotive field, have been recently reported. In [30,31,32], the methods for detecting and mitigating spoofing attacks against an automotive radar based on simulations of the car-following model have been proposed. However, few experimental examples of spoofing attacks can be found in the literature. Most of them are based on simulated platforms using software-defined radio (SDR) and evaluation radar kits used as spoofing devices. Spoofing attacks against vehicular FMCW radar have recently been studied in [33], where experimental results have been implemented using SDR at 6 GHz. Experimental studies of cyberattacks introducing an interference from another source (a radar kit at 77 GHz from Texas Instruments) and strategies based on the design of a detection threshold to minimize the attacks have also recently been presented in [34]. A spoofing device based on the use of another radar that retransmits a replica of the signal has been presented in [35] for distance spoofing. A method for interference and spoofing mitigation based on a random-frequency hopping radar (BlueFMCW) has recently been proposed in [36], including experimental validation with a 77 GHz radar kit. In [37], a spoofing device prototype based on a phase-quadrature (IQ) mixer for FMCW radar at 5.8 GHz has been presented. The local oscillator was extracted from the amplified radar signal and was mixed with a low-frequency spoofing signal. The signal at the output of the mixer was amplified and transmitted through the antenna.
Spoofing attacks can also be performed on other radar applications [38,39,40]. In particular, there is a growing interest in detecting unmanned aerial vehicles (UAV) [41] and one of the detection techniques proposed is the use of FMCW radars, which are susceptible to suffer attacks [42,43,44].
Backscattering communication is a data-transmission method based on the modulation of an incident RF signal from a reader. Backscattering is extensively used in radio frequency identification systems (RFID) and in low-power ambient backscatter, also known as RF backscatter. Backscatter communication has proven to be indispensable for the deployment of Internet of Things (IoT). As communications technology in the millimeter-wave frequency band has matured, the interest in mm wave ID (MMID) and in communications applications using backscatters at these bands has grown in recent years [45,46,47]. These systems are characterized by the use of small directional reader antennas and high bandwidth for data handling. Radars with small modifications can be used as readers in these backscattering systems [48,49,50,51]. Therefore, backscatters can be used for distance measurements, localization, or sensing in combination with FMCW and UWB radars.

1.3. Contribution

The objective of this paper is to study a hypothetical spoofing attack on an FMCW radar using low-cost devices. The main contribution of this work is based on a novel and simple concept, consisting of using a semi-passive modulated transponder or tag, for spoofing applications, instead of using SDR or other radars to generate spoofing signals, as presented in other works found in the literature. Simulated and experimental results show that by changing the modulation frequency of the transponder, it is possible to generate ghost targets at different distances and velocities in order to confuse the radar. Transponder modulation can be easily implemented with a low-cost microcontroller without the need to implement complex modulations or complicated algorithms. Compared to passive backscatters on reflection, the use of a gain-modulated transponder allows the level of the spoofing signal to be increased near to the echo of a small vehicle. Therefore, the spoofing signal can exceed the threshold level set in the radars to eliminate clutter.
A proof-of-concept device has been designed using commercial off-the-shelf (COST) components and 3D-printed directive lens antennas integrated into a case. In addition, the device is portable and has low power consumption due the use of low-power SiGe monolithic microwave integrated circuit (MMIC) amplifiers (<12 mA at 3 V). Experimental results of false targets generation and detection are demonstrated using a 24 GHz FMCW radar. The proposed spoofing device does not require a local oscillator; therefore, it can be scaled to other radar bands such as those licensed for automotive radar at 77 GHz. Therefore, the proposed device can be useful in experimentally testing countermeasure algorithms to protect these radars from spoofing attacks.
The paper is organized as follows. Section 2 describes the detection of modulated backscatter using an FMCW radar. A relatively simple and inexpensive device used to confuse the radar is presented. Section 3 describes the design of the proposed solution. Simulated and experimental results are shown in Section 4. Some countermeasures used to detect the presence of a spoofing device based on backscatters are proposed in Section 5. Finally, conclusions are provided in Section 6.

2. System Overview and Theoretical Background

FMCW Radar and Backscatter Detection

FMCW radars, such as those used in the automotive field, are characterized by the ability to measure range and velocity. By adding MIMO structures based on virtual arrays [52], modern automotive radars can estimate the direction of arrival (DOA). This work focuses on a basic one-channel FMCW radar. Figure 3 shows the main blocks of an FMCW radar. The radar transmitter basically consists of a VCO in which the control input is modulated by a modulator. Today, these modulators are implemented with fast digital-to-analogue converters (DAC) that allow different waveforms to be configured. The most commonly used waveform is a single slope sawtooth. As a result, the transmitted signal is a chirp-type in which the frequency varies from a minimum ( f m i n ) to a maximum ( f m a x ). The bandwidth ( B = f m a x f m i n ) determines the range resolution, Δ R = c / ( 2 B ) , with c being the speed of light in a vacuum. Therefore, the range resolution of the highest automotive bands (77–81 GHz) is better due to the higher available bandwidth. Another important parameter is the sweep slope defined as μ = B / T , with T being the sweep time. The transmitted wave propagates to the target and is backscattered and received by the radar receiver. The FMCW radar front-end consists of a down-converter phase-quadrature mixer, the IF amplifiers, and the antialiasing low-pass filters. The phase and quadrature signals are sampled at a rate f s using fast analogue-to-digital converters (ADCs). The samples from the phase I [ n ] and quadrature Q [ n ] channels are sent to the processor (microcontroller or DSP), which performs the signal processing and target detection. The methods used to combat interference between radars are based on the variations in the modulation waveform. Thus, the receiver is able to distinguish the signals sent by the radar itself, since it uses parameters for which interference from other radars can be detected [23,26].
In [33,35,38], spoofing devices based on a phase-quadrature modulator with an oscillator were proposed. They proposed sending artificial chirp signals to generate ghost responses with the same parameters as the victim radar but without transmitting the signals. Therefore, detecting the IF signal to synchronize and tune the attack parameters is necessary. The idea is to use another radar device with the same parameter as the victim’s radar. These spoofing devices are designed to generate errors in range. As a countermeasure against this distance-spoofing attack, a random-chirp modulation was proposed to make the modulation parameters difficult to tune.
This work investigates a possible attack using backscatter devices. The backscatter returns the radar signal but introduces a modulation that generates a false response. The retransmission of the same signal is independent of the type of radar and modulation used by it, which makes applying countermeasures difficult. In addition, the devices are simpler than those proposed in previous work and are based on low-cost components.
Figure 4 shows a schema of a simple backscatter typically used in RFID tags or in communication systems based on backscattering. The communication principle in these systems is based on load modulation, which consists of switching the antenna load between two impedances ( Z ON and Z OFF ) for ON and OFF switch states, respectively, that have high reflection coefficients (e.g., short-circuit and open-circuit). A low-frequency modulator is responsible for controlling the switch transmitting the data to the reader. The result is the change in the backscattered field and therefore the modulation of the radar cross section of the tag. The modulation is carried out with an RF switch that works similar to a mixer. At microwave and millimeter-wave bands, this switch can be implemented using PIN or Schottky diodes. For example, Refs. [48,49] describe modulated backscatters for an FMCW radar-based range using reflection backscatters based on diodes.
From the antenna scattering theory, the backscattered field can be expressed as the sum of two main contributions: the structural mode E ¯ e s t , which depends on the shape and materials that support the tag as a passive device, and the antenna or tag mode E ¯ m , which is the field re-radiated by the antenna that depends on the modulation. Therefore, the backscattered field E ¯ s ( Z L ) can be written as a function of the antenna load Z L [53,54]:
E ¯ s ( Z L ) = R e E ¯ e s t + E ¯ m · Γ L e j 2 π f c t
where R e ( ) denotes the real part operator, f c is the carrier frequency of the incoming field, and Γ L is the power reflection coefficient that can be obtained from the load and the antenna impedance Z a using the following [55]:
Γ L = Z L Z a Z L + Z a
The antenna mode is composed of multiple sidebands located at the harmonics of the modulation frequency (switching rate of the two impedances). The amplitude of these sidebands depends on the Fourier coefficients c n (e.g., square wave coefficients). The power reflection coefficient can be written as a Fourier series because it is a periodic function of the modulation frequency [50]:
Γ L = Δ Γ · k = 0 t k T m T m = n = c n e j 2 π n T m
where ( t ) is the rectangular function with unit duration, f m = 1 / T m is the modulation frequency, and Δ Γ = Γ ON Γ OFF is the difference between the reflection coefficients for the two switch states.
The backscattered field E s can be written as follows:
E ¯ s ( t ) = R e E ¯ e s t + E ¯ m · n = c n e j 2 π n T m e j 2 π f c t
Therefore, the received signal x R ( t ) is the signal backscattered by the tag, attenuated due to propagation and delayed. The delay τ = 2 r / c depends on the distance between the transmitter and the tag:
r = r 0 + v · t
where r 0 is the initial distance between the radar and the target or tag, and v is the relative velocity between both. The effect of the movement adds a frequency shift f D to the frequency components of the received signal due to the Doppler effect, given approximately by the following:
f D 2 v λ
where λ is the wavelength at the center frequency. The sign of the Doppler frequency shift depends on the direction of movement.
The effect of the modulation causes the appearance of the sidebands. The response for the term n = 0 is superposed on the structural mode associated with the tag seen as a passive target. Since the amplitude of the Fourier coefficients decreases very fast with the index n, in practice, only the first n = ± 1 can be detected. Depending on the parameters, these sidebands terms can be used to generate ghost responses that can confuse the radar.
Other backscatter topologies can be used to increase the signal level by placing an amplifier between the tag’s receiving and transmitting antenna (see Figure 5). In this case, the modulation can be carried out by means of a switch or, as in this work, by changing the power supply of the amplifier, taking advantage of its isolation in reverse.
The amplitude of this response is proportional to the differential radar cross section given by the following:
R C S d i f = λ 2 4 π G R x G a G T x m
where G R x and G T x are the gains in the receiving and transmitting antennas of the tag, and G a is the gain of the amplifier. m is a modulation factor that depends on the Fourier coefficient, and m = 1 / π 2 for a square wave waveform [50]. This equation suggests that the level of interference could be increased by increasing the gain in the antennas or that of the amplifier. The advantage of using an amplifier in the transponder is obvious compared with passive backscatter methods ( G T x = G R x and G a = 1 ). The excess power required due to the amplifier is not usually a problem in this case, unlike conventional RFID applications.
Due to the propagation between the input and output antenna in the semi-passive transmission backscatter used in this work, the modulated signal includes an additional delay compared to the case of a passive reflection backscatter. This delay must be added to the propagation delay between the tag and the radar ( τ ). Since the distance between antennas is only a few centimeters, this delay is difficult to resolve due to the limited resolution of the radar. Consequently, it can be considered as a small error in the position of the spoofing target.
FMCW radar uses a range–Doppler (RD) map to simultaneously detect the range and velocity of the targets [56] obtained from the samples of several chirps grouped in a frame (see Figure 6). Each frame is composed of L chirps with N samples per chirp sampled at a rate of f s = 1 / T s . The complex representations ( s [ n ] = I [ n ] + j Q [ n ] ) are saved in a matrix s so that the columns correspond to the samples for each chirp transmitted.
For a single backscatter case at distance r 0 and under some typical approximations that ignore second order contributions, the elements of this matrix can be written as [57]:
s ( k , l ) = A k T s T · n = c n e j 2 π μ τ 0 k T s e j 2 π f D l T e j 2 π n f m ( k T s + l T )
where k = 0 . . . N 1 , l = 0 . . . L 1 , and τ 0 = 2 r 0 / c . If more targets or backscatters are considered, the signal would be the sum of the contributions applying the superposition principle, taking into account the corresponding delay and attenuation.
After that, the RD map is obtained from the windowed two-dimensional Fourier transform of s. Hann’s window functions in both range and Doppler are often used to reduce sidelobes in the Fourier transform [58], and zero-padding is used to interpolate the frequency bins when the transform is carried out. The RD map is obtained from the next operation:
RD = FFT doppler ( FFT range ( s · w range ) · w doppler )
where FFT range and FFT doppler denote the FFT along the range index k and the Doppler index l, and w range and w doppler are the windows used in range and Doppler (e.g., Hann’s window), respectively. The range R and velocity v depend on the 2D Fourier frequencies, f r and f v , respectively, and are obtained from the following expressions:
R = c f r 2 μ
v = λ f v 2
The position of targets on the RD map can be detected by analyzing (8) and Figure 7. Of note, unmodulated passive targets are considered for the case of n = 0 . A peak in the RD map associated with the point closest to the pair of frequencies f r = 2 R μ / c and f D is observed. These frequencies correspond to the point with coordinates ( R , v ) on the RD map (see Figure 7a). The backscatter modulation produces a frequency shift over the beat signal at the output of the mixer. Fast frequency components in the beat signal are interpreted by the radar as changes due to the delay produced by the propagation distance between the radar and the target, whereas smooth phase changes between chirps are associated with Doppler variations caused by the velocity at which the target moves. Three cases can be considered for the modulated backscatter. The first corresponds to a high modulating frequency, in which its value is an integer that is a multiple of half of the sampling frequency in Doppler ( f s d = 1 / T ). The half of the sampling frequency in Doppler corresponds to the Nyquist frequency in this axis. In this case, sidebands f m apart on the range frequency axis are observed, producing ghost peaks on the RD map with coordinates ( R + n Δ R , v ) (see Figure 7b). The second case occurs when f m < 1 / T and corresponds to the case of low-modulation frequencies in which the values are of the order of the changes produced in the Doppler frequency. Therefore, due to its low-modulation frequency, the phase of this beat signal does not produce a significant change within each chirp (therefore, the range does not change with respect to an unmodulated tag) but introduces a slow phase variation between the chirps in the frame that can be interpreted by the radar as a Doppler shift when the Fourier transform is performed in Doppler. Consequently, two sidebands f m apart on the Doppler frequency axis appear, producing ghost peaks in the RD map with coordinates ( R , v + n Δ v ) (see Figure 7c). The third case, shown in Figure 7d, is a combination of the cases from Figure 7b,c, where the modulation frequency is high but not an integer that is a multiple of half of the sampling frequency in Doppler. In practice, the first sidebands ( n = ± 1 ) can only be detected for typical ranges because the harmonics fall below the clutter.
For a certain spacing in the range Δ R and velocity Δ v between the ghost points and unmodulated point on the RD map, the backscatter modulation frequency f m is chosen using the following expression:
f m = [ ( 2 μ · Δ R / c ) ÷ ( f s d / 2 ) ] · ( f s d / 2 ) 2 Δ v / λ
where ÷ is the integer division. The first term of (12) determines a shift in range. The spoofed target position is rounded to the nearest modulation frequency that does not produce a Doppler shift. Then, a frequency shift is added to produce a shift in the velocity axis.
Therefore, by changing the modulation frequency, the introduction of false targets on the RD map around the physical position of the backscatter is possible. Thus, a backscatter-based tag located in a car or on the road can introduce points that can generate signals that confuse the radar, compromising the safety of the vehicle. The modulation frequency can be easily changed by generating a pulse-width modulation (PWM) at the desired frequency using a low-cost and low-power microcontroller. Different frequencies profiles can be synthesized by varying the PWM signal as a function of time.

3. Spoofing Device Design

The spoofing device was based on an updated version of the backscatter tag presented in [59,60]. The GaAs amplifier was replaced by a pair of lower-power-consumption amplifiers, and the patch array was replaced by a lens antenna. The prototype used a silicon germanium MMIC (monolithic microwave integrated circuit) amplifier LNA_24_04 from Silicon Radar GmbH. The typical gain of this amplifier between 24 GHz and 29 GHz is 17 dB, with only 5.6 mA of current consumption at 3.3V. A second cascade amplifier was added to increase the differential radar cross section according to (7). The amplifier has a shutdown power-down control pin that is used to enable/disable the amplifier. With this method, quick, pulsed operation of several megahertz can be achieved, which is sufficient for our application. Therefore, adding an expensive mm wave modulator to the system is not necessary, since modulation of the RCS is carried out by switching the power-down pin of the amplifier. Consequently, the amplitude of the backscattered field can be controlled by a modulation signal connected to the power-control pin, as shown in Figure 5. A low-cost Seeduino XIAO is used to generate the frequency-configurable PWM output. This module integrates an Atmel ARM Cortex-M0 ATSAM21G18A-MU microcontroller operating at a clock frequency of 48 MHz. Of note, other microcontrollers that have PWM outputs and similar performance can also be chosen for this prototype. Generating different ghost targets at distances and velocities according to (12) is possible by choosing the appropriate PWM frequency.
The input and output antennas of the prototype are integrated lens antennas (ILA). The antenna consists of a microstrip patch with a lens to increase the gain [61,62,63]. The material used to manufacture the low-cost lenses using a 3D printer was polylactic acid (PLA). The dielectric data for PLA at millimeter band can be found in [64]. A dielectric constant of 2.55 and a dissipation factor of 0.02 were considered for the PLA material at 24 GHz for the antenna design. The lens was illuminated by a microstrip patch antenna designed on Rogers 4003 substrate with a thickness of 16 mm, a dielectric permittivity of 3.59, and a dissipation factor of 0.003.
Figure 8 schematically shows a ray-tracing analysis of the focal length of the extended hemispherical lens. The optimal size of the lens extension of a conventional elliptical lens is given by the following [62]:
H L = R ϵ r L + 1 ϵ r L 1 1
where R L is the radius of the lens in the vertical plane, H is the length of the extension from the substrate, and ϵ r L is the permittivity of the lens material (PLA). The radius R L was fixed to the wavelength ( λ 0 ) in air at 24 GHz, and H is obtained from 13. The patch was designed by taking into account that the PLA structure of the lens lays on it. The width of the patch W is assumed to be equal to half of the wavelength when considering an effective permittivity approximately equal to the average between the lens material (PLA) and the substrate ϵ r s :
W = c 2 f 0 ( ϵ r L + ϵ r s ) / 2
Taking this width into account, a better estimate of the effective permittivity ϵ r e f from the effective permittivity of a microstrip line (case W > h ) is possible [65]:
ϵ r e f = ϵ r s + ϵ r L 2 + ϵ r s ϵ r L 2 · ( 1 + 12 h / W ) 1 / 2
where h is the thickness of the substrate. The patch length was designed to be resonant at f 0 = 24 GHz. Therefore, the effective length must be half of the wavelength calculated from the effective dielectric permittivity. To adjust the resonance frequency to the desired frequency ( f 0 = 24 GHz) and to take into account the fringing effect in the ends of the patch, a length extension ( Δ L ) is considered [65]:
L = c 2 f 0 ϵ r e f 2 Δ L
where the length extension is estimated as [65]:
Δ L = 0.412 h ( ϵ r e f + 0.3 ) · ( W / h + 0.264 ) ( ϵ r e f 0.258 ) · ( W / h + 0.8 )
The design of the patch antenna, including the effect of the lens material and taper, was carried out with the Momentum software included in the Keysight ADS and with Ansys HFSS. A prototype antenna was manufactured, the sketch of which is presented in Figure 8. The gain and pattern diagram measurements were performed in a semi-anechoic chamber to avoid reflections of the environment, and a calibrated horn antenna was used in the gain calibration. Measurements were performed using a PCB end launch connector (2.92 mm (K)) from Southwest Microwave. The measured gains at 24 GHz in the E-plane and H-plane are shown in Figure 9. The antenna has a maximum gain of 17.5 dB, a sidelobe level better than 18 dB, and a −3 dB beamwidth of about 22 degrees in both planes. Figure 9 also shows the measured reflection coefficient of the prototype (S11) including the end launch connector. The return losses are better than 10 dB in the 24 GHz ISM band. The vector network analyzer (VNA) PNA E8364C from Agilent was used to perform these measurements.
Table 1 summarizes the dimensions of the antenna. Figure 10 shows a photograph of the prototype spoofing device. The dimensions of the device are 120 mm × 37 mm × 24 mm, including the protection box. We proved that the isolation between antennas is greater than the gain in the amplifiers, avoiding oscillation of the device due to the parasitic feedback between the output and input antennas. From 6, the estimated differential radar cross section is 13.6 dBsm. Figure 11 compares the typical values of RCS in the 24 GHz band for some of the objects that can be found on the road, taken from the literature. The RCS value depends on different factors such as size, material, or orientation with respect to the radar. Thus, the average RCS of a pedestrian reported in the literature [66] is about −5 dBsm. This value is significantly lower than those for a car (10 dBsm), a motorcycle (5–8 dBsm) [67], or a guardrail (5–10 dBsm) [68]. Therefore, the designed spoofing device based on modulated backscatter has an RCS level comparable with that of a car and, therefore, can be confused with it.

4. Results

4.1. Simulated Results

To verify the previous theory, a set of simulations were carried out, in which the presence of cluttering interference from the scene was not considered. The synthetic signals received were simulated from each target using (1)–(6). The data received were sampled at a rate of f s , and from (8), the 2D-FFT was performed to obtain the range–Doppler map. In the simulation, parameters similar to those used by the radar during the experiments were chosen. Therefore, a total of 128 frames were taken with 256 points per frame in the next simulations. The radar sweeps from the 24 GHz to 24.3 GHz frequency bands with a sweep time of 250 μ s. Figure 12, Figure 13, Figure 14 and Figure 15 show the RD maps obtained for different modulation frequencies corresponding to the cases described in Figure 7. Table 2 lists the frequencies and the values of the offset positions Δ R and the offset velocities Δ v . A stationary spoofing device located at 10 m is considered in these examples. The figures show both the raw RD maps and these maps after having applied a CFAR detector. This detector is used to estimate a threshold that eliminates unwanted interference and sidelobes associated with Fourier transforms of the windows. The threshold is obtained from the RD of the adjacent cells. Several methods exist, but in this work, the well-known cell-averaging (CA-CFAR) method with 20 dB above the threshold and 15 averaging cells in addition to two guard cells in both range and velocity was considered. A centroid method was used to determine the position of the main targets. The positions of the detected centroids are shown and marked with a cross.

4.2. Experimental Validation

For the spoofing validation, a FMCW radar kit (EVAL-DEMORAD) from Analog Devices Inc. (Norwood, MA, USA) was used (see Figure 16). The radar consists of two transmitters and four receiver antennas that are based on the ADF5901 2-channel FMCW transmitter and the ADF5904 4-channel receiver, both from Analog Devices Inc. The radar uses a patch antenna array design with a field of view (FOV) of approximately 120 degrees in azimuth and 15 degrees in elevation. The power transmitted by the radar is 8 dBm. The FMCW radar was configured to sweep within the ISM frequency band (24–24.3 GHz). The sampling frequency was 1.2 MHz, and the sweep time used was 250 μ s. The points per frame were 256, and a total of 128 frames were used to obtain the range–Doppler maps. The main parameters are summarized in Table 3. The designed spoofing device and the commercial radar kit were used in the experiment. A test software developed with Python and Matlab based on the communication functions provided with the kit was developed. The experiments were performed in an indoor environment (research laboratory). The following figures depict several cases for different modulation frequencies obtained from (12) for a range Δ R and a velocity Δ v . Figure 17 shows the measured RD map after applying the CFAR detector considering a f m =1000 Hz. Therefore, according to the theory presented, two ghost targets are observed at the same distance from the tag or spoofing device ( Δ R = 0 ) but with a Doppler shift corresponding to δ v = 6.25 m/s. A second case is presented in Figure 18. This case shows a spoofing device located at 6 m from the radar. It is also in motion to avoid cluttering interference due to static objects in the laboratory and thus to better appreciate the results. A pair of ghost targets at Δ R = 3.5 m without Doppler shift ( Δ v = 0 ) are generated. The Doppler shift is observed to be due to movement of the tag or spoofing device. The spoofing device is held by a walking person. Figure 19 and Figure 20 show the same case but with the spoofing device moving in both directions (towards and away from the radar, respectively) with Δ R = 2.5 m and Δ v = 0 . Figure 21 shows another case where a 6.5 m/s Doppler shift ( f m =1000 Hz) was introduced into a moving spoofing device (tag).
FMCW radars equipped with multiple receive and transmit antennas can estimate the angle of arrival (AoA), showing the targets on range–angle maps. The ghost targets generated by the backscatter tag used as a spoofing device can be observed on range–angle maps. The FFT-based algorithm for AoA detection is one of the most widely used algorithms because of its low complexity and ease of implementation [69]. Angle estimation is performed by processing the received signal at the array composed of multiple antennas. If a Fourier transform is performed in the spatial dimension through the receiving elements (known as angle FFT), distinguishing objects based on their AoA in azimuth will be possible. Since the EVAL-DEMORAD kit has two transmitting antennas and four receiving antennas, the angle resolution is limited; however, the ghost targets can be detected. Figure 22 shows the range–angle map obtained from the FFT method using the EVAL-DEMORAD kit. In this example, a tag or spoofing device is located at 5 m from the radar and two ghost targets are generated by programming the modulation frequency to Δ R = 2.5 m. The measurements in the last case have been performed in an outdoor scenario.

5. Discussion and Countermeasures

Since spoofing attacks on automotive radars can seriously affect safety and may cause accidents that endanger human lives, providing countermeasures to detect and neutralize such attacks is necessary.
Strategies to combat the attacks are derived from Equation (12). From (12), the ghost points on the range axis are at a distance Δ R from the backscatter position, which depends on the slope of the sweep frequency. Analogously, from (12), the ghost points on the velocity axis are Δ v from the backscatter position and are a function of wavelength. The attacker does not know these radar parameters a priori, which may be different from one radar model to another. However, the number of existing automotive radars is not very high, so fining out the vehicle model from the radar is easy. In addition, the attacker can program a microcontroller with different typical configuration parameters corresponding to various standard radar models to periodically generate attacks.
A countermeasure that the radar can implement, which also prevents interference from other radars, is to vary the slope of the frequency sweep, for example, by changing the duration of the chirp signal between frames. The algorithm compares the RD obtained with different frequency slope chirps. This allows the ghost points to appear at different distances or velocities between two consecutive range–Doppler maps. Consequently, identifying them is easy: by comparing the positions of the detected targets between sweeps.
The case in which the spoofing device introduces false targets at the same position ( Δ R = 0 ) but with different velocities (see Figure 7c) can be identified by considering that two peaks appear with the same amplitude but velocities equal to 2 Δ v but with opposite signs, which cannot correspond to a true target. In this case, the position in the RD map is independent of the sweep slope.
Unfortunately, the radar kit used in our experiments does not allow for arbitrary transmission of the sequences to be chosen, so changing the chirp duration within the frame is not possible. To investigate the effect of the chirp, we could only change the duration between frames, shown in the following simulations.
Figure 23 shows a schematic diagram of the proposed algorithm for determining if a target is real or spoofed. The objective is to send a set of frames with a specific sweep slope, determining the list of potential targets, and then to send another set of frames with a different sweep slope (or frame duration). An example of the simulations performed is shown in Figure 24 and Figure 25.
In the following example, a real target 15 m away and moving at 8 m/s towards the radar is considered. A stationary spoofing device is located 10 m away. The spoofing device is configured to generate ghost targets with values of Δ R = 5 m and Δ v = 6.25 m/s, and a nominal sweep slope μ . The simulated RD is shown in Figure 24. The crosses show the potential targets detected by the algorithm. In subsequent sweeps, the value of the sweep slope is doubled. The corresponding RD is shown in Figure 25. As observed, the real target preserves the same position and velocity, whereas the range of the spoofed targets changes. Consequently, the countermeasure algorithm detects these false targets and discards them. Finally, the use of this algorithm, which is easy to implement, does not prevent normal operation of the radar, the hardware of which remains the same. A similar method used to combat interferences and attackers has been recently proposed in [36] and consists of splitting a chirp into multiple sub-chirps and randomizing every chirp period. Therefore, this random frequency hopping makes it difficult for the attacker to listen (e.g., with an spectrum analyzer or receiver) to the victim’s radar signal to learn the main radar parameters (such as frequency range and slope). Although a backscattering-based method presents great flexibility in the design of the targets, due to the presence of the sidebands (since the modulation is not a single sideband), the targets appear in pairs, and a Doppler coupling can be seen, as shown in Figure 7. Therefore, in the car-follower scenario shown in Figure 2, one target is closer to the radar and the other is behind the attacker. The victim’s radar considers the closest target to be less than a safe distance away. Consequently, the radar alerts a user to the threat of a collision. To avoid the pairs of peaks, more complex single-sideband (SSB) modulators must be implemented. In the case of backscatter in a reflection, they can be implemented using a hybrid coupler loaded with switching devices (e.g., PIN diodes) or using IQ mixers in the case with a transponder in transmission.

6. Conclusions and Future Work

In this work, a simple low-cost spoofing device operating at 24 GHz based on modulated backscatter was proposed. Our goal was to generate false targets, thus fooling vehicles that incorporate a mm wave FMCW radar. In contrast with other works in the literature that use SDRs or other radars to generate spoofing signals, we proposed a simple device based on a modulated semi-passive transponder or tag. We demonstrated that, by changing the modulation of this transponder, the generation of ghost targets to confuse the radar at different distances and velocities is possible. The transponder consists of two patch antennas with dielectric lenses to achieve a high gain. Two low-noise amplifiers are cascade-connected between the two antennas. Modulation is achieved by switching the gain of the amplifiers. We showed that the combination of high gains of the antennas with those of the amplifiers allows us to achieve a high differential RCS, comparable with that of a car at 24 GHz. The victim radar detects a beat frequency change associated with the backscatter modulation frequency. This frequency shift results in a ghost target, and the modulation frequency can be set to generate spoofing targets at different distances and velocities. Several simulations have been carried out, and different spoofing measures have been validated using the designed tag and the FMCW radar kit (EVAL-DEMORAD) from Analog Devices. In both cases, RD maps have been generated. The results obtained agree with those expected from theory, both for the simulations and for the measurements after applying the CA-CFAR detection algorithm.
Countermeasures mitigating the effects of potential spoofing using these devices based on random variation in the radar sweep parameters, such as the sweep slope or the duration of the chirps, were proposed.
In addition, the low-cost device presented allows for the generation of artificial targets that can be used to calibrate radars in assembly lines, in technical vehicle-inspection centers, and indoors or to avoid clutter interference as an alternative to expensive commercial instrumentation-based systems.

Author Contributions

Investigation and writing—original draft preparation, A.L. and A.P.; prototype manufacturing: M.L.; software: A.L. and M.L.; review and editing, R.V. and D.G.; project administration and supervision, A.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Spanish Government Project RTI2018-096019-B-C31, R2B2020 project, and grant PRE2019-089028 and by the EU’s European Regional Development Fund (ERDF).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Park, J.; Park, S.; Kim, D.H.; Park, S.O. Leakage mitigation in heterodyne FMCW radar for small drone detection with stationary point concentration technique. IEEE Trans. Microw. Theory Tech. 2019, 67, 1221–1232. [Google Scholar] [CrossRef] [Green Version]
  2. Alizadeh, M.; Shaker, G.; De Almeida, J.C.M.; Morita, P.P.; Safavi-Naeini, S. Remote monitoring of human vital signs using mm-wave FMCW radar. IEEE Access 2019, 7, 54958–54968. [Google Scholar] [CrossRef]
  3. Piotrowsky, L.; Jaeschke, T.; Kueppers, S.; Siska, J.; Pohl, N. Enabling high accuracy distance measurements with FMCW radar sensors. IEEE Trans. Microw. Theory Tech. 2019, 67, 5360–5371. [Google Scholar] [CrossRef]
  4. Shrestha, A.; Li, H.; Le Kernec, J.; Fioranelli, F. Continuous human activity classification from FMCW radar with Bi-LSTM networks. IEEE Sens. J. 2020, 20, 13607–13619. [Google Scholar] [CrossRef]
  5. Wang, Y.; Ren, A.; Zhou, M.; Wang, W.; Yang, X. A novel detection and recognition method for continuous hand gesture using fmcw radar. IEEE Access 2020, 8, 167264–167275. [Google Scholar] [CrossRef]
  6. Alizadeh, M.; Abedi, H.; Shaker, G. Low-cost low-power in-vehicle occupant detection with mm-wave FMCW radar. In Proceedings of the 2019 IEEE SENSORS, Montreal, QC, Canada, 27–30 October 2019; pp. 1–4. [Google Scholar]
  7. Rasshofer, R.H.; Spies, M.; Spies, H. Influences of weather phenomena on automotive laser radar systems. Adv. Radio Sci. ARS 2011, 9, 49. [Google Scholar] [CrossRef] [Green Version]
  8. Sun, S.; Petropulu, A.P.; Poor, H.V. MIMO radar for advanced driver-assistance systems and autonomous driving: Advantages and challenges. IEEE Signal Process. Mag. 2020, 37, 98–117. [Google Scholar] [CrossRef]
  9. Currie, N.C.; Brown, C.E. Principles and Applications of Millimeter-Wave Radar; Artech House Norwood: Norwood, MA, USA, 1987. [Google Scholar]
  10. Poisel, R. Modern Communications Jamming Principles and Techniques; Artech House: Norwood, MA, USA, 2011. [Google Scholar]
  11. Gerstmair, M.; Melzer, A.; Onic, A.; Huemer, M. On the safe road toward autonomous driving: Phase noise monitoring in radar sensors for functional safety compliance. IEEE Signal Process. Mag. 2019, 36, 60–70. [Google Scholar] [CrossRef]
  12. Jin, F.; Cao, S. Automotive Radar Interference Mitigation Using Adaptive Noise Canceller. IEEE Trans. Veh. Technol. 2019, 68, 3747–3754. [Google Scholar] [CrossRef] [Green Version]
  13. Graham, A. Communications, Radar and Electronic Warfare; John Wiley & Sons: Hoboken, NJ, USA, 2011. [Google Scholar]
  14. Lichtman, M.; Poston, J.D.; Amuru, S.; Shahriar, C.; Clancy, T.C.; Buehrer, R.M.; Reed, J.H. A communications jamming taxonomy. IEEE Secur. Priv. 2016, 14, 47–54. [Google Scholar] [CrossRef]
  15. Schroer, R. Electronic warfare. [A century of powered flight: 1903–2003]. IEEE Aerosp. Electron. Syst. Mag. 2003, 18, 49–54. [Google Scholar] [CrossRef]
  16. Matić, V.; Kosjer, V.; Lebl, A.; Pavić, B.; Radivojević, J. Methods for Drone Detection and Jamming. In Proceedings of the 10th International Conference on Information Society and Technology (ICIST), Kopaonik, Serbia, 8–11 March 2020; pp. 16–21. [Google Scholar]
  17. Tedeschi, P.; Oligeri, G.; Di Pietro, R. Leveraging jamming to help drones complete their mission. IEEE Access 2019, 8, 5049–5064. [Google Scholar] [CrossRef]
  18. Wang, Y.; Zhan, Z.; Xue, B. Operation method of electronic warfare UAV. In Proceedings of the Global Intelligence Industry Conference (GIIC 2018), International Society for Optics and Photonics, Beijing, China, 22–24 May 2018; Volume 10835, p. 108351L. [Google Scholar]
  19. Multerer, T.; Ganis, A.; Prechtel, U.; Miralles, E.; Meusling, A.; Mietzner, J.; Vossiek, M.; Loghi, M.; Ziegler, V. Low-cost jamming system against small drones using a 3D MIMO radar based tracking. In Proceedings of the 2017 European Radar Conference (EURAD), Nuremberg, Germany, 11–13 October 2017; pp. 299–302. [Google Scholar]
  20. Yan, C.; Xu, W.; Liu, J. Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle. DEFCON 2016, 24, 109. [Google Scholar]
  21. Yeh, E.; Choi, J.; Prelcic, N.; Bhat, C.; Heath, R.W., Jr. Security in automotive radar and vehicular networks. Microw. J. 2016. submitted. [Google Scholar]
  22. Wagner, M.; Sulejmani, F.; Melzer, A.; Meissner, P.; Huemer, M. Threshold-Free Interference Cancellation Method for Automotive FMCW Radar Systems. In Proceedings of the 2018 IEEE International Symposium on Circuits and Systems (ISCAS), Florence, Italy, 27–30 May 2018; pp. 1–4. [Google Scholar] [CrossRef]
  23. Brooker, G.M. Mutual interference of millimeter-wave radar systems. IEEE Trans. Electromagn. Compat. 2007, 49, 170–181. [Google Scholar] [CrossRef]
  24. Uysal, F. Phase-coded FMCW automotive radar: System design and interference mitigation. IEEE Trans. Veh. Technol. 2019, 69, 270–281. [Google Scholar] [CrossRef] [Green Version]
  25. Dai, J.; Hao, X.; Li, P.; Li, Z.; Yan, X. Antijamming design and analysis of a novel pulse compression radar signal based on radar identity and chaotic encryption. IEEE Access 2020, 8, 5873–5884. [Google Scholar] [CrossRef]
  26. Alland, S.; Stark, W.; Ali, M.; Hegde, M. Interference in automotive radar systems: Characteristics, mitigation techniques, and current and future research. IEEE Signal Process. Mag. 2019, 36, 45–59. [Google Scholar] [CrossRef]
  27. Bechter, J.; Eid, K.; Roos, F.; Waldschmidt, C. Digital beamforming to mitigate automotive radar interference. In Proceedings of the 2016 IEEE MTT-S International Conference on Microwaves for Intelligent Mobility (ICMIM), San Diego, CA, USA, 19–20 May 2016; pp. 1–4. [Google Scholar]
  28. Bechter, J.; Rameez, M.; Waldschmidt, C. Analytical and experimental investigations on mitigation of interference in a DBF MIMO radar. IEEE Trans. Microw. Theory Tech. 2017, 65, 1727–1734. [Google Scholar] [CrossRef]
  29. Chauhan, R. A Platform for False Data Injection in Frequency Modulated Continuous Wave Radar; Utah State University: Logan, UT, USA, 2014. [Google Scholar]
  30. Shoukry, Y.; Martin, P.; Yona, Y.; Diggavi, S.; Srivastava, M. Pycra: Physical challenge-response authentication for active sensors under spoofing attacks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 12–16 October 2015; pp. 1004–1015. [Google Scholar]
  31. Dutta, R.G.; Guo, X.; Zhang, T.; Kwiat, K.; Kamhoua, C.; Njilla, L.; Jin, Y. Estimation of safe sensor measurements of autonomous system under attack. In Proceedings of the 54th Annual Design Automation Conference 2017, Austin, TX, USA, 18–22 June 2017; pp. 1–6. [Google Scholar]
  32. Kapoor, P.; Vora, A.; Kang, K.D. Detecting and Mitigating Spoofing Attack Against an Automotive Radar. In Proceedings of the 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), Chicago, IL, USA, 27–30 August 2018; pp. 1–6. [Google Scholar] [CrossRef]
  33. Komissarov, R.; Wool, A. Spoofing attacks against vehicular FMCW radar. In Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, Virtual Event, Korea, 19 November 2021; pp. 91–97. [Google Scholar]
  34. Toker, O.; Alsweiss, S. Design of a cyberattack resilient 77 GHz automotive radar sensor. Electronics 2020, 9, 573. [Google Scholar] [CrossRef] [Green Version]
  35. Miura, N.; Machida, T.; Matsuda, K.; Nagata, M.; Nashimoto, S.; Suzuki, D. A low-cost replica-based distance-spoofing attack on mmWave FMCW radar. In Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop, London, UK, 15 November 2019; pp. 95–100. [Google Scholar]
  36. Moon, T.; Park, J.; Kim, S. BlueFMCW: Random frequency hopping radar for mitigation of interference and spoofing. EURASIP J. Adv. Signal Process. 2022, 2022, 1–17. [Google Scholar] [CrossRef]
  37. Li, C.; Cummings, J.; Lam, J.; Graves, E.; Wu, W. Radar remote monitoring of vital signs. IEEE Microw. Mag. 2009, 10, 47–56. [Google Scholar] [CrossRef]
  38. Nallabolu, P.; Li, C. A Frequency-Domain Spoofing Attack on FMCW Radars and Its Mitigation Technique Based on a Hybrid-Chirp Waveform. IEEE Trans. Microw. Theory Tech. 2021, 69, 5086–5098. [Google Scholar] [CrossRef]
  39. Nashimoto, S.; Suzuki, D.; Miura, N.; Machida, T.; Matsuda, K.; Nagata, M. Low-cost distance-spoofing attack on FMCW radar and its feasibility study on countermeasure. J. Cryptogr. Eng. 2021, 11, 289–298. [Google Scholar] [CrossRef]
  40. Rodriguez, D.; Wang, J.; Li, C. Spoofing attacks to radar motion sensors with portable RF devices. In Proceedings of the 2021 IEEE Radio and Wireless Symposium (RWS), San Diego, CA, USA, 17–22 January 2021; pp. 73–75. [Google Scholar]
  41. Guvenc, I.; Koohifar, F.; Singh, S.; Sichitiu, M.L.; Matolak, D. Detection, tracking, and interdiction for amateur drones. IEEE Commun. Mag. 2018, 56, 75–81. [Google Scholar] [CrossRef]
  42. Zhao, J.; Fu, X.; Yang, Z.; Xu, F. Radar-assisted UAV detection and identification based on 5G in the Internet of Things. Wirel. Commun. Mob. Comput. 2019, 2019, 2850263. [Google Scholar] [CrossRef] [Green Version]
  43. Lykou, G.; Moustakas, D.; Gritzalis, D. Defending airports from UAS: A survey on cyber-attacks and counter-drone sensing technologies. Sensors 2020, 20, 3537. [Google Scholar] [CrossRef] [PubMed]
  44. Wang, J.; Liu, Y.; Song, H. Counter-unmanned aircraft system (s)(C-UAS): State of the art, challenges, and future trends. IEEE Aerosp. Electron. Syst. Mag. 2021, 36, 4–29. [Google Scholar] [CrossRef]
  45. Matos, D.; da Cruz Jordão, M.D.; Correia, R.; Carvalho, N.B. Millimeter-Wave BiCMOS Backscatter Modulator for 5G-IoT Applications. IEEE Microw. Wirel. Components Lett. 2020, 31, 173–176. [Google Scholar] [CrossRef]
  46. Eid, A.; Hester, J.G.; Tentzeris, M.M. Rotman Lens-Based Wide Angular Coverage and High-Gain Semipassive Architecture for Ultralong Range mm-Wave RFIDs. IEEE Antennas Wirel. Propag. Lett. 2020, 19, 1943–1947. [Google Scholar] [CrossRef]
  47. Daskalakis, S.; Georgiadis, A.; Kimionis, J.; Tentzeris, M. A printed millimeter-wave modulator and antenna array for low-complexity Gigabit-datarate backscatter communications. Res. Sq. 2021. [Google Scholar] [CrossRef]
  48. Schmid, C.M.; Feger, R.; Stelzer, A. Millimeter-wave phase-modulated backscatter transponder for FMCW radar applications. In Proceedings of the 2011 IEEE MTT-S International Microwave Symposium, Baltimore, MD, USA, 5–10 June 2011; pp. 1–4. [Google Scholar]
  49. Stein, W.; Aleksieieva, A.; Roehr, S.; Vossiek, M. Phase modulated 61 GHz backscatter transponder for FMCW radar-based ranging. In Proceedings of the GeMiC 2014; German Microwave Conference, Aachen, Germany, 10–12 March 2014; pp. 1–4. [Google Scholar]
  50. Lazaro, A.; Lorenzo, J.; Villarino, R.; Girbau, D. Backscatter transponder based on frequency selective surface for FMCW radar applications. Radioengineering 2014, 23, 632–641. [Google Scholar]
  51. Lazaro, A.; Ramos, A.; Girbau, D.; Villarino, R. A novel UWB RFID tag using active frequency selective surface. IEEE Trans. Antennas Propag. 2012, 61, 1155–1165. [Google Scholar] [CrossRef]
  52. Kim, B.; Kim, S.; Lee, J. A novel DFT-based DOA estimation by a virtual array extension using simple multiplications for FMCW radar. Sensors 2018, 18, 1560. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  53. Collin, R. Limitations of the Thevenin and Norton equivalent circuits for a receiving antenna. IEEE Antennas Propag. Mag. 2003, 45, 119–124. [Google Scholar] [CrossRef]
  54. Green, R.B. The General Theory of Antenna Scattering; The Ohio State University: Columbus, OH, USA, 1963. [Google Scholar]
  55. Nikitin, P.V.; Rao, K.S.; Lam, S.F.; Pillai, V.; Martinez, R.; Heinrich, H. Power reflection coefficient analysis for complex impedances in RFID tag design. IEEE Trans. Microw. Theory Tech. 2005, 53, 2721–2725. [Google Scholar] [CrossRef]
  56. Rohling, H.; Kronauge, M. New radar waveform based on a chirp sequence. In Proceedings of the 2014 International Radar Conference, Lille, France, 13–17 October 2014; pp. 1–4. [Google Scholar] [CrossRef]
  57. Lazaro, A.; Lazaro, M.; Villarino, R.; De Paco, P. New Radar Micro-Doppler Tag for Road Safety Based on the Signature of Rotating Backscatters. IEEE Sens. J. 2020, 21, 8604–8612. [Google Scholar] [CrossRef]
  58. Harris, F.J. On the use of windows for harmonic analysis with the discrete Fourier transform. Proc. IEEE 1978, 66, 51–83. [Google Scholar] [CrossRef]
  59. Lazaro, A.; Lazaro, M.; Villarino, R.; Girbau, D.; de Paco, P. Car2Car Communication Using a Modulated Backscatter and Automotive FMCW Radar. Sensors 2021, 21, 3656. [Google Scholar] [CrossRef] [PubMed]
  60. Lazaro, A.; Villarino, R.; Lazaro, M.; Girbau, D.; dePaco, P. Modulated Backscattering transponder to increase the detectability of pedestrians with automotive radar at 24 GHz. In Proceedings of the 2021 XXXIVth General Assembly and Scientific Symposium of the International Union of Radio Science (URSI GASS), Rome, Italy, 28 August–4 September 2021; pp. 1–4. [Google Scholar]
  61. Filipovic, D.F.; Gearhart, S.S.; Rebeiz, G.M. Double-slot antennas on extended hemispherical and elliptical silicon dielectric lenses. IEEE Trans. Microw. Theory Tech. 1993, 41, 1738–1749. [Google Scholar] [CrossRef]
  62. Nguyen, N.T.; Rolland, A.; Boriskin, A.V.; Valerio, G.; Le Coq, L.; Sauleau, R. Size and weight reduction of integrated lens antennas using a cylindrical air cavity. IEEE Trans. Antennas Propag. 2012, 60, 5993–5998. [Google Scholar] [CrossRef]
  63. Kamran Saleem, M.; Xie, M.; Alkanhal, M.A.; Saadi, M. Effect of dielectric materials on integrated lens antenna for millimeter wave applications. Microw. Opt. Technol. Lett. 2019, 61, 1079–1083. [Google Scholar] [CrossRef]
  64. Boussatour, G.; Cresson, P.Y.; Genestie, B.; Joly, N.; Lasri, T. Dielectric characterization of polylactic acid substrate in the frequency band 0.5–67 GHz. IEEE Microw. Wirel. Components Lett. 2018, 28, 374–376. [Google Scholar] [CrossRef]
  65. Garg, R.; Bhartia, P.; Bahl, I.J.; Ittipiboon, A. Microstrip Antenna Design Handbook; Artech House: Norwood, MA, USA, 2001. [Google Scholar]
  66. Marchetti, E.; Du, R.; Norouzian, F.; Hoare, E.; Tran, T.Y.; Cherniakov, M.; Gashinova, M. Comparison of pedestrian reflectivities at 24 and 300 GHz. In Proceedings of the 2017 18th International Radar Symposium (IRS), Prague, Czech Republic, 28–30 June 2017; pp. 1–7. [Google Scholar]
  67. Schipper, T.; Fortuny-Guasch, J.; Tarchi, D.; Reichardt, L.; Zwick, T. RCS measurement results for automotive related objects at 23–27 GHz. In Proceedings of the 5th European Conference on Antennas and Propagation (EUCAP), Rome, Italy, 11–15 April 2011; pp. 683–686. [Google Scholar]
  68. Lin, J.; Chien, S.; Chen, Y.; Chen, C.C.; Sherony, R. 24 GHz and 77 GHz radar characteristics of metal guardrail for the development of metal guardrail surrogate for road departure mitigation system testing. In Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference (ITSC), Auckland, New Zealand, 27–30 October 2019; pp. 3340–3346. [Google Scholar]
  69. Abou-Khousa, M.A.; Simms, D.L.; Kharkovsky, S.; Zoughi, R. High-resolution short-range wideband FMCW radar measurements based on MUSIC algorithm. In Proceedings of the 2009 IEEE Instrumentation and Measurement Technology Conference, Singapore, 5–7 May 2009; pp. 498–501. [Google Scholar]
Figure 1. Illustration of a road scenario where the victim’s radar receives the echo signal from a target and is interfered with by another radar, a jamming transmitter, and an spoofing attack.
Figure 1. Illustration of a road scenario where the victim’s radar receives the echo signal from a target and is interfered with by another radar, a jamming transmitter, and an spoofing attack.
Sensors 22 02145 g001
Figure 2. Scheme of a car-following model where the victim radar experiences a spoofing attack from a device installed in a car in the same lane, introducing a false target less than a safe distance away.
Figure 2. Scheme of a car-following model where the victim radar experiences a spoofing attack from a device installed in a car in the same lane, introducing a false target less than a safe distance away.
Sensors 22 02145 g002
Figure 3. Block diagram of a generic FMCW radar used in the analysis.
Figure 3. Block diagram of a generic FMCW radar used in the analysis.
Sensors 22 02145 g003
Figure 4. Block diagram of a passive modulated backscatter in reflection based on a microwave switch.
Figure 4. Block diagram of a passive modulated backscatter in reflection based on a microwave switch.
Sensors 22 02145 g004
Figure 5. Block diagram of a modulated backscatter based on an amplifier.
Figure 5. Block diagram of a modulated backscatter based on an amplifier.
Sensors 22 02145 g005
Figure 6. Diagram of the transmitted signal and calculation of the range–Doppler matrix from the I and Q samples received.
Figure 6. Diagram of the transmitted signal and calculation of the range–Doppler matrix from the I and Q samples received.
Sensors 22 02145 g006
Figure 7. Ghost points introduced for the backscatter: (a) unmodulated case, (b) high-frequency modulation case with a modulation frequency integer multiple of f s d / 2 , (c) low-frequency modulation case, and (d) high-frequency modulation case where the modulation frequency is not an integer multiple of f s d / 2 .
Figure 7. Ghost points introduced for the backscatter: (a) unmodulated case, (b) high-frequency modulation case with a modulation frequency integer multiple of f s d / 2 , (c) low-frequency modulation case, and (d) high-frequency modulation case where the modulation frequency is not an integer multiple of f s d / 2 .
Sensors 22 02145 g007
Figure 8. Geometry and dimensions of the antenna.
Figure 8. Geometry and dimensions of the antenna.
Sensors 22 02145 g008
Figure 9. (a) Measured gain in the lens antenna (cuts in the E-plane and H-plane). Inset image of the antenna prototype. (b) Measured reflection coefficient as a function of the frequency.
Figure 9. (a) Measured gain in the lens antenna (cuts in the E-plane and H-plane). Inset image of the antenna prototype. (b) Measured reflection coefficient as a function of the frequency.
Sensors 22 02145 g009
Figure 10. Photo of the prototype.
Figure 10. Photo of the prototype.
Sensors 22 02145 g010
Figure 11. RCS level of different relevant road objects such as a car, a small van, a guardrail, a bicycle, and a pedestrian at 24 GHz band.The peak differential radar cross section for the prototype of modulated backscatter is shown as a red line.
Figure 11. RCS level of different relevant road objects such as a car, a small van, a guardrail, a bicycle, and a pedestrian at 24 GHz band.The peak differential radar cross section for the prototype of modulated backscatter is shown as a red line.
Sensors 22 02145 g011
Figure 12. Simulated range–Doppler map (a) and after CFAR detector (b) for case a in Table 2.
Figure 12. Simulated range–Doppler map (a) and after CFAR detector (b) for case a in Table 2.
Sensors 22 02145 g012
Figure 13. Simulated range–Doppler map (a) and after CFAR detector (b) for case b in Table 2.
Figure 13. Simulated range–Doppler map (a) and after CFAR detector (b) for case b in Table 2.
Sensors 22 02145 g013
Figure 14. Simulated range–Doppler map (a) and after CFAR detector (b) for case c in Table 2.
Figure 14. Simulated range–Doppler map (a) and after CFAR detector (b) for case c in Table 2.
Sensors 22 02145 g014
Figure 15. Simulated range–Doppler map (a) and after CFAR detector (b) for case d in Table 2.
Figure 15. Simulated range–Doppler map (a) and after CFAR detector (b) for case d in Table 2.
Sensors 22 02145 g015
Figure 16. Image of EVAL-DEMORAD kit used in the experiments.
Figure 16. Image of EVAL-DEMORAD kit used in the experiments.
Sensors 22 02145 g016
Figure 17. Measured range–Doppler map including two ghost targets generated with a Doppler frequency shift of 1000 Hz keeping the tag static.
Figure 17. Measured range–Doppler map including two ghost targets generated with a Doppler frequency shift of 1000 Hz keeping the tag static.
Sensors 22 02145 g017
Figure 18. Measured range–Doppler map including two ghost targets at 3.5 m with the tag approaching the radar.
Figure 18. Measured range–Doppler map including two ghost targets at 3.5 m with the tag approaching the radar.
Sensors 22 02145 g018
Figure 19. Measured range–Doppler map including two ghost targets at 2.5 m with the tag approaching the radar.
Figure 19. Measured range–Doppler map including two ghost targets at 2.5 m with the tag approaching the radar.
Sensors 22 02145 g019
Figure 20. Measured range–Doppler map including two phantom targets at 2.5 m with the tag moving away from the radar.
Figure 20. Measured range–Doppler map including two phantom targets at 2.5 m with the tag moving away from the radar.
Sensors 22 02145 g020
Figure 21. Measured range–Doppler map including two ghost targets generated with a Doppler frequency shift of 1000 Hz with the tag approaching the radar.
Figure 21. Measured range–Doppler map including two ghost targets generated with a Doppler frequency shift of 1000 Hz with the tag approaching the radar.
Sensors 22 02145 g021
Figure 22. Measured range–angle map including two phantom targets at 2.5 m.
Figure 22. Measured range–angle map including two phantom targets at 2.5 m.
Sensors 22 02145 g022
Figure 23. Procedure used to detect a spoofing target using data from two chirps with different sweep slopes.
Figure 23. Procedure used to detect a spoofing target using data from two chirps with different sweep slopes.
Sensors 22 02145 g023
Figure 24. Simulated range–Doppler map (a) and after CFAR detector (b) with a real target at 15 m and 8 m/s.
Figure 24. Simulated range–Doppler map (a) and after CFAR detector (b) with a real target at 15 m and 8 m/s.
Sensors 22 02145 g024
Figure 25. Simulated range–Doppler map (a) and after CFAR detector (b) with a real target at 15 m and 8 m/s with the slope changed.
Figure 25. Simulated range–Doppler map (a) and after CFAR detector (b) with a real target at 15 m and 8 m/s with the slope changed.
Sensors 22 02145 g025
Table 1. Dimensions of the antenna.
Table 1. Dimensions of the antenna.
DimensionValue (mm)
R L 13.95
H13.4
L2.9
W3.45
W t 0.5
L t 12.5
Table 2. Simulated cases.
Table 2. Simulated cases.
CaseModulation Frequency (Hz) Δ R (m) Δ v (m/s)
a46,87550
b100006.25
c46,875 − 100056.25
d46,875 + 10005−6.25
Table 3. Configuration of the FMCW radar.
Table 3. Configuration of the FMCW radar.
ParameterValue
Start Frequency24 GHz
Sweep bandwidth300 MHz
Sweep slope300/250 MHz/ μ s
Sweep time250 μ s
Sampling frequency1.2 Mbps
Number of samples per chirp256
Number of chirps per frame128
Transmit antennas2
Receive antennas4
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Lazaro, A.; Porcel, A.; Lazaro, M.; Villarino, R.; Girbau, D. Spoofing Attacks on FMCW Radars with Low-Cost Backscatter Tags. Sensors 2022, 22, 2145. https://doi.org/10.3390/s22062145

AMA Style

Lazaro A, Porcel A, Lazaro M, Villarino R, Girbau D. Spoofing Attacks on FMCW Radars with Low-Cost Backscatter Tags. Sensors. 2022; 22(6):2145. https://doi.org/10.3390/s22062145

Chicago/Turabian Style

Lazaro, Antonio, Arnau Porcel, Marc Lazaro, Ramon Villarino, and David Girbau. 2022. "Spoofing Attacks on FMCW Radars with Low-Cost Backscatter Tags" Sensors 22, no. 6: 2145. https://doi.org/10.3390/s22062145

APA Style

Lazaro, A., Porcel, A., Lazaro, M., Villarino, R., & Girbau, D. (2022). Spoofing Attacks on FMCW Radars with Low-Cost Backscatter Tags. Sensors, 22(6), 2145. https://doi.org/10.3390/s22062145

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop