WASTON: Inferring Critical Information to Enable Spoofing Attacks Using COTS mmWave Radar

Published: 01 Jan 2025, Last Modified: 11 Apr 2025IEEE Trans. Dependable Secur. Comput. 2025EveryoneRevisionsBibTeXCC BY-SA 4.0
Abstract: Radar spoofing attacks mislead victim radars by injecting false information. Successful attacks require prior knowledge of the victim radar's mode and parameters, and existing works obtain this critical information with expensive equipment, e.g., software-defined radio or spectrum analyzer. In this paper, we propose Waston, a low-cost system for radar mode detection and parameter estimation using commercial off-the-shelf (COTS) mmWave radars. To overcome the disadvantage of low sampling frequency of COTS mmWave radars, we design two special local signals to detect frequency points and spectral shapes for radar mode detection. We propose a novel parameter estimation algorithm to estimate frequency- and time-domain parameters for spoofing different radars. We have implemented a prototype on the TI AWR1843 platform and conducted extensive experiments to evaluate the performance of Waston. Our experimental results demonstrate that Waston achieves an accuracy of 100$\%$ for mode detection and 99$\%$ for parameter estimation. Furthermore, we demonstrate that the estimated parameters can be used to launch a successful spoofing attack against the victim radar.
Loading

OpenReview is a long-term project to advance science through improved peer review with legal nonprofit status. We gratefully acknowledge the support of the OpenReview Sponsors. © 2025 OpenReview