Spoofing Attacks to Radar Motion Sensors with Portable RF Devices

Daniel Rodriguez, Jing Wang, Changzhi Li

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations


Radar sensors have shown great potential for surveillance and security authentication applications. However, a thorough analysis of their vulnerability to spoofing or replay attacks has not been performed yet. In this paper, the feasibility of performing spoofing attacks to radar sensor is studied and experimentally verified. First, a simple binary phase-shift keying system was used to generate artificial spectral components in the radar's demodulated signal. Additionally, an analog phase shifter was driven by an arbitrary signal generator to mimic the human cardio-respiratory motion. Characteristic time and frequency domain cardio-respiratory human signatures were successfully generated, which opens possibilities to perform spoofing attacks to surveillance and security continuous authentication systems based on microwave radar sensors.

Original languageEnglish
Title of host publication2021 IEEE Radio and Wireless Symposium, RWS 2021
PublisherIEEE Computer Society
Number of pages3
ISBN (Electronic)9781728180625
StatePublished - Jan 17 2021
Event2021 IEEE Radio and Wireless Symposium, RWS 2021 - Virtual, San Diego, United States
Duration: Jan 17 2021Jan 22 2021

Publication series

NameIEEE Radio and Wireless Symposium, RWS
ISSN (Print)2164-2958
ISSN (Electronic)2164-2974


Conference2021 IEEE Radio and Wireless Symposium, RWS 2021
Country/TerritoryUnited States
CityVirtual, San Diego


  • Biometrics
  • Doppler radar
  • continuous authentication
  • radar sensors
  • spoofing attacks


Dive into the research topics of 'Spoofing Attacks to Radar Motion Sensors with Portable RF Devices'. Together they form a unique fingerprint.

Cite this