A Replay Attack Against ISAC Based on OFDM

Integrated sensing and communication (ISAC) is envisioned to be a core element of future 6G and connected vehicular wireless systems. As always wireless security and privacy will still be of outmost importance. Existing research on ISAC has not explored sufficiently security attacks that compromise...

Full description

Bibliographic Details
Main Authors: Georgios Chrysanidis, Yanwei Liu, Antonios Argyriou
Format: Article
Language:English
Published: IEEE 2024-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10416823/
_version_ 1797316080328245248
author Georgios Chrysanidis
Yanwei Liu
Antonios Argyriou
author_facet Georgios Chrysanidis
Yanwei Liu
Antonios Argyriou
author_sort Georgios Chrysanidis
collection DOAJ
description Integrated sensing and communication (ISAC) is envisioned to be a core element of future 6G and connected vehicular wireless systems. As always wireless security and privacy will still be of outmost importance. Existing research on ISAC has not explored sufficiently security attacks that compromise its sensing operation. In this paper we present a new wireless range-Doppler replay attack that can compromise the functionality of ISAC systems that use orthogonal frequency division multiplexing (OFDM) for sensing and data communication. With the proposed attack the adversary detects wireless OFDM transmissions and retransmits the same wireless frame (preamble and data) but with a phase shift that varies across subcarriers and successive OFDM symbols of the frame. This results in the creation of false targets in the range-Doppler images that are created by the ISAC system. Our simulation results for a vehicular scenario show that the ISAC system cannot distinguish the false targets from the real ones even when the attacker uses low transmission power. The implication of this attack is that it may lead to inability of advanced driver assistance systems (ADAS) or connected autonomous vehicular (CAV) systems that use ISAC to operate safely.
first_indexed 2024-03-08T03:13:06Z
format Article
id doaj.art-c4ceec25e3bf4ae2ab1c8e831eb16d2a
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-03-08T03:13:06Z
publishDate 2024-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-c4ceec25e3bf4ae2ab1c8e831eb16d2a2024-02-13T00:01:12ZengIEEEIEEE Access2169-35362024-01-0112209982100310.1109/ACCESS.2024.335968010416823A Replay Attack Against ISAC Based on OFDMGeorgios Chrysanidis0https://orcid.org/0009-0000-4113-7976Yanwei Liu1https://orcid.org/0000-0002-0626-1901Antonios Argyriou2https://orcid.org/0000-0002-2510-3124Department of Electrical and Computer Engineering, University of Thessaly, Volos, GreeceInstitute of Information Engineering, Chinese Academy of Sciences, Beijing, ChinaDepartment of Electrical and Computer Engineering, University of Thessaly, Volos, GreeceIntegrated sensing and communication (ISAC) is envisioned to be a core element of future 6G and connected vehicular wireless systems. As always wireless security and privacy will still be of outmost importance. Existing research on ISAC has not explored sufficiently security attacks that compromise its sensing operation. In this paper we present a new wireless range-Doppler replay attack that can compromise the functionality of ISAC systems that use orthogonal frequency division multiplexing (OFDM) for sensing and data communication. With the proposed attack the adversary detects wireless OFDM transmissions and retransmits the same wireless frame (preamble and data) but with a phase shift that varies across subcarriers and successive OFDM symbols of the frame. This results in the creation of false targets in the range-Doppler images that are created by the ISAC system. Our simulation results for a vehicular scenario show that the ISAC system cannot distinguish the false targets from the real ones even when the attacker uses low transmission power. The implication of this attack is that it may lead to inability of advanced driver assistance systems (ADAS) or connected autonomous vehicular (CAV) systems that use ISAC to operate safely.https://ieeexplore.ieee.org/document/10416823/Integrated sensing and communication (ISAC)joint RADAR communication (JRC)6GOFDM RADARreplay attackdoppler estimation
spellingShingle Georgios Chrysanidis
Yanwei Liu
Antonios Argyriou
A Replay Attack Against ISAC Based on OFDM
IEEE Access
Integrated sensing and communication (ISAC)
joint RADAR communication (JRC)
6G
OFDM RADAR
replay attack
doppler estimation
title A Replay Attack Against ISAC Based on OFDM
title_full A Replay Attack Against ISAC Based on OFDM
title_fullStr A Replay Attack Against ISAC Based on OFDM
title_full_unstemmed A Replay Attack Against ISAC Based on OFDM
title_short A Replay Attack Against ISAC Based on OFDM
title_sort replay attack against isac based on ofdm
topic Integrated sensing and communication (ISAC)
joint RADAR communication (JRC)
6G
OFDM RADAR
replay attack
doppler estimation
url https://ieeexplore.ieee.org/document/10416823/
work_keys_str_mv AT georgioschrysanidis areplayattackagainstisacbasedonofdm
AT yanweiliu areplayattackagainstisacbasedonofdm
AT antoniosargyriou areplayattackagainstisacbasedonofdm
AT georgioschrysanidis replayattackagainstisacbasedonofdm
AT yanweiliu replayattackagainstisacbasedonofdm
AT antoniosargyriou replayattackagainstisacbasedonofdm