What is it about?

The study focuses on “Integrated Sensing and Communication” (ISAC), where 5G base stations not only exchange data but also detect the presence and movement of nearby objects, much like a radar. We demonstrate, for the first time, that by simply recording and retransmitting an entire 5G frame with a small delay and frequency shift, an attacker can create fake “ghost” targets or hide real ones in the radar map— without interrupting the normal data connection. The research combines theory, signal modeling, and real experiments using software-defined radios to prove that such blind replay attacks are easy to perform and very difficult to detect.

Featured Image

Why is it important?

As ISAC becomes a key feature of future 5G and 6G networks—for example in autonomous vehicles, drones, and smart factories—its security is critical. The results reveal that even simple physical-layer manipulations can deceive sensing functions while leaving the communication link intact. This means that traditional network security tools may not be enough to protect future systems that rely on joint sensing and communication. By exposing this weakness early, the paper provides experimental evidence that can guide the design of stronger, cross-layer defenses before ISAC is widely deployed.

Perspectives

From our perspective, this research highlights how easy it can be to exploit assumptions about “trusted” physical signals in wireless networks. The attack we tested required no access to network parameters or decoding—only the ability to replay a recorded signal with slight timing and frequency offsets. Seeing the sensing output respond to a completely fake target was both surprising and concerning. Our hope is that these findings will motivate the research community and industry to consider sensing integrity as seriously as communication reliability, and to develop mechanisms that detect or prevent such deceptive replays in future 5G/6G systems.

Stefania Bartoletti
Universita degli Studi di Roma Tor Vergata

Read the Original

This page is a summary of: Blind Deception in ISAC via Full-Frame OFDM Replay, November 2025, ACM (Association for Computing Machinery),
DOI: 10.1145/3737895.3768297.
You can read the full text:

Read

Contributors

The following have contributed to this page