Radar sensors can be viewed as a limited wireless sensor network consisting of radar transmitter nodes, target nodes, and
radar receiver nodes. The radar transmitter node sends a communication signal to the target node which then reflects it in
a known pattern to the radar receiver nodes. This type of wireless sensor network is susceptible to the same types of
attacks as a traditional wireless sensor network, but there is less opportunity for defense. The target nodes in the network
are unable to validate the return signal, and they are often uncooperative. This leads to ample opportunities for spoofing
and man-in-the-middle attacks. This paper explores some of the fundamental techniques that can be used against a
limited wireless network system as well as explores the techniques that can be used to counter them.