Friday, May 23, 2025
HomeComputer SecurityNormal Wi-Fi Devices Can Be Used to Detect Dangerous Objects Such as...

Normal Wi-Fi Devices Can Be Used to Detect Dangerous Objects Such as Weapons and Bombs

Published on

SIEM as a Service

Follow Us on Google News

Dangerous Objects such as weapons, Bombs, and chemicals that are hidden in baggage can be detected with Wi-Fi signals from normal Wi-Fi devices without opening it.

Researchers from Rutgers University demonstrated the readily available WiFi signals from low-cost devices can penetrate into baggage without any dedicated devices or signals.

With their model they utilized channel state information (CSI) from normal Wi-Fi Devices to be used in detecting suspicious objects, the CSI is a channel property of a communication link that describes how the signal propagates from the transmitter to receiver.

- Advertisement - Google News

Object Classification – Wi-Fi devices

The system classified into two major components

It first detects the existence of dangerous objects and identifies it’s type based on reconstructed CSI complex value.
Then it calculates the risk level of the object by examining the dimensions of the object based on the reconstructed CSI complex of the signals reflected from the object.

They said that Our system only requires a WiFi device with 2 to 3 antennas and can be integrated into existing WiFi networks with low costs and deployment efforts, making it more scalable and practical than the approaches using dedicated instruments.

Wi-Fi devices

Researchers said our system can detect over 95% of suspicious objects in different types of bags and successfully identify 90% dangerous material types.

Researchers evaluated 15 metal and liquid objects and 6 types of bags in a 6-month period. Each experiment is repeated 5 times by changing object’s position and orientation.

Wi-Fi devices

They said Our system can be easily deployed to many places that still have no pre-installed security check infrastructures and require high-manpower to conduct security checks such as theme parks, museums, stadiums, metro/train stations, and scenic locations.

Professor Yingying Chen said in an interview to CBS local that their new prototype detection is a game changer and We feel really excited and we realized this could be very useful.

More technical details can be found in the paper “Towards In-baggage Suspicious Object Detection Using Commodity WiFi” published by researchers.

Related Read:

WiFi Broadcasts in All Version of Android OS Leaking Sensitive Data Including IP Addresses, BSSID, WiFi Network Name

A New Method Discovered to Crack WPA/WPA2 PSK Enabled WiFi Network Passwords

WiFi Hacking Tool Aircrack-ng 1.3 Released with New Features, Speed Up & Bug Fixes

Wi-Jacking – New Wifi Attack Allow Accessing Millions of Neighbour’s WiFi Without Cracking

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs...

UK Government to Shift Away from Passwords in New Security Move

UK government has unveiled plans to implement passkey technology across its digital services later...

New Spam Campaign Leverages Remote Monitoring Tools to Exploit Organizations

A sophisticated spam campaign targeting Portuguese-speaking users in Brazil has been uncovered by Cisco...