Tuesday, February 25, 2025
HomeComputer SecurityNormal Wi-Fi Devices Can Be Used to Detect Dangerous Objects Such as...

Normal Wi-Fi Devices Can Be Used to Detect Dangerous Objects Such as Weapons and Bombs

Published on

SIEM as a Service

Follow Us on Google News

Dangerous Objects such as weapons, Bombs, and chemicals that are hidden in baggage can be detected with Wi-Fi signals from normal Wi-Fi devices without opening it.

Researchers from Rutgers University demonstrated the readily available WiFi signals from low-cost devices can penetrate into baggage without any dedicated devices or signals.

With their model they utilized channel state information (CSI) from normal Wi-Fi Devices to be used in detecting suspicious objects, the CSI is a channel property of a communication link that describes how the signal propagates from the transmitter to receiver.

Object Classification – Wi-Fi devices

The system classified into two major components

It first detects the existence of dangerous objects and identifies it’s type based on reconstructed CSI complex value.
Then it calculates the risk level of the object by examining the dimensions of the object based on the reconstructed CSI complex of the signals reflected from the object.

They said that Our system only requires a WiFi device with 2 to 3 antennas and can be integrated into existing WiFi networks with low costs and deployment efforts, making it more scalable and practical than the approaches using dedicated instruments.

Wi-Fi devices

Researchers said our system can detect over 95% of suspicious objects in different types of bags and successfully identify 90% dangerous material types.

Researchers evaluated 15 metal and liquid objects and 6 types of bags in a 6-month period. Each experiment is repeated 5 times by changing object’s position and orientation.

Wi-Fi devices

They said Our system can be easily deployed to many places that still have no pre-installed security check infrastructures and require high-manpower to conduct security checks such as theme parks, museums, stadiums, metro/train stations, and scenic locations.

Professor Yingying Chen said in an interview to CBS local that their new prototype detection is a game changer and We feel really excited and we realized this could be very useful.

More technical details can be found in the paper “Towards In-baggage Suspicious Object Detection Using Commodity WiFi” published by researchers.

Related Read:

WiFi Broadcasts in All Version of Android OS Leaking Sensitive Data Including IP Addresses, BSSID, WiFi Network Name

A New Method Discovered to Crack WPA/WPA2 PSK Enabled WiFi Network Passwords

WiFi Hacking Tool Aircrack-ng 1.3 Released with New Features, Speed Up & Bug Fixes

Wi-Jacking – New Wifi Attack Allow Accessing Millions of Neighbour’s WiFi Without Cracking

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Critical RCE Vulnerability in MITRE Caldera – Proof of Concept Released

A critical remote code execution (RCE) vulnerability has been uncovered in MITRE Caldera, a...

CISA Alerts: Oracle Agile Vulnerability Actively Exploited

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding...

Hackers Evade Outlook Spam Filters to Deliver Malicious ISO Files

A newly discovered technique allows threat actors to circumvent Microsoft Outlook’s spam filters to...

KernelSnitch: Uncovering a New Side-Channel Attack on Data Structures

Researchers at Graz University of Technology have uncovered a groundbreaking software-based side-channel attack, KernelSnitch, which...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...

New FUD Malware Targets MacOS, Evading Antivirus and Security Tools

A new strain of Fully Undetectable (FUD) macOS malware, dubbed "Tiny FUD," has emerged,...