Normal Wi-Fi Devices Can Be Used to Detect Dangerous Objects Such as Weapons and Bombs

Dangerous Objects such as weapons, Bombs, and chemicals that are hidden in baggage can be detected with Wi-Fi signals from normal Wi-Fi devices without opening it.

Researchers from Rutgers University demonstrated the readily available WiFi signals from low-cost devices can penetrate into baggage without any dedicated devices or signals.

With their model they utilized channel state information (CSI) from normal Wi-Fi Devices to be used in detecting suspicious objects, the CSI is a channel property of a communication link that describes how the signal propagates from the transmitter to receiver.

Object Classification – Wi-Fi devices

The system classified into two major components

It first detects the existence of dangerous objects and identifies it’s type based on reconstructed CSI complex value.
Then it calculates the risk level of the object by examining the dimensions of the object based on the reconstructed CSI complex of the signals reflected from the object.

They said that Our system only requires a WiFi device with 2 to 3 antennas and can be integrated into existing WiFi networks with low costs and deployment efforts, making it more scalable and practical than the approaches using dedicated instruments.

Researchers said our system can detect over 95% of suspicious objects in different types of bags and successfully identify 90% dangerous material types.

Researchers evaluated 15 metal and liquid objects and 6 types of bags in a 6-month period. Each experiment is repeated 5 times by changing object’s position and orientation.

They said Our system can be easily deployed to many places that still have no pre-installed security check infrastructures and require high-manpower to conduct security checks such as theme parks, museums, stadiums, metro/train stations, and scenic locations.

Professor Yingying Chen said in an interview to CBS local that their new prototype detection is a game changer and We feel really excited and we realized this could be very useful.

More technical details can be found in the paper “Towards In-baggage Suspicious Object Detection Using Commodity WiFi” published by researchers.

Related Read:

WiFi Broadcasts in All Version of Android OS Leaking Sensitive Data Including IP Addresses, BSSID, WiFi Network Name

A New Method Discovered to Crack WPA/WPA2 PSK Enabled WiFi Network Passwords

WiFi Hacking Tool Aircrack-ng 1.3 Released with New Features, Speed Up & Bug Fixes

Wi-Jacking – New Wifi Attack Allow Accessing Millions of Neighbour’s WiFi Without Cracking

Guru baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Google Guide! How to Detect Browser Data Theft Using Windows Event Logs

In the ever-evolving cybersecurity landscape, Google is continually striving to protect user data from malicious actors. In a recent blog…

14 hours ago

Millions of Malicious “Imageless” Docker Hub Repositories Drop Malware

In a startling revelation, nearly 20% of Docker Hub repositories have been identified as conduits for malware and phishing scams,…

15 hours ago

Attackers Leverage Sidecar Container Injection Technique To Stay Stealthy

Kubernetes (K8s) is an open-source container orchestration platform designed to automate application container deployment, scaling, and running.  Containers are isolated…

17 hours ago

How to Utilize Azure Logs to Identify Threats: Insights From Microsoft

Microsoft's Azure platform is a highly acclaimed and widely recognized solution that organizations worldwide are leveraging. It is regarded as…

19 hours ago

Redline Malware Using Lua Bytecode to Challenge the SOC/TI Team to Detect

The first instance of Redline using such a method is in a new variant of Redline Stealer malware that McAfee…

1 day ago

Threat Actor Claims Selling of Dell Database with 49M User Records

A threat actor reportedly sells a database containing 49 million user records from Dell, one of the world's leading technology…

1 day ago