Wi-Fi as a Sensor: Capabilities, Challenges, and Defenses

Survey on Security and Privacy Defenses in Wi-Fi Sensing

Bachelor Thesis (2025)
Author(s)

S. Dimieva (TU Delft - Electrical Engineering, Mathematics and Computer Science)

Contributor(s)

F.M.L. Portner – Mentor (TU Delft - Embedded Systems)

Arash Asadi – Mentor (TU Delft - Embedded Systems)

Faculty
Electrical Engineering, Mathematics and Computer Science
More Info
expand_more
Publication Year
2025
Language
English
Graduation Date
24-06-2025
Awarding Institution
Delft University of Technology
Project
['CSE3000 Research Project']
Programme
['Computer Science and Engineering']
Faculty
Electrical Engineering, Mathematics and Computer Science
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

This paper addresses the growing privacy concerns associated with Wi-Fi sensing, a technology that uses existing wireless infrastructure to extract sensitive information such as human presence, motion, breathing, and typing. Although Wi-Fi sensing enables cost-effective and scalable applications in smart homes, healthcare, and security, its passive nature allows adversaries to eavesdrop on Wi-Fi transmissions and analyze signal patterns for private data extraction. While researchers have proposed various defense mechanisms to counter these threats, a unified framework for categorizing and comparing these approaches, particularly in terms of their trade-offs and practicality, has been notably absent. This paper aims to fill this gap by providing a structured categorization of existing defense mechanisms against Wi-Fi sensing, including a detailed analysis of their limitations, and informing the design of more robust and privacypreserving solutions. The key contributions include a comprehensive taxonomy of defense mechanisms based on their core strategy and operational layer, a comparative analysis of their effectiveness, feasibility, and trade-offs, and an identification of open challenges for future research.

Files

License info not available