A Survey of Wireless Sensing Security from a Role-Based View: Victim, Weapon, and Shield
Ruixu Geng,Jianyang Wang,Yuqin Yuan,Fengquan Zhan,Tianyu Zhang,Rui Zhang,Pengcheng Huang,Dongheng Zhang,Jinbo Chen,Yang Hu,Yan Chen
2024-12-04
Abstract:Wireless sensing technology has become prevalent in healthcare, smart homes, and autonomous driving due to its non-contact operation, penetration capabilities, and cost-effectiveness. As its applications expand, the technology faces mounting security challenges: sensing systems can be attack targets, signals can be weaponized, or signals can function as security shields. Despite these security concerns significantly impacting the technology's development, a systematic review remains lacking. This paper presents the first comprehensive survey of wireless sensing security through a role-based perspective. Analyzing over 200 publications from 2020-2024, we propose a novel classification framework that systematically categorizes existing research into three main classes: (1) wireless systems as victims of attacks, (2) wireless signals as weapons for attacks, and (3) wireless signals as shields for security applications. This role-based classification method is not only intuitive and easy to understand, but also reflects the essential connection between wireless signals and security issues. Through systematic literature review and quantitative analysis, this paper outlines a panoramic view of wireless sensing security, revealing key technological trends and innovation opportunities, thereby helping to promote the development of this field. Project page: \url{<a class="link-external link-https" href="https://github.com/Intelligent-Perception-Lab/Awesome-WS-Security" rel="external noopener nofollow">this https URL</a>}.
Human-Computer Interaction,Cryptography and Security