RF Sensing Security and Malicious Exploitation: A Comprehensive Survey

📅 2025-04-15
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This paper systematically uncovers security threats and malicious exploitation risks inherent in radio-frequency (RF) sensing technologies. Motivated by their dual vulnerabilities—stemming from non-intrusiveness, environmental sensitivity, and data dependency—it proposes the first three-dimensional classification framework integrating task type, threat vector, and sensing modality. This framework unifies six attack categories: signal spoofing, adversarial perturbations, model poisoning, cross-boundary surveillance, side-channel inference, and semantic privacy leakage. Through cross-layer security analysis, scenario-driven vulnerability testing, and defense efficacy evaluation, the work establishes a structured protection architecture encompassing both active and passive paradigms. The resulting methodology delivers a practical, deployable security assessment framework and hardening guidelines for RF sensing systems, thereby addressing a critical research gap in systematic threat modeling and holistic defense design for RF-based perception.

Technology Category

Application Category

📝 Abstract
Radio Frequency (RF) sensing technologies have experienced significant growth due to the widespread adoption of RF devices and the Internet of Things (IoT). These technologies enable numerous applications across healthcare, smart homes, industrial automation, and human-computer interaction. However, the non-intrusive and ubiquitous nature of RF sensing - combined with its environmental sensitivity and data dependency - makes these systems inherently vulnerable not only as attack targets, but also as powerful attack vectors. This survey presents a comprehensive analysis of RF sensing security, covering both system-level vulnerabilities - such as signal spoofing, adversarial perturbations, and model poisoning - and the misuse of sensing capabilities for attacks like cross-boundary surveillance, side-channel inference, and semantic privacy breaches. We propose unified threat models to structure these attack vectors and further conduct task-specific vulnerability assessments across key RF sensing applications, identifying their unique attack surfaces and risk profiles. In addition, we systematically review defense strategies across system layers and threat-specific scenarios, incorporating both active and passive paradigms to provide a structured and practical view of protection mechanisms. Compared to prior surveys, our work distinguishes itself by offering a multi-dimensional classification framework based on task type, threat vector, and sensing modality, and by providing fine-grained, scenario-driven analysis that bridges theoretical models and real-world implications. This survey aims to serve as a comprehensive reference for researchers and practitioners seeking to understand, evaluate, and secure the evolving landscape of RF sensing technologies.
Problem

Research questions and friction points this paper is trying to address.

Analyzing vulnerabilities in RF sensing systems against malicious attacks
Exploring misuse of RF sensing for surveillance and privacy breaches
Reviewing defense strategies for securing RF sensing technologies
Innovation

Methods, ideas, or system contributions that make the work stand out.

Unified threat models for RF sensing attacks
Task-specific vulnerability assessments in RF applications
Multi-dimensional classification framework for RF security
🔎 Similar Papers
No similar papers found.
M
Mingda Han
School of Computer Science and Technology, Shandong University, Qingdao, China
H
Huanqi Yang
Department of Computer Science, City University of Hong Kong, Hong Kong SAR, China
W
Wenhao Li
School of Computer Science and Technology, Shandong University, Qingdao, China
Weitao Xu
Weitao Xu
Associate Professor at City University of Hong Kong
IoTMobile computingSecurityLPWANLLM
Xiuzhen Cheng
Xiuzhen Cheng
School of Computer Science and Technology, Shandong University
BlockchainIoT SecurityEdge ComputingDistributed Computing
Prasant Mohapatra
Prasant Mohapatra
Professor of Computer Science and Engineering, University of South Florida
Wireless NetworksMobile CommunicationsInternet QoS
P
Pengfei Hu
School of Computer Science and Technology, Shandong University, Qingdao, China