Questions /Wireless security and privacy
Which projects study BLE, WiFi, mmWave, or radar security?
The right project depends on whether the threat is tracking, spoofing, jamming, or hidden physical-layer leakage.
Short answer
Security questions in wireless systems do not all look the same. BLE tracking, mmWave spoofing, radar integrity, and 5G anti-jamming each have different attacker models and system consequences.
The useful way to navigate the area is by threat model first, then by modality. Once you know what the attacker can do, the relevant papers and artifacts become much easier to identify.
What to do next
- Name the attacker capability before choosing the sensing or wireless modality.
- Separate eavesdropping, spoofing, jamming, and fingerprinting into different evaluation paths.
- Use the linked papers to narrow the threat model before building defenses.
Research areas to open next
Representative papers
Useful tools and datasets
People and group context
When to reach out
Reach out when the security question is tied to a real deployment and the missing step is threat modeling or defensive system design.
Related questions
How can wireless systems be spoofed or tracked?
Wireless systems leak identity and state through signals, timing, metadata, and physical-layer behavior that are often ignored during system design.
What are practical privacy risks in RF sensing?
RF sensing can leak occupancy, identity, movement, and interaction patterns even when it does not produce images.
How do you make mmWave links reliable?
Reliability comes from system design: beams, tracking, redundancy, control, and environment awareness.