Questions /Wireless security and privacy

Which projects study BLE, WiFi, mmWave, or radar security?

The right project depends on whether the threat is tracking, spoofing, jamming, or hidden physical-layer leakage.

Short answer

Security questions in wireless systems do not all look the same. BLE tracking, mmWave spoofing, radar integrity, and 5G anti-jamming each have different attacker models and system consequences.

The useful way to navigate the area is by threat model first, then by modality. Once you know what the attacker can do, the relevant papers and artifacts become much easier to identify.

What to do next

  • Name the attacker capability before choosing the sensing or wireless modality.
  • Separate eavesdropping, spoofing, jamming, and fingerprinting into different evaluation paths.
  • Use the linked papers to narrow the threat model before building defenses.

When to reach out

Reach out when the security question is tied to a real deployment and the missing step is threat modeling or defensive system design.

Related questions