{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:27:48Z","timestamp":1760059668717,"version":"build-2065373602"},"reference-count":36,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T00:00:00Z","timestamp":1750982400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Australian Research Council (ARC) Discovery Early Career Researcher Award","award":["DE230101391","NI240100147"],"award-info":[{"award-number":["DE230101391","NI240100147"]}]},{"name":"National Intelligence and Security Discovery Research Grant","award":["DE230101391","NI240100147"],"award-info":[{"award-number":["DE230101391","NI240100147"]}]},{"name":"Australian Office of National Intelligence (ONI)","award":["DE230101391","NI240100147"],"award-info":[{"award-number":["DE230101391","NI240100147"]}]},{"name":"Australian Government\u2019s Cooperative Research Centres Programme","award":["DE230101391","NI240100147"],"award-info":[{"award-number":["DE230101391","NI240100147"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The widespread use of WiFi Internet-of-Things (IoT) devices has rendered them valuable tools for detecting information about the physical environment. Recent studies have demonstrated that WiFi Channel State Information (CSI) can detect physical events like movement, occupancy increases, and gestures. This paper empirically investigates the conditions under which WiFi sensing technology remains effective for keystroke detection. To achieve this timely goal of assessing whether it can raise any privacy concerns, experiments are conducted using commodity hardware to predict the accuracy of WiFi CSI in detecting keys pressed on a keyboard. Our novel results show that, in an ideal setting with a robotic arm, the position of a specific key can be predicted with 99% accuracy using a simple machine learning classifier. Furthermore, human finger localisation over a key and actual key-press recognition is also successfully achieved, with 94% and 89% reduced accuracy values, respectively. Moreover, our detailed investigation reveals that to ensure high accuracy, the gap distance between each test object must be substantial, while the size of the test group should be limited. Finally, we show WiFi sensing technology has limitations in small-scale gesture recognition for generic settings where proper device positioning is crucial. Specifically, detecting keyed words achieves an overall accuracy of 94% for the forefinger and 87% for multiple fingers when only the right hand is used. Accuracy drops to 56% when using both hands. We conclude WiFi sensing is effective in controlled indoor environments, but it has limitations due to the device location and the limited granularity of sensing objects.<\/jats:p>","DOI":"10.3390\/fi17070288","type":"journal-article","created":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T11:37:51Z","timestamp":1751283471000},"page":"288","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Empirical Investigation on Practical Robustness of Keystroke Recognition Using WiFi Sensing for Future IoT Applications"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-4847-0476","authenticated-orcid":false,"given":"Haoming","family":"Wang","sequence":"first","affiliation":[{"name":"School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, NSW 2052, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8692-3380","authenticated-orcid":false,"given":"Aryan","family":"Sharma","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, NSW 2052, Australia"},{"name":"Cyber Security Cooperative Research Centre, Kingston, ACT 2600, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3225-6495","authenticated-orcid":false,"given":"Deepak","family":"Mishra","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, NSW 2052, Australia"}]},{"given":"Aruna","family":"Seneviratne","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, NSW 2052, Australia"}]},{"given":"Eliathamby","family":"Ambikairajah","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, NSW 2052, Australia"}]}],"member":"1968","published-online":{"date-parts":[[2025,6,27]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Wang, H., Sharma, A., Mishra, D., Seneviratne, A., and Ambikairajah, E. (2023, January 4\u20138). Keystroke Recognition using WiFi Sensing: An Empirical Study on Robustness. Proceedings of the IEEE Globecom Workshops, Kuala Lumpur, Malaysia.","DOI":"10.1109\/GCWkshps58843.2023.10464769"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"40878","DOI":"10.1109\/ACCESS.2023.3269843","article-title":"Human Sensing by Using Radio Frequency Signals: A Survey on Occupancy and Activity Detection","volume":"11","author":"Shahbazian","year":"2023","journal-title":"IEEE Access"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.comcom.2022.08.004","article-title":"A survey on vital signs monitoring based on Wi-Fi CSI data","volume":"195","author":"Soto","year":"2022","journal-title":"Comput. Commun."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"100703","DOI":"10.1016\/j.patter.2023.100703","article-title":"SenseFi: A library and benchmark on deep-learning-empowered WiFi human sensing","volume":"4","author":"Yang","year":"2023","journal-title":"Patterns"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Nasser, F., Suliman, A., Poon, K., Alteneiji, A., and Ahmad, U. (2024, January 12\u201314). Fall Detection Using Wi-Fi Channel State Information. Proceedings of the 2024 7th International Conference on Signal Processing and Information Security (ICSPIS), Dubai, United Arab Emirates.","DOI":"10.1109\/ICSPIS63676.2024.10812620"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Li, J., Sharma, A., Mishra, D., and Seneviratne, A. (2021, January 7\u201311). Fire Detection Using Commodity WiFi Devices. Proceedings of the IEEE Global Communications Conference (GLOBECOM), Madrid, Spain.","DOI":"10.1109\/GLOBECOM46510.2021.9685183"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Sharma, A., Li, J., Mishra, D., Batista, G., and Seneviratne, A. (2021, January 14\u201323). Passive WiFi CSI Sensing Based Machine Learning Framework for COVID-Safe Occupancy Monitoring. Proceedings of the IEEE International Conference on Communications Workshops (ICC Workshops), Montreal, QC, Canada.","DOI":"10.1109\/ICCWorkshops50388.2021.9473673"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1109\/RBME.2022.3156810","article-title":"Contactless WiFi Sensing and Monitoring for Future Healthcare-Emerging Trends, Challenges, and Opportunities","volume":"16","author":"Ge","year":"2022","journal-title":"IEEE Rev. Biomed. Eng."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3491245","article-title":"Non-invasive Techniques for Monitoring Different Aspects of Sleep: A Comprehensive Review","volume":"3","author":"Hussain","year":"2022","journal-title":"ACM Trans. Comput. Healthc. (HEALTH)"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Li, M., Meng, Y., Liu, J., Zhu, H., Liang, X., Liu, Y., and Ruan, N. (2016, January 24\u201328). When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals. Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria.","DOI":"10.1145\/2976749.2978397"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1175","DOI":"10.1109\/JSAC.2017.2680998","article-title":"Recognizing Keystrokes Using WiFi Devices","volume":"35","author":"Ali","year":"2017","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Dwivedi, A.D., Srivastava, G., Dhar, S., and Singh, R. (2019). A decentralized privacy-preserving healthcare blockchain for IoT. Sensors, 19.","DOI":"10.3390\/s19020326"},{"key":"ref_13","first-page":"1","article-title":"Placement Matters: Understanding the Effects of Device Placement for WiFi Sensing","volume":"6","author":"Wang","year":"2022","journal-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3310194","article-title":"WiFi Sensing with Channel State Information: A Survey","volume":"52","author":"Ma","year":"2019","journal-title":"ACM Comput. Surv."},{"key":"ref_15","first-page":"510","article-title":"CSI-based human sensing using model-based approaches: A survey","volume":"8","author":"Wang","year":"2021","journal-title":"J. Comput. Des. Eng."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Li, P., Cui, H., Khan, A., Raza, U., Piechocki, R., Doufexi, A., and Farnham, T. (2021, January 10\u201315). Wireless Localisation in WiFi using Novel Deep Architectures. Proceedings of the 2020 25th International Conference on Pattern Recognition (ICPR), Milan, Italy.","DOI":"10.1109\/ICPR48806.2021.9412230"},{"key":"ref_17","unstructured":"Wang, H., Zhang, D., Niu, K., Lv, Q., Liu, Y., Wu, D., Gao, R., and Xie, B. (2017). MFDL: A Multicarrier Fresnel Penetration Model based Device-Free Localization System leveraging Commodity Wi-Fi Cards. arXiv."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1380","DOI":"10.1109\/TMC.2018.2860018","article-title":"RoArray: Towards More Robust Indoor Localization Using Sparse Recovery with Commodity WiFi","volume":"18","author":"Gong","year":"2018","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TCOMM.2018.2874941","article-title":"OpArray: Exploiting Array Orientation for Accurate Indoor Localization","volume":"67","author":"Zheng","year":"2018","journal-title":"IEEE Trans. Commun."},{"key":"ref_20","first-page":"163","article-title":"A survey of deep learning approaches for WiFi-based indoor positioning","volume":"6","author":"Feng","year":"2022","journal-title":"J. Inf. Telecommun."},{"key":"ref_21","first-page":"1","article-title":"QGesture: Quantifying Gesture Distance and Direction with WiFi Signals","volume":"2","author":"Yu","year":"2018","journal-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1186\/s13634-016-0383-6","article-title":"Generalized Hampel Filters","volume":"2016","author":"Pearson","year":"2016","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Cheng, L., and Wang, J. (2016;, January 5\u20138). How can I guard my AP? Non-intrusive user identification for mobile devices using WiFi signals. Proceedings of the the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, New York, NY, USA.","DOI":"10.1145\/2942358.2942373"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Ma, Y., Zhou, G., Wang, S., Zhao, H., and Jung, W. (2018). SignFi: Sign Language Recognition Using WiFi. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2.","DOI":"10.1145\/3191755"},{"key":"ref_25","first-page":"8671","article-title":"Widar3.0: Zero-Effort Cross-Domain Gesture Recognition with Wi-Fi","volume":"44","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Hu, J., Wang, H., Zheng, T., Hu, J., Chen, Z., Jiang, H., and Luo, J. (2023, January 26\u201330). Password-stealing without hacking: Wi-Fi enabled practical keystroke eavesdropping. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Copenhagen, Denmark.","DOI":"10.1145\/3576915.3623088"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1093\/comjnl\/bxae087","article-title":"Wi-Crack: A smartphone keystroke recognition system based on multi-dimensional information","volume":"68","author":"Peng","year":"2025","journal-title":"Comput. J."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"101393","DOI":"10.1016\/j.pmcj.2021.101393","article-title":"WiPass: 1D-CNN-based smartphone keystroke recognition using WiFi signals","volume":"73","author":"Shen","year":"2021","journal-title":"Pervasive Mob. Comput."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"155986","DOI":"10.1109\/ACCESS.2019.2949123","article-title":"A Survey on Human Behavior Recognition Using Channel State Information","volume":"7","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Gringoli, F., Schulz, M., Link, J., and Hollick, M. (2019, January 25). Free Your CSI: A Channel State Information Extraction Platform For Modern Wi-Fi Chipsets. Proceedings of the 13th International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization, Los Cabos, Mexico.","DOI":"10.1145\/3349623.3355477"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Guo, R., Li, H., Han, D., and Liu, R. (2023). Feasibility Analysis of Using Channel State Information (CSI) Acquired from Wi-Fi Routers for Construction Worker Fall Detection. Int. J. Environ. Res. Public Health, 20.","DOI":"10.3390\/ijerph20064998"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Wang, W., Liu, A.X., Shahzad, M., Ling, K., and Lu, S. (2015, January 7\u201311). Understanding and Modeling of WiFi Signal Based Human Activity Recognition. Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, Paris, France.","DOI":"10.1145\/2789168.2790093"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42486-020-00027-1","article-title":"Device free human activity and fall recognition using WiFi channel state information (CSI)","volume":"2","author":"Damodaran","year":"2020","journal-title":"CCF Trans. Pervasive Comput. Interact."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Li, J., Mishra, D., and Seneviratne, A. (2020, January 17\u201319). Network traffic classification using wifi sensing. Proceedings of the Symposium on Modelling, Analysis, and Simulation of Computer and Telecommunication Systems, Nice, France.","DOI":"10.1007\/978-3-030-68110-4_3"},{"key":"ref_35","unstructured":"Jang, J.S.R. (2022, December 10). Machine Learning Toolbox. Available online: http:\/\/mirlab.org\/jang\/matlab\/toolbox\/machineLearning\/help\/."},{"key":"ref_36","first-page":"365","article-title":"A statistical sensing method by utilizing Wi-Fi CSI subcarriers: Empirical study and performance enhancement","volume":"2","author":"Deng","year":"2024","journal-title":"J. Inf. Intell."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/7\/288\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:00:20Z","timestamp":1760032820000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/7\/288"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,27]]},"references-count":36,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2025,7]]}},"alternative-id":["fi17070288"],"URL":"https:\/\/doi.org\/10.3390\/fi17070288","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2025,6,27]]}}}