AI-Driven Gesture Recognition using Wi-Fi Signals for Enhancing Women’s Safety

Authors

  • Kartiki Sanjay Repale
  • Gauri Sanjay Chaure
  • Sujit More
  • Harshada M. Raghuwanshi

Keywords:

Artificial Intelligence, Channel State Information (CSI), CNN-LSTM, Deep learning, Gesture recognition, Non-Intrusive Monitoring, Wi-Fi sensing, Women safety

Abstract

Ensuring women’s safety in both private and public environments remains a critical societal concern, particularly in situations where traditional safety mechanisms such as mobile applications, panic buttons, or wearable devices are inaccessible or impractical. This paper presents an AI-driven gesture recognition framework that leverages Wi-Fi Channel State Information (CSI) to detect distress gestures in a non-intrusive, contactless, and privacy-preserving manner. Unlike camera-based surveillance systems, the proposed approach does not capture visual data, thereby avoiding privacy violations and maintaining functionality in low-light or occluded environments. The proposed system exploits the fact that human motion alters the amplitude and phase of Wi-Fi signals propagating through indoor environments. These subtle variations are extracted as CSI features and analyzed using a hybrid deep learning architecture combining Convolutional Neural Networks (CNNs) and Long Short-Term Memory (LSTM) networks. The CNN component captures spatial patterns from CSI spectrograms, while the LSTM models temporal dependencies associated with dynamic gesture movements. This combination enables effective discrimination between distress-related gestures and routine human activities. A custom dataset comprising 2,400 gesture samples was collected in controlled indoor settings under varying distances, obstacles, and non-line-of-sight conditions. Six gesture classes were defined, including distress, panic, cautionary, and neutral gestures. Experimental evaluation demonstrates that the proposed CNN–LSTM model achieves a classification accuracy of 94.2%, outperforming standalone CNN and LSTM models in terms of precision, recall, and F1-score. Robustness analysis further indicates minimal performance degradation in multipath-rich and dynamically changing environments. To enable real-world applicability, the gesture recognition framework is integrated with an IoT-based alert generation module that automatically transmits emergency notifications and location information to predefined contacts upon detecting a distress gesture. The end-to-end system response time remains below 1.5 seconds, making it suitable for real-time deployment. Overall, the study demonstrates the feasibility of Wi-Fi-based AI sensing as a cost-effective, scalable, and privacy-aware solution for women’s safety. The results highlight the potential of leveraging existing wireless infrastructure to provide continuous, unobtrusive protection without relying on user-initiated actions or visual monitoring systems.

References

M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Jul. 2009, doi: https://doi.org/10.1109/cisda.2009.5356528.

N. Moustafa and J. Slay, “UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set),” IEEE Xplore, Nov. 01, 2015. https://ieeexplore.ieee.org/document/7348942

A. L. Buczak and E. Guven, “A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection,” IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153–1176, 2016, doi: https://doi.org/10.1109/comst.2015.2494502.

A. Patcha and J.-M. Park, “An overview of anomaly detection techniques: Existing solutions and latest technological trends,” Computer Networks, vol. 51, no. 12, pp. 3448–3470, Aug. 2007, doi: https://doi.org/10.1016/j.comnet.2007.02.001.

C. Kolias, G. Kambourakis, A. Stavrou, and S. Gritzalis, “Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset,” IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp. 184–208, 2016, doi: https://doi.org/10.1109/comst.2015.2402161.

U. Fiore, F. Palmieri, A. Castiglione, and A. De Santis, “Network anomaly detection with the restricted Boltzmann machine,” Neurocomputing, vol. 122, pp. 13–23, Dec. 2013, doi: https://doi.org/10.1016/j.neucom.2012.11.050.

N. Shone, T. N. Ngoc, V. D. Phai, and Q. Shi, “A Deep Learning Approach to Network Intrusion Detection,” IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 2, no. 1, pp. 41–50, Feb. 2018, doi: https://doi.org/10.1109/tetci.2017.2772792.

A. Javaid, Q. Niyaz, W. Sun, and M. Alam, “A Deep Learning Approach for Network Intrusion Detection System,” Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), 2016, doi: https://doi.org/10.4108/eai.3-12-2015.2262516.

M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, “Network Anomaly Detection: Methods, Systems and Tools,” IEEE Communications Surveys Tutorials, vol. 16, no. 1, pp. 303–336, 2014, doi: https://doi.org/10.1109/SURV.2013.052213.00046.

S. Givnan, C. Chalmers, P. Fergus, S. Ortega-Martorell, and T. Whalley, “Anomaly Detection Using Autoencoder Reconstruction upon Industrial Motors,” Sensors, vol. 22, no. 9, p. 3166, Apr. 2022, doi: https://doi.org/10.3390/s22093166

C. Wang, Y. Sun, W. Wang, H. Liu, and B. Wang, “Hybrid Intrusion Detection System Based on Combination of Random Forest and Autoencoder,” Symmetry, vol. 15, no. 3, p. 568, Mar. 2023, doi: https://doi.org/10.3390/sym15030568

Z. Dai, L. Yee Por, Y.-L. Chen, J. Yang, and C. Soon Ku, “An intrusion detection model to detect zero-day attacks in unseen data using machine learning,” PLoS ONE, vol. 19, no. 9, pp. e0308469–e0308469, Sep. 2024, doi: https://doi.org/10.1371/journal.pone.0308469

S. More, M. Idrissi, and H. Mahmoud, “Enhanced Intrusion Detection Systems Performance with UNSW-NB15 Data Analysis,” Algorithms, vol. 17, no. 2, pp. 64–64, Feb. 2024, doi: https://doi.org/10.3390/a17020064.

S. A. Ajagbe, J. B. Awotunde, and H. Florez, “Intrusion Detection: A Comparison Study of Machine Learning Models Using Unbalanced Dataset,” SN Computer Science, vol. 5, no. 8, Nov. 2024, doi: https://doi.org/10.1007/s42979-024-03369-0.

R. Ghadami, “An intrusion detection system in the Internet of Things with deep learning and an improved arithmetic optimization algorithm (AOA) and sine cosine algorithm (SCA),” Scientific Reports, vol. 15, no. 1, Oct. 2025, doi: https://doi.org/10.1038/s41598-025-22074-3.

M. Rahman, S. A. Shakil, and M. R. Mustakim, “A Survey on Intrusion Detection System in IoT Networks,” Cyber Security and Applications, vol. 222, p. 100082, Dec. 2024, doi: https://doi.org/10.1016/j.csa.2024.100082.

R. Chinnasamy, M. Subramanian, S. V. Easwaramoorthy, and J. Cho, “Deep Learning-driven Methods for Network-based Intrusion Detection Systems: A Systematic Review,” ICT Express, Jan. 2025, doi: https://doi.org/10.1016/j.icte.2025.01.005.

V. Babaey and H. R. Faragardi, “Detecting Zero-Day Web Attacks with an Ensemble of LSTM, GRU, and Stacked Autoencoders,” Computers, vol. 14, no. 6, p. 205, May 2025, doi: https://doi.org/10.3390/computers14060205.

Md. A. Hossain, “Deep learning-based intrusion detection for IoT networks: a scalable and efficient approach,” EURASIP Journal on Information Security, vol. 2025, no. 1, Sep. 2025, doi: https://doi.org/10.1186/s13635-025-00202-w.

A. A. A. Mohammed, “Improving Intrusion Detection Systems by using Deep Learning Methods on Time Series Data,” Engineering, Technology & Applied Science Research, vol. 15, no. 1, pp. 19267–19272, Feb. 2025, doi: https://doi.org/10.48084/etasr.9417.

A. Jain, R. Bagoria, and P. Arora, “An Intelligent Zero-day Attack Detection System using Unsupervised Machine Learning for enhancing Cyber security,” Knowledge-Based Systems, p. 113833, May 2025, doi: https://doi.org/10.1016/j.knosys.2025.113833.

E. C. P. Neto, S. Iqbal, S. Buffett, M. Sultana, and A. Taylor, “Deep learning for intrusion detection in emerging technologies: a comprehensive survey and new perspectives,” Artificial Intelligence Review, vol. 58, no. 11, Aug. 2025, doi: https://doi.org/10.1007/s10462-025-11346-z.

K. Ahi and S. Valizadeh, “Large Language Models (LLMs) and Generative AI in Cybersecurity and Privacy: A Survey of Dual-Use Risks, AI-Generated Malware, Explainability, and Defensive Strategies,” In Proc. Silicon Valley Cybersecurity Conf. (SVCC), pp. 1–8, Jun. 2025, doi: https://doi.org/10.1109/svcc65277.2025.11133642.

N. Sharma, M. Swarnkar, and B. Mondal, “WebWall: Zero-Day Attack Detection in Web Traffic Using Spatial Graph Neural Network,” 2024 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1–6, Dec. 2024, doi: https://doi.org/10.1109/ants63515.2024.10898287.

D. Nevare and S. B. Mane, “Improving Security Detection with Machine Learning: A Scalable Solution for Real-Time Vulnerability Analysis,” 2025 International Conference on Emerging Smart Computing and Informatics (ESCI), pp. 1–5, Mar. 2025, doi: https://doi.org/10.1109/esci63694.2025.10988222.

Published

2026-01-13

Issue

Section

Articles