Cover
Vol. 1 No. 2 (2025)

Published: December 1, 2025

Pages: 104-113

Original Article

Deep Learning for Enhanced Anomaly Detection in Wireless Communication Networks using Channel State Information (CSI)

Abstract

This research introduces a deep learning-based framework for anomaly detection in wireless communication networks using Channel State Information (CSI)—a fine-grained physical-layer signal that captures wireless channel dynamics. Traditional detection methods often fall short in identifying subtle or evolving threats, whereas CSI provides a rich, underutilized source for context-aware monitoring. Inspired by its use in human activity recognition, we apply and compare deep learning architectures such as Convolutional Neural Networks (CNNs), Long Short-Term Memory (LSTMs), and Transformers to learn normal network behavior and detect anomalies, including spoofing, jamming, rogue access points, environmental disruptions, and Quality of Service (QoS) degradation. The system supports supervised, semi-supervised, and unsupervised settings, accommodating scenarios with limited labeled data. CSI data is collected using tools like the Intel 5300 NIC and Nexmon CSI under both controlled and realistic conditions. We benchmark our models against traditional techniques (e.g., Isolation Forests, Support Vector Machines (SVMs), Principal Component Analysis (PCA)), evaluating accuracy, false positives, latency, and robustness. To enhance transparency, we employ interpretability methods such as Gradient-weighted Class Activation Mapping (Grad-CAM) and t-distributed Stochastic Neighbor Embedding (t-SNE). Experimental results show that deep learning models outperform classical baselines by up to 30% in detection accuracy. The Transformer architecture achieved 96.2% accuracy with a false positive rate of 3.9%, while the CNN-LSTM hybrid achieved the best latency–performance tradeoff (5.1ms inference). Compared to Isolation Forest and One-Class SVM, our framework reduced false positives by over 10–14%.

References

  1. Y. Wang, J. Liu, Y. Chen, M. Gruteser, J. Yang, and H. Liu, "E-eyes: Device-free location-oriented activity identification using fine-grained WiFi signatures”, Proceedings of the 20th annual international conference on Mobile computing and networking 2014, https://doi.org/10.1145/2639108.2639143
  2. M. Kotaru, K. Joshi, D. Bharadia, and S. Katti, "Spotfi: Decimeter level localization using Wi-Fi”, Proceedings of the 2015 ACM conference on special interest group on data communication, 2015, https://doi.org/10.1145/2785956.2787487
  3. F. Wang, J. Han, S. Zhang, X. He, and D. Huang, "Csi-net: Unified human body characterization and pose recognition", arXiv preprint arXiv:1810.03064, vol. 18, no. 11, pp. 2714-2724, 1 Nov. 2019, https://doi.org/10.48550/arXiv.1810.03064
  4. Z. Chen, L. Zhang, C. Jiang, Z. Cao, and W. Cui, "Wi-Fi CSI based passive human activity recognition using attention based BLSTM", IEEE Transactions on Mobile Computing vol.18, no.11, pp. 2714-2724, 2018, https://doi.org/10.1109/TMC.2018.2878233
  5. Z. Chen, C. Cai, T. Zheng, J. Luo, J. Xiong, and X. Wang, "RF-based human activity recognition using signal adapted convolutional neural network", IEEE Transactions on Mobile Computing, vol. 22, no. 1, pp. 487-499, 2021, https://doi.org/10.1109/TMC.2021.3073969
  6. V. Chandola, A. Banerjee, and V. Kumar, "Anomaly detection: A survey”, ACM computing surveys, vol. 41, no. 15, pp. 1-58, 2009, https://doi.org/10.1145/1541880.1541882
  7. M. Ahmed, A. N. Mahmood, and J. Hu, "A survey of network anomaly detection techniques", Journal of Network and Computer Applications, vol. 60, pp. 19-31 2016, https://doi.org/10.1016/j.jnca.2015.11.016
  8. Y. Zhao, Z. Nasrullah, and Z. Li, “Pyod: A python toolbox for scalable outlier detection", Journal of machine learning research, vol. 41, no. 3, 2019, https://www.jmlr.org/papers/v20/19-011.html
  9. W. Wang, A. X. Liu, M. Shahzad, K. Ling, and S. Lu, "Device-free human activity recognition using commercial WiFi devices", IEEE Journal on Selected Areas in Communications, vol. 35, no. 5, pp. 1118-1131, 2017, https://doi.org/10.1109/JSAC.2017.2679658 [10] Y. Zeng, P. H. Pathak, and P. Mohapatra, "WiWho: WiFi-based person identification in smart spaces", ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN). IEEE, pp. 1-12 2016, https://doi.org/10.1109/IPSN.2016.7460727
  10. M. S Aljumaily, and G. A. Al-Suhail. "Towards ubiquitous human gestures recognition using wireless networks", International Journal of Pervasive Computing and Communications, vol.13, no. 4, pp. 408-418, 2017, https://doi.org/10.1108/IJPCC-D-17-00005.
  11. J. Xiao, K. Wu, Y. Yi, and L. M. Ni, "FIFS: Fine-grained indoor fingerprinting system", 2012 21st international conference on computer communications and networks (ICCCN). IEEE, pp. 1-7 2012, https://doi.org/10.1109/ICCCN.2012.6289200
  12. K. Wu, J. Xiao, Y. Yi, D. Chen, X. Luo, and L. M. Ni, "CSI-based indoor localization." IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 7, pp. 1300-1309, 2012, https://doi.org/10.1109/TPDS.2012.214
  13. H. Abdelnasser, M. Youssef, and K. A. Harras, "WiGest: A ubiquitous WiFi-based gesture recognition system", 2015 IEEE conference on computer communications (INFOCOM). IEEE, pp. 1472-1480, 2015, https://doi.org/10.1109/INFOCOM.2015.7218525
  14. L. Xiao, L. Greenstein, N. Mandayam and W. Trappe, "A Physical-Layer Technique to Enhance Authentication for Mobile Terminals," 2008 IEEE International Conference on Communications, Beijing, China, pp. 1520-1524, 2008, doi: 10.1109/ICC.2008.294
  15. F. Elia, "Anomaly detection using WiFi signals of opportunity", 2019 13th International Conference on Signal Processing and Communication Systems (ICSPCS). IEEE, pp. 1-7, 2019, https://doi: 10.1109/ICSPCS47537.2019.9008700
  16. R. Kong, and He Chen. "DeepCRF: Deep learning-enhanced CSI-Based RF fingerprinting for channel-resilient WiFi device identification", IEEE Transactions on Information Forensics and Security (2024), vol. 20, pp. 264-278, 2025, https://doi: 10.1109/TIFS.2024.3515796
  17. W. Wei, "Understanding and modeling of wifi signal based human activity recognition”, Proceedings of the 21st annual international conference on mobile computing and networking, pp. 65 – 76, 2015, https://doi.org/10.1145/2789168.279009
  18. N. Dash, S. Chakravarty, A. Rath, "An optimized LSTM-based deep learning model for anomaly network intrusion detection", Scientific Reports 15.1 https://doi.org/10.1038/s41598-025-85248-z
  19. Z. Tianyu, F. Li, and P. Tian. "A deep-learning method for device activity detection in mMTC under imperfect CSI based on variational-autoencoder", IEEE Transactions on Vehicular Technology 69.7 (2020): 7981-7986. vol. 69, no. 7, pp. 7981-7986, July 2020, https://doi: 10.1109/TVT.2020.2992080
  20. L. Hyeon-Ju, and S. Buu. "Wi-Fi-enabled Vision via Spatially-variant Pose Estimation based on Convolutional Transformer Network", IEEE Access vol. 13, pp. 84855-84869, 2025, https://doi: 10.1109/ACCESS.2025.3568505
  21. D. Halperin, W. Hu, A. Sheth, D. Wetherall, "Tool release: Gathering 802.11 n traces with channel state information”, ACM SIGCOMM computer communication review, vol. 41, no. 1, 2011, https://doi.org/10.1145/1925861.192587
  22. F. Gringoli, M. Schulz, J. Link, M. Hollick. "Free your CSI: A channel state information extraction platform for modern Wi-Fi chipsets", Proceedings of the 13th International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization. 2019, https://doi.org/10.1145/3349623.3355477
  23. M. Shervin. "A Domain Adaptation Framework for Human Activity Monitoring Using Passive Wi-Fi Sensing", 2023 IEEE 5th International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA). IEEE, 2023, https://doi: 10.1109/ICCCMLA58983.2023.10346849
  24. L. Tony, K. Ting and Z. Zhou. "2008 eighth ieee international conference on data mining", 2008 Eighth IEEE International Conference on Data Mining, Dec, 2008, https://doi.org/10.1109/icdm14818.2008
  25. H. Muhammad “Domain adaptation for cross-domain alignment in human activity recognition using device-free sensing”, Diss. The University of St Andrews, 2025, https://doi.org/10.17630/sta/1348
  26. A. Fadhil, N. Din, N. Aripin., and A. Abed, “Secure AODV routing strategies in smart cities for vehicular communication”, Journal Européen des Systèmes Automatisés, vol. 57, no. 3, pp. 861-867, 2024, https://doi.org/10.18280/jesa.570325
  27. Z. Aziz and A. Abed, “Harnessing Large Language Models for Enhanced Cybersecurity: A Review of Their Role in Defending Against APT and Cyber Attacks”, International Journal of Mechatronics, Robotics, and Artificial Intelligence (IJMRAI), vol. 1, issue 1, pp. 54-62, June 2025, https://doi.org 10.33971/ijmrai.1.1.8