The diverse requirements of next-generation communication systems necessitate awareness, flexibility, and intelligence as essential building blocks of future wireless networks. The awareness can be obtained from the radio signals in the environment using wireless sensing and radio environment mapping (REM) methods. This is, however, accompanied by threats such as eavesdropping, manipulation, and disruption posed by malicious attackers. To this end, this work analyzes the wireless sensing and radio environment awareness mechanisms, highlighting their vulnerabilities and provides solutions for mitigating them. As an example, the different threats to REM and its consequences in a vehicular communication scenario are described. Furthermore, the use of REM for securing communications is discussed and future directions regarding sensing/REM security are highlighted.INDEX TERMS 5G, 6G, cryptography, joint radar and communication (JRC), physical layer security, radio environment mapping (REM), REM security, sensing security, vehicle-to-everything (V2X) communication, wireless sensing, WLAN sensing.As explained earlier, our surroundings contain a myriad of radio signals. These signals can be leveraged to extract information about the environment itself and the users/devices within. As such, a malicious node might have the following motivations when attacking a (communication and/or sensing) wireless network:• Confidentiality Violation: The malicious node tries to intercept either the communication or characteristics of the legitimate nodes. In the context of sensing, this information may include a user's location, mobility pattern, social trends, etc. • Degradation: The malicious node attempts to impair the communication link and/or sensing capabilities of the legitimate parties. • Exploitation: The malicious node tries to exploit the communication and/or sensing for its own benefit. This may include learning and then manipulating the legitimate communication (or sensing) to acquire resources for itself.Corresponding to the aforementioned intentions of the malicious attackers, the network strives to guarantee that its nodes and users are protected. This includes ensuring no illegitimate access to the information/transmission is allowed, the data shared between legitimate nodes is accurate, and there is no disruption of the services offered by the network [16].
B. SECURITY THREATS -COMMUNICATION VS SENSINGThe broadcast nature of wireless communication (or signals in general) renders it susceptible to various security threats. Given below is an overview of how these threats compare for communication and sensing aspects.