Professional Documents
Culture Documents
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2756689, IEEE Internet of
Things Journal
1
2327-4662 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2756689, IEEE Internet of
Things Journal
2
In this paper, we consider the use passive sniffing of WiFi node. It is demonstrated using simulations and real data
probe requests for occupancy monitoring and tracking in smart that the proposed technique achieves better accuracy.
buildings as illustrated in Fig. 1. Probe requests are signals that • We conduct simulations with realistic WiFi channel
are continuously broadcast from devices with WiFi technology, models to show the occupancy detection performance
such as smartphones, laptops, and tablets [11]–[15]. The probe of our proposed framework. We also show the accuracy
requests are not encrypted, and can be captured and decoded of our approach using real world data, by carrying out
with the help of passive sniffers as shown in Fig. 1(a), an experiment with WiFi-PAs as probe request sniffers
without connecting to a particular network. Probe requests for hourly occupancy tracking of a university building
are also burst in nature, since they are broadcasted in the in a typical day. Proposed method achieves up to 90%
air in search of WiFi networks to get connected, to get a occupancy detection performance in zone-level tracking.
list of available networks, or to handover between WiFi APs. This paper is organized as follows. In Section II, a brief
Frequent transmission of probe requests from mobile devices overview of the existing literature related to the tracking
introduces an opportunity to track the occupancy count in techniques is presented. Models for the tracking algorithm
different zones of a building by simply monitoring the probe are explained in Section III. Localization and initialization
requests (see Fig. 1(b)). In particular, we can capture the for user tracking using probe request data are presented in
received signal strength (RSS) of probe requests using sniffers Section IV, while tracking with the IMM filters and zone-level
such as WiFi Pineapple (WiFi-PA) [16], which can then be occupancy counting are provided in Section V. Subsequently,
used for occupancy monitoring inside the building. gathering of probe requests is explained in Section VI in
To the best knowledge of the authors, there are no detailed detail. Simulation and experimental results are presented
studies in the literature that report efficiency of occupancy in Section VII, and finally, concluding remarks and future
counting using WiFi probe requests using varying number prospects are summarized in Section VIII.
of reference nodes to track individual devices. In this paper,
we use WiFi probe requests captured at various reference
locations for occupancy monitoring in smart buildings as II. L ITERATURE R EVIEW
summarized in Fig. 1. To this end, seven WiFi-PAs are Use of probe requests have recently received interest from
deployed at various locations within the FIU Engineering researchers for various applications. For example, they are
Center, and probe requests are collected over multiple days. used for load balancing in wireless networks to find hidden and
The burst and intermittent nature of probe requests require mobile nodes in [17], and to analyze the handover processes
post processing of the data to make it ready for the localization of 802.11 network in [18]. A WiFi flood attack detection
and tracking. Subsequently, at every sampling window, various system, which is a method based on the probe request and
localization techniques are used to obtain location estimates probe response timeouts, is proposed in [19]. Privacy issues
of each WiFi device, which are further refined using an with probe requests are evaluated in [20], where authors utilize
Interacting Multiple Model (IMM) filter for tracking user probe requests to link the devices by creating a table for the
location. Position estimates are then aggregated into one of requested WiFi network names and comparing them with the
the eight occupancy zones inside the building for real-time other devices.
occupancy counting. Although RSS-based tracking with Kalman filters (KF) is a
The main novel contributions of this paper can be well-established area, it is still an interesting research topic due
summarized as follows to its various new applications for accurate localization [21],
• We propose an adaptive occupancy counting and tracking [22]. In [23] two-slope RSS model is used with two Extended
algorithm considering: 1) burst and intermittent signal Kalman filters (EKF) considering an IMM framework to
strength measurements from the target node; and 2) improve tracking accuracy. In [24], the authors present a novel
a time-varying number of positioning reference nodes exponential-Rayleigh RSS model for device-free localization
(sniffers) during location tracking, as typical for WiFi and tracking with KF, where the main contribution is to
devices that broadcast probe requests. To authors’ best include multipath components in RSS model for improving
knowledge, and somewhat surprisingly, there is no similar localization and tracking accuracy. The accuracy is shown to
study in the literature considering both conditions. increase significantly compared to the standard RSS model.
• In our experiments, we observe that 47.3% of the time, In [25], the RSS variance problem in tracking due to the
probe requests are detected by a single reference node hardware differences, device placement, and environmental
whereas 36.9% of them are received by two reference changes are studied, and a particle filter based solution is
nodes. Thus, including such cases is crucial for robustly proposed. The results show that the tracking accuracy is more
estimating occupancy count in building zones. We hence robust against the RSS variance when the accelerometer and
develop estimators and heuristic methods to localize and digital compass readings are included in system. In [26], a
track a target node even when the measurements are novel approach based on compressive sensing is used for
available from only one or two reference nodes. the localization and tracking of WiFi devices. In particular,
• The performance of the proposed approach is compared coarse estimates of RSS fingerprinting are improved by the
with 1) no Bayesian filtering, and 2) traditional unscented compressive sensing techniques, and KF with map information
Kalman filtering (UKF) based methods, both of which is used to track the devices. A scaled UKF approach is
require at least three reference nodes to localize a target proposed to overcome the limitations of traditional KF and
2327-4662 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2756689, IEEE Internet of
Things Journal
3
2327-4662 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2756689, IEEE Internet of
Things Journal
4
2327-4662 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2756689, IEEE Internet of
Things Journal
5
reference node and the target node (dˆi,k ) based on the RSS matrices are defined and given explicitly for three different
measurements is given as availability level of a priori information below (i.e., estimated
P0 −pi,k or unknown P0 and n).
dˆi,k = 10 10n . (6) a) Unknown P0 (v = 1): In the case of unknown P0 and
In other words, as shown in Fig. 4(c), the target node is x0k with knowledge of n, at least three reference nodes are
assumed to be on the straight line that passes through the required to estimate P0 . If the number of the reference nodes
locations of the two reference nodes, and positioned on the are less than three, approaches introduced in Section IV-A are
line depending on the RSS measurements at each node. used. The optimization problem given in (10) for this case is
written as
Third, consider that at sampling windows k, RSS
measurements are available at three or more reference nodes λ1 −2λ1 a1 −1 T
(|Pk | ≥ 3). Then, we consider a linear least squares (LLS) Z1 , ...
.. .. , f , − 1 0 0 0 ,
. . 1
2
solution as a low computational complexity method [31],
λN −2λN aN −1
[32] that has acceptable localization performance as shown
b1 , − λ1 ka1 k2 , · · · , −λN
aN k2 ]T , D 1 , diag(0, 1, 1, 0),
in Fig. 4(e). The location of the target device can be obtained
by solving the LLS problem in the form Mxk = b with where λi , 10pi /(5n) and α = 10P0 /(5n) , and solution for
1 PN 1 PN minimization problem is defined as y 1 , kx0k k2 x0T
k α .
x1 − i=1 xi y1 − i=1 yi
N N b) Unknown n (v = 2): In the case of unknown n and
M = .. .. x0k with knowledge of P0 , optimization matrices and vectors
, (7)
. .
1 PN 1 PN
become
xN − xi yN − yi
N i=1 N i=1
1 −2a1 q1 ln q1 T
1 PN 2 1 PN 2 .. . . 1
(x21 − xi ) + (y12 − y ) Z2 , . . . , f2 , − 0 0 0 ,
N i=1
N i=1 i . . 2
1 N 1 −2aN qN ln qN
−(dˆ21,k − ˆ2
P
i=1 di,k )
N T
b2 , q1 − ka1 k2 , · · · , qN − kaN k2 , D 2 , diag(0, 1, 1, 0),
1 ..
b= .
, (8)
2
(x2 − 1 P N 2 2 1 P N
2 where qi , 10(P0 −pi,k )/(5n0 ) and n0 is the tuning parameter
N i=1 xi ) + (yN − i=1 yi ) of the algorithm for n. The final solution of the optimization
N N
1 PN ˆ2
(n−n0 )
−(dˆ2N,k − d ) is defined as y 2 , kx0k k x0T k δ where δ , n0 shows
N i=1 i,k the suitability of the tuning parameter.
where M and b are defined with the known position of the c) Unknown P0 and n (v = 3): In the worst case, which
reference nodes (xi , yi ) and ranging information for reference there is no prior information on the parameters, we have to
nodes using (6). The solution to the LLS problem can then be estimate both the location of the target nodes and channel
found by solving for x0 k , as follows parameters with below matrices and vectors
x̂0 k = (MT M)−1 MT b.
(9) 1 −2a1 −g1 g1 ln g1
Z3 , ... .. .. ..
,
. . .
B. RSS Available at Four or More Reference Nodes 1 −2aN −gN
gN ln gN
T
Consider now that the RSS information is available at b3 , − ka1 k , · · · , −kaN k2 ,
2
least at four reference nodes, i.e., |Pk | ≥ 4. Then, adapting T
[33], a nonlinear least squares algorithm is used to solve 1
f 3 , − 0 0 0 0 , D 3 , diag(0, 1, 1, 0, 0),
the localization problem with unknown parameters. The 2
optimization problem is based on the relaxation of a maximum ¯
where gi , 10(P0 −pi,k )/(5n0 ) and P¯0 is the tuning parameter
likelihood estimator with Taylor expansions of RSS defined for P0 . Solution for the corresponding
in (2), around assumed values of unknown parameters [33]. NLS to a generalT trust
region problem is defined as y3 , kx0k k2 x0T k γ γδ where
The general optimization problem is defined as a special type (P0 −P¯0 )/(5n)
γ , 10 is a measure on P0 tuning parameter
of quadratic problem, general trust region problem, given as
suitability. The IMM based tracking takes the localization
follows
estimates as an input, which is explained in the following
minimize kZv y v − bv k2 (10) section in details.
yv
2327-4662 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2756689, IEEE Internet of
Things Journal
6
requests are transmitted by the mobile device, they may not vector and the estimated covariance matrix of the state in
always be captured at the reference node. Therefore, using sampling window k −1. Mean and covariance of states consist
a standard Kalman filtering technique (see e.g. [34], [35]) of position and velocity information of the target device.
that assumes uniform set of system parameters will not work b) Update:
effectively. Considering varying system properties such as the
number of the available measurements and prior information vk = yk − Hk m−
k , (16)
related to the target node, we consider an IMM framework Sk = Hk U− T
k Hk + Rk , (17)
that employs multiple, interacting Kalman filters in this study. Kk = U− T −1
k Hk Sk , (18)
The overall model [36] is represented with a linear system as
mk = m−
k + Kk vk , (19)
follows
−
Uk = Uk − Kk Sk KTk , (20)
xk = Ajk−1 xk−1 + qjk−1 , (11)
where vk and Sk are the measurement residual and
yk = Hjk xk + rjk , (12)
measurement prediction covariance on state for sampling
where xk ∈ Rn is the state of the system during window k, respectively. Kalman gain Kk is the tuning
sampling window k, Ajk−1 is the transition matrix for the parameter, which adjusts prediction’s correction for
model order j, where the model order depends on the sampling window k. Estimated mean and covariance of
number of available reference nodes (see Table I). which is the state at sampling window k with the measurements are
in effect during the sampling windows k − 1, and qjk−1 ∼ represented with mk and Uk , respectively.
N (0, Qjk−1 ) is the process noise which is Gaussian distributed
with zero mean and covariance Qjk−1 for the jth model. B. Unscented Kalman Filter
The measurement on the sampling window k is denoted by
Due to the nonlinear nature of the dynamic systems, the
yk ∈ Rm , where Hjk is the jth measurement model matrix,
traditional KF approach is ineffective for the considered
and rjk ∼ N (0, Rjk ) is the measurement noise on the step
problem. The EKF and UKF are used to estimate the nonlinear
k for jth model with Gaussian distribution of mean zero
dynamic systems by forming Gaussian approximations to the
and covariance Rjk . As explained earlier, each model in the
joint distribution of the state xk and the measurement yk .
system has its own Kalman filter parameters, and the resulting
The UKF is based on unscented transformation (UT) of the
estimate is calculated with the selection of the correct model
joint distribution of state xk and measurement yk . The UT
based on the status of the system such as |Pk | and prior
is a nonlinear approximation of a probability distribution
information of channel parameters.
considering a finite set of statistics such as sigma points
A standard Wiener process velocity model is used for all
that are chosen deterministically to capture the exact desired
of the models, with varying measurement noise (rjk ) and step
moments of xk [36]. The moments of the transformed variable
sizes based on sampling window length (∆tk = T ). Defining
are estimated by a nonlinear function g where sigma points
matrices of the models are given as
are input values. Since the UT captures higher order moments
1 0 ∆tk 0 of the states and the measurement better than the Taylor
0 1 0 ∆tk 1 0 0 0 series approximation, the UKF has a better performance
Ajk =
0 0
, Hj =
k . (13)
1 0 0 1 0 0 compared to EKF when nonlinearity is higher. In addition
0 0 0 1 to the performance, UKF does not require the Jacobian and
Hessian matrices as required in EKF. Thus, it has lower
A. Review of a Generic Kalman Filter computational complexity and easier implementation which
Kalman filtering, in general, has two steps: 1) prediction are critical for IoT applications.
and 2) update. In the prediction step, next state of the system In [27], the authors propose a scaled version of the
is predicted with the given previous measurements, and in UKF with WiFi RSSI measurements in which distance
the update step, the current state of the system is estimated measurements based on RSSI are related to the position
with the given measurement at that sampling window [36]. In of the target using a nonlinear dynamic state space model.
below, first the general procedure for the prediction and update Implementation details of the UKF are given in [27]. The
stages are mathematically summarized (model index j will be most distinctive difference with [27] and our work is the
dropped for brevity), and we will subsequently discuss how requirement on the number of reference nodes. In [27], the
Kalman filters with multiple models can be utilized for our system requires at least three reference nodes to work properly,
scenario. whereas in our proposed model any number of references
a) Prediction: nodes can be used for localization/tracking. This is a very
critical condition for occupancy counting as shown in the
m−
k = Ak−1 mk−1 , (14) numerical results section.
U−
k = Ak−1 Uk−1 ATk−1 + Qk−1 , (15)
where m− − C. IMM Based Kalman Tracking of Target Location
k and Uk are the predicted mean vector and the
predicted covariance matrix of the state in sampling window k, Section V-A summarized the model for a generic Kalman
respectively, while mk−1 and Uk−1 are the estimated mean filter while Section V-B briefly reviewed the UKF approach
2327-4662 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2756689, IEEE Internet of
Things Journal
7
2327-4662 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2756689, IEEE Internet of
Things Journal
8
70
Reference Nodes
60 Estimated Positions
Real Path
50 Estimated Path
Y-axis (m)
Fig. 6: Distribution of passing-by, static and tracked devices
40
by number of probe requests.
30
occupancy zones in the area of interest. The IMM filtering
results lead to mapping of the each target node to a zone which 20
is created as illustrated in Fig. 1. Sum of the individual target
nodes in a zone gives the occupancy count of that zone. In 10
this case, there might be a problem when a user switches the
device’s screen off since probe requests may not be sent for 0
0 20 40 60 80 100
300 seconds to 600 seconds [37]. Thus, this interval should be
considered as a grace period for that individual device, and the X-axis (m)
user should be kept within the occupancy count for that zone, Fig. 7: A sample simulation for a given map (Fig. 5).
until the time threshold expires. In our occupancy counting
model, we consider the grace period to be 300 seconds, after 33, 847 unique and legitimate MAC addresses are detected
which we remove a user from the building zone which has within a period of one week.
been last localized. Since probe requests are only used to discover APs, they are
burst and intermittent as shown in Fig. 3. After connecting to a
network, probe requests are rarely sent to search for a network
VI. S NIFFING P ROBE R EQUESTS
with better quality or handover possibilities. Therefore, they
In the experiments, seven different WiFi-PA equipment are could be sent 50 times within a minute (i.e., burst), or do not
deployed at various locations on the floor of a university trigger for 5 to 10 minutes (i.e., intermittent). This depends
campus building as in Fig. 5. The data captured at WiFi-PA on the implementation of the IEEE 802.11 protocol at the
include absolute time stamp providing the time at which the device in terms of both the design of hardware and software.
data was captured, MAC address of the WiFi device, and the Due to the mobility, WiFi device needs to send probe requests
RSS of the WiFi device. Gathered data is transferred to a more frequently since it causes to lose connectivity with the
server for execution of the occupancy counting. AP, or degrade the quality of the connection. Therefore, probe
Probe request mechanism is explained in [18]. Probe requests can effectively facilitate localization and tracking of
requests, which are sent by WiFi devices to scan WiFi APs the WiFi devices.
at certain channels, are active mechanisms to discover APs
around the mobile device. APs respond with probe responses VII. N UMERICAL R ESULTS
and beacons. A problem with probe requests is passing-by
In this section, we will first investigate the performance
and static devices. For instance, there might be people outside
of the proposed framework with computer simulations using
of the building passing by a WiFi device and it still can be
realistic WiFi signal propagation data. Subsequently, we will
detected by the reference nodes which are close to the border.
present our experimental results and occupancy counting based
Such devices usually send a few low power probe requests
on the measurement data that has been collected at FIU
while in the vicinity of the reference node. Static devices
College of Engineering and Computing building.
(such as wireless printers) send thousands of probe requests
with the same RSS value usually periodically. Passing-by and
static devices are removed from the occupancy count in our A. Simulation Results
analysis using outlier detection and filtering techniques. Our The proposed framework is simulated considering an indoor
experimental results indicate that only 40% of the detected environment with propagation parameters and indoor channel
devices are in our region of interest as shown in Fig. 6. In total, characteristics summarized in Table II. In our simulations, we
2327-4662 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2756689, IEEE Internet of
Things Journal
9
M-2 M-1
IMM
M-3 M-3
M-1 Estimator M-2
only
Estimator
UKF
only
UKF
IMM
Fig. 8: CDF of mean tracking RMSE for the simulation. Fig. 9: Performance of zone-level tracking for simulation.
2327-4662 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2756689, IEEE Internet of
Things Journal
10
22
Zone-A
5
10 10.5 11 11.5 12 12.5 13 13.5 14
Time of day (hours)
Fig. 11: Total number of occupants on a weekday for
22
sample-and-hold window lengths L = 1 and L = 10. Scenario
Zone-E
2327-4662 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2756689, IEEE Internet of
Things Journal
11
Zone-H ACKNOWLEDGEMENTS
15 (Study
Areas) We would like to thank Edwin Vattapparamban for
helping in probe request data collection within Florida
10 International University, and Yusuf Said Eroglu for reviewing
the manuscript and providing feedback.
Zone-G
5 (Office
Spaces) R EFERENCES
0 [1] V. Erickson, S. Achleitner, and A. Cerpa, “POEM: power-efficient
0 4 8 12 16 20 24 occupancy-based energy management system,” in Proc. IEEE
Information Processing in Sensor Networks (IPSN), Apr 2013,
Time of day (hours) pp. 203–216.
[2] A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, “Internet
Fig. 13: Total number of occupants within the individual zones of Things for smart cities,” IEEE Internet of Things J., vol. 1, no. 1, pp.
C, G, and H given in Fig. 5 throughout a weekday. 22–32, Feb. 2014.
[3] J. Jin, J. Gubbi, S. Marusic, and M. Palaniswami, “An information
14 framework for creating a smart city through Internet of Things,” IEEE
Internet of Things J., vol. 1, no. 2, pp. 112–121, Apr. 2014.
[4] P. Vlacheas, R. Giaffreda, V. Stavroulaki, D. Kelaidonis, V. Foteinos,
12 G. Poulios, P. Demestichas, A. Somov, A. Biswas, and K. Moessner,
“Enabling smart cities through a cognitive management framework for
% of occupants
10 the Internet of Things,” IEEE Commun. Mag., vol. 51, no. 6, pp.
102–111, June 2013.
8 [5] K. Pahlavan, P. Krishnamurthy, and Y. Geng, “Localization challenges
for the emergence of the smart world,” IEEE Access, vol. 3, pp.
3058–3067, 2015.
6 [6] G. Pan, G. Qi, W. Zhang, S. Li, Z. Wu, and L. Yang, “Trace analysis
and mining for smart cities: issues, methods, and applications,” IEEE
4 Commun. Mag., vol. 51, no. 6, pp. 120–126, June 2013.
[7] S. Tadokoro, Q. shan Jia, Q. Zhao, H. Darabi, G. Huang,
2 B. Becerik-Gerber, H. Sandberg, and K. Johansson, “Smart building
technology,” IEEE Robotics Automation Mag., vol. 21, no. 2, pp. 18–20,
June 2014.
0 [8] Y. Agarwal, B. Balaji, R. Gupta, J. Lyles, M. Wei, and T. Weng,
0 2 4 6 8 10 12 14 16 18 20 22 24 “Occupancy-driven energy management for smart building automation,”
Occupancy duration (hours) in Proc. ACM Workshop on Embedded Sensing Systems for
Energy-Efficiency in Building, 2010, pp. 1–6.
Fig. 14: The distribution of the occupancy hours for the [9] K. Akkaya, I. Guvenc, R. Aygun, N. Pala, and A. Kadri, “IoT-based
individual occupants. occupancy monitoring techniques for energy-efficient smart buildings,”
in Proc. IEEE Wireless Commun. Networking Conference Workshops
(WCNCW), Mar. 2015, pp. 58–63.
spend 2 to 3 hours in the building, whereas the people [10] B. Balaji, J. Xu, A. Nwokafor, R. Gupta, and Y. Agarwal, “Sentinel:
spending less than 1 hour is less than 1%. More than half Occupancy based HVAC actuation using existing WiFi infrastructure
of the occupants spend less than 6 hours in the building, with within commercial buildings,” in Proc. ACM Conf. on Embedded
Networked Sensor Systems, 2013, pp. 17:1–17:14. [Online]. Available:
13% of them spending 3 to 4 hours. http://doi.acm.org/10.1145/2517351.2517370
[11] E. Vattapparamban, B. S. Ciftler, I. Guvenc, K. Akkaya, and A. Kadri,
“Indoor occupancy tracking in smart buildings using passive sniffing
VIII. C ONCLUSION of probe requests,” in Proc. IEEE International Conference on
Communications Workshops (ICC), May 2016, pp. 38–44.
In this paper, we propose a new framework for real-time [12] L. Demir, “Wi-Fi tracking: what about privacy,” Ph.D. dissertation, M2
occupancy counting of buildings by passively sniffing WiFi SCCI Security, Cryptology and Coding of Information-UFR IMAG,
probe requests. We first differentiate the static and passing-by 2013.
[13] J. Freudiger, “How talkative is your mobile device?: An experimental
devices in the building using probe request statistics, and study of Wi-Fi probe requests,” in Proc. ACM Conf. Security and
then use the information for the remaining users inside the Privacy in Wireless and Mobile Networks, New York, NY, USA, 2015,
building for localization, tracking, and occupancy counting. pp. 8:1–8:6. [Online]. Available: http://doi.acm.org/10.1145/2766498.
2766517
The proposed method assures the utilization of the probe [14] A. B. M. Musa and J. Eriksson, “Tracking unmodified smartphones
requests regardless of the number of the available reference using Wi-fi monitors,” in Proc. ACM Conf. Embedded Network Sensor
nodes that they are detected, which allows to detect three times Systems, ser. SenSys ’12. New York, NY, USA: ACM, 2012,
pp. 281–294. [Online]. Available: http://doi.acm.org/10.1145/2426656.
more users in the occupancy counting process when compared 2426685
to requiring at at least three reference nodes for localization [15] D. Namiot and M. Sneps-Sneppe, “On the analysis of statistics of mobile
and tracking with UKF. In our experimental results, we are visitors,” Automatic Control and Computer Sciences, vol. 48, no. 3, pp.
150–158, 2014.
able to perform zone-level occupancy tracking with up to [16] Hak5. (2013) Wi-Fi Pineapple Mark V. [Online]. Available: http:
90% accuracy. We are also able to determine the peak hours //hakshop.myshopify.com/products/wifi-pineapple
2327-4662 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2756689, IEEE Internet of
Things Journal
12
[17] J. Ryou, B. Lee, C. Yu, M. Kim, S.-J. Hyun, S.-M. Park, and W.-T.
Kim, “Probe request based load balancing metric with timely handoffs
for wlans,” in Proc. IEEE Int. Conf. Inf. Commun. Tech. Convergence
(ICTC), Nov 2010, pp. 346–351.
[18] A. Mishra, M. Shin, and W. Arbaugh, “An empirical analysis of the
ieee 802.11 mac layer handoff process,” SIGCOMM Comput. Commun.
Rev., vol. 33, no. 2, pp. 93–102, Apr. 2003. [Online]. Available:
http://doi.acm.org/10.1145/956981.956990
[19] J. Millikenl, V. Selis, K. M. Yap, and A. Marshall, “The effect of
probe interval estimation on attack detection performance of a WLAN
independent intrusion detection system,” in Proc. IET Int. Conf. Wireless
Commun. Appl. (ICWCA), Oct 2012, pp. 1–6.
[20] M. Cunche, M. A. Kaafar, and R. Boreli, “I know who you will meet this
evening! linking wireless devices using Wi-Fi probe requests,” in Proc.
IEEE Int. Symp. World of Wireless, Mobile and Multimedia Networks
(WoWMoM), June 2012, pp. 1–9.
[21] F. Zampella, A. R. J. Ruiz, and F. S. Granja, “Indoor positioning using
efficient map matching, RSS measurements, and an improved motion
model,” IEEE Trans. Veh. Technol., vol. 64, no. 4, pp. 1304–1317, April
2015.
[22] D. Dardari, P. Closas, and P. M. Djuri, “Indoor tracking: Theory,
methods, and technologies,” IEEE Trans. Veh. Technol., vol. 64, no. 4,
pp. 1263–1278, April 2015.
[23] J. Castro-Arvizu, J. Vila-Valls, P. Closas, and J. Fernandez-Rubio,
“Simultaneous tracking and RSS model calibration by robust filtering,”
in Proc. of Asilomar Conf. on Signals, Syst. and Comp., Nov. 2014, pp.
706–710.
[24] Y. Guo, K. Huang, N. Jiang, X. Guo, Y. Li, and G. Wang, “An
exponential-Rayleigh model for RSS-based device-free localization and
tracking,” IEEE Trans. Mobile Computing, vol. 14, no. 3, pp. 484–494,
March 2015.
[25] Y. Kim, H. Shin, and H. Cha, “Smartphone-based Wi-Fi
pedestrian-tracking system tolerating the RSS variance problem,”
in Proc. IEEE Int. Conf. Pervasive Computing and Communications
(PerCom), March 2012, pp. 11–19.
[26] A. W. S. Au, C. Feng, S. Valaee, S. Reyes, S. Sorour, S. N. Markowitz,
D. Gold, K. Gordon, and M. Eizenman, “Indoor tracking and navigation
using received signal strength and compressive sensing on a mobile
device,” IEEE Trans. Mobile Comp., vol. 12, no. 10, pp. 2050–2062,
Oct 2013.
[27] L. Khalil and P. Jung, “Scaled unscented Kalman filter for RSSI-based
indoor positioning and tracking,” in IEEE Int. Conf. on Next Gen. Mob.
App., Serv. and Tech., Sept. 2015, pp. 132–137.
[28] M. R. Gholami, S. Gezici, and E. G. Strom, “Improved position
estimation using hybrid TW-TOA and TDOA in cooperative networks,”
IEEE Trans. Sig. Processing, vol. 60, no. 7, pp. 3770–3785, July 2012.
[29] B. J. Dil and P. J. M. Havinga, “RSS-based self-adaptive localization
in dynamic environments,” in Proc. IEEE Int. Conf. Internet of Things,
Oct. 2012, pp. 55–62.
[30] A. Bose and C. H. Foh, “A practical path loss model for indoor WiFi
positioning enhancement,” in Proc. 6th International Conference on
Information, Communications Signal Processing, Dec 2007, pp. 1–5.
[31] I. Guvenc, S. Gezici, and Z. Sahinoglu, “Fundamental limits
and improved algorithms for linear least-squares wireless position
estimation,” Wireless Communications and Mobile Computing, vol. 12,
no. 12, pp. 1037–1052, 2012.
[32] I. Guvenc and C.-C. Chong, “A survey on TOA based wireless
localization and NLOS mitigation techniques,” IEEE Commun. Surveys
Tuts., vol. 11, no. 3, 2009.
[33] M. R. Gholami, R. M. Vaghefi, and E. G. Strom, “RSS-based sensor
localization in the presence of unknown channel parameters,” IEEE
Trans. Signal Process., vol. 61, no. 15, pp. 3752–3759, Aug 2013.
[34] I. Guvenc, C. T. Abdallah, R. Jordan, and O. Dedeoglu, “Enhancements
to RSS based indoor tracking systems using Kalman filters,” in Proc.
GSPx & International Signal Processing Conference, 2003, pp. 91–102.
[35] J. Yim, C. Park, J. Joo, and S. Jeong, “Extended Kalman filter for
wireless LAN based indoor positioning,” Decision support systems,
vol. 45, no. 4, pp. 960–971, 2008.
[36] J. Hartikainen, A. Solin, and S. Särkkä, “Optimal filtering with Kalman
filters and smoothers,” Department of Biomedica Engineering and
Computational Sciences, Aalto University School of Science: Greater
Helsinki, Finland, vol. 16, 2011.
[37] L. Demir, “Wi-Fi tracking: what about privacy,” Mobile Computing,
2013. [Online]. Available: https://hal.inria.fr/hal-00859013
2327-4662 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.