[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1860093.1860104acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
research-article

Detecting intra-room mobility with signal strength descriptors

Published: 20 September 2010 Publication History

Abstract

We explore the problem of detecting whether a device has moved within a room. Our approach relies on comparing summaries of received signal strength measurements over time, which we call descriptors. We consider descriptors based on the differences in the mean, standard deviation, and histogram comparison. In close to 1000 mobility events we conducted, our approach delivers perfect recall and near perfect precision for detecting mobility at a granularity of a few seconds. It is robust to the movement of dummy objects near the transmitter as well as people moving within the room. The detection is successful because true mobility causes fast fading, while environmental mobility causes shadow fading, which exhibit considerable difference in signal distributions. The ability to produce good detection accuracy throughout the experiments also demonstrates that our approach can be applied to varying room environments and radio technologies, thus enabling novel security, health care, and inventory control applications.

References

[1]
}}Mobility Traces. http://grail.rutgers.edu/mobilitytraces/, 2009.
[2]
}}I. Anderson and H. Muller. Context Awareness via GSM Signal Strength Fluctuation. In The IEEE Pervasive Computing, Late Breaking Results, pages 27--31, 2006.
[3]
}}L. Bao and S. S. Intille. Activity Recognition from User-Annotated Acceleration Data. In Pervasive Computing (LNCS), volume 3001, pages 1--17, 2004.
[4]
}}Y. Chen, W. Trappe, and R. P. Martin. Attack Detection in Wireless Localization. In The 26th IEEE International Conference on Computer Communications, pages 1964--1972, 2007.
[5]
}}W. W. Cohen. Fast Effective Rule Induction. In The 12th International Conference on Machine Learning, pages 115--123, 1995.
[6]
}}N. Eagle and A. Pentland. Reality Mining: Sensing Complex Social Systems. J. Personal and Ubiquitous Computing, 10:255--268, 2006.
[7]
}}B. Firner, S. Medhekar, Y. Zhang, R. Howard, W. Trappe, P. Wolniansky, and E. Fenson. PIP Tags: Hardware Design and Power Optimization. In The 5th Workshop on Embedded Networked Sensors, 2008.
[8]
}}M. J. Gans. A Power-Spectral Theory of Propagation in the Mobile-Radio Environment. J. Vehicular Technology, 21:27--38, 1972.
[9]
}}F. Hansen and F. I. Meno. Mobile Fading-Rayleigh and Lognormal Superimposed. J. Vehicular Technology, 26:332--335, 1977.
[10]
}}K. Koile, K. Tollmar, D. Demirdjian, H. Shrobe, and T. Darrell. Activity Zones for Context-Aware Computing. In UbiComp (LNCS), volume 2864, pages 90--106, 2003.
[11]
}}J. Krumm and E. Horvitz. LOCADIO: Inferring Motion and Location from Wi-Fi Signal Strengths. In The 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pages 4--13, 2004.
[12]
}}J. Krumm, L. Williams, and G. Smith. SmartMoveX on a Graph - An Inexpensive Active Badge Tracker. In UbiComp (LNCS), volume 2498, pages 299--307, 2002.
[13]
}}J. Lester, T. Choudhury, N. Kern, G. Borriello, and B. Hannaford. A Hybrid Discriminative/Generative Approach for Modeling Human Activities. In The International Joint Conference on Artificial Intelligence, pages 766--772, 2005.
[14]
}}L. Liao, D. Fox, and H. Kautz. Location-Based Activity Recognition using Relational Markov Networks. In The International Joint Conference on Artificial Intelligence, pages 773--778, 2005.
[15]
}}T. Lin, P. Huang, H. Chu, and C. You. Energy-Efficient Boundary Detection for RF-Based Localization Systems. J. Transactions on Mobile Computing, 8:29--40, 2009.
[16]
}}K. Muthukrishnan, M. Lijding, N. Meratnia, and P. Havinga. Sensing Motion Using Spectral and Spatial Analysis of WLAN RSSI. In The 2nd European Conference on Smart Sensing and Context, pages 62--76, 2007.
[17]
}}D. J. Patterson, L. Liao, D. Fox, and H. A. Kautz. Inferring High-Level Behavior from Low-Level Sensors. In UbiComp (LNCS), volume 2864, pages 73--89, 2003.
[18]
}}N. Patwari and S. K. Kasera. Robust Location Distinction using Temporal Link Signatures. In The 13th ACM International Conference on Mobile Computing Networking, pages 111--122, 2007.
[19]
}}M. Philipose, K. P. Fishkin, M. Perkowitz, D. J. Patterson, D. Fox, H. Kautz, and D. Hahnel. Inferring Activities from Interactions with Objects. In The IEEE Pervasive Computing, volume 3, pages 50--57, 2004.
[20]
}}C. Randell and H. Muller. Context Awareness by Analysing Accelerometer Data. In The 4th IEEE Computer Society International Symposium on Wearable Computers, pages 175--176, 2000.
[21]
}}Y. Rubner, C. Tomasi, and L. J. Guibas. The Earth Mover's Distance as a Metric for Image Retrieval. J. Computer Vision, 40:99--121, 2000.
[22]
}}T. Sohn, A. Varshavsky, A. LaMarca, M. Y. Chen, T. Choudhury, I. Smith, S. Consolvo, J. Hightower, W. G. Griswold, and E. Lara. Mobility Detection Using Everyday GSM Traces. In UbiComp (LNCS), pages 212--224, 2006.
[23]
}}P. Tan, M. Steinback, and V. Kumar. Introduction to Data Mining. Addison Wesley, 2006.
[24]
}}M. Wallbaum and S. Diepolder. A Motion Detection Scheme For Wireless LAN Stations. In The 3rd International Conference on Mobile Computing and Ubiquitous Networking, 2006.
[25]
}}I. H. Witten and E. Frank. Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann, San Francisco, 2005.
[26]
}}L. Xiao, J. L. Greenstein, N. B. Mandayam, and W. Trappe. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication. In The IEEE International Conference on Communications, pages 4646--4651, 2007.
[27]
}}G. Xing, J. Wang, K. Shen, Q. Huang, X. Jia, and H. C. So. Mobility-assisted Spatiotemporal Detection in Wireless Sensor Networks. In The 28th International Conference on Distributed Computing Systems, 2008.
[28]
}}M. Youssef, M. Mah, and A. Agrawala. Device-Free Passive Localization for Wireless Environments. In The 13th ACM International Conference on Mobile Computing and Networking, pages 222--229, 2007.

Cited By

View all

Index Terms

  1. Detecting intra-room mobility with signal strength descriptors

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MobiHoc '10: Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing
      September 2010
      272 pages
      ISBN:9781450301831
      DOI:10.1145/1860093
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 20 September 2010

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. mobility detection
      2. signal strength descriptors

      Qualifiers

      • Research-article

      Conference

      MobiCom/MobiHoc '10
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 296 of 1,843 submissions, 16%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 06 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Research on Multi-Path Tracking and Selection Algorithm for Wi-Fi Signals2022 2nd International Conference on Electronic Information Technology and Smart Agriculture (ICEITSA)10.1109/ICEITSA57468.2022.00014(24-30)Online publication date: Dec-2022
      • (2021)Passive Human Detection with Wi-FiSmart Wireless Sensing10.1007/978-981-16-5658-3_3(25-45)Online publication date: 28-Oct-2021
      • (2020)A Survey of Handy See-Through Wall TechnologyIEEE Access10.1109/ACCESS.2020.29912018(82951-82971)Online publication date: 2020
      • (2020)Activity Recognition and Classification via Deep Neural NetworksTestbeds and Research Infrastructures for the Development of Networks and Communications10.1007/978-3-030-43215-7_15(213-228)Online publication date: 5-Mar-2020
      • (2019)Counting Human Objects Using Backscattered Radio Frequency SignalsIEEE Transactions on Mobile Computing10.1109/TMC.2018.285262718:5(1054-1067)Online publication date: 1-May-2019
      • (2019)Device Mobility Detection Based on Optical Flow and Multi-Receiver Consensus2019 IEEE SENSORS10.1109/SENSORS43011.2019.8956541(1-4)Online publication date: Oct-2019
      • (2019)Wiar: A Public Dataset for Wifi-Based Activity RecognitionIEEE Access10.1109/ACCESS.2019.29470247(154935-154945)Online publication date: 2019
      • (2018)HuAcWireless Communications & Mobile Computing10.1155/2018/61634752018Online publication date: 11-Jan-2018
      • (2018)FreeSenseProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/32649532:3(1-23)Online publication date: 18-Sep-2018
      • (2018)Authenticating Users Through Fine-Grained Channel InformationIEEE Transactions on Mobile Computing10.1109/TMC.2017.271854017:2(251-264)Online publication date: 1-Feb-2018
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media