Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3551659.3559042acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article
Open access

Anonymized Counting of Nonstationary Wi-Fi Devices When Monitoring Crowds

Published: 24 October 2022 Publication History

Abstract

Pedestrian dynamics are nowadays commonly analyzed by leveraging Wi-Fi signals sent by devices that people carry with them and captured by an infrastructure of Wi-Fi scanners. Emitting such signals is not a feature for devices of only passersby, but also for printers, smart TVs, and other devices that exhibit a stationary behavior over time, which eventually end up affecting pedestrian crowd measurements. In this paper we propose a system that accurately counts nonstationary devices sensed by scanners, separately from stationary devices, using no information other than the Wi-Fi signals captured by each scanner in isolation. As counting involves dealing with privacy-sensitive detections of people's devices, the system discards any data in the clear immediately after sensing, later working on encrypted data that it cannot decrypt in the process. The only information made available in the clear is the intended output, i.e. statistical counts of Wi-Fi devices. Our approach relies on an object, which we call comb, that maintains, under encryption, a representation of the frequency of occurrence of devices over time. Applying this comb on the detections made by a scanner enables the calculation of the separate counts. We implement the system and feed it with data from a large open-air festival, showing that accurate anonymized counting of nonstationary Wi-Fi devices is possible when dealing with real-world detections.

References

[1]
Mehmet Adalier and Antara Teknik. 2015. Efficient and secure elliptic curve cryptography implementation of Curve P-256. In Workshop on Elliptic Curve Cryptography Standards, Vol. 66.
[2]
Mikhail Afanasyev, Tsuwei Chen, Geoffrey M Voelker, and Alex C Snoeren. 2010. Usage patterns in an urban WiFi network. IEEE/ACM Transactions on Networking, Vol. 18, 5 (2010), 1359--1372.
[3]
Mohammad Alaggan, Mathieu Cunche, and Sébastien Gambs. 2018. Privacy-preserving wi-fi analytics. Proceedings on Privacy Enhancing Technologies, Vol. 2018, 2 (2018), 4--26.
[4]
Austin Appleby. 2016. MurmurHash3. (2016). https://github.com/aappleby/smhasher/wiki/MurmurHash3
[5]
Lu Bai, Neil Ireson, Suvodeep Mazumdar, and Fabio Ciravegna. 2017. Lessons learned using wi-fi and Bluetooth as means to monitor public service usage. In Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers. 432--440.
[6]
Giuseppe Bianchi, Lorenzo Bracciale, and Pierpaolo Loreti. 2012. " Better Than Nothing" Privacy with Bloom Filters: To What Extent?. In International Conference on Privacy in Statistical Databases. Springer, 348--363.
[7]
Burton H Bloom. 1970. Space/time trade-offs in hash coding with allowable errors. Commun. ACM, Vol. 13, 7 (1970), 422--426.
[8]
Zhen Cao, Yu-E Sun, He Huang, Hansong Guo, Yang Du, An Liu, and Le Lu. 2020. Finding Persistent Elements of Anomalous Flows in Distributed Monitoring Systems. In 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE, 1--7.
[9]
Cristian Chilipirea, Ciprian Dobre, Mitra Baratchi, and Maarten van Steen. 2018. Identifying movements in noisy crowd analytics data. In 2018 19th IEEE International Conference on Mobile Data Management (MDM). IEEE, 161--166.
[10]
Yael Ejgenberg, Moriya Farbstein, Meital Levy, and Yehuda Lindell. 2012. SCAPI: The Secure Computation Application Programming Interface. IACR Cryptol. ePrint Arch., Vol. 2012 (2012), 629.
[11]
Taher ElGamal. 1985. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE transactions on information theory, Vol. 31, 4 (1985), 469--472.
[12]
Li Fan, Pei Cao, Jussara Almeida, and Andrei Z Broder. 2000. Summary cache: a scalable wide-area web cache sharing protocol. IEEE/ACM transactions on networking, Vol. 8, 3 (2000), 281--293.
[13]
Julien Freudiger. 2015. How talkative is your mobile device? An experimental study of Wi-Fi probe requests. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks. 1--6.
[14]
Jong Hee Kang, William Welbourne, Benjamin Stewart, and Gaetano Borriello. 2005. Extracting places from traces of locations. ACM SIGMOBILE Mobile Computing and Communications Review, Vol. 9, 3 (2005), 58--68.
[15]
Odysseas Papapetrou, Wolf Siberski, and Wolfgang Nejdl. 2010. Cardinality estimation and dynamic length adaptation for bloom filters. Distributed and Parallel Databases, Vol. 28, 2 (2010), 119--156.
[16]
Alessandro Enrico Cesare Redondi, Davide Sanvito, and Matteo Cesana. 2016. Passive classification of Wi-Fi enabled devices. In Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. 51--58.
[17]
Ronald L Rivest, Len Adleman, Michael L Dertouzos, et al. 1978. On data banks and privacy homomorphisms. Foundations of secure computation, Vol. 4, 11 (1978), 169--180.
[18]
Lorenz Schauer, Martin Werner, and Philipp Marcus. 2014. Estimating crowd densities and pedestrian flows using wi-fi and bluetooth. In Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. 171--177.
[19]
Balamurugan Soundararaj, James Cheshire, and Paul Longley. 2020. Estimating real-time high-street footfall from Wi-Fi probe requests. International Journal of Geographical Information Science, Vol. 34, 2 (2020), 325--343.
[20]
Valeriu-Daniel Stanciu, Maarten van Steen, Ciprian Dobre, and Andreas Peter. 2021. Privacy-Preserving Crowd-Monitoring Using Bloom Filters and Homomorphic Encryption. In Proceedings of the 4th International Workshop on Edge Systems, Analytics and Networking. 37--42.
[21]
Valeriu-Daniel Stanciu, Maarten van Steen, Ciprian Dobre, and Andreas Peter. 2020. k-Anonymous Crowd Flow Analytics. In MobiQuitous 2020--17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. 376--385.
[22]
S Joshua Swamidass and Pierre Baldi. 2007. Mathematical correction for fingerprint similarity measures to improve chemical retrieval. Journal of chemical information and modeling, Vol. 47, 3 (2007), 952--964.

Cited By

View all
  • (2023)Privacy-Aware Crowd Monitoring and WiFi Traffic Emulation for Effective Crisis Management2023 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)10.1109/ICT-DM58371.2023.10286944(1-6)Online publication date: 13-Sep-2023

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MSWiM '22: Proceedings of the 25th International ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems
October 2022
243 pages
ISBN:9781450394826
DOI:10.1145/3551659
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 October 2022

Check for updates

Author Tags

  1. anonymized counting
  2. bloom filters
  3. crowd monitoring
  4. homomorphic encryption
  5. nonstationary devices
  6. privacy protection
  7. statistical counting

Qualifiers

  • Research-article

Conference

MSWiM '22
Sponsor:

Acceptance Rates

MSWiM '22 Paper Acceptance Rate 27 of 117 submissions, 23%;
Overall Acceptance Rate 398 of 1,577 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)169
  • Downloads (Last 6 weeks)33
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Privacy-Aware Crowd Monitoring and WiFi Traffic Emulation for Effective Crisis Management2023 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)10.1109/ICT-DM58371.2023.10286944(1-6)Online publication date: 13-Sep-2023

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media