| Literature DB >> 28098772 |
Yunjian Jia1, Zhenyu Zhou2, Fei Chen3, Peng Duan4, Zhen Guo5, Shahid Mumtaz6.
Abstract
Tracking people's behaviors is a main category of cyber physical social sensing (CPSS)-related people-centric applications. Most tracking methods utilize camera networks or sensors built into mobile devices such as global positioning system (GPS) and Bluetooth. In this article, we propose a non-intrusive wireless fidelity (Wi-Fi)-based tracking method. To show the feasibility, we target tracking people's access behaviors in Wi-Fi networks, which has drawn a lot of interest from the academy and industry recently. Existing methods used for acquiring access traces either provide very limited visibility into media access control (MAC)-level transmission dynamics or sometimes are inflexible and costly. In this article, we present a passive CPSS system operating in a non-intrusive, flexible, and simplified manner to overcome above limitations. We have implemented the prototype on the off-the-shelf personal computer, and performed real-world deployment experiments. The experimental results show that the method is feasible, and people's access behaviors can be correctly tracked within a one-second delay.Entities:
Keywords: non-intrusive; passive cyber physical social sensing (CPSS); people behavior tracking; wireless fidelity (Wi-Fi)
Year: 2017 PMID: 28098772 PMCID: PMC5298716 DOI: 10.3390/s17010143
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Comparison between different people tracking technologies.
| Tracking Methods | Pros | Cons |
|---|---|---|
| GPS [ |
High positioning precision Low-cost to deploy |
Need people to participate Rarely works indoors |
| Wi-Fi [ |
High positioning precision Low-cost to deploy |
Need people to participate Need special software |
| Camera [ |
Non-intrusive High positioning precision No devices carried by people |
LOS Inflexible deployment |
| RFID [ |
NLOS Flexible deployment High positioning precision |
Intrusive Dedicated devices carried by people |
| ZigBee [ |
NLOS Flexible deployment High positioning precision |
Intrusive Dedicated devices carried by people |
| Bluetooth [ |
NLOS Flexible deployment High positioning precision |
Intrusive Dedicated devices carried by people |
| Cellular signal [ |
NLOS Wide Coverage Widely deployed infrastructures |
Intrusive Poor positioning precision Inflexible deployment Common devices carried by people |
| Proposed system (passive) |
Non-intrusive NLOS Flexible deployment Relatively high positioning precision |
Common devices carried by people |
Figure 1Description of formulating people’s access behaviors in Wi-Fi networks.
Figure 2Overall 802.11 state diagram.
Figure 3Procedures of accessing an encrypted AP. (a) Access procedures; (b) The 4-way handshake.
Figure 4Overview of system architecture.
Figure 5Generic 802.11 frame format.
Information fields description.
| Type | Subtype | Frame Name | Address1 | Address2 | Address3 |
|---|---|---|---|---|---|
| 00 | 0001 | Association Response | Destination | Source | BSSID |
| 00 | 0011 | Reassociation Response | Destination | Source | BSSID |
| 00 | 1010 | Disassociation | Destination | Source | BSSID |
| 00 | 1100 | Deauthentication | Destination | Source | BSSID |
| 10 | 1000 | QoS Data(from AP) | Destination | BSSID | Source |
| 10 | 1000 | QoS Data(to AP) | BSSID | Source | Destination |
Figure 6Format of the QoS Data frame with the EAPOL-Key message.
Information fields description.
| Field Name | Description | Illustration |
|---|---|---|
| Mac address of station | 0c:37:dc:d3:25:22 | |
| Mac address of AP | 1c:fa:68:4e:4c:c6 | |
| Frame type and direction | disassociation_from_ap | |
| Receiving time | 2014-08-26 20:33:00 | |
| Access or exit | ||
| Status code | 0-65535/65536(default) | |
| Reason code | 0-65535/65536(default) | |
| Retransmitted or not | 1(retransmit)/0(not) | |
| Access succeeds or not | 1(succeed)/0(not)/65536(default) |
Figure 7Experimental setup: (a) Experiment equipment; (b) The GUI of the monitor; (c) The floor plan of the experiment.
Figure 8Experimental results: (a) Records of the experiment; (b) Output information of the system.
Figure 9Frame type and transmission direction.
Frame Information Encoding.
| Frame Information | Code |
|---|---|
| Association Response frame from AP to Wi-Fi Device | 0 |
| Re-association Response frame from AP to Wi-Fi Device | 1 |
| Disassociation frame from AP to Wi-Fi Device | 2 |
| Disassociation frame from Wi-Fi Device to AP | 3 |
| De-authentication frame from AP to Wi-Fi Device | 4 |
| De-authentication frame from Wi-Fi Device to AP | 5 |
Figure 10Status codes and reason codes.
Figure 11ValiFlag value for the access operation of each device.