Abstract
Initially envisioned to accelerate association of mobile devices in wireless networks, broadcasting of Wi-Fi probe requests has opened avenues for researchers and network practitioners to exploit information sent out in this type of frames for observing devices’ digital footprints and for their tracking. One of the applications for this is crowd estimation. Noticing the privacy risks that this default mode of operation poses, device vendors have introduced MAC address randomization—a privacy preserving technique by which mobile devices periodically generate random hardware addresses contained in probe requests. In this paper, we propose a method for estimating the number of wireless devices in the environment by means of analyzing Wi-Fi probe requests sent by those devices and in spite of MAC address randomization. Our solution extends previous work that uses Wi-Fi fingerprinting based on the timing information of probe requests. The only additional information we extract from probe requests is the MAC address, making our method minimally privacy-invasive. Our estimation method is also nearly real-time. We conduct several experiments to collect wireless measurements in different static environments and we use these measurements to validate our method. Through an extensive analysis and parameter tuning, we show the robustness of our method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
While, with just four adapters, we do not obtain full channel coverage and thus may miss frames, this leaner design makes the system portable, e.g., to be carried in a backpack.
References
Android Documentation (API Level 23). https://developer.android.com/about/versions/marshmallow/android-6.0-changes
d’Otreppe de Bouvette, T.: Aircrack-ng. https://www.aircrack-ng.org/doku.php?id=main. Accessed Oct 2016
Celosia, G., Cunche, M.: Fingerprinting bluetooth-low-energy devices based on the generic attribute profile. In: Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things (2019)
Depatla, S., Mostofi, Y.: Crowd counting through walls using WiFi. In: 2018 IEEE International Conference on Pervasive Computing and Communications (PerCom) (2018)
Franklin, J., McCoy, D., Tabriz, P., Neagoe, V., van Randwyk, J., Sicker, D.: Passive data link layer 802.11 wireless device driver fingerprinting. In: 15th USENIX Security Symposium (2006)
Freudiger, J.: How talkative is your mobile device? An experimental study of Wi-Fi probe requests. In: Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) (2015)
IEEE Standards Association: Guidelines for Use of Extended Unique Identifier (EUI), Organizationally Unique Identifier (OUI), and Company ID (CID) (2017). https://standards.ieee.org/content/dam/ieee-standards/standards/web/documents/tutorials/eui.pdf
Irfan, M., Marcenaro, L., Tokarchuk, L.: Crowd analysis using visual and non-visual sensors, a survey. In: IEEE Global Conference on Signal and Information Processing (GlobalSIP) (2016)
Kouyoumdjieva, S.T., Danielis, P., Karlsson, G.: Survey of non-image-based approaches for counting people. IEEE Commun. Surv. Tutor. 22(2), 1305–1336 (2020)
Longo, E., Redondi, A.E., Cesana, M.: Accurate occupancy estimation with WiFi and bluetooth/BLE packet capture. Comput. Netw. 163, 106876 (2019)
Martin, J., et al.: A study of MAC address randomization in mobile devices and when it fails. In: Proceedings on Privacy Enhancing Technologies (2017)
Matte, C.: Wi-Fi tracking: fingerprinting attacks and counter-measures. Ph.D. thesis, Université de Lyon, INSA Lyon, France (2017)
Matte, C., Cunche, M., Rousseau, F., Vanhoef, M.: Defeating MAC address randomization through timing attacks. In: Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) (2016)
Myrvoll, T.A., Hakegard, J.E., Matsui, T., Septier, F.: Counting public transport passenger using WiFi signatures of mobile devices. In: 2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC) (2017)
Saleh, S.A.M., Suandi, S.A., Ibrahim, H.: Recent survey on crowd density estimation and counting for visual surveillance. Eng. Appl. Artif. Intell. 41, 103–114 (2015)
Schauer, L., Werner, M., Marcus, P.: Estimating crowd densities and pedestrian flows using Wi-Fi and Bluetooth. In: Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MOBIQUITOUS) (2014)
Skinner, K., Novak, J.: Privacy and your app. In: Apple Worldwide Development Conference (WWDC) (2015)
Tonetto, L., Untersperger, M., Ott, J.: Towards exploiting Wi-Fi signals from low density infrastructure for crowd estimation. In: Proceedings of the 14th Workshop on Challenged Networks (CHANTS) (2019)
Vanhoef, M., Matte, C., Cunche, M., Cardoso, L.S., Piessens, F.: Why MAC address randomization is not enough: an analysis of Wi-Fi network discovery mechanisms. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (2016)
Vattapparamban, E., Ciftler, B.S., Güvenc, I., Akkaya, K., Kadri, A.: Indoor occupancy tracking in smart buildings using passive sniffing of probe requests. In: 2016 IEEE International Conference on Communications Workshops (ICC) (2016)
Wang, W.: Wireless networking in Windows 10. In: Windows Hardware Engineering Community conference (WinHEC) (2015)
Wirz, M., Franke, T., Roggen, D., Mitleton-Kelly, E., Lukowicz, P., Tröster, G.: Inferring crowd conditions from pedestrians’ location traces for real-time crowd monitoring during city-scale mass gatherings. In: 2012 IEEE 21st International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (2012)
Xi, W., Zhao, J., Li, X., Zhao, K., Tang, S., Liu, X., Jiang, Z.: Electronic frog eye: counting crowd using WiFi. In: Proceedings IEEE Inofocom (2014)
Zeng, Y., Pathak, P.H., Mohapatra, P.: Analyzing shopper’s behavior through WiFi signals. In: Proceedings of the 2nd Workshop on Workshop on Physical Analytics (WPA) (2015)
Zou, H., Zhou, Y., Yang, J., Spanos, C.J.: Device-free occupancy detection and crowd counting in smart buildings with WiFi-enabled IoT. Energy Build. 174, 309–322 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
Appendix A Data Exploration for Parameter Tuning
1.1 A.1 Analysis of the Algorithm Bootstrap Time
Table A.1 lists overlap-MAC and the number of all valid created clusters, cluster-DB, for different bootstrapTime values used when initializing the cluster database with Algorithm 3 for two datasets. The results in the table show that overlap-MAC decreases or remains the same whereas cluster-DB decreases as we extend bootstrapTime. Thus, creating the initial cluster database using a larger subset of data (longer bootstrapTime) ensures fewer errors in signature clustering. In addition, as shown in Fig. 6, the estimated number of devices is almost the same for different bootstrapTime. This suggests that smaller bootstrapTime leads to creating extra clusters. However, since our device counting method is able to cope with ”stale” clusters the end result is that the estimates for the number of detected devices do not differ by more than 1, as already explained in Sect. 3.3. As our trimmed flight datasets contain approximately 2.5 h of measurements, we set bootstrapTime to 30 min.
Appendix B Algorithms



Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Torkamandi, P., Kärkkäinen, L., Ott, J. (2021). An Online Method for Estimating the Wireless Device Count via Privacy-Preserving Wi-Fi Fingerprinting. In: Hohlfeld, O., Lutu, A., Levin, D. (eds) Passive and Active Measurement. PAM 2021. Lecture Notes in Computer Science(), vol 12671. Springer, Cham. https://doi.org/10.1007/978-3-030-72582-2_24
Download citation
DOI: https://doi.org/10.1007/978-3-030-72582-2_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-72581-5
Online ISBN: 978-3-030-72582-2
eBook Packages: Computer ScienceComputer Science (R0)