Skip to main content

An Online Method for Estimating the Wireless Device Count via Privacy-Preserving Wi-Fi Fingerprinting

  • Conference paper
  • First Online:
Passive and Active Measurement (PAM 2021)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 12671))

Included in the following conference series:

  • 2119 Accesses

Abstract

Initially envisioned to accelerate association of mobile devices in wireless networks, broadcasting of Wi-Fi probe requests has opened avenues for researchers and network practitioners to exploit information sent out in this type of frames for observing devices’ digital footprints and for their tracking. One of the applications for this is crowd estimation. Noticing the privacy risks that this default mode of operation poses, device vendors have introduced MAC address randomization—a privacy preserving technique by which mobile devices periodically generate random hardware addresses contained in probe requests. In this paper, we propose a method for estimating the number of wireless devices in the environment by means of analyzing Wi-Fi probe requests sent by those devices and in spite of MAC address randomization. Our solution extends previous work that uses Wi-Fi fingerprinting based on the timing information of probe requests. The only additional information we extract from probe requests is the MAC address, making our method minimally privacy-invasive. Our estimation method is also nearly real-time. We conduct several experiments to collect wireless measurements in different static environments and we use these measurements to validate our method. Through an extensive analysis and parameter tuning, we show the robustness of our method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    While, with just four adapters, we do not obtain full channel coverage and thus may miss frames, this leaner design makes the system portable, e.g., to be carried in a backpack.

References

  1. Android Documentation (API Level 23). https://developer.android.com/about/versions/marshmallow/android-6.0-changes

  2. d’Otreppe de Bouvette, T.: Aircrack-ng. https://www.aircrack-ng.org/doku.php?id=main. Accessed Oct 2016

  3. Celosia, G., Cunche, M.: Fingerprinting bluetooth-low-energy devices based on the generic attribute profile. In: Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things (2019)

    Google Scholar 

  4. Depatla, S., Mostofi, Y.: Crowd counting through walls using WiFi. In: 2018 IEEE International Conference on Pervasive Computing and Communications (PerCom) (2018)

    Google Scholar 

  5. Franklin, J., McCoy, D., Tabriz, P., Neagoe, V., van Randwyk, J., Sicker, D.: Passive data link layer 802.11 wireless device driver fingerprinting. In: 15th USENIX Security Symposium (2006)

    Google Scholar 

  6. Freudiger, J.: How talkative is your mobile device? An experimental study of Wi-Fi probe requests. In: Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) (2015)

    Google Scholar 

  7. IEEE Standards Association: Guidelines for Use of Extended Unique Identifier (EUI), Organizationally Unique Identifier (OUI), and Company ID (CID) (2017). https://standards.ieee.org/content/dam/ieee-standards/standards/web/documents/tutorials/eui.pdf

  8. Irfan, M., Marcenaro, L., Tokarchuk, L.: Crowd analysis using visual and non-visual sensors, a survey. In: IEEE Global Conference on Signal and Information Processing (GlobalSIP) (2016)

    Google Scholar 

  9. Kouyoumdjieva, S.T., Danielis, P., Karlsson, G.: Survey of non-image-based approaches for counting people. IEEE Commun. Surv. Tutor. 22(2), 1305–1336 (2020)

    Article  Google Scholar 

  10. Longo, E., Redondi, A.E., Cesana, M.: Accurate occupancy estimation with WiFi and bluetooth/BLE packet capture. Comput. Netw. 163, 106876 (2019)

    Article  Google Scholar 

  11. Martin, J., et al.: A study of MAC address randomization in mobile devices and when it fails. In: Proceedings on Privacy Enhancing Technologies (2017)

    Google Scholar 

  12. Matte, C.: Wi-Fi tracking: fingerprinting attacks and counter-measures. Ph.D. thesis, Université de Lyon, INSA Lyon, France (2017)

    Google Scholar 

  13. Matte, C., Cunche, M., Rousseau, F., Vanhoef, M.: Defeating MAC address randomization through timing attacks. In: Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) (2016)

    Google Scholar 

  14. Myrvoll, T.A., Hakegard, J.E., Matsui, T., Septier, F.: Counting public transport passenger using WiFi signatures of mobile devices. In: 2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC) (2017)

    Google Scholar 

  15. Saleh, S.A.M., Suandi, S.A., Ibrahim, H.: Recent survey on crowd density estimation and counting for visual surveillance. Eng. Appl. Artif. Intell. 41, 103–114 (2015)

    Article  Google Scholar 

  16. Schauer, L., Werner, M., Marcus, P.: Estimating crowd densities and pedestrian flows using Wi-Fi and Bluetooth. In: Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MOBIQUITOUS) (2014)

    Google Scholar 

  17. Skinner, K., Novak, J.: Privacy and your app. In: Apple Worldwide Development Conference (WWDC) (2015)

    Google Scholar 

  18. Tonetto, L., Untersperger, M., Ott, J.: Towards exploiting Wi-Fi signals from low density infrastructure for crowd estimation. In: Proceedings of the 14th Workshop on Challenged Networks (CHANTS) (2019)

    Google Scholar 

  19. Vanhoef, M., Matte, C., Cunche, M., Cardoso, L.S., Piessens, F.: Why MAC address randomization is not enough: an analysis of Wi-Fi network discovery mechanisms. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (2016)

    Google Scholar 

  20. Vattapparamban, E., Ciftler, B.S., Güvenc, I., Akkaya, K., Kadri, A.: Indoor occupancy tracking in smart buildings using passive sniffing of probe requests. In: 2016 IEEE International Conference on Communications Workshops (ICC) (2016)

    Google Scholar 

  21. Wang, W.: Wireless networking in Windows 10. In: Windows Hardware Engineering Community conference (WinHEC) (2015)

    Google Scholar 

  22. Wirz, M., Franke, T., Roggen, D., Mitleton-Kelly, E., Lukowicz, P., Tröster, G.: Inferring crowd conditions from pedestrians’ location traces for real-time crowd monitoring during city-scale mass gatherings. In: 2012 IEEE 21st International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (2012)

    Google Scholar 

  23. Xi, W., Zhao, J., Li, X., Zhao, K., Tang, S., Liu, X., Jiang, Z.: Electronic frog eye: counting crowd using WiFi. In: Proceedings IEEE Inofocom (2014)

    Google Scholar 

  24. Zeng, Y., Pathak, P.H., Mohapatra, P.: Analyzing shopper’s behavior through WiFi signals. In: Proceedings of the 2nd Workshop on Workshop on Physical Analytics (WPA) (2015)

    Google Scholar 

  25. Zou, H., Zhou, Y., Yang, J., Spanos, C.J.: Device-free occupancy detection and crowd counting in smart buildings with WiFi-enabled IoT. Energy Build. 174, 309–322 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pegah Torkamandi .

Editor information

Editors and Affiliations

Appendices

Appendix A Data Exploration for Parameter Tuning

1.1 A.1 Analysis of the Algorithm Bootstrap Time

Table A.1 lists overlap-MAC and the number of all valid created clusters, cluster-DB, for different bootstrapTime values used when initializing the cluster database with Algorithm 3 for two datasets. The results in the table show that overlap-MAC decreases or remains the same whereas cluster-DB decreases as we extend bootstrapTime. Thus, creating the initial cluster database using a larger subset of data (longer bootstrapTime) ensures fewer errors in signature clustering. In addition, as shown in Fig. 6, the estimated number of devices is almost the same for different bootstrapTime. This suggests that smaller bootstrapTime leads to creating extra clusters. However, since our device counting method is able to cope with ”stale” clusters the end result is that the estimates for the number of detected devices do not differ by more than 1, as already explained in Sect. 3.3. As our trimmed flight datasets contain approximately 2.5 h of measurements, we set bootstrapTime to 30 min.

Table A.1 : Cluster databases statistics for different boostrap times.

Appendix B Algorithms

figure a
figure b
figure c

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Torkamandi, P., Kärkkäinen, L., Ott, J. (2021). An Online Method for Estimating the Wireless Device Count via Privacy-Preserving Wi-Fi Fingerprinting. In: Hohlfeld, O., Lutu, A., Levin, D. (eds) Passive and Active Measurement. PAM 2021. Lecture Notes in Computer Science(), vol 12671. Springer, Cham. https://doi.org/10.1007/978-3-030-72582-2_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-72582-2_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-72581-5

  • Online ISBN: 978-3-030-72582-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics