skip to main content
10.1145/1860093.1860104acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
research-article

Detecting intra-room mobility with signal strength descriptors

Published:20 September 2010Publication History

ABSTRACT

We explore the problem of detecting whether a device has moved within a room. Our approach relies on comparing summaries of received signal strength measurements over time, which we call descriptors. We consider descriptors based on the differences in the mean, standard deviation, and histogram comparison. In close to 1000 mobility events we conducted, our approach delivers perfect recall and near perfect precision for detecting mobility at a granularity of a few seconds. It is robust to the movement of dummy objects near the transmitter as well as people moving within the room. The detection is successful because true mobility causes fast fading, while environmental mobility causes shadow fading, which exhibit considerable difference in signal distributions. The ability to produce good detection accuracy throughout the experiments also demonstrates that our approach can be applied to varying room environments and radio technologies, thus enabling novel security, health care, and inventory control applications.

References

  1. }}Mobility Traces. http://grail.rutgers.edu/mobilitytraces/, 2009.Google ScholarGoogle Scholar
  2. }}I. Anderson and H. Muller. Context Awareness via GSM Signal Strength Fluctuation. In The IEEE Pervasive Computing, Late Breaking Results, pages 27--31, 2006.Google ScholarGoogle Scholar
  3. }}L. Bao and S. S. Intille. Activity Recognition from User-Annotated Acceleration Data. In Pervasive Computing (LNCS), volume 3001, pages 1--17, 2004.Google ScholarGoogle Scholar
  4. }}Y. Chen, W. Trappe, and R. P. Martin. Attack Detection in Wireless Localization. In The 26th IEEE International Conference on Computer Communications, pages 1964--1972, 2007.Google ScholarGoogle Scholar
  5. }}W. W. Cohen. Fast Effective Rule Induction. In The 12th International Conference on Machine Learning, pages 115--123, 1995.Google ScholarGoogle Scholar
  6. }}N. Eagle and A. Pentland. Reality Mining: Sensing Complex Social Systems. J. Personal and Ubiquitous Computing, 10:255--268, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. }}B. Firner, S. Medhekar, Y. Zhang, R. Howard, W. Trappe, P. Wolniansky, and E. Fenson. PIP Tags: Hardware Design and Power Optimization. In The 5th Workshop on Embedded Networked Sensors, 2008.Google ScholarGoogle Scholar
  8. }}M. J. Gans. A Power-Spectral Theory of Propagation in the Mobile-Radio Environment. J. Vehicular Technology, 21:27--38, 1972.Google ScholarGoogle Scholar
  9. }}F. Hansen and F. I. Meno. Mobile Fading-Rayleigh and Lognormal Superimposed. J. Vehicular Technology, 26:332--335, 1977.Google ScholarGoogle Scholar
  10. }}K. Koile, K. Tollmar, D. Demirdjian, H. Shrobe, and T. Darrell. Activity Zones for Context-Aware Computing. In UbiComp (LNCS), volume 2864, pages 90--106, 2003.Google ScholarGoogle Scholar
  11. }}J. Krumm and E. Horvitz. LOCADIO: Inferring Motion and Location from Wi-Fi Signal Strengths. In The 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pages 4--13, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  12. }}J. Krumm, L. Williams, and G. Smith. SmartMoveX on a Graph - An Inexpensive Active Badge Tracker. In UbiComp (LNCS), volume 2498, pages 299--307, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. }}J. Lester, T. Choudhury, N. Kern, G. Borriello, and B. Hannaford. A Hybrid Discriminative/Generative Approach for Modeling Human Activities. In The International Joint Conference on Artificial Intelligence, pages 766--772, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. }}L. Liao, D. Fox, and H. Kautz. Location-Based Activity Recognition using Relational Markov Networks. In The International Joint Conference on Artificial Intelligence, pages 773--778, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. }}T. Lin, P. Huang, H. Chu, and C. You. Energy-Efficient Boundary Detection for RF-Based Localization Systems. J. Transactions on Mobile Computing, 8:29--40, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. }}K. Muthukrishnan, M. Lijding, N. Meratnia, and P. Havinga. Sensing Motion Using Spectral and Spatial Analysis of WLAN RSSI. In The 2nd European Conference on Smart Sensing and Context, pages 62--76, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. }}D. J. Patterson, L. Liao, D. Fox, and H. A. Kautz. Inferring High-Level Behavior from Low-Level Sensors. In UbiComp (LNCS), volume 2864, pages 73--89, 2003.Google ScholarGoogle Scholar
  18. }}N. Patwari and S. K. Kasera. Robust Location Distinction using Temporal Link Signatures. In The 13th ACM International Conference on Mobile Computing Networking, pages 111--122, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. }}M. Philipose, K. P. Fishkin, M. Perkowitz, D. J. Patterson, D. Fox, H. Kautz, and D. Hahnel. Inferring Activities from Interactions with Objects. In The IEEE Pervasive Computing, volume 3, pages 50--57, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. }}C. Randell and H. Muller. Context Awareness by Analysing Accelerometer Data. In The 4th IEEE Computer Society International Symposium on Wearable Computers, pages 175--176, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. }}Y. Rubner, C. Tomasi, and L. J. Guibas. The Earth Mover's Distance as a Metric for Image Retrieval. J. Computer Vision, 40:99--121, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. }}T. Sohn, A. Varshavsky, A. LaMarca, M. Y. Chen, T. Choudhury, I. Smith, S. Consolvo, J. Hightower, W. G. Griswold, and E. Lara. Mobility Detection Using Everyday GSM Traces. In UbiComp (LNCS), pages 212--224, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. }}P. Tan, M. Steinback, and V. Kumar. Introduction to Data Mining. Addison Wesley, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. }}M. Wallbaum and S. Diepolder. A Motion Detection Scheme For Wireless LAN Stations. In The 3rd International Conference on Mobile Computing and Ubiquitous Networking, 2006.Google ScholarGoogle Scholar
  25. }}I. H. Witten and E. Frank. Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann, San Francisco, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. }}L. Xiao, J. L. Greenstein, N. B. Mandayam, and W. Trappe. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication. In The IEEE International Conference on Communications, pages 4646--4651, 2007.Google ScholarGoogle Scholar
  27. }}G. Xing, J. Wang, K. Shen, Q. Huang, X. Jia, and H. C. So. Mobility-assisted Spatiotemporal Detection in Wireless Sensor Networks. In The 28th International Conference on Distributed Computing Systems, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. }}M. Youssef, M. Mah, and A. Agrawala. Device-Free Passive Localization for Wireless Environments. In The 13th ACM International Conference on Mobile Computing and Networking, pages 222--229, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Detecting intra-room mobility with signal strength descriptors

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MobiHoc '10: Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing
        September 2010
        272 pages
        ISBN:9781450301831
        DOI:10.1145/1860093

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 September 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate296of1,843submissions,16%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader