ABSTRACT
We explore the problem of detecting whether a device has moved within a room. Our approach relies on comparing summaries of received signal strength measurements over time, which we call descriptors. We consider descriptors based on the differences in the mean, standard deviation, and histogram comparison. In close to 1000 mobility events we conducted, our approach delivers perfect recall and near perfect precision for detecting mobility at a granularity of a few seconds. It is robust to the movement of dummy objects near the transmitter as well as people moving within the room. The detection is successful because true mobility causes fast fading, while environmental mobility causes shadow fading, which exhibit considerable difference in signal distributions. The ability to produce good detection accuracy throughout the experiments also demonstrates that our approach can be applied to varying room environments and radio technologies, thus enabling novel security, health care, and inventory control applications.
- }}Mobility Traces. http://grail.rutgers.edu/mobilitytraces/, 2009.Google Scholar
- }}I. Anderson and H. Muller. Context Awareness via GSM Signal Strength Fluctuation. In The IEEE Pervasive Computing, Late Breaking Results, pages 27--31, 2006.Google Scholar
- }}L. Bao and S. S. Intille. Activity Recognition from User-Annotated Acceleration Data. In Pervasive Computing (LNCS), volume 3001, pages 1--17, 2004.Google Scholar
- }}Y. Chen, W. Trappe, and R. P. Martin. Attack Detection in Wireless Localization. In The 26th IEEE International Conference on Computer Communications, pages 1964--1972, 2007.Google Scholar
- }}W. W. Cohen. Fast Effective Rule Induction. In The 12th International Conference on Machine Learning, pages 115--123, 1995.Google Scholar
- }}N. Eagle and A. Pentland. Reality Mining: Sensing Complex Social Systems. J. Personal and Ubiquitous Computing, 10:255--268, 2006. Google ScholarDigital Library
- }}B. Firner, S. Medhekar, Y. Zhang, R. Howard, W. Trappe, P. Wolniansky, and E. Fenson. PIP Tags: Hardware Design and Power Optimization. In The 5th Workshop on Embedded Networked Sensors, 2008.Google Scholar
- }}M. J. Gans. A Power-Spectral Theory of Propagation in the Mobile-Radio Environment. J. Vehicular Technology, 21:27--38, 1972.Google Scholar
- }}F. Hansen and F. I. Meno. Mobile Fading-Rayleigh and Lognormal Superimposed. J. Vehicular Technology, 26:332--335, 1977.Google Scholar
- }}K. Koile, K. Tollmar, D. Demirdjian, H. Shrobe, and T. Darrell. Activity Zones for Context-Aware Computing. In UbiComp (LNCS), volume 2864, pages 90--106, 2003.Google Scholar
- }}J. Krumm and E. Horvitz. LOCADIO: Inferring Motion and Location from Wi-Fi Signal Strengths. In The 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pages 4--13, 2004.Google ScholarCross Ref
- }}J. Krumm, L. Williams, and G. Smith. SmartMoveX on a Graph - An Inexpensive Active Badge Tracker. In UbiComp (LNCS), volume 2498, pages 299--307, 2002. Google ScholarDigital Library
- }}J. Lester, T. Choudhury, N. Kern, G. Borriello, and B. Hannaford. A Hybrid Discriminative/Generative Approach for Modeling Human Activities. In The International Joint Conference on Artificial Intelligence, pages 766--772, 2005. Google ScholarDigital Library
- }}L. Liao, D. Fox, and H. Kautz. Location-Based Activity Recognition using Relational Markov Networks. In The International Joint Conference on Artificial Intelligence, pages 773--778, 2005. Google ScholarDigital Library
- }}T. Lin, P. Huang, H. Chu, and C. You. Energy-Efficient Boundary Detection for RF-Based Localization Systems. J. Transactions on Mobile Computing, 8:29--40, 2009. Google ScholarDigital Library
- }}K. Muthukrishnan, M. Lijding, N. Meratnia, and P. Havinga. Sensing Motion Using Spectral and Spatial Analysis of WLAN RSSI. In The 2nd European Conference on Smart Sensing and Context, pages 62--76, 2007. Google ScholarDigital Library
- }}D. J. Patterson, L. Liao, D. Fox, and H. A. Kautz. Inferring High-Level Behavior from Low-Level Sensors. In UbiComp (LNCS), volume 2864, pages 73--89, 2003.Google Scholar
- }}N. Patwari and S. K. Kasera. Robust Location Distinction using Temporal Link Signatures. In The 13th ACM International Conference on Mobile Computing Networking, pages 111--122, 2007. Google ScholarDigital Library
- }}M. Philipose, K. P. Fishkin, M. Perkowitz, D. J. Patterson, D. Fox, H. Kautz, and D. Hahnel. Inferring Activities from Interactions with Objects. In The IEEE Pervasive Computing, volume 3, pages 50--57, 2004. Google ScholarDigital Library
- }}C. Randell and H. Muller. Context Awareness by Analysing Accelerometer Data. In The 4th IEEE Computer Society International Symposium on Wearable Computers, pages 175--176, 2000. Google ScholarDigital Library
- }}Y. Rubner, C. Tomasi, and L. J. Guibas. The Earth Mover's Distance as a Metric for Image Retrieval. J. Computer Vision, 40:99--121, 2000. Google ScholarDigital Library
- }}T. Sohn, A. Varshavsky, A. LaMarca, M. Y. Chen, T. Choudhury, I. Smith, S. Consolvo, J. Hightower, W. G. Griswold, and E. Lara. Mobility Detection Using Everyday GSM Traces. In UbiComp (LNCS), pages 212--224, 2006. Google ScholarDigital Library
- }}P. Tan, M. Steinback, and V. Kumar. Introduction to Data Mining. Addison Wesley, 2006. Google ScholarDigital Library
- }}M. Wallbaum and S. Diepolder. A Motion Detection Scheme For Wireless LAN Stations. In The 3rd International Conference on Mobile Computing and Ubiquitous Networking, 2006.Google Scholar
- }}I. H. Witten and E. Frank. Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann, San Francisco, 2005. Google ScholarDigital Library
- }}L. Xiao, J. L. Greenstein, N. B. Mandayam, and W. Trappe. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication. In The IEEE International Conference on Communications, pages 4646--4651, 2007.Google Scholar
- }}G. Xing, J. Wang, K. Shen, Q. Huang, X. Jia, and H. C. So. Mobility-assisted Spatiotemporal Detection in Wireless Sensor Networks. In The 28th International Conference on Distributed Computing Systems, 2008. Google ScholarDigital Library
- }}M. Youssef, M. Mah, and A. Agrawala. Device-Free Passive Localization for Wireless Environments. In The 13th ACM International Conference on Mobile Computing and Networking, pages 222--229, 2007. Google ScholarDigital Library
Index Terms
- Detecting intra-room mobility with signal strength descriptors
Recommendations
Security model for Intra-Domain Mobility Management Protocol
Intra-Domain Mobility Management Protocol (IDMP) provides a mobility solution for mobile nodes (MNs) in next-generation wireless networks. It provides a solution for intra-domain mobility without assuming the existence or use of any global mobility ...
A generalized strength-based signal detection model for concentration-encoded molecular communication
BodyNets '13: Proceedings of the 8th International Conference on Body Area NetworksIn this paper, a generalized strength-based signal detection model for Concentration-Encoded Molecular Communication (CEMC) has been presented. The generalized strength-based signal detection problem in diffusion-based CEMC system has been investigated ...
An Intra-domain Mobility Handling Scheme Across All-IP Wireless Networks
The rapid growth of wireless network technology such as HSDPA and WiMAX, has lead to greater demand for access to Internet via mobile hosts. Supporting mobile connection with fast and smooth roaming across heterogeneous wireless technologies has been an ...
Comments