Digital Marketplaces Unleashed

Home > Other > Digital Marketplaces Unleashed > Page 65
Digital Marketplaces Unleashed Page 65

by Claudia Linnhoff-Popien


  Hence, Wi‐Fi enabled mobile devices periodically perform an IEEE 802.11 active scan, in order to discover available access points in their surroundings more quickly. The scanning interval depends on the used chipset and the Wi‐Fi driver, but not on the association status. Our own investigations show that an active scan is performed at least once within two minutes on average for Android and iOS devices. Furthermore, we also found a maximum idle time of less than 5 min where no probe requests were sent out during a 10 h test phase, despite the case that the test device was associated to an access point or not.

  Generally, a device starts an active scan by sending out probe requests and listens for probe responses (3). This is done for each channel iteratively. Each probe request frame contains the device specific MAC address of sender and receiver, supported rates, the destination’s network name (SSID) and other management information. If the SSID field is left empty, then the probe request addresses all access points in range which is seen as broadcast. If the SSID field is filled with a specific network name, only the corresponding access point with the same SSID will answer with a probe response frame when it’s within range. These directed active probe requests are the consequence of hidden networks, broadcasting beacons with an empty SSID field which makes a directed probe necessary. In practice, various mobile devices broadcast directed probes for each SSID, which is saved in the preferred network list (PNL). In combination with other information from periodical active probes, such as the device MAC address, this can be a serious privacy issue [3].

  All of the mentioned Wi‐Fi management frames can be easily captured by any Wi‐Fi card within range which is set into a special monitor mode. Hence, it is very simple to implement this technique on almost any stationary device containing a Wi‐Fi interface, e. g., access points, laptops, pcs, etc. The aggregation and analyzation of captured packets in an area of interest is also quite simple, due to the fact that management frames contain the essential information in plain‐text, without any encryption. With the usage of advance algorithms in data analytics, one is able to gather useful information from the digital society in a very efficient and easy way. This information can be of high interest for different kind of purposes. Some of these will be presented in the sequel, where we describe scientific and commercial investigations based on captured Wi‐Fi data from the digital crowd.

  42.3 Wi‐Fi Tracking as Emerging Research Field

  Due to the increasing percentage of Wi‐Fi enabled devices in our digital society, the topic of Wi‐Fi tracking has gathered high interest in the scientific world since recent years. Some of the most relevant papers are presented in the following subsections, clustered by the kind of extracted information.

  42.3.1 Crowd Data and Social Information

  As already mentioned, probe request frames transport different types of management data which can be used to gather some general information about mobile users passing by a Wi‐Fi monitor.

  For instance, on the basis of the first three Bytes of a captured MAC‐address, Barbera et al. [4] determine the manufacturer ID of the sender by performing an OUI – organizationally unique identifier – lookup. One observation of this investigation is the remarkable dominance of Apple devices, which was also detected by our tests at a major German airport [5]. However, these results have to be treated carefully, due to the fact, that Apple devices perform active scans more often, and thus, they might be detected more frequently than other devices.

  Beside this, Barbera et al. focus on social relationships in their work and use captured Wi‐Fi probes to uncover the social structure of the set of people in the crowd. They determine the similarity of users’ context by comparing the SSIDs in the probes and performed a thorough social analysis in terms of social links, user languages, and vendor adoptions in different real‐world scenarios.

  Cunche et al. [6] also investigate social links based on captured Wi‐Fi probes by comparing SSIDs fingerprints using different similarity metrics. On the basis of two large datasets, partly collected with the help of volunteers, the authors conclude that the detection of relationships by analyzing captured Wi‐Fi probes is very easy and also a huge privacy risk.

  Ruiz‐Ruiz et al. [7] present several analysis methods for extracting knowledge from Wi‐Fi tracking data. They perform a huge real‐world study in a hospital and calculate various features, such as vendor adoptions, arrival and stay times, frequented places, densities, flows, and so on. The authors conclude that they could extract realistic information reflecting real behavior of people in such a complex environment.

  42.3.2 Density and Pedestrian Flow Information

  The current user density is quite easy to determine by the amount of captured unique devices being within a Wi‐Fi monitor’s coverage range for a certain time interval. Flow information can then be extracted out of the density information from more than one monitor node supervising an area of interest, as it is schematically illustrated in Fig. 42.2. The pedestrian flow is computed as the amount of people moving one way through this area which can be determined by comparing captured MAC‐addresses at all of the installed monitor nodes [5].

  Fig. 42.2Density and Pedestrian Flow in an Area of Interest

  Schauer et al. [8] used this procedure and deployed two monitor nodes in the public and security area of an airport divided by a single security check‐in counter. With the access to corresponding boarding pass scans, they were able to compare their density and flow estimations with ground truth data. Overall, they determined a strong correlation of 0.75 between the Wi‐Fi estimations and the real amount of people passing through the security check.

  Fukuzaki et al. [9] claim that pedestrian flow sensing using Wi‐Fi monitors is one of the most promising technique for smart cities. They conducted a two-month experiment with 20 Wi‐Fi monitors deployed in a shopping mall and determined a coefficient to estimate the number of people. An error rate of 260 persons for weekdays has been achieved.

  Li et al. [10] presented a system called SenseFlow for monitoring people density and flows based on Wi‐Fi tracking data. The system was evaluated in four different application scenarios focusing on various parameters which may have an influence on the tracking accuracy e. g., the device type, the device’s operational mode, or the underlying human walking behavior. Overall, the system showed an accuracy of up to 93% in case of Android and 80% for Apple devices in best case.

  42.3.3 Location and Trajectory Information

  One of the most interesting but also very challenging topic in the field of Wi‐Fi tracking is the detection and determination of users’ current locations and their trajectories. Due to arbitrary probe transmissions form moving mobile devices and significant fluctuations in the Wi‐Fi based received signal strengths indicator (RSSI), simple positioning methods are not sufficient for achieving accurate localization results. Bonné et al. [11] confirm this statement claiming that several empirical tests have indicated that the RSSI value is not feasible in crowded environments for tracking the device’s location. The authors conducted two large real‐world experiments at their university campus and at a music festival.

  A more sophisticated solution for tracking complete trajectories of unmodified smartphones is presented by Musa and Eriksson [12]. They used a probabilistic method based on Hidden Markov Model and Viterbi’s algorithm and performed real‐word experiments on a road network. Their Wi‐Fi based trajectory estimations are compared to ground truth data provided by GPS resulting in a mean estimation error of under 70 m.

  Chon et al. [13] performed a complete urban mobility monitoring project based on Wi‐Fi tracking. They used the well‐adopted fingerprinting technique and distinguished between stationary and moving users, in order to detect logical and revisited places. Their experiment was conducted with 25 students
over a seven week period in Seoul.

  Wi‐Fi based trajectory estimations for indoor scenarios were also performed by Schauer et al. [14]. They investigated several probabilistic methods and introduced a modification to a common particle filter implementation in order to improve the tracking accuracy and its performance. Overall, a mean error of 11.65 meters for complete trajectories have been achieved indicating that highly accurate localizations of users based on Wi‐Fi tracking data remain challenging.

  42.3.4 Other Context Information

  Beside the mentioned types of extracted information, there is still a lot of research inferring other context information from Wi‐Fi tracking data.

  For instance, Wang et al. [15] proposed a method for measuring human queues using a single Wi‐Fi monitor. Such queues can be found in different business scenarios, such as retail stores, or at state departments. The authors infer typical and significant time spans, e. g., waiting in the queue, being attended, or leaving the queue, just by Wi‐Fi signal readings form mobile devices. Their approach was tested within several experiments at different places, such as coffee shops, laboratory, or at an airport, reaching an estimation error of about 5 s for short and normal service times and under 10 s for longer service times.

  Another interesting work is introduced by Maier et al. [16] who use Wi‐Fi management frames for a privacy‐preserving proximity detection for mobile users. The authors use a variation of the well‐adopted cosine similarity to measure the degree of spatial closeness of mobile targets listening on probe requests from their environment. The idea behind is, that the collections of Wi‐Fi probes in the surrounding of a mobile user depends on both spatial and temporal criteria. If two users capture a similar amount of probes, they can be seen in a spatial closeness at this moment. The results derived from conducted experiments at different scenarios yield to the conclusion, that a short‐range and privacy preserving proximity detection is possible when using Wi‐Fi tracking data.

  Based on the presented scientific works, we conclude that Wi‐Fi tracking involves high potentials for analyzing our digital society without requiring any active user participation nor any device or hardware modification. We have shown different aspects of extracting essential information from the crowd which can be very valuable for various use and business cases. Considering the ongoing digitalization with the increasing usage of Wi‐Fi enabled devices, this technique becomes even more promising for innovative business cases in the near future.

  42.4 Wi‐Fi Tracking as Innovative Business Model

  We have just demonstrated the potentials of Wi‐Fi tracking and the kind of investigations which are performed in an experimental and scientific context. In this section, however, we highlight the business context and show how Wi‐Fi tracking can be used economically.

  Due to the increased attention of this technique, a lot of smaller and bigger companies exists offering products and special business services based on Wi‐Fi tracking. Most customers of such products are retail shop managers who search for adequate analytic tools in order to analyze the behavior of their customers, like it is well‐established in online shops. Hence, they require valuable insights about locations, interests, and all interactions of customers inside their shops. In the sequel, we present and compare some of the companies trying to solve this problem by Wi‐Fi tracking:

  42reports1 is a Berlin Start‐up focusing on Wi‐Fi tracking to monitor customers in retail stores. It was founded in December 2012 and bought by DILAX Intelcom GmbH in April 2016. Beside Wi‐Fi, they use other sensors, such as cameras and Bluetooth Beacons, and offer both the infrastructure and tools for retail analytics. Their services are divided into three packages and can be used to access different levels of information about customers’ behavior and the shop’s situation. Hence, shop managers get the possibility to see how their marketing performs and can make data‐driven decisions. Some important features from the provided services are listed below: Detection and recognition of customers (new and old)

  Counting, frequency and success rates

  Forecasts

  Return of investment (ROI) analyzations

  Dwell times, density and flow information

  Visualization tools for different platforms in responsive design

  Another important topic for 42reports is the protection of users’ privacy. The start‐up claim to be one of the leaders in security and protection of data privacy. Therefore, they perform 256‐bit SSL encryption and a MAC‐address anonymization for their retail analytic tools. Hence, third parties and shop owners don’t get access to real MAC‐addresses which belong to personal information (like IP‐addresses).

  sensalytics2 provides similar services for retail shops, events and public buildings. Again, they offer different sensors, such as infrared, Wi‐Fi, 3D‐cameras, and a particular revenue sensor. Their basic concept is to measure all kind of customer and user interactions, in order to provide thorough analyzation possibilities for manager to make operational and strategic decisions. Based on Wi‐Fi tracking, sensalytics extract similar information as 42reports, such as dwell times, detection and recognition of visitors, etc. On their website, they specify the counting accuracy between 40 and 70%. Note here, that other Wi‐Fi tracking companies do not publish any data about accuracies and precisions of their services. Beside in‐store analytics, sensalytics also focus on fairs and events, and offers a solution for human queue analysis which is, unlike to Wang et al. [15], based on 3D‐camera sensors. Overall, with the fusion of the named sensors and the proposed software, they give retailers and event managers some of the possibilities which are quite common and well‐adopted in e‐commerce: the analyzation of customers. In this context, other German business rivals have to be mentioned, such as Infsoft3, Crosscan4, or RetailReports5, providing similar analytic tools and services for retail shops.

  Within the European market, walkbase6 is one of the most famous retail analytics providers. Some of their key partners are IBM, Samsung, or Cisco. Beside the services we already mentioned above, walkbase also provides marketing optimization tools, queue management, passenger flow optimization, and location based services. They claim that “Wi‐Fi is the most versatile technology for modern retail analytics”. Using Wi‐Fi and Bluetooth enabled devices, they even provide indoor positioning for opt‐in passengers at travel hubs.

  Euclid Analytics7 is another company from the US using Wi‐Fi probes from mobile devices for customer analytics. They offer “three distinct products to meet the needs of retailers, restaurants and malls”. Their services include among others: visitor counts, evaluation of marketing campaigns, identifying visitor patterns, analyzation of visitor behavior, and understanding entire customer buying journeys. Like walkbase, Euclid was founded in 2010 and states that it is nowadays “monitoring hundreds of millions of events daily”.

  Based on the introduced examples of companies and start‐ups from above, one can get an adequate overview of the potentials of Wi‐Fi tracking for innovative business models in our digital world where mobile devices are more and more popular. Hence, on the one hand, this technique renders digital analytic tools possible for retailers and offline marketplaces. On the other hand, we have to look carefully on social restrictions, such as users’ privacy, and consider technical changes in the near future which may degrade these potentials and cause negative impacts. Thus, we will discuss these points in the following section.

  42.5 Social and Technical Consequences of Wi‐Fi Tracking

  As we have demonstrated, Wi‐Fi tracking combined with big data algorithms creates the ability to track and analyze mobile users without their consent or even awareness. No complex hard‐ or software is required, and thus, it is very easy for companies or even malicious persons to use this technique for their intents. Hence, anyone who carrie
s a Wi‐Fi enabled mobile device risks to be tracked all the time involuntarily. This fact is a major issue for users’ privacy and their implicit rights on personal data.

  So what are the consequences for our more and more digitalized society where a stable and fast connection to the Internet is treated as a valuable asset? Sure, the easiest and most effective way is just to disable Wi‐Fi interfaces and use more mobile data connections. However, inside huge buildings, e. g., shopping malls, or airports, only Wi‐Fi may provide a stable connection. Furthermore, we suppose that only a few people are willing to enable or disable the Wi‐Fi adapter several times per day.

  Stricter laws and penalties which prohibit passive Wi‐Fi sniffing in public spaces would be a political way trying to reduce the risk of being involuntarily analyzed. However, this would probably not prevent malicious persons from sniffing Wi‐Fi traffic, and would definitively destroy all the innovative business models we mentioned in the previous section.

  Users could also actively remove network names from their PNL which are not going to be used anymore. This would at least decrease the number of SSIDs sent out by probe requests and thus, social profiling becomes more difficult and inaccurate. However, most users never delete their saved networks and furthermore, this method does not protect users from being analyzed by Wi‐Fi sniffers.

 

‹ Prev