-
A Comprehensive Review of Automated Data Annotation Techniques in Human Activity Recognition
Authors:
Florenc Demrozi,
Cristian Turetta,
Fadi Al Machot,
Graziano Pravadelli,
Philipp H. Kindt
Abstract:
Human Activity Recognition (HAR) has become one of the leading research topics of the last decade. As sensing technologies have matured and their economic costs have declined, a host of novel applications, e.g., in healthcare, industry, sports, and daily life activities have become popular. The design of HAR systems requires different time-consuming processing steps, such as data collection, annot…
▽ More
Human Activity Recognition (HAR) has become one of the leading research topics of the last decade. As sensing technologies have matured and their economic costs have declined, a host of novel applications, e.g., in healthcare, industry, sports, and daily life activities have become popular. The design of HAR systems requires different time-consuming processing steps, such as data collection, annotation, and model training and optimization. In particular, data annotation represents the most labor-intensive and cumbersome step in HAR, since it requires extensive and detailed manual work from human annotators. Therefore, different methodologies concerning the automation of the annotation procedure in HAR have been proposed. The annotation problem occurs in different notions and scenarios, which all require individual solutions. In this paper, we provide the first systematic review on data annotation techniques for HAR. By grou** existing approaches into classes and providing a taxonomy, our goal is to support the decision on which techniques can be beneficially used in a given scenario.
△ Less
Submitted 12 July, 2023;
originally announced July 2023.
-
WiFiEye -- Seeing over WiFi Made Accessible
Authors:
Philipp H. Kindt,
Cristian Turetta,
Florenc Demrozi,
Alejandro Masrur,
Graziano Pravadelli,
Samarjit Chakraborty
Abstract:
While commonly used for communication purposes, an increasing number of recent studies consider WiFi for sensing. In particular, wireless signals are altered (e.g., reflected and attenuated) by the human body and objects in the environment. This can be perceived by an observer to infer information on human activities or changes in the environment and, hence, to "see" over WiFi. Until now, works on…
▽ More
While commonly used for communication purposes, an increasing number of recent studies consider WiFi for sensing. In particular, wireless signals are altered (e.g., reflected and attenuated) by the human body and objects in the environment. This can be perceived by an observer to infer information on human activities or changes in the environment and, hence, to "see" over WiFi. Until now, works on WiFi-based sensing have resulted in a set of custom software tools - each designed for a specific purpose. Moreover, given how scattered the literature is, it is difficult to even identify all steps/functions necessary to build a basic system for WiFi-based sensing. This has led to a high entry barrier, hindering further research in this area. There has been no effort to integrate these tools or to build a general software framework that can serve as the basis for further research, e.g., on using machine learning to interpret the altered WiFi signals. To address this issue, in this paper, we propose WiFiEye - a generic software framework that makes all necessary steps/functions available "out of the box". This way, WiFiEye allows researchers to easily bootstrap new WiFi-based sensing applications, thereby, focusing on research rather than on implementation aspects. To illustrate WiFiEye's workflow, we present a case study on WiFi-based human activity recognition.
△ Less
Submitted 6 April, 2022; v1 submitted 4 April, 2022;
originally announced April 2022.
-
Performance Limits of Neighbor Discovery in Wireless Networks
Authors:
Philipp H. Kindt,
Samarjit Chakraborty
Abstract:
Neighbor Discovery (ND) is the process employed by two wireless devices to discover each other. There are many different ND protocols, both in the scientific literature and also those employed in practice. All ND protocols involve devices sending beacons, and also listening for them. Protocols differ in terms of how the beacon transmissions and reception windows are scheduled, and the device sleep…
▽ More
Neighbor Discovery (ND) is the process employed by two wireless devices to discover each other. There are many different ND protocols, both in the scientific literature and also those employed in practice. All ND protocols involve devices sending beacons, and also listening for them. Protocols differ in terms of how the beacon transmissions and reception windows are scheduled, and the device sleeps in between consecutive transmissions and reception windows in order to save energy. A successful discovery constitutes a sending device's beacon overlap** with a receiving device's reception window. The goal of all ND protocols is to minimize the discovery latency. In spite of the ubiquity of ND protocols and active research on this topic for over two decades, the basic question "Given an energy budget, what is the minimum guaranteed ND latency?", however, still remains unanswered. Given the different kinds of protocols that exist, there has also been no standard way of comparing them and their performance. This paper, for the first time, answers the question on the best-achievable ND latency for a given energy budget. We derive discovery latencies for different scenarios, e.g., when both devices have the same energy budgets, and both devices have different energy budgets. We also show that some existing protocols can be parametrized such that they perform optimally. The fact that the parametrizations of some other protocols were optimal was not known before, and can now be established using our technique. Our results are restricted to the case when a few devices discover each other at a time, as is the case in most real-life scenarios. When many devices need to discover each other simultaneously, packet collisions play a dominant role in the discovery latency and how to analyze such scenarios need further study.
△ Less
Submitted 8 March, 2021;
originally announced March 2021.
-
Estimating indoor occupancy through low-cost BLE devices
Authors:
Florenc Demrozi,
Cristian Turetta,
Fabio Chiarani,
Philipp H. Kindt,
Graziano Pravadelli
Abstract:
Detecting the presence of persons and estimating their quantity in an indoor environment has grown in importance recently. For example, the information if a room is unoccupied can be used for automatically switching off the light, air conditioning, and ventilation, thereby saving significant amounts of energy in public buildings. Most existing solutions rely on dedicated hardware installations, wh…
▽ More
Detecting the presence of persons and estimating their quantity in an indoor environment has grown in importance recently. For example, the information if a room is unoccupied can be used for automatically switching off the light, air conditioning, and ventilation, thereby saving significant amounts of energy in public buildings. Most existing solutions rely on dedicated hardware installations, which involve presence sensors, video cameras, and carbon dioxide sensors. Unfortunately, such approaches are costly, are subject to privacy concerns, have high computational requirements, and lack ubiquitousness. The work presented in this article addresses these limitations by proposing a low-cost occupancy detection system. Our approach builds upon detecting variations in Bluetooth Low Energy (BLE) signals related to the presence of humans. The effectiveness of this approach is evaluated by performing comprehensive tests on five different datasets. We apply several pattern recognition models and compare our methodology with systems building upon IEEE 802.11 (WiFi). On average, in multifarious environments, we can correctly classify the occupancy with an accuracy of 97.97%. When estimating the number of people in a room, on average, the estimated number of subjects differs from the actual one by 0.32 persons. We conclude that our system's performance is comparable to that of existing ones based on WiFi, while significantly reducing cost and installation effort. Hence, our approach makes occupancy detection practical for real-world deployments.
△ Less
Submitted 17 May, 2021; v1 submitted 30 January, 2021;
originally announced February 2021.
-
Optimizing BLE-Like Neighbor Discovery
Authors:
Philipp H. Kindt,
Swaminathan Narayanaswamy,
Marco Saur,
Samarjit Chakraborty
Abstract:
Neighbor discovery (ND) protocols are used for establishing a first contact between multiple wireless devices. The energy consumption and discovery latency of this procedure are determined by the parametrization of the protocol. In most existing protocols, reception and transmission are temporally coupled. Such schemes are referred to as \textit{slotted}, for which the problem of finding optimized…
▽ More
Neighbor discovery (ND) protocols are used for establishing a first contact between multiple wireless devices. The energy consumption and discovery latency of this procedure are determined by the parametrization of the protocol. In most existing protocols, reception and transmission are temporally coupled. Such schemes are referred to as \textit{slotted}, for which the problem of finding optimized parametrizations has been studied thoroughly in the literature. However, slotted approaches are not efficient in applications in which new devices join the network gradually and only the joining devices and a master node need to run the ND protocol simultaneously. For example, this is typically the case in IoT scenarios or Bluetooth Low Energy (BLE) piconets. Here, protocols in which packets are transmitted with periodic intervals (PI) can achieve significantly lower worst-case latencies than slotted ones. For this class of protocols, optimal parameter values remain unknown. To address this, we propose an optimization framework for PI-based BLE-like protocols, which translates any specified duty-cycle (and therefore energy budget) into a set of optimized parameter values. We show that the parametrizations resulting from one variant of our proposed scheme are optimal when one receiver discovers one transmitter, and no other parametrization or ND protocol - neither slotted nor slotless - can guarantee lower discovery latencies for a given duty-cycle in this scenario. Since the resulting protocol utilizes the channel more aggressively than other ND protocols, beacons will collide more frequently. Hence, due to collisions, the rate of successful discoveries gracefully decreases for larger numbers of devices discovering each other simultaneously. We also propose a scheme for configuring the BLE protocol (and not just BLE-\textit{like} protocols).
△ Less
Submitted 9 September, 2020;
originally announced September 2020.
-
Digital Contact Tracing Service: An improved decentralized design for privacy and effectiveness
Authors:
Kilian Holzapfel,
Martina Karl,
Linus Lotz,
Georg Carle,
Christian Djeffal,
Christian Fruck,
Christian Haack,
Dirk Heckmann,
Philipp H. Kindt,
Michael Köppl,
Patrick Krause,
Lolian Shtembari,
Lorenz Marx,
Stephan Meighen-Berger,
Birgit Neumair,
Matthias Neumair,
Julia Pollmann,
Tina Pollmann,
Elisa Resconi,
Stefan Schönert,
Andrea Turcati,
Christoph Wiesinger,
Giovanni Zattera,
Christopher Allan,
Esteban Barco
, et al. (12 additional authors not shown)
Abstract:
We propose a decentralized digital contact tracing service that preserves the users' privacy by design while complying to the highest security standards. Our approach is based on Bluetooth and measures actual encounters of people, the contact time period, and estimates the proximity of the contact. We trace the users' contacts and the possible spread of infectious diseases while preventing locatio…
▽ More
We propose a decentralized digital contact tracing service that preserves the users' privacy by design while complying to the highest security standards. Our approach is based on Bluetooth and measures actual encounters of people, the contact time period, and estimates the proximity of the contact. We trace the users' contacts and the possible spread of infectious diseases while preventing location tracking of users, protecting their data and identity. We verify and improve the impact of tracking based on epidemiological models. We compare a centralized and decentralized approach on a legal perspective and find a decentralized approach preferable considering proportionality and data minimization.
△ Less
Submitted 29 June, 2020;
originally announced June 2020.
-
Identifying the BLE Advertising Channel for Reliable Distance Estimation on Smartphones
Authors:
Christian Gentner,
Daniel Günther,
Philipp H. Kindt
Abstract:
As a response to the global COVID-19 surge in 2020, many countries have implemented lockdown or stay-at-home policies. If, however, the contact persons of every infected patient could be identified, the number of virus transmissions could be reduced, while the more incisive measures could be softened. For this purpose, contact tracing using smartphones is being considered as a promising technique.…
▽ More
As a response to the global COVID-19 surge in 2020, many countries have implemented lockdown or stay-at-home policies. If, however, the contact persons of every infected patient could be identified, the number of virus transmissions could be reduced, while the more incisive measures could be softened. For this purpose, contact tracing using smartphones is being considered as a promising technique. Here, smartphones emit and scan for Bluetooth Low Energy (BLE) signals for detecting devices in range. When a device is detected, its distance is estimated by evaluating its received signal strength. The main insight that is exploited for distance estimation is that the attenuation of a signal increases with the distance along which it has traveled. However, besides distance, there are multiple additional factors that impact the attenuation and hence disturb distance estimation. Among them, frequency-selective hardware and signal propagation belong to the most significant ones. For example, a BLE device transmits beacons on three different frequencies (channels), while the transmit power and the receiver sensitivity depend on the frequency. As a result, the received signal strength varies for each channel, even when the distance remains constant. However, the information on which wireless channel a beacon has been received is not made available to a smartphone. Hence, this error cannot be compensated, e.g., by calibration. In this paper, we for the first time provide a solution to detect the wireless channel on which a packet has been received on a smartphone. We experimentally evaluate our proposed technique on multiple different smartphone models. Our results help to make contact tracing more robust by improving the accuracy of distance estimation.
△ Less
Submitted 27 July, 2020; v1 submitted 16 June, 2020;
originally announced June 2020.
-
How Reliable is Smartphone-based Electronic Contact Tracing for COVID-19?
Authors:
Philipp H. Kindt,
Trinad Chakraborty,
Samarjit Chakraborty
Abstract:
Smartphone-based electronic contact tracing is currently considered an essential tool towards easing lockdowns, curfews, and shelter-in-place orders issued by most governments around the world in response to the 2020 novel coronavirus (SARS-CoV-2) crisis. While the focus on develo** smartphone-based contact tracing applications or apps has been on privacy concerns stemming from the use of such a…
▽ More
Smartphone-based electronic contact tracing is currently considered an essential tool towards easing lockdowns, curfews, and shelter-in-place orders issued by most governments around the world in response to the 2020 novel coronavirus (SARS-CoV-2) crisis. While the focus on develo** smartphone-based contact tracing applications or apps has been on privacy concerns stemming from the use of such apps, an important question that has not received sufficient attention is: How reliable will such smartphone-based electronic contact tracing be?
This is a technical question related to how two smartphones reliably register their mutual proximity. Here, we examine in detail the technical prerequisites required for effective smartphone-based contact tracing. The underlying mechanism that any contact tracing app relies on is called Neighbor Discovery (ND), which involves smartphones transmitting and scanning for Bluetooth signals to record their mutual presence whenever they are in close proximity. The hardware support and the software protocols used for ND in smartphones, however, were not designed for reliable contact tracing. In this paper, we quantitatively evaluate how reliably can smartphones do contact tracing. Our results point towards the design of a wearable solution for contact tracing that can overcome the shortcomings of a smartphone-based solution to provide more reliable and accurate contact tracing. To the best of our knowledge, this is the first study that quantifies, both, the suitability and also the drawbacks of smartphone-based contact tracing. Further, our results can be used to parameterize a ND protocol to maximize the reliability of any contact tracing app that uses it.
△ Less
Submitted 22 May, 2020; v1 submitted 12 May, 2020;
originally announced May 2020.
-
On Optimal Neighbor Discovery
Authors:
Philipp H. Kindt,
Samarjit Chakraborty
Abstract:
Mobile devices apply neighbor discovery (ND) protocols to wirelessly initiate a first contact within the shortest possible amount of time and with minimal energy consumption. For this purpose, over the last decade, a vast number of ND protocols have been proposed, which have progressively reduced the relation between the time within which discovery is guaranteed and the energy consumption. In spit…
▽ More
Mobile devices apply neighbor discovery (ND) protocols to wirelessly initiate a first contact within the shortest possible amount of time and with minimal energy consumption. For this purpose, over the last decade, a vast number of ND protocols have been proposed, which have progressively reduced the relation between the time within which discovery is guaranteed and the energy consumption. In spite of the simplicity of the problem statement, even after more than 10 years of research on this specific topic, new solutions are still proposed even today. Despite the large number of known ND protocols, given an energy budget, what is the best achievable latency still remains unclear. This paper addresses this question and for the first time presents safe and tight, duty-cycle-dependent bounds on the worst-case discovery latency that no ND protocol can beat. Surprisingly, several existing protocols are indeed optimal, which has not been known until now. We conclude that there is no further potential to improve the relation between latency and duty-cycle, but future ND protocols can improve their robustness against beacon collisions.
△ Less
Submitted 26 August, 2019; v1 submitted 13 May, 2019;
originally announced May 2019.
-
Fast Collision Simulation for Cyclic Wireless Protocols
Authors:
Philipp H. Kindt,
Sangyoung Park,
Samarjit Chakraborty
Abstract:
With most modern smartphones supporting wireless protocols such as Bluetooth Low Energy (BLE) or ANT+, the number of networks are growing rapidly. Therefore, collisions among multiple networks need to be considered for choosing the appropriate protocol parameters. With growing numbers of networks, simulations for estimating the collision rate become computationally very complex and lengthy. The la…
▽ More
With most modern smartphones supporting wireless protocols such as Bluetooth Low Energy (BLE) or ANT+, the number of networks are growing rapidly. Therefore, collisions among multiple networks need to be considered for choosing the appropriate protocol parameters. With growing numbers of networks, simulations for estimating the collision rate become computationally very complex and lengthy. The large simulation times therefore constitute a major limitation in the analysis of complex cases. In this paper, we present a novel simulation technique which can speed up collision simulations by one order of magnitude in realistic situations. Whenever the transmission of a packet is simulated, the cyclic nature of protocols like BLE is exploited to predict the next packet that has a chance of colliding. All transmissions in between can be skipped without affecting the simulation results. Based on the transmission intervals of the networks, one can compute a certain shrinkage per cycle of the time offset between their packets. Using this shrinkage and the current offset between the starting times of any two packets, our proposed simulation model can accurately predict the next pair of packets that needs to be simulated. Whereas our proposed technique aims at the BLE protocol, the theory is generic and can be used for many other cyclic protocols such as ANT/ANT+ as well.
△ Less
Submitted 4 July, 2018;
originally announced July 2018.
-
Slotless Protocols for Fast and Energy-Efficient Neighbor Discovery
Authors:
Philipp H. Kindt,
Marco Saur,
Samarjit Chakraborty
Abstract:
In mobile ad-hoc networks, neighbor discovery protocols are used to find surrounding devices and to establish a first contact between them. Since the clocks of the devices are not synchronized and their energy-budgets are limited, usually duty-cycled, asynchronous discovery protocols are applied. Only if two devices are awake at the same point in time, they can rendezvous. Currently, time-slotted…
▽ More
In mobile ad-hoc networks, neighbor discovery protocols are used to find surrounding devices and to establish a first contact between them. Since the clocks of the devices are not synchronized and their energy-budgets are limited, usually duty-cycled, asynchronous discovery protocols are applied. Only if two devices are awake at the same point in time, they can rendezvous. Currently, time-slotted protocols, which subdivide time into multiple intervals with equal lengths (slots), are considered to be the most efficient discovery schemes. In this paper, we break away from the assumption of slotted time. We propose a novel, continuous-time discovery protocol, which temporally decouples beaconing and listening. Each device periodically sends packets with a certain interval, and periodically listens for a given duration with a different interval. By optimizing these interval lengths, we show that this scheme can, to the best of our knowledge, outperform all known protocols such as DISCO, U-Connect or Searchlight significantly. For example, Searchlight takes up to 740 % longer than our proposed technique to discover a device with the same duty-cycle. Further, our proposed technique can also be applied in widely-used asymmetric purely interval-based protocols such as ANT or Bluetooth Low Energy.
△ Less
Submitted 13 July, 2016; v1 submitted 18 May, 2016;
originally announced May 2016.