{"id":3277,"date":"2025-08-27T14:47:58","date_gmt":"2025-08-27T12:47:58","guid":{"rendered":"https:\/\/sites.unica.it\/net4u\/?p=3277"},"modified":"2025-08-27T14:47:59","modified_gmt":"2025-08-27T12:47:59","slug":"datasets-of-labelled-device-wi-fi-probe-requests-for-monitoring-crowds","status":"publish","type":"post","link":"https:\/\/sites.unica.it\/net4u\/datasets-of-labelled-device-wi-fi-probe-requests-for-monitoring-crowds\/","title":{"rendered":"Datasets of labelled device Wi-Fi probe requests for monitoring crowds"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Background\u00a0<\/h3>\n\n\n\n<p>The widespread use of personal mobile devices, such as tablets and smartphones, has opened new possibilities for collecting data on individuals&#8217; movements within cities while maintaining their anonymity. Extensive research has explored how personal mobile devices can serve as tools for measuring human presence. To ensure privacy, the collected data must be either anonymous or pseudo-anonymous, leading to a preference for management data.&nbsp;<\/p>\n\n\n\n<p>A popular method involves analysing probe requests, which are Wi-Fi protocol messages sent by mobile devices as they search for access points. These messages contain media access control (MAC) addresses, which were once unique identifiers. However, to protect user privacy, companies like Google, Apple, and Microsoft have introduced algorithms that randomize MAC addresses, causing them to change frequently and unpredictably.&nbsp;<\/p>\n\n\n\n<p>Our work aims to address the issue of fingerprinting Wi-Fi devices through the analysis of management messages, providing an alternative to outdated methods reliant on MAC addresses. By identifying messages from the same device, it becomes possible to count the number of devices in an area, track their duration of stay, and correlate these metrics with the people carrying them.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Datasets&nbsp;<\/h3>\n\n\n\n<p>In this context, we developed datasets containing traces of individually analysed devices on three non-overlapping channels, which can be used to study device behaviour or to generate synthetic traces with multiple devices.&nbsp;<\/p>\n\n\n\n<p>Here are the links to our datasets:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/data.mendeley.com\/datasets\/j64btzdsdy\" target=\"_blank\" rel=\"noreferrer noopener\">A dataset of labelled device Wi-Fi probe requests for MAC address de-randomization \u2013 2021<\/a>\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/data.mendeley.com\/datasets\/5tvnwhsj2p\" target=\"_blank\" rel=\"noreferrer noopener\">A dataset of labelled device Wi-Fi probe requests for MAC address de-randomization &#8211; 2024<\/a>\u00a0<\/li>\n<\/ul>\n\n\n\n<p>Here is the software used to create our datasets:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/github.com\/luciapintor\/WiFi-Sniffer\" target=\"_blank\" rel=\"noreferrer noopener\">Software to collect Wi-Fi probe requests<\/a>\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/github.com\/luciapintor\/SnifferFiltering\" target=\"_blank\" rel=\"noreferrer noopener\">Software to filter the probe requests with higher receiver power<\/a>\u00a0<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">CONFRONT \u2013 Challenge ON wifi FRame fingerprinting for people cOunting aNd Tracking (2024)&nbsp;<\/h3>\n\n\n\n<p>The <a href=\"https:\/\/sites.unica.it\/net4u\/confront-challenge-on-wifi-frame-fingerprinting-for-people-counting-and-trackingconfront\/\" target=\"_blank\" rel=\"noreferrer noopener\">CONFRONT challenge<\/a> took place in 2024 as part of the MOST project. The challenge focused on analysing Wi-Fi management frames to identify patterns that could be used for people counting and tracking in an indoor environment. Participants were provided with Wi-Fi sniffed data, and their task was to develop algorithms capable of extracting useful insights from this data, with a particular emphasis on accuracy and efficiency. The competition aimed to foster collaboration and innovation in the area of Wi-Fi-based device fingerprinting, attracting participants interested in the practical applications of network traffic analysis. Some of the participants presented their work in the special session \u201cChallenges and advanced technologies for crowd mobility monitoring: a 5G\/6G approach\u201d at the <a href=\"https:\/\/www.eucnc.eu\/\" target=\"_blank\" rel=\"noreferrer noopener\">EuCNC &amp; 6G Summit 2024<\/a> conference.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Contacts&nbsp;<\/h3>\n\n\n\n<p>lucia.pintor[at]unica.it&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Funding&nbsp;<\/h3>\n\n\n\n<p>Ministero dello Sviluppo Economico &#8211; <a href=\"https:\/\/www.cagliaridlab.it\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cagliari Digital Lab<\/a> &#8211; G27F22000040008&nbsp;<\/p>\n\n\n\n<p>Ministero dell&#8217;Universit\u00e0 e della Ricerca &#8211; <a href=\"https:\/\/www.centronazionalemost.it\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sustainable Mobility Center (MOST)<\/a> &#8211; 00000023&nbsp;<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Background\u00a0 The widespread use of personal mobile devices, such as tablets and smartphones, has opened new possibilities for collecting data on individuals&#8217; movements within cities while maintaining their anonymity. Extensive research has explored how personal mobile devices can serve as tools for measuring human presence. To ensure privacy, the collected data must be either anonymous&hellip;&nbsp;<a href=\"https:\/\/sites.unica.it\/net4u\/datasets-of-labelled-device-wi-fi-probe-requests-for-monitoring-crowds\/\" rel=\"bookmark\">Leggi tutto &raquo;<span class=\"screen-reader-text\">Datasets of labelled device Wi-Fi probe requests for monitoring crowds<\/span><\/a><\/p>\n","protected":false},"author":3512,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[45],"tags":[],"class_list":["post-3277","post","type-post","status-publish","format-standard","hentry","category-dataset"],"_links":{"self":[{"href":"https:\/\/sites.unica.it\/net4u\/wp-json\/wp\/v2\/posts\/3277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.unica.it\/net4u\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.unica.it\/net4u\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.unica.it\/net4u\/wp-json\/wp\/v2\/users\/3512"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.unica.it\/net4u\/wp-json\/wp\/v2\/comments?post=3277"}],"version-history":[{"count":1,"href":"https:\/\/sites.unica.it\/net4u\/wp-json\/wp\/v2\/posts\/3277\/revisions"}],"predecessor-version":[{"id":3278,"href":"https:\/\/sites.unica.it\/net4u\/wp-json\/wp\/v2\/posts\/3277\/revisions\/3278"}],"wp:attachment":[{"href":"https:\/\/sites.unica.it\/net4u\/wp-json\/wp\/v2\/media?parent=3277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.unica.it\/net4u\/wp-json\/wp\/v2\/categories?post=3277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.unica.it\/net4u\/wp-json\/wp\/v2\/tags?post=3277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}