+

Nozari et al., 2025 - Google Patents

CrowdWatch: Privacy-Preserving Monitoring Leveraging Wi-Fi Multiple Access Information

Nozari et al., 2025

Document ID
3462061708778998305
Author
Nozari S
Haleem H
Garibotto C
Sciarrone A
Bisio I
Lavagetto F
Publication year
Publication venue
IEEE Internet of Things Journal

External Links

Snippet

The use of multiple access protocols information in Internet of Things (IoT) environments has gained significant interest over the past decade, particularly for crowd behavior monitoring. Due to its high data rates and low infrastructure requirements, WiFi is considered one of the …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/008Mobile application services or facilities specially adapted for wireless communication networks using short range communication, e.g. NFC, RFID or PAN
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Mittal et al. Analysis of security and energy efficiency for shortest route discovery in low‐energy adaptive clustering hierarchy protocol using Levenberg‐Marquardt neural network and gated recurrent unit for intrusion detection system
Altuwaiyan et al. EPIC: efficient privacy-preserving contact tracing for infection detection
Redondi et al. Building up knowledge through passive WiFi probes
Severi et al. M2M technologies: Enablers for a pervasive Internet of Things
Mahapatra et al. A survey on secure transmission in internet of things: taxonomy, recent techniques, research requirements, and challenges
US9756461B1 (en) Privacy-preserving large-scale location monitoring
Matte Wi-Fi tracking: Fingerprinting attacks and counter-measures
CN104093145A (en) An Authentication Method Between Adjacent Mobile Terminal Users
US11876830B2 (en) Network based hyperlocal authentication
Ficara et al. A tutorial on privacy, RCM and its implications in WLAN
Trnka et al. Securing internet of things devices using the network context
Chakraborty et al. RTT-based rogue UAV detection in IoV networks
Varela et al. Discovering co-located walking groups of people using iBeacon technology
US10419318B2 (en) Determining attributes using captured network probe data in a wireless communications system
US20190174252A1 (en) Method and Apparatus for Wireless Client-to-Network Host Association
Vishwas et al. Recent Trends in Localization, Routing, and Security for Wireless Sensor Networks
Nozari et al. CrowdWatch: Privacy-Preserving Monitoring Leveraging Wi-Fi Multiple Access Information
Namiot et al. On the analysis of statistics of mobile visitors
JP2021128599A (en) Number estimation system, number estimation device, number estimation method, and number estimation program
JP2019212285A (en) Time-based verification for determining presence of devices and/or individuals at specific locations
CN116057586A (en) Apparatus and method for identifying transmitting radio equipment
Najafi et al. Privacy leaks from Wi-Fi probing
Sneps-Sneppe et al. Smart cities software: customized messages for mobile subscribers
Biehl et al. Anchor of trust: Towards collusion-resistant trusted indoor location for enterprise and industrial use
Schauer Wi-Fi tracking threatens users’ privacy in fingerprinting techniques
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载