Nozari et al., 2025 - Google Patents
CrowdWatch: Privacy-Preserving Monitoring Leveraging Wi-Fi Multiple Access InformationNozari et al., 2025
- Document ID
- 3462061708778998305
- Author
- Nozari S
- Haleem H
- Garibotto C
- Sciarrone A
- Bisio I
- Lavagetto F
- Publication year
- Publication venue
- IEEE Internet of Things Journal
External Links
Snippet
The use of multiple access protocols information in Internet of Things (IoT) environments has gained significant interest over the past decade, particularly for crowd behavior monitoring. Due to its high data rates and low infrastructure requirements, WiFi is considered one of the …
- 238000012544 monitoring process 0 title abstract description 15
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/008—Mobile application services or facilities specially adapted for wireless communication networks using short range communication, e.g. NFC, RFID or PAN
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Mittal et al. | Analysis of security and energy efficiency for shortest route discovery in low‐energy adaptive clustering hierarchy protocol using Levenberg‐Marquardt neural network and gated recurrent unit for intrusion detection system | |
| Altuwaiyan et al. | EPIC: efficient privacy-preserving contact tracing for infection detection | |
| Redondi et al. | Building up knowledge through passive WiFi probes | |
| Severi et al. | M2M technologies: Enablers for a pervasive Internet of Things | |
| Mahapatra et al. | A survey on secure transmission in internet of things: taxonomy, recent techniques, research requirements, and challenges | |
| US9756461B1 (en) | Privacy-preserving large-scale location monitoring | |
| Matte | Wi-Fi tracking: Fingerprinting attacks and counter-measures | |
| CN104093145A (en) | An Authentication Method Between Adjacent Mobile Terminal Users | |
| US11876830B2 (en) | Network based hyperlocal authentication | |
| Ficara et al. | A tutorial on privacy, RCM and its implications in WLAN | |
| Trnka et al. | Securing internet of things devices using the network context | |
| Chakraborty et al. | RTT-based rogue UAV detection in IoV networks | |
| Varela et al. | Discovering co-located walking groups of people using iBeacon technology | |
| US10419318B2 (en) | Determining attributes using captured network probe data in a wireless communications system | |
| US20190174252A1 (en) | Method and Apparatus for Wireless Client-to-Network Host Association | |
| Vishwas et al. | Recent Trends in Localization, Routing, and Security for Wireless Sensor Networks | |
| Nozari et al. | CrowdWatch: Privacy-Preserving Monitoring Leveraging Wi-Fi Multiple Access Information | |
| Namiot et al. | On the analysis of statistics of mobile visitors | |
| JP2021128599A (en) | Number estimation system, number estimation device, number estimation method, and number estimation program | |
| JP2019212285A (en) | Time-based verification for determining presence of devices and/or individuals at specific locations | |
| CN116057586A (en) | Apparatus and method for identifying transmitting radio equipment | |
| Najafi et al. | Privacy leaks from Wi-Fi probing | |
| Sneps-Sneppe et al. | Smart cities software: customized messages for mobile subscribers | |
| Biehl et al. | Anchor of trust: Towards collusion-resistant trusted indoor location for enterprise and industrial use | |
| Schauer | Wi-Fi tracking threatens users’ privacy in fingerprinting techniques |