ABSTRACT
The ever increasing ubiquitousness of WiFi access points, coupled with the diffusion of smartphones, suggest that Internet every time and everywhere will soon (if not already has) become a reality. Even in presence of 3G connectivity, our devices are built to switch automatically to WiFi networks so to improve user experience. Most of the times, this is achieved by recurrently broadcasting automatic connectivity requests (known as Probe Requests) to known access points (APs), like, e.g., "Home WiFi", "Campus WiFi", and so on. In a large gathering of people, the number of these probes can be very high. This scenario rises a natural question: "Can significant information on the social structure of a large crowd and on its socioeconomic status be inferred by looking at smartphone probes?". In this work we give a positive answer to this question. We organized a 3-months long campaign, through which we collected around 11M probes sent by more than 160K different devices. During the campaign we targeted national and international events that attracted large crowds as well as other gatherings of people. Then, we present a simple and automatic methodology to build the underlying social graph of the smartphone users, starting from their probes. We do so for each of our target events, and find that they all feature social-network properties. In addition, we show that, by looking at the probes in an event, we can learn important sociological aspects of its participants---language, vendor adoption, and so on.
Supplemental Material
Available for Download
Consolidated Review of Signals from the Crowd: Uncovering Social Relationships Through Smartphone Probes
- L. A. Adamic and E. Adar. Friends and neighbors on the web. Social networks, 25(3):211--230, 2003.Google ScholarCross Ref
- T. Baldwin and M. Lui. Language identification: The long and the short of the matter. In Human Language Technologies. Association for Computational Linguistics, 2010. Google ScholarDigital Library
- A.-L. Barabási and R. Albert. Emergence of scaling in random networks. Science, 286(5439):509--512, 1999.Google ScholarCross Ref
- J. Bhardwaj. Naked security blog: What is your phone saying behind your back?Google Scholar
- R. L. Breiger. The duality of persons and groups. Social forces, 53(2):181--190, 1974.Google ScholarCross Ref
- S. Carter, W. Weerkamp, and M. Tsagkias. Microblog language identification: Overcoming the limitations of short, unedited and idiomatic text. Language Resources and Evaluation, pages 1--21, 2013. Google ScholarDigital Library
- N. Cheng, P. Mohapatra, M. Cunche, M. A. Kaafar, R. Boreli, and S. Krishnamurthy. Inferring user relationship from hidden information in wlans. In Military Communications Conference. IEEE, 2012.Google ScholarCross Ref
- D. J. Crandall, L. Backstrom, D. Cosley, S. Suri, D. Huttenlocher, and J. Kleinberg. Inferring social ties from geographic coincidences. Proceedings of the National Academy of Sciences, 107(52):22436--22441, 2010.Google ScholarCross Ref
- M. Cunche, M. A. Kaafar, and R. Boreli. I know who you will meet this evening! linking wireless devices using wi-fi probe requests. In Proceedings of the International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 2012.Google ScholarCross Ref
- J. Cranshaw, E. Toch, J. Hong, A. Kittur, and N. Sadeh. Bridging the gap between physical location and online social networks. In Proceedings of the 12th International Conference on Ubiquitous Computing. ACM, 2010. Google ScholarDigital Library
- D. A. Dai Zovi and S. A. Macaulay. Attacking automatic wireless network selection. In Proceedings from the Sixth Annual SMC. IEEE, 2005.Google ScholarCross Ref
- L. C. C. Desmond, C. C. Yuan, T. C. Pheng, and R. S. Lee. Identifying unique devices through wireless fingerprinting. In Proceedings of the first conference on Wireless Network Security. ACM, 2008. Google ScholarDigital Library
- N. Eagle and A. Pentland. Reality mining: sensing complex social systems. Personal and ubiquitous computing, 10(4):255--268, 2006. Google ScholarDigital Library
- N. Eagle and A. S. Pentland. Eigenbehaviors: Identifying structure in routine. Behavioral Ecology and Sociobiology, 63(7):1057--1066, 2009.Google ScholarCross Ref
- J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. V. Randwyk, and D. Sicker. Passive data link layer 802.11 wireless device driver fingerprinting. In Proceedings of the 15th USENIX Security Symposium, 2006. Google ScholarDigital Library
- M. S. Granovetter. The strength of weak ties. American journal of sociology, pages 1360--1380, 1973.Google Scholar
- M. Heymans and A. K. Singh. Deriving phylogenetic trees from the similarity analysis of metabolic pathways. Bioinformatics, 19(suppl 1):i138--i146, 2003.Google ScholarCross Ref
- T. Karagiannis, J.-Y. Le Boudec, and M. Vojnovic. Power law and exponential decay of intercontact times between mobile devices. Transactions on Mobile Computing, 9(10):1377--1390, 2010. Google ScholarDigital Library
- L. Katz. A new status index derived from sociometric analysis. Psychometrika, 18(1):39--43, 1953.Google ScholarCross Ref
- C. Klaus. Wireless 802.11b security faq. https://lwn.net/2001/1011/a/wlan-security.php3.Google Scholar
- J. M. Kleinberg. Authoritative sources in a hyperlinked environment. Journal of the ACM (JACM), 46(5):604--632, 1999. Google ScholarDigital Library
- R. Kumar, A. Tomkins, and E. Vee. Connectivity structure of bipartite graphs via the knc-plot. In Proceedings of the international conference on Web search and web data mining. ACM, 2008. Google ScholarDigital Library
- S. Lattanzi and D. Sivakumar. Affiliation networks. In Proceedings of the 41st annual symposium on Theory of computing. ACM, 2009. Google ScholarDigital Library
- J. Leskovec. Stanford large network dataset collection. http://snap.stanford.edu/data/.Google Scholar
- J. Leskovec, L. A. Adamic, and B. A. Huberman. The dynamics of viral marketing. ACM Transactions on the Web (TWEB), 1(1):5, 2007. Google ScholarDigital Library
- J. Leskovec, J. Kleinberg, and C. Faloutsos. Graph evolution: Densification and shrinking diameters. ACM Transactions on Knowledge Discovery from Data (TKDD), 1(1):2, 2007. Google ScholarDigital Library
- D. Liben-Nowell and J. Kleinberg. The link-prediction problem for social networks. Journal of the American society for information science and technology, 58(7):1019--1031, 2007. Google ScholarDigital Library
- J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall. 802.11 user fingerprinting. In Proceedings of the 13th annual international conference on Mobile computing and networking. ACM, 2007. Google ScholarDigital Library
- C. D. Manning, P. Raghavan, and H. Schütze. Introduction to information retrieval, volume 1. Cambridge University Press Cambridge, 2008. Google ScholarDigital Library
- J. McAuley and J. Leskovec. Learning to discover social circles in ego networks. In Advances in Neural Information Processing Systems 25, pages 548--556, 2012.Google ScholarDigital Library
- M. McPherson, L. Smith-Lovin, and J. M. Cook. Birds of a feather: Homophily in social networks. Annual review of sociology, pages 415--444, 2001.Google Scholar
- A. Musa and J. Eriksson. Tracking unmodified smartphones using wi-fi monitors. In Proceedings of the 10th Conference on Embedded Network Sensor Systems. ACM, 2012. Google ScholarDigital Library
- M. E. Newman. Mixing patterns in networks. Physical Review E, 67(2):026126, 2003.Google ScholarCross Ref
- I. Rose and M. Welsh. Mapping the urban wireless landscape with argos. In Proceedings of the 8th Conference on Embedded Networked Sensor Systems. ACM, 2010. Google ScholarDigital Library
- M. Salathé, M. Kazandjieva, J. W. Lee, P. Levis, M. W. Feldman, and J. H. Jones. A high-resolution human contact network for infectious disease transmission. Proceedings of the National Academy of Sciences, 107(51):22020--22025, 2010.Google ScholarCross Ref
- S. Scellato, A. Noulas, R. Lambiotte, and C. Mascolo. Socio-spatial properties of online location-based social networks. ICWSM, 11:329--336, 2011.Google Scholar
- I. C. Society. Ieee standardd 802.11, 2012.Google Scholar
- M. J. Warrens. Inequalities between multi-rater kappas. Advances in data analysis and classification, 4(4):271--286, 2010. Google ScholarDigital Library
- D. J. Watts and S. H. Strogatz. Collective dynamics of 'small-world' networks. nature, 393(6684):440--442, 1998.Google Scholar
- E. Zheleva, H. Sharara, and L. Getoor. Co-evolution of social and affiliation networks. In Proceedings of the 15th international conference on Knowledge discovery and data mining. ACM, 2009. Google ScholarDigital Library
- M. V. Barbera, A. Epasto, A. Mei, S. Kosta, V. C. Perta, and J. Stefa. CRAWDAD data set sapienza/probe-requests, 2013.Google Scholar
Index Terms
- Signals from the crowd: uncovering social relationships through smartphone probes
Recommendations
Detecting repackaged smartphone applications in third-party android marketplaces
CODASPY '12: Proceedings of the second ACM conference on Data and Application Security and PrivacyRecent years have witnessed incredible popularity and adoption of smartphones and mobile devices, which is accompanied by large amount and wide variety of feature-rich smartphone applications. These smartphone applications (or apps), typically organized ...
Smartphone Energy Drain in the Wild: Analysis and Implications
SIGMETRICS '15: Proceedings of the 2015 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer SystemsThe limited battery life of modern smartphones remains a leading factor adversely affecting the mobile experience of millions of smartphone users. In order to extend battery life, it is critical to understand where and how is energy drain happening on ...
Smart smartphone development: iOS versus android
SIGCSE '11: Proceedings of the 42nd ACM technical symposium on Computer science educationIn a remarkably short timeframe, developing apps for smartphones has gone from an arcane curiosity to an essential skill set. Employers are scrambling to find developers capable of transforming their ideas into apps. Educators interested in filling that ...
Comments