skip to main content
10.1145/2504730.2504742acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article

Signals from the crowd: uncovering social relationships through smartphone probes

Published:23 October 2013Publication History

ABSTRACT

The ever increasing ubiquitousness of WiFi access points, coupled with the diffusion of smartphones, suggest that Internet every time and everywhere will soon (if not already has) become a reality. Even in presence of 3G connectivity, our devices are built to switch automatically to WiFi networks so to improve user experience. Most of the times, this is achieved by recurrently broadcasting automatic connectivity requests (known as Probe Requests) to known access points (APs), like, e.g., "Home WiFi", "Campus WiFi", and so on. In a large gathering of people, the number of these probes can be very high. This scenario rises a natural question: "Can significant information on the social structure of a large crowd and on its socioeconomic status be inferred by looking at smartphone probes?". In this work we give a positive answer to this question. We organized a 3-months long campaign, through which we collected around 11M probes sent by more than 160K different devices. During the campaign we targeted national and international events that attracted large crowds as well as other gatherings of people. Then, we present a simple and automatic methodology to build the underlying social graph of the smartphone users, starting from their probes. We do so for each of our target events, and find that they all feature social-network properties. In addition, we show that, by looking at the probes in an event, we can learn important sociological aspects of its participants---language, vendor adoption, and so on.

Skip Supplemental Material Section

Supplemental Material

References

  1. L. A. Adamic and E. Adar. Friends and neighbors on the web. Social networks, 25(3):211--230, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  2. T. Baldwin and M. Lui. Language identification: The long and the short of the matter. In Human Language Technologies. Association for Computational Linguistics, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A.-L. Barabási and R. Albert. Emergence of scaling in random networks. Science, 286(5439):509--512, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  4. J. Bhardwaj. Naked security blog: What is your phone saying behind your back?Google ScholarGoogle Scholar
  5. R. L. Breiger. The duality of persons and groups. Social forces, 53(2):181--190, 1974.Google ScholarGoogle ScholarCross RefCross Ref
  6. S. Carter, W. Weerkamp, and M. Tsagkias. Microblog language identification: Overcoming the limitations of short, unedited and idiomatic text. Language Resources and Evaluation, pages 1--21, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. N. Cheng, P. Mohapatra, M. Cunche, M. A. Kaafar, R. Boreli, and S. Krishnamurthy. Inferring user relationship from hidden information in wlans. In Military Communications Conference. IEEE, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  8. D. J. Crandall, L. Backstrom, D. Cosley, S. Suri, D. Huttenlocher, and J. Kleinberg. Inferring social ties from geographic coincidences. Proceedings of the National Academy of Sciences, 107(52):22436--22441, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  9. M. Cunche, M. A. Kaafar, and R. Boreli. I know who you will meet this evening! linking wireless devices using wi-fi probe requests. In Proceedings of the International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  10. J. Cranshaw, E. Toch, J. Hong, A. Kittur, and N. Sadeh. Bridging the gap between physical location and online social networks. In Proceedings of the 12th International Conference on Ubiquitous Computing. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. A. Dai Zovi and S. A. Macaulay. Attacking automatic wireless network selection. In Proceedings from the Sixth Annual SMC. IEEE, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  12. L. C. C. Desmond, C. C. Yuan, T. C. Pheng, and R. S. Lee. Identifying unique devices through wireless fingerprinting. In Proceedings of the first conference on Wireless Network Security. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. N. Eagle and A. Pentland. Reality mining: sensing complex social systems. Personal and ubiquitous computing, 10(4):255--268, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. N. Eagle and A. S. Pentland. Eigenbehaviors: Identifying structure in routine. Behavioral Ecology and Sociobiology, 63(7):1057--1066, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  15. J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. V. Randwyk, and D. Sicker. Passive data link layer 802.11 wireless device driver fingerprinting. In Proceedings of the 15th USENIX Security Symposium, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. S. Granovetter. The strength of weak ties. American journal of sociology, pages 1360--1380, 1973.Google ScholarGoogle Scholar
  17. M. Heymans and A. K. Singh. Deriving phylogenetic trees from the similarity analysis of metabolic pathways. Bioinformatics, 19(suppl 1):i138--i146, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  18. T. Karagiannis, J.-Y. Le Boudec, and M. Vojnovic. Power law and exponential decay of intercontact times between mobile devices. Transactions on Mobile Computing, 9(10):1377--1390, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. L. Katz. A new status index derived from sociometric analysis. Psychometrika, 18(1):39--43, 1953.Google ScholarGoogle ScholarCross RefCross Ref
  20. C. Klaus. Wireless 802.11b security faq. https://lwn.net/2001/1011/a/wlan-security.php3.Google ScholarGoogle Scholar
  21. J. M. Kleinberg. Authoritative sources in a hyperlinked environment. Journal of the ACM (JACM), 46(5):604--632, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. R. Kumar, A. Tomkins, and E. Vee. Connectivity structure of bipartite graphs via the knc-plot. In Proceedings of the international conference on Web search and web data mining. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Lattanzi and D. Sivakumar. Affiliation networks. In Proceedings of the 41st annual symposium on Theory of computing. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. J. Leskovec. Stanford large network dataset collection. http://snap.stanford.edu/data/.Google ScholarGoogle Scholar
  25. J. Leskovec, L. A. Adamic, and B. A. Huberman. The dynamics of viral marketing. ACM Transactions on the Web (TWEB), 1(1):5, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. J. Leskovec, J. Kleinberg, and C. Faloutsos. Graph evolution: Densification and shrinking diameters. ACM Transactions on Knowledge Discovery from Data (TKDD), 1(1):2, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. D. Liben-Nowell and J. Kleinberg. The link-prediction problem for social networks. Journal of the American society for information science and technology, 58(7):1019--1031, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall. 802.11 user fingerprinting. In Proceedings of the 13th annual international conference on Mobile computing and networking. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. C. D. Manning, P. Raghavan, and H. Schütze. Introduction to information retrieval, volume 1. Cambridge University Press Cambridge, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. J. McAuley and J. Leskovec. Learning to discover social circles in ego networks. In Advances in Neural Information Processing Systems 25, pages 548--556, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. M. McPherson, L. Smith-Lovin, and J. M. Cook. Birds of a feather: Homophily in social networks. Annual review of sociology, pages 415--444, 2001.Google ScholarGoogle Scholar
  32. A. Musa and J. Eriksson. Tracking unmodified smartphones using wi-fi monitors. In Proceedings of the 10th Conference on Embedded Network Sensor Systems. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. M. E. Newman. Mixing patterns in networks. Physical Review E, 67(2):026126, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  34. I. Rose and M. Welsh. Mapping the urban wireless landscape with argos. In Proceedings of the 8th Conference on Embedded Networked Sensor Systems. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. M. Salathé, M. Kazandjieva, J. W. Lee, P. Levis, M. W. Feldman, and J. H. Jones. A high-resolution human contact network for infectious disease transmission. Proceedings of the National Academy of Sciences, 107(51):22020--22025, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  36. S. Scellato, A. Noulas, R. Lambiotte, and C. Mascolo. Socio-spatial properties of online location-based social networks. ICWSM, 11:329--336, 2011.Google ScholarGoogle Scholar
  37. I. C. Society. Ieee standardd 802.11, 2012.Google ScholarGoogle Scholar
  38. M. J. Warrens. Inequalities between multi-rater kappas. Advances in data analysis and classification, 4(4):271--286, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. D. J. Watts and S. H. Strogatz. Collective dynamics of 'small-world' networks. nature, 393(6684):440--442, 1998.Google ScholarGoogle Scholar
  40. E. Zheleva, H. Sharara, and L. Getoor. Co-evolution of social and affiliation networks. In Proceedings of the 15th international conference on Knowledge discovery and data mining. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. M. V. Barbera, A. Epasto, A. Mei, S. Kosta, V. C. Perta, and J. Stefa. CRAWDAD data set sapienza/probe-requests, 2013.Google ScholarGoogle Scholar

Index Terms

  1. Signals from the crowd: uncovering social relationships through smartphone probes

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        IMC '13: Proceedings of the 2013 conference on Internet measurement conference
        October 2013
        480 pages
        ISBN:9781450319539
        DOI:10.1145/2504730

        Copyright © 2013 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 23 October 2013

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        IMC '13 Paper Acceptance Rate42of178submissions,24%Overall Acceptance Rate277of1,083submissions,26%

        Upcoming Conference

        IMC '24
        ACM Internet Measurement Conference
        November 4 - 6, 2024
        Madrid , AA , Spain

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader