Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Next2You: Robust Copresence Detection Based on Channel State Information

Published: 15 February 2022 Publication History

Abstract

Context-based copresence detection schemes are a necessary prerequisite to building secure and usable authentication systems in the Internet of Things (IoT). Such schemes allow one device to verify proximity of another device without user assistance utilizing their physical context (e.g., audio). The state-of-the-art copresence detection schemes suffer from two major limitations: (1) They cannot accurately detect copresence in low-entropy context (e.g., empty room with few events occurring) and insufficiently separated environments (e.g., adjacent rooms), (2) They require devices to have common sensors (e.g., microphones) to capture context, making them impractical on devices with heterogeneous sensors. We address these limitations, proposing Next2You, a novel copresence detection scheme utilizing channel state information (CSI). In particular, we leverage magnitude and phase values from a range of subcarriers specifying a Wi-Fi channel to capture a robust wireless context created when devices communicate. We implement Next2You on off-the-shelf smartphones relying only on ubiquitous Wi-Fi chipsets and evaluate it based on over 95 hours of CSI measurements that we collect in five real-world scenarios. Next2You achieves error rates below 4%, maintaining accurate copresence detection both in low-entropy context and insufficiently separated environments. We also demonstrate the capability of Next2You to work reliably in real-time and its robustness to various attacks.

References

[1]
Pooyan Abouzar, David G. Michelson, and Maziyar Hamdi. 2016. RSSI-based distributed self-localization for wireless sensor networks used in precision agriculture. IEEE Transactions on Wireless Communications 15, 10 (2016), 6638–6650.
[2]
Amirhossein Yazdani Abyaneh, Ali Hosein Gharari Foumani, and Vahid Pourahmadi. 2018. Deep neural networks meet CSI-based authentication. arXiv:1812.04715. Retrieved from https://arxiv.org/abs/1812.04715.
[3]
Yugo Agata, Jihoon Hong, and Tomoaki Ohtsuki. 2015. Room-level proximity detection using beacon frame from multiple access points. In Proceedings of the 2015 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference. IEEE, 941–945.
[4]
Yugo Agata, Jihoon Hong, and Tomoaki Ohtsuki. 2016. Room-level proximity detection based on RSS of dual-band Wi-Fi signals. In Proceedings of the IEEE International Conference on Communications. IEEE, 1–6.
[5]
Aviva. 2020. Tech Nation: Number of Internet-Connected Devices Grows to 10 per Home. Retrieved 29 September, 2021 from https://www.aviva.com/newsroom/news-releases/2020/01/tech-nation-number-of-internet-connected-devices-grows-to-10-per-home/.
[6]
David Baehrens, Timon Schroeter, Stefan Harmeling, Motoaki Kawanabe, Katja Hansen, and Klaus-Robert Müller. 2010. How to explain individual classification decisions. The Journal of Machine Learning Research 11, 61 (2010), 1803–1831.
[7]
Jason Brownlee. 2020. How to Control the Stability of Training Neural Networks with the Batch Size. Retrieved from https://machinelearningmastery.com/how-to-control-the-speed-and-stability-of-training-neural-networks-with-gradient-descent-batch-size/.
[8]
Jiska Classen and Matthias Hollick. 2019. Inside job: Diagnosing bluetooth lower layers using off-the-shelf devices. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks. 186–191.
[9]
Mauro Conti and Chhagan Lal. 2019. Context-based co-presence detection techniques: A survey. Computers & Security 88 (2019), 101652.
[10]
Song Fang, Yao Liu, Wenbo Shen, and Haojin Zhu. 2014. Where are you from? Confusing location distinction using virtual multipath camouflage. In Proceedings of the 20th Annual International Conference on Mobile Computing and Networking. 225–236.
[11]
Song Fang, Yao Liu, Wenbo Shen, Haojin Zhu, and Tao Wang. 2016. Virtual multipath attack and defense for location distinction in wireless networks. IEEE Transactions on Mobile Computing 16, 2 (2016), 566–580.
[12]
Chen Feng, Wain Sy Anthea Au, Shahrokh Valaee, and Zhenhui Tan. 2011. Received-signal-strength-based indoor positioning using compressive sensing. IEEE Transactions on Mobile Computing 11, 12 (2011), 1983–1993.
[13]
Mikhail Fomichev, Luis F. Abanto-Leon, Max Stiegler, Alejandro Molina, Jakob Link, and Matthias Hollick. 2021. Index of Supplementary Files from “Next2You: Robust Copresence Detection Based on Channel State Information”. ACM Transactions on Internet of Things 1, 1 (2021), 1–30. DOI:https://doi.org/10.5281/zenodo.5105815
[14]
Mikhail Fomichev, Flor Álvarez, Daniel Steinmetzer, Paul Gardner-Stephen, and Matthias Hollick. 2018. Survey and systematization of secure device pairing. IEEE Communications Surveys & Tutorials 20, 1 (2018), 517–550.
[15]
Mikhail Fomichev, Max Maass, Lars Almon, Alejandro Molina, and Matthias Hollick. 2019. Perils of zero-interaction security in the Internet of Things. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 1 (2019), 10.
[16]
Jonathan Frankle and Michael Carbin. 2018. The lottery ticket hypothesis: Finding sparse, trainable neural networks. In 7th International Conference on Learning Representations (ICLR’19).
[17]
Futurae Technologies AG. 2019. Futurae Authentication Suite. Retrieved 29 September, 2021 from https://www.futurae.com/product/strongauth/.
[18]
Piotr Gawłowicz, Anatolij Zubow, Suzan Bayhan, and Adam Wolisz. 2020. Punched cards over the air: Cross-technology communication between LTE-U/LAA and WiFi. In Proceedings of the 21st IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks. IEEE.
[19]
Liangyi Gong, Wu Yang, Zimu Zhou, Dapeng Man, Haibin Cai, Xiancun Zhou, and Zheng Yang. 2016. An adaptive wireless passive human detection via fine-grained physical layer information. Ad Hoc Networks 100, 38 (2016), 38–50.
[20]
Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep Learning. MIT press.
[21]
Francesco Gringoli, Matthias Schulz, Jakob Link, and Matthias Hollick. 2019. Free your CSI: A channel state information extraction platform for modern Wi-Fi chipsets. In Proceedings of the 13th International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization. 21–28.
[22]
Tzipora Halevi, Di Ma, Nitesh Saxena, and Tuo Xiang. 2012. Secure proximity detection for NFC devices based on ambient sensor data. In Proceedings of the European Symposium on Research in Computer Security. Springer, 379–396.
[23]
Daniel Halperin, Wenjun Hu, Anmol Sheth, and David Wetherall. 2011. Tool release: Gathering 802.11n traces with channel state information. ACM SIGCOMM CCR 41, 1 (2011), 53.
[24]
Jun Han, Albert Jin Chung, Manal Kumar Sinha, Madhumitha Harishankar, Shijia Pan, Hae Young Noh, Pei Zhang, and Patrick Tague. 2018. Do you feel what I hear? Enabling autonomous IoT device pairing using different sensor types. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 836–852.
[25]
Steven C. Hauser, William C. Headley, and Alan J. Michaels. 2017. Signal detection effects on deep neural networks utilizing raw IQ for modulation classification. In Proceedings of the IEEE Military Communications Conference. IEEE, 121–127.
[26]
Kurt Hornik, Maxwell Stinchcombe, and Halbert White. 1989. Multilayer feedforward networks are universal approximators. Neural Networks 2, 5 (1989), 359–366.
[27]
Donny Huang, Rajalakshmi Nandakumar, and Shyamnath Gollakota. 2014. Feasibility and limits of Wi-Fi imaging. In Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems. 266–279.
[28]
Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, and Srdjan Capkun. 2015. Sound-proof: Usable two-factor authentication based on ambient sound. In Proceedings of the 24th \(\lbrace\) USENIX \(\rbrace\) Security Symposium ( \(\lbrace\) USENIX \(\rbrace\) Security 15). 483–498.
[29]
Keras team. 2020. Keras: The Python Deep Learning Library. Retrieved 29 September, 2021 from https://keras.io/.
[30]
Diederik P. Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. In 3rd International Conference on Learning Representations (ICLR’15).
[31]
Sebastian Lapuschkin, Stephan Wäldchen, Alexander Binder, Grégoire Montavon, Wojciech Samek, and Klaus-Robert Müller. 2019. Unmasking Clever Hans predictors and assessing what machines really learn. Nature Communications 10, 1 (2019), 1–8.
[32]
Yann LeCun, Bernhard Boser, John S. Denker, Donnie Henderson, Richard E. Howard, Wayne Hubbard, and Lawrence D. Jackel. 1989. Backpropagation applied to handwritten zip code recognition. Neural Computation 1, 4 (1989), 541–551.
[33]
Jialin Liu, Lei Wang, Linlin Guo, Jian Fang, Bingxian Lu, and Wei Zhou. 2017. A research on CSI-based human motion detection in complex scenarios. In Proceedings of the IEEE 19th International Conference on e-Health Networking, Applications and Services. IEEE, 1–6.
[34]
Zhou Lu, Hongming Pu, Feicheng Wang, Zhiqiang Hu, and Liwei Wang. 2017. The expressive power of neural networks: A view from the width. In Proceedings of the 31st International Conference on Neural Information Processing Systems. 6232–6240.
[35]
Yongsen Ma, Gang Zhou, and Shuangquan Wang. 2019. WiFi sensing with channel state information: A survey. ACM Computing Surveys 52, 3 (2019), 1–36.
[36]
Dennis Mantz, Jiska Classen, Matthias Schulz, and Matthias Hollick. 2019. Internalblue-bluetooth binary patching and experimentation framework. In Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services. 79–90.
[37]
Shrirang Mare, Andrés Molina Markham, Cory Cornelius, Ronald Peterson, and David Kotz. 2014. Zebra: Zero-effort bilateral recurring authentication. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 705–720.
[38]
Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, and Srdjan Capkun. 2014. Smartphones as practical and secure location verification tokens for payments. In Proceedings of the 21st Network and Distributed System Security Symposium. Vol. 14, 23–26.
[39]
Jan Matuszewski and Katarzyna Sikorska-Łukasiewicz. 2017. Neural network application for emitter identification. In Proceedings of the 18th International Radar Symposium. IEEE, 1–8.
[40]
Arne Niitsoo, Thorsten Edelhäuβer, and Christopher Mutschler. 2018. Convolutional neural networks for position estimation in TDoA-based locating systems. In Proceedings of the International Conference on Indoor Positioning and Indoor Navigation. IEEE, 1–8.
[41]
Timothy James O’Shea, Tamoghna Roy, and T. Charles Clancy. 2018. Over-the-air deep learning based radio signal classification. IEEE Journal of Selected Topics in Signal Processing 12, 1 (2018), 168–179.
[42]
Fernando Pérez-Cruz, Pablo M. Olmos, Michael Minyi Zhang, and Howard Huang. 2019. Probabilistic time of arrival localization. IEEE Signal Processing Letters 26, 11 (2019), 1683–1687.
[43]
Florentin Putz, Flor Álvarez, and Jiska Classen. 2020. Acoustic integrity codes: Secure device pairing using short-range acoustic communication. In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. 31–41.
[44]
Kun Qian, Chenshu Wu, Zheng Yang, Yunhao Liu, and Zimu Zhou. 2014. PADS: Passive detection of moving targets with dynamic speed using PHY layer information. In Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems. IEEE, 1–8.
[45]
Andrew Slavin Ross, Michael C. Hughes, and Finale Doshi-Velez. 2017. Right for the right reasons: Training differentiable models by constraining their explanations. In Proceedings of the 26th International Joint Conference on Artificial Intelligence. 2662–2670.
[46]
B. Schultz. 2013. 802.11 ad–WLAN at 60 GHz–A Technology Introduction. Rohde & Schwarz.
[47]
Matthias Schulz, Jakob Link, Francesco Gringoli, and Matthias Hollick. 2018. Shadow Wi-Fi: Teaching smartphones to transmit raw signals and to extract channel state information to implement practical covert channels over Wi-Fi. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services. ACM, 256–268.
[48]
Matthias Schulz, Daniel Wegemer, and Matthias Hollick. 2017. Nexmon: The C-based Firmware Patching Framework. Retrieved 29 September, 2021 from https://nexmon.org.
[49]
Souvik Sen, Božidar Radunovic, Romit Roy Choudhury, and Tom Minka. 2012. You are facing the Mona Lisa: Spot localization using PHY layer information. In Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services. 183–196.
[50]
Carlton Shepherd, Iakovos Gurulian, Eibe Frank, Konstantinos Markantonakis, Raja Naeem Akram, Emmanouil Panaousis, and Keith Mayes. 2017. The applicability of ambient sensors as proximity evidence for NFC transactions. In Proceedings of the IEEE Security and Privacy Workshops. IEEE, 179–188.
[51]
Cong Shi, Jian Liu, Hongbo Liu, and Yingying Chen. 2017. Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing. 1–10.
[52]
Yi Shi, Kemal Davaslioglu, Yalin E. Sagduyu, William C. Headley, Michael Fowler, and Gilbert Green. 2019. Deep learning for RF signal classification in unknown and dynamic spectrum environments. In Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks. IEEE, 1–10.
[53]
Babins Shrestha, Manar Mohamed, and Nitesh Saxena. 2019. ZEMFA: Zero-effort multi-factor authentication based on multi-modal gait biometrics. In Proceedings of the 17th International Conference on Privacy, Security and Trust. IEEE, 1–10.
[54]
Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, and N. Asokan. 2014. Drone to the rescue: Relay-resilient authentication using ambient multi-sensing. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 349–364.
[55]
Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, and N. Asokan. 2018. Sensor-based proximity detection in the face of active adversaries. IEEE Transactions on Mobile Computing 18, 2 (2018), 444–457.
[56]
Babins Shrestha, Maliheh Shirvanian, Prakash Shrestha, and Nitesh Saxena. 2016. The sounds of the phones: Dangers of zero-effort second factor login based on ambient audio. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 908–919.
[57]
Dave Shuman. 2019. Looking Under the Hood of the Connected Car. Retrieved 29 September, 2021 from https://www.techradar.com/news/looking-under-the-hood-of-the-connected-car.
[58]
Sho Sonoda and Noboru Murata. 2017. Neural network with unbounded activation functions is universal approximator. Applied and Computational Harmonic Analysis 43, 2 (2017), 233–268.
[59]
Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2014. Dropout: A simple way to prevent neural networks from overfitting. The Journal of Machine Learning Research 15, 1 (2014), 1929–1958.
[60]
Milan Stute, David Kreitschmann, and Matthias Hollick. 2018. One billion Apples’ secret sauce: Recipe for the Apple Wireless Direct Link Ad hoc protocol. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking. ACM, 529–543.
[61]
Milan Stute, Sashank Narain, Alex Mariotto, Alexander Heinrich, David Kreitschmann, Guevara Noubir, and Matthias Hollick. 2019. A billion open interfaces for eve and mallory: MitM, DoS, and tracking attacks on iOS and macOS through Apple Wireless Direct Link. In Proceedings of the 28th USENIX Conference on Security Symposium. 37–54.
[62]
Chuanqi Tan, Fuchun Sun, Tao Kong, Wenchang Zhang, Chao Yang, and Chunfang Liu. 2018. A survey on deep transfer learning. In Proceedings of the International Conference on Artificial Neural Networks. Springer, 270–279.
[63]
TensorFlow team. 2020. Deploy Machine Learning Models on Mobile and IoT Devices. Retrieved 29 September, 2021 from https://www.tensorflow.org/lite.
[64]
The Weaver Computer Engineering Research Group. 2020. The Top 50 Fastest Computers in the Weaver Research Group. Retrieved 29 September, 2021 from http://web.eece.maine.edu/ vweaver/group/machines.html.
[65]
Hien Thi Thu Truong, Xiang Gao, Babins Shrestha, Nitesh Saxena, N. Asokan, and Petteri Nurmi. 2014. Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications. IEEE, 163–171.
[66]
Hien Thi Thu Truong, Juhani Toivonen, Thien Duc Nguyen, Claudio Soriente, Sasu Tarkoma, and N. Asokan. 2019. DoubleEcho: Mitigating context-manipulation attacks in copresence verification. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications. IEEE.
[67]
Taylor Twain. 2019. 6 Most Commonly Used IoT Communication Protocols. Retrieved 29 September, 2021 from http://techgenix.com/iot-communication-protocols/.
[68]
Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, Łukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. In Proceedings of the 31st International Conference on Neural Information Processing Systems. 5998–6008.
[69]
Xuyu Wang, Lingjun Gao, and Shiwen Mao. 2016. CSI phase fingerprinting for indoor localization with a deep learning approach. IEEE Internet of Things Journal 3, 6 (2016), 1113–1123.
[70]
Xuyu Wang, Lingjun Gao, and Shiwen Mao. 2017. BiLoc: Bi-modal deep learning for indoor localization with commodity 5GHz WiFi. IEEE Access 5 (2017), 4209–4220.
[71]
Myounggyu Won, Shaohu Zhang, and Sang H. Son. 2017. WiTraffic: Low-cost and non-intrusive traffic monitoring system using WiFi. In Proceedings of the 26th International Conference on Computer Communication and Networks. IEEE, 1–9.
[72]
Kaishun Wu, Jiang Xiao, Youwen Yi, Dihu Chen, Xiaonan Luo, and Lionel M. Ni. 2012. CSI-based indoor localization. IEEE Transactions on Parallel and Distributed Systems 24, 7 (2012), 1300–1309.
[73]
Yuezhong Wu, Qi Lin, Hong Jia, Mahbub Hassan, and Wen Hu. 2020. Auto-Key: Using autoencoder to speed up gait-based key generation in body area networks. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4, 1 (2020), 1–23.
[74]
Wei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, and Jizhong Zhao. 2016. Instant and robust authentication and key agreement among mobile devices. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 616–627.
[75]
Jiang Xiao, Zimu Zhou, Youwen Yi, and Lionel M. Ni. 2016. A survey on wireless indoor localization from the device perspective. ACM Computing Surveys 49, 2 (2016), 1–31.
[76]
Yaxiong Xie, Zhenjiang Li, and Mo Li. 2015. Precise power delay profiling with commodity WiFi. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking. ACM, 53–64.
[77]
Jie Xiong and Kyle Jamieson. 2013. Arraytrack: A fine-grained indoor location system. In Proceedings of the 10th \(\lbrace\) USENIX \(\rbrace\) Symposium on Networked Systems Design and Implementation. 71–84.
[78]
Jie Xiong and Kyle Jamieson. 2013. Securearray: Improving WiFi security with fine-grained physical-layer information. In Proceedings of the 19th Annual International Conference on Mobile Computing & Networking. 441–452.
[79]
Bing Xu, Naiyan Wang, Tianqi Chen, and Mu Li. 2015. Empirical evaluation of rectified activations in convolutional network. arXiv:1505.00853. Retrieved from https://arxiv.org/abs/1505.00853.
[80]
Jiang Xue, Sudip Biswas, Ali Cagatay Cirik, Huiqin Du, Yang Yang, Tharmalingam Ratnarajah, and Mathini Sellathurai. 2018. Transceiver design of optimum wirelessly powered full-duplex MIMO IoT devices. IEEE Transactions on Communications 66, 5 (2018), 1955–1969.
[81]
Zheng Yang, Zimu Zhou, and Yunhao Liu. 2013. From RSSI to CSI: Indoor localization via channel response. ACM Computing Surveys 46, 2 (2013), 1–32.
[82]
Alice Zheng and Amanda Casari. 2018. Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists. O’Reilly Media, Inc.
[83]
Yanzi Zhu, Zhujun Xiao, Yuxin Chen, Zhijing Li, Max Liu, Ben Y. Zhao, and Haitao Zheng. 2020. Et tu Alexa? When commodity WiFi devices turn into adversarial motion sensors. In Proceedings of the 27th Annual Network and Distributed System Security Symposium. The Internet Society.

Cited By

View all
  • (2024)Enhancing Industrial Wireless Communication Security Using Deep Learning Architecture-Based Channel Frequency ResponseIET Signal Processing10.1049/2024/88846882024(1-13)Online publication date: 28-Mar-2024
  • (2023)Chirp-LocPervasive and Mobile Computing10.1016/j.pmcj.2022.10172088:COnline publication date: 1-Jan-2023
  • (2022)Improving Fingerprint-Based Positioning by Using IEEE 802.11mc FTM/RTT ObservablesSensors10.3390/s2301026723:1(267)Online publication date: 27-Dec-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet of Things
ACM Transactions on Internet of Things  Volume 3, Issue 2
May 2022
214 pages
EISSN:2577-6207
DOI:10.1145/3505220
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 15 February 2022
Accepted: 01 October 2021
Revised: 01 September 2021
Received: 01 February 2021
Published in TIOT Volume 3, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Copresence detection
  2. context-based
  3. Internet of Things
  4. channel state information
  5. neural networks

Qualifiers

  • Research-article
  • Refereed

Funding Sources

  • Research Council of Norway
  • German Research Foundation (DFG)
  • Collaborative Research Center (CRC)
  • German Federal Ministry of Education and Research
  • Hessian Ministry of Higher Education
  • National Research Center for Applied Cybersecurity ATHENE

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)240
  • Downloads (Last 6 weeks)16
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Enhancing Industrial Wireless Communication Security Using Deep Learning Architecture-Based Channel Frequency ResponseIET Signal Processing10.1049/2024/88846882024(1-13)Online publication date: 28-Mar-2024
  • (2023)Chirp-LocPervasive and Mobile Computing10.1016/j.pmcj.2022.10172088:COnline publication date: 1-Jan-2023
  • (2022)Improving Fingerprint-Based Positioning by Using IEEE 802.11mc FTM/RTT ObservablesSensors10.3390/s2301026723:1(267)Online publication date: 27-Dec-2022

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media