Datasets
Open Access
CRAWDAD tuda/ubicompzis
- Citation Author(s):
- Submitted by:
- CRAWDAD Team
- Last updated:
- Wed, 04/08/2020 - 08:00
- DOI:
- 10.15783/c7-n3q8-xr73
- Data Format:
- License:
- Collection:
- CRAWDAD
- Categories:
- Keywords:
Abstract
The dataset contains 10 types of context information (i.e., audio restricted access, Wi-Fi and Bluetooth Low Energy (BLE) beacons, barometric pressure, humidity, luminosity, temperature, accelerometer, gyroscope, and magnetometer) collected by multiple devices in three scenarios: car, office, and mobile. The collected context information is used to evaluate the performance of five zero-interaction pairing or authentication schemes the results of this evaluation are also part of the dataset. Institution that owns the data: TU Darmstadt DOI: 10.15783/c7-n3q8-xr73 URL links to data: http://crawdad.org/download/tuda/ubicompzis/url.txt and https://zenodo.org/record/2537707#.XpRnFepKgdV
last modified : 2020-04-08
nickname : ubicompzis
institution : tuda
release date : 2020-04-08
Traceset
tuda/ubicompzis/rawcartraceset
Raw context information collected in moving cars
- files: url.txt, Readme.md
- description: The dataset contains raw context information collected by 12 sensing devices (CC2650 SensorTag) located in two moving cars over the course of four hours. In this scenario, sensing devices are static. URL: https://zenodo.org/record/2537707#.Xp-PoNNKiqC
- measurement purpose: None of the above
tuda/ubicompzis/rawcartraceset Traces
- rawcartrace:
tuda/ubicompzis/rawofficetraceset
Raw context information collected in offices
- files: url.txt, Readme.md
- description: The dataset contains raw context information collected by 24 sensing devices (CC2650 SensorTag) located in three offices over the course of one week. In this scenario, sensing devices are static.
- measurement purpose: None of the above
tuda/ubicompzis/rawofficetraceset Traces
- rawofficetrace:
tuda/ubicompzis/rawmobiletraceset
Raw context information collected in offices with both static and mobile devices
- files: url.txt, Readme.md
- description: The dataset contains raw context information collected by 25 sensing devices (CC2650 SensorTag, Samsung Galaxy S6, Samsung Gear S3, RuuviTag) located in three offices over the course of eight hours. In this scenario, sensing devices are both static and carried by users.
- measurement purpose: None of the above
tuda/ubicompzis/rawmobiletraceset Traces
- rawmobiletrace:
tuda/ubicompzis/proccartraceset
Processed context information (i.e., computed context features) from the car scenario
- files: url.txt, Readme.md
- description: The dataset contains context features for five reproduced zero-interaction pairing or authentication schemes computed on the raw context information collected in two moving cars.
- measurement purpose: None of the above
tuda/ubicompzis/proccartraceset Traces
- proccartrace:
tuda/ubicompzis/procofficetraceset
Processed context information (i.e., computed context features) from the office scenario
- files: url.txt, Readme.md
- description: The dataset contains context features for five reproduced zero-interaction pairing or authentication schemes computed on the raw context information collected in three offices.
- measurement purpose: None of the above
tuda/ubicompzis/procofficetraceset Traces
- procofficetrace:
tuda/ubicompzis/procmobiletraceset
Processed context information (i.e., computed context features) from the mobile scenario
- files: url.txt, Readme.md
- description: The dataset contains context features for five reproduced zero-interaction pairing or authentication schemes computed on the raw context information collected in three offices with both static and mobile devices.
- measurement purpose: None of the above
tuda/ubicompzis/procmobiletraceset Traces
- procmobiletrace:
tuda/ubicompzis/reskarapanosetaltraceset
Evaluation results for Karapanos et al. zero-interaction authentication scheme
- files: url.txt, Readme.md
- description: The dataset contains evaluation results for scheme by Karapanos et al. [1], including computed error rates, generated plots, and cached files. [1] - Karapanos, Nikolaos, et al. "Sound-proof: usable two-factor authentication based on ambient sound." 24th {USENIX} Security Symposium ({USENIX} Security 15). 2015.
- measurement purpose: None of the above
tuda/ubicompzis/reskarapanosetaltraceset Traces
- reskarapanosetaltrace: res-karapanos-et-al
tuda/ubicompzis/resschurmannandsiggtraceset
Evaluation results for Schurmann and Sigg zero-interaction pairing scheme
- files: url.txt, Readme.md
- description: The dataset contains evaluation results for scheme by Schurmann and Sigg [2], including computed error rates, generated plots, and cached files. [2] - Schurmann, Dominik, and Stephan Sigg. "Secure communication based on ambient audio." IEEE Transactions on mobile computing 12.2 (2011): 358-370.
- measurement purpose: None of the above
tuda/ubicompzis/resschurmannandsiggtraceset Traces
- resschurmannandsiggtrace: res-schurmann-and-sigg
tuda/ubicompzis/resmiettinenetaltraceset
Evaluation results for Miettinen et al. zero-interaction pairing scheme
- files: url.txt, Readme.md
- description: The dataset contains evaluation results for scheme by Miettinen et al. [3], including computed error rates, generated plots, and cached files. [3] - Miettinen, Markus, et al. "Context-based zero-interaction pairing and key evolution for advanced personal devices." Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 2014.
- measurement purpose: None of the above
tuda/ubicompzis/resmiettinenetaltraceset Traces
- resmiettinenetaltrace: res-miettinen-et-al
tuda/ubicompzis/restruongetaltraceset
Evaluation results for Truong et al. zero-interaction authentication scheme
- files: url.txt, Readme.md
- description: The dataset contains evaluation results for scheme by Truong et al. [4], including computed error rates, generated plots, and cached files. [4] - Truong, Hien Thi Thu, et al. "Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication." 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom). IEEE, 2014.
- measurement purpose: None of the above
tuda/ubicompzis/restruongetaltraceset Traces
- restruongetaltrace: res-truong-et-al
tuda/ubicompzis/resshresthaetaltrace
Evaluation results for Shrestha et al. zero-interaction authentication scheme
- files: url.txt, Readme.md
- description: The dataset contains evaluation results for scheme by Shrestha et al. [5], including computed error rates, generated plots, and cached files. [5] - Shrestha, Babins, et al. "Drone to the rescue: Relay-resilient authentication using ambient multi-sensing." International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2014.
- measurement purpose: None of the above
tuda/ubicompzis/resshresthaetaltrace Traces
- resshresthaetaltrace: res-shrestha-et-al
The files in this directory are a CRAWDAD dataset hosted by IEEE DataPort.
About CRAWDAD: the Community Resource for Archiving Wireless Data At Dartmouth is a data resource for the research community interested in wireless networks and mobile computing.
CRAWDAD was founded at Dartmouth College in 2004, led by Tristan Henderson, David Kotz, and Chris McDonald. CRAWDAD datasets are hosted by IEEE DataPort as of November 2022.
Note: Please use the Data in an ethical and responsible way with the aim of doing no harm to any person or entity for the benefit of society at large. Please respect the privacy of any human subjects whose wireless-network activity is captured by the Data and comply with all applicable laws, including without limitation such applicable laws pertaining to the protection of personal information, security of data, and data breaches. Please do not apply, adapt or develop algorithms for the extraction of the true identity of users and other information of a personal nature, which might constitute personally identifiable information or protected health information under any such applicable laws. Do not publish or otherwise disclose to any other person or entity any information that constitutes personally identifiable information or protected health information under any such applicable laws derived from the Data through manual or automated techniques.
Please acknowledge the source of the Data in any publications or presentations reporting use of this Data.
Citation:
Mikhail Fomichev, Max Maass, Lars Almon, Alejandro Molina, Matthias Hollick, tuda/ubicompzis, https://doi.org/10.15783/c7-n3q8-xr73 , Date: 20200408
Dataset Files
- tuda_ubicompzis.png (77.84 kB)
- index.html (2.83 kB)
- LICENSE.txt (19.96 kB)
- linktosite.txt (46 bytes)
- Readme.md (4.19 kB)
- shasumsAudio.txt (7.92 MB)
- shasumsSensors.txt (274.14 kB)
- shrestha.txt (46 bytes)
- shrestha_office_night.csv.gz (21.72 MB)
- shrestha_office_weekend.csv.gz (6.99 MB)
- truong.txt (46 bytes)
- truong_office_weekend_30sec.csv.gz (31.40 MB)
- tuda-ubicompzis-20200408.xml (23.50 kB)
- tuda_ubicompzis.txt (99 bytes)
- url.txt (73 bytes)
Open Access dataset files are accessible to all logged in users. Don't have a login? Create a free IEEE account. IEEE Membership is not required.
Documentation
Attachment | Size |
---|---|
tuda-ubicompzis-readme.txt | 1.62 KB |
These datasets are part of Community Resource for Archiving Wireless Data (CRAWDAD). CRAWDAD began in 2004 at Dartmouth College as a place to share wireless network data with the research community. Its purpose was to enable access to data from real networks and real mobile users at a time when collecting such data was challenging and expensive. The archive has continued to grow since its inception, and starting in summer 2022 is being housed on IEEE DataPort.
Questions about CRAWDAD? See our CRAWDAD FAQ. Interested in submitting your dataset to the CRAWDAD collection? Get started, by submitting an Open Access Dataset.