Datasets
Open Access
CRAWDAD uiuc/uim
- Citation Author(s):
- Submitted by:
- CRAWDAD Team
- Last updated:
- Tue, 01/24/2012 - 08:00
- DOI:
- 10.15783/C7HG6D
- Data Format:
- License:
- Collection:
- CRAWDAD
- Categories:
- Keywords:
Abstract
This is the dataset of MACs of Bluetooth and Wi-Fi access points collected by the University of Illinois Movement (UIM) framework using Google Android phones.
last modified : 2012-01-24
release date : 2012-01-24
date/time of measurement start : 2010-03-01
date/time of measurement end : 2010-03-20
collection environment : We release the set of Bluetooth and Wifi traces collected by 28 Google Android phone users for 3 weeks in March 2010. These people are staff, faculties, grads, and undergrads at University of Illinois.
network configuration : Each UIM experiment phone encompasses a Bluetooth scanner and a Wi-Fi scanner capturing both Bluetooth MAC addresses and Wi-Fi access point MAC addresses in proximity of the phone.
data collection methodology : The Bluetooth scanner periodically (e.g. every 60 seconds) scans the Bluetooth-enabled devices in the phone's proximity. The Wi-Fi scanner periodically (e.g. every 30 minutes) scans the Wi-Fi access points in the phone's proximity.
sanitization : Detected MACs are hashed with SHA-1.
limitation : You will see that the Bluetooth and Wi-Fi traces may be collected with different frequencies by different users. This is because we tune the frequency when doing trace collection. Higher frequency consumes a lot of energy, and the phone can not last more than 1.5 days. Thus, we have to lower the frequency. However, we can not contact all 28 participants at the same time to tune all the scanning frequencies. Some users are willing to charge their experiment phones a couple of times per day, then they accept higher scaning frequency. Others may not, then we have to lower the frequency for them.
Traceset
uiuc/uim/bluetooth
Traceset of Bluetooth traces collected from Android phone users at University of Illinois.
- description: This is a traceset of Bluetooth traces of ad hoc contacts collected by the UIM framework using Google Android phones.
- measurement purpose: User Mobility Characterization, Positioning Systems, Human Behavior Modeling, Content Distribution Evaluation, Localization, Opportunistic Connectivity
- methodology: The Bluetooth scanner on the phone periodically scans the Bluetooth-enabled devices in the phone's proximity. The scanned results include the MAC addresses of the Bluetooth-enabled devices and the corresponding scanning time stamps. The scanning interval is set to 60 seconds to conserve the phone battery. The collected movement trace is stored at the local disk of the phone.
- sanitization: Detected MACs are hashed with SHA-1.
uiuc/uim/bluetooth Traces
- 2010: Bluetooth traces collected from Android phone users at University of Illinois in March 2010.
- configuration: We configure out scanners to run from 6 a.m. to 11 p.m. every day, instead of running the entire day. After 11 p.m., the scanners pause to conserve the battery and wake up at 6 a.m. the following day.
- format:
For each user, there is a directory "btlog". In this directory, you will find
two different file names:
- Files starting with "s" are Bluetooth traces and "w" are Wi-Fi traces.
- Bluetooth file: s60m3d20h9.9bd0a2dc47f35a4e904fac9aa3834d5e is the Bluetooth
trace collected with frequency of 60 seconds on 03/09/2010(m3d9) during
9AM-10AM time period by the Google phone, whose hashed MAC value is
9bd0a2dc47f35a4e904fac9aa3834d5e. This hashed MAC value can be used (with
traces collected by other Google phones in the trace) to determine which
phones are in the proximity of each other. In the file, you will see
timestamps and the lists of scanned Bluetooth MACs, which are hashed.
uiuc/uim/wifi
Traceset of Wi-Fi traces collected from Android phone users at University of Illinois.
- description: This is a traceset of ad hoc contacts and MACs of Wi-Fi access points collected by the UIM framework using Google Android phones.
- measurement purpose: User Mobility Characterization, Positioning Systems, Human Behavior Modeling, Content Distribution Evaluation, Localization, Opportunistic Connectivity
- methodology: The Wi-Fi scanner on the phone periodically scans the Wi-Fi access points in the phone's proximity. The scanned results include the MAC addresses of the Wi-Fi access points and the corresponding scanning time stamps. The scanning interval is set to 30 minutes because in the campus environment people usually do not move too far too fast, and also to conserve the phone battery.
- sanitization: Detected MACs are hashed with SHA-1.
uiuc/uim/wifi Traces
- 2010: Wi-Fi traces collected from Android phone users at University of Illinois in March 2010.
- configuration: We configure out scanners to run from 6 a.m. to 11 p.m. every day, instead of running the entire day. After 11 p.m., the scanners pause to conserve the battery and wake up at 6 a.m. the following day.
- format:
For each user, there is a directory "btlog". In this directory, you will find
two different file names:
- Files starting with "s" are Bluetooth traces and "w" are Wi-Fi traces.
- Wi-Fi file: w_m30m4d8.9bd0a2dc47f35a4e904fac9aa3834d5e is the Wi-Fi trace
collected with the frequency of 30 minutes on 04/08/2010 by the Google phone,
whose hashed mac value is 9bd0a2dc47f35a4e904fac9aa3834d5e. In the file, you
will see timestamps and the lists of scanned Wi-Fi MACs, which are hashed.
Each Wi-Fi scan may result in several records with slightly different
scan times.
The files in this directory are a CRAWDAD dataset hosted by IEEE DataPort.
About CRAWDAD: the Community Resource for Archiving Wireless Data At Dartmouth is a data resource for the research community interested in wireless networks and mobile computing.
CRAWDAD was founded at Dartmouth College in 2004, led by Tristan Henderson, David Kotz, and Chris McDonald. CRAWDAD datasets are hosted by IEEE DataPort as of November 2022.
Note: Please use the Data in an ethical and responsible way with the aim of doing no harm to any person or entity for the benefit of society at large. Please respect the privacy of any human subjects whose wireless-network activity is captured by the Data and comply with all applicable laws, including without limitation such applicable laws pertaining to the protection of personal information, security of data, and data breaches. Please do not apply, adapt or develop algorithms for the extraction of the true identity of users and other information of a personal nature, which might constitute personally identifiable information or protected health information under any such applicable laws. Do not publish or otherwise disclose to any other person or entity any information that constitutes personally identifiable information or protected health information under any such applicable laws derived from the Data through manual or automated techniques.
Please acknowledge the source of the Data in any publications or presentations reporting use of this Data.
Citation:
Klara Nahrstedt, Long Vu, uiuc/uim, https://doi.org/10.15783/C7HG6D , Date: 20120124
Dataset Files
- uim_exp1_release.tar.gz (5.42 MB)
Open Access dataset files are accessible to all logged in users. Don't have a login? Create a free IEEE account. IEEE Membership is not required.
Documentation
Attachment | Size |
---|---|
uiuc-uim-readme.txt | 1.56 KB |
These datasets are part of Community Resource for Archiving Wireless Data (CRAWDAD). CRAWDAD began in 2004 at Dartmouth College as a place to share wireless network data with the research community. Its purpose was to enable access to data from real networks and real mobile users at a time when collecting such data was challenging and expensive. The archive has continued to grow since its inception, and starting in summer 2022 is being housed on IEEE DataPort.
Questions about CRAWDAD? See our CRAWDAD FAQ. Interested in submitting your dataset to the CRAWDAD collection? Get started, by submitting an Open Access Dataset.