Professional Documents
Culture Documents
Signals
249
tooth has a much lower range compared to other ubiquitous (Timestamp, {Bluetooth devices}, {Cell Towers}, {Wi-Fi
network technologies (see Table 1). Second, the discovery networks}). Bluetooth devices are identified by their MAC
process of bluetooth devices is time-consuming and could addresses, cell-towers are identified by the tower identifier
take as long as 10 seconds [14]. Finally, unlike cell-towers and Wi-Fi access points by their SSID/BSSID. The mobile
and access points that are stationary, bluetooth devices are device then uses its log to predict Wi-Fi connectivity.
primarily carried by users and hence mobile. The key question we need to address is: how accurately
Blue-Fi leverages bluetooth’s low range to its advantage can a bluetooth device or a cell-tower predict the Wi-Fi avail-
to achieve high prediction accuracy of Wi-Fi network avail- ability? We first discuss the reliability of bluetooth predic-
ability. However, the high accuracy comes at a price: cov- tion. If all bluetooth devices were fixed, predicting Wi-Fi
erage. The smaller the communication range is, the less availability would be easy. Given a bluetooth device b, just
likely for Blue-Fi to find a nearby bluetooth device. To check whether there is a log entry containing b and a Wi-Fi
increase the prediction coverage, Blue-Fi complements blue- access point: if yes, then we predict the Wi-Fi availability.
tooth with cell-tower information. To alleviate bluetooth’s Unfortunately, in practice many bluetooth devices are mo-
high discovery time, Blue-Fi implements periodic discovery bile (e.g., phones, notebooks), so they cannot straightaway
and uses the latest discovered list of bluetooth devices. Fi- be used to predict fixed Wi-Fi access points.
nally, despite the fact that many bluetooth devices are mo- To account for the mobile bluetooth devices we consider
bile, our results indicate that there is enough repeatability in the correlation between the observations of the bluetooth
contact-patterns of bluetooth devices that can be leveraged devices and Wi-Fi access points. Intuitively, we consider
to provide accurate context information, especially indoors. a bluetooth device b to be a reliable predictor for Wi-Fi
In its basic form, Blue-Fi requires no distributed infras- connectivity, if most of the log entries in which b appears
tructure, or running complex distributed protocols. Each contain at least a Wi-Fi access point.
mobile device periodically logs locally the bluetooth devices,
cell-towers, and Wi-Fi access points in its proximity, and L Log of all network signals over time
later uses this information to predict Wi-Fi connectivity. To τ Threshold for a bluetooth device or
speed up the learning process, we also propose variants of cell-tower to be a reliable predictor
Blue-Fi which employ peer-to-peer protocols or centralized predictcell Cell-towers that are reliable predictors
web services to share the logs. predictBT Bluetooth devices that are reliable predictors
We make the following contributions. First, we advocate SBT Set of all bluetooth devices in the log
the use of bluetooth contact patterns for context inference, Wc Connectable Wi-Fi networks
effectively providing a low-powered location system. In do- EDT Threshold of euclidean distance below
ing so, we address the limitations of the bluetooth devices which a user is considered stationary
with respect to low range, high discovery time and mobil-
ity. Second, we leverage the complementary properties of Table 2: List of notations.
bluetooth and cell-tower to improve the prediction of Wi-Fi
availability. By combining bluetooth and cell tower based More precisely, let SBT be the set of bluetooth devices in
predictions we obtain an average coverage of 94% and an log L and Wc be the set of Wi-Fi networks which provides
average accuracy of 84%, a 47% improvement in accuracy connectivity to the device (we describe mechanisms to ob-
over the pure cell-tower based prediction and a 57% improve- tain Wc in Section 7.1). For each Bluetooth device, BTi
ment in coverage over the pure bluetooth based prediction SBT , we compute the predictability of BTi as n(L, BTi , Wc )/
scheme. This translates to an energy efficiency of up to 62% n(L, BTi ), where n(L, BTi , Wc ) is the number of entries in
and increase in our mobile device’s lifetime by more than a L when BTi was present and at least one of the networks
day. Finally, we analyze the benefits of collaborative predic- in Wc was present, and n(L, BTi ) is the number of entries
tion including security and privacy concerns. in L when BTi was present. Predictability is a confidence
The rest of the paper is organized as follows. Section 2 measure of how much a device’s presence indicates Wi-Fi
describes the system’s functioning including the prediction connectivity. If predictability is greater than a threshold τ ,
schemes. Section 3 deals with the problem of bluetooth dis- we add BTi to predictBT . In Section 2.2, we present a simple
covery. Algorithms to infer special bluetooth devices - land- algorithm to set this threshold.
mark devices and mobile accessories - are presented in Sec- While a single bluetooth discovery or Wi-Fi scan can po-
tion 4. Collaborative prediction, along with the security and tentially miss some bluetooth devices or access points respec-
privacy implications, is addressed in Section 5. Evaluation tively, we believe the errors due such misses are minimized
of the different aspects of the system is done in Section 6. or negligible when predictBT is calculated over a sufficiently
We present improvements to Blue-Fi - identifying browser- large set of log entries over time.
authenticated Wi-Fi networks, and multihop bluetooth dis- The algorithm to obtain predictcell is exactly the same
covery - in Section 7. We discuss an indoor monitoring sys- as the algorithm described above, with bluetooth devices
tem, and enhanced prediction models in Section 8. Section 9 replaced by cell-towers. predictcell contains the list of cell-
presents related work and contrasts it with Blue-Fi, and we towers at places where the device has Wi-Fi connectivity.
conclude in Section 10.
2.1 Prediction Schemes
2. PREDICTING WI-FI AVAILABILITY In this section, we describe the Wi-Fi prediction schemes
In a nutshell, Blue-Fi predicts the Wi-Fi network avail- based on bluetooth and cell-tower signals. The Wi-Fi pre-
ability by leveraging existing cell-towers and bluetooth de- diction schemes predict Wi-Fi availability using predictBT
vices. Each mobile device periodically logs all the network and predictcell . We evaluate the prediction schemes on two
signals in a log L, locally. The log entries are of the form metrics:
250
Figure 2: Predict-Signal Matrix
251
Figure 3: Variation in Euclidean Distance when a
device is stationary, walking (5 km/hr) and driving
(30 km/hr).
3. BLUETOOTH DISCOVERY
Bluetooth discovery takes considerable time (over 10 sec-
onds [14]) causing high latency in prediction and subsequent Figure 4: Periodic Bluetooth Discovery combined
application data transfers. We note that when the user is with Euclidean Distance Estimation
not moving at high speeds, Wi-Fi connectivities are likely
to be relatively stable. Based on this observation, Blue-Fi
scans for nearby bluetooth devices periodically, and stores 3.1 Euclidean Distance Threshold (EDT )
and uses the latest discovered list for prediction. Periodic The threshold of euclidean distance for inferring station-
discovery reduces the latency of prediction using Blue-Fi. ary periods, EDT , depends on the fluctuation of cellular
The period of discovery is appropriately set depending on signal in a user’s surroundings and hence fixing a static and
the Wi-Fi scanning frequency and the ratio of power con- uniform value across all users is problematic. We present
sumption of Wi-Fi scanning to Bluetooth discovery. a simple heuristic by which devices can calibrate this value
However, periodic discovery could be wasteful in times themselves.
when device’s Wi-Fi scanning frequency is low or the user The heuristic is based on estimating the times when the
is stationary. In such cases, Wi-Fi characteristics are not device was stationary and calculating the average euclidean
expected to change. For example, a user sitting in his office distance between the cell-tower fingerprints in those periods.
with his office’s Wi-Fi connectivity is unlikely to see a change We consider being in the proximity of a stationary bluetooth
in his Wi-Fi prediction. In cases when the user is stationary, device (we discuss them in Section 4.2) or being connected
the last predicted Wi-Fi connectivity can be used without to the same Wi-Fi access point (BSSID) as an indication
wasting power on updating the visible bluetooth devices. of being stationary. Note that we are only interested in
Observations from prior work [25, 23] and our own exper- inferring times when a user’s Wi-Fi connectivity is relatively
iments indicate that cell tower signal strength values have stable as opposed to a user being completely stationary in
low variance when the device is stationary. A cell-tower fin- the traditional sense. From the log, L, devices can calculate
gerprint is a set of tuples containing the cell-tower identifier the average euclidean distance during stationary periods and
(CT ) and signal strength (SS). Given two cell-tower fin- fix the value of EDT appropriately.
gerprints, Fi = {(CTi1 , SSi1 ), ..., (CTin , SSin )} and Fj =
{(CTj1 , SSj1p), ..., (CTjn , SSjn )}, the euclidean distance is
defined as (SSi1 − SSj1 )2 + ... + (SSin − SSjn )2 ). Cell- 4. SPECIAL BLUETOOTH DEVICES
towers that are present in only one of the fingerprints are There are two classes of bluetooth devices that are espe-
not used in the calculation. High values of euclidean dis- cially interesting - landmark devices and mobile accesories.
tance indicate low similarity between the fingerprints. Landmark devices are devices that are stationary like a blue-
Figure 3 plots the average euclidean distance between con- tooth mouse, keyboard or printer, and mobile accessories
secutive readings in our experiments when a user is station- correspond to devices like bluetooth headsets. This section
ary, walking (5 km/hr) and driving slowly (30 km/hr). Con- describes ways to identify these two categories of devices
secutive measurements were taken a minute apart. As shown from the log, L. Landmark devices can be shared among
in Figure 3, the euclidean distance is a good indicator of users as they are not dependent on any single user’s move-
whether a user is stationary or mobile. ments. Mobile accessories are not reliable indicators of Wi-
Blue-Fi calculates the average euclidean distance since the Fi availability and should be removed from the logs.
last Wi-Fi prediction and if it is below a threshold, EDT , Our identification technique is based on correlating the
periodic bluetooth discovery is not performed and the last Wi-Fi access points and cell-towers, both of which are es-
made prediction of Wi-Fi availability is used. While we note sentially stationary, with the bluetooth devices. In other
that there are alternatives to the average euclidean distance words, we intend to capture the variation in the difference
like Spearman rank correlation coefficient [6] and common locations at which a bluetooth device was sighted. To this
number of cell-towers, our metric is suited for our purpose end, we first introduce the notion of diversity for a device
and produces good results (see Section 6.4). Figure 4 illus- and then use that to identify landmark devices and mobile
trates the steps in Blue-Fi’s periodic bluetooth discovery. accessories.
252
4.1 Diversity 4.2 Landmark Devices
Diversity captures the variance among the list of loca- Intuitively, a landmark device is one that a user discovers
tions a device is sighted. For every bluetooth device in SBT , only at one location (e.g., home) and always discovers that
we extract the list of Wi-Fi and cell-tower signatures that device when he is at that location. Precisely, a device BT
were co-sighted along with it. A Wi-Fi signature is a list of is classified as landmark if it satisfies two properties: (1) Its
BSSIDs, and a cell signature is a list of cell-tower identifiers. diversity is sufficiently low, and (2) Whenever a signature
Note that the list of signatures can contain repetitions. We that is similar to its median, Wm , occurs in the log, BT
use the list of signatures as an indicator of the locations the should also be present. Property (1) ensures that BT is seen
bluetooth device was present. only at one location. Property (2) ensures that whenever the
We define similarity between two signatures A and B as user is at that location, BT is seen.
|(A ∩ B)| / |(A ∪ B)|. Clearly, the higher the number of
intersecting wireless access points or cell-towers, the greater 4.3 Mobile Accessories
the value of similarity. Mobile accessories are not reliable indicators of Wi-Fi
We use similarity to now calculate diversity for a list of availability and should be removed from the logs. We treat
signatures. Let W = {Ws } be the list of Wi-Fi signatures devices that occur in a high fraction of the log entries to
for a bluetooth device. We identify the median of W us- be mobile personal accessories and unreliable indicators of
ing K-Medians clustering [18]. K-Medians is suited for our a user’s location.
purpose as it can perform clustering even when the “points”
to be clustered are not in Euclidean space, as in our case 5. COLLABORATIVE PREDICTION
where we have to cluster signatures. K-Medians clustering This section explores the scenarios, benefits and issues
exhaustively evaluates the suitability of each Ws in W to if devices were to collaborate and share information about
be the median and picks the best. Table 3 describes the Wi-Fi availability. An example scenario when such sharing
algorithm to pick the median and calculate the diversity of is beneficial is when a user goes to a new place with no prior
a given list of signatures. The presence of repetitions in the context (improve coverage). Sharing essentially speeds-up
signature list, W , ensures that the signatures are automati- the learning process. We present two sharing approaches −
cally weighted during the calculation of diversity. Diversity peer-to-peer and global − and also discuss their security and
is calculated for every device and varies between 0 and 1. privacy implications.
Diversity for a list of cell-tower signatures is exactly similar
with Wi-Fi BSSIDs replaced by cell-tower identifiers. 5.1 Peer-to-peer Sharing
Devices query each other over bluetooth for the availabil-
Input: List of signatures, W = {Ws } ity for Wi-Fi networks. Any device that is currently using
Output: Median, Wm and Diversity, D the Wi-Fi network can respond with details including the
bandwidth and authentication mechanisms. In fact, users
Variables: can exchange more useful information like “I performed a 1
Aggregate Similarity, agg sim MB download 30 seconds back and got a 10 Mbps through-
Highest Similarity, best sim ← 0 put”. Such sharing can be used for collaborative selection of
Current Median, Wmc access points. Hence, presence of at least one bluetooth de-
vice can potentially result in a device knowing about Wi-Fi
Algorithm: connectivity.
for each Wsi in W We can extend the hybrid prediction scheme to include
Wmc ← Wsi peer-to-peer querying wherein the device queries its neigh-
agg sim ← 0 bors when bluetooth prediction is inconclusive and before
for each Wsj in W resorting to cell-tower based prediction.
agg sim += Similarity(Wsi , Wsj )
end for 5.2 Global Sharing
if(agg sim > best sim) The alternative to peer-to-peer sharing is global sharing
best sim ← agg sim facilitated through a central service. Devices, when using
Wm ← Wmc the Wi-Fi network, periodically upload entries − (Times-
end for tamp, {Bluetooth devices}, {Cell Towers}, {Wi-Fi network,
{Characteristics}}) − to a centralized server. Characteris-
for each Ws in W tics specify if a network requires authentication along with
D += Similarity(Ws , Wm ) performance parameters like throughput and latency. While
end for information about security of a network (e.g., WEP encryp-
tion) is specified for all Wi-Fi beacons, performance param-
D ← D/|W | eters are provided only for the associated network. Servers
index these entries by bluetooth devices and cell-tower iden-
return (D and Wm ) tifiers for efficient retrieval.
Any device that wants to know about its current Wi-Fi
float Similarity (Signature W1 , Signature W2 ) availability can query the central server by supplying the list
float similarity = |(W1 ∩ W2 )| / |(W1 ∪ W2 )| of currently visible bluetooth devices and cell-towers. The
return similarity server responds by matching the bluetooth devices and cell-
towers in its database and returns the Wi-Fi networks along
Table 3: Diversity of a signature list with their characteristics. Communication with the server
253
happens over the cellular interface (data channel or simpler 6. EVALUATION
options like SMS). The details of matching application needs We collected logs from twelve volunteers for a period of
with the best suited Wi-Fi network are beyond the scope of two weeks each. In this section, we use the logs to evaluate
this paper. our prediction schemes for accuracy and coverage, appro-
Matching cell-towers need not involve the timestamp field priate threshold selection, effects of periodic discovery and
in the entries in the server because they are stationary. Blue- energy efficiency for our workload. We also evaluate our
tooth devices are mostly dynamic and should be matched algorithms for identifying landmark devices and mobile ac-
only if the time of uploading of the log entry and time of cesories. Finally we quantify the benefits of collaborative
querying is within a bounded interval. Note that the server prediction. We briefly summarize our results here.
can process the logs and obtain the set of landmark devices
as described in Section 4. Matches with landmark devices 1. Hybrid prediction scheme produces high coverage (93.5
need not consider the timestamp. %) and accuracy (84.2%), a 47% improvement in ac-
The ability to leverage landmark devices makes the global curacy over the pure cell-tower based prediction and
sharing option potentially more useful than peer-to-peer shar- a 57% improvement in coverage over pure bluetooth
ing; landmark devices are not expected to do peer-to-peer based prediction scheme.
communication. But on the other hand, peer-to-peer shar-
ing does not need any infrastructure support and hence is 2. Periodic discovery results in negligible reduction in ac-
more readily deployable. curacy and coverage.
3. Energy consumption reduces by up to 62% for our
5.3 Privacy and Security workload using Blue-Fi’s prediction techniques.
In this section, we discuss the security and privacy con-
cerns related to global and peer-to-peer sharing. A trusted 4. Collaborative prediction through sharing improves the
service model, like the emerging location-based services [1], coverage by up to 36.2%.
alleviates these concerns for the case of global sharing. Next,
we discuss the security and privacy issues in peer-to-peer 6.1 Log Collection
sharing, and compare it with the global sharing model. Twelve volunteers were given i-mate PDAs programmed
to log the Wi-Fi, bluetooth and cell-tower signals as men-
1. Intrusion: Peer-to-peer collaboration requires devices tioned in Section 2, every minute. The i-mate runs Win-
talking to other devices around them, and users might dows Mobile 5.0 and is equipped with a Class-2 bluetooth
be wary of such communication as it might potentially interface. We performed Wi-Fi scanning using a library
lead to intrusions. Without any prior knowledge, there that was built using the Windows Driver Development Kit.
is no feasible filter that users can apply. Global sharing Bluetooth scanning happened using the open-source library,
requires the device to just talk to a trusted server. InTheHand [3]. GSM tower information was obtained by
reading a well-known memory location that has been ob-
2. Usage Pattern: If devices were to exchange details tained by the community via reverse-engineering [19]. The
about their network activity (size of download, time of volunteers were a mix of graduate students in Berkeley as
download), a malicious person can continually query well as working professionals in San Francisco Bay Area.
a device in the guise of knowing the Wi-Fi connec- Volunteers carried the PDA along for two weeks in their nor-
tivity characteristics, and end up obtaining the exact mal routine. No instance of the PDA’s battery discharging
access patterns of the device. This can be correlated to or any such incident that stopped the logging was reported.
make decisions about a user’s activity like streaming, Table 4 lists the details about the log. There are two
browsing etc. potentially leading to annoying and tar- noteworthy features from the logs:
geted advertisements. With global sharing, the central 1. The fraction of times when there was Wi-Fi connectiv-
server is expected to hide the identity of the users who ity from the preferred networks varies from 32.1% to
uploaded the data. 68%, indicating it is not ubiquitous and hence the need
for a mechanism for predicting Wi-Fi availability.
3. Industrial Espionage: Assume a scenario where cof-
fee shop A has Wi-Fi connectivity for its customers. A 2. The number of bluetooth devices and the fraction of
competitor, B, is looking to set up its store near A’s times they are visible (49.6% to 77.2%) are encourag-
and expects the same customers to visit B too. Now ing to base a prediction scheme on them.
B can have a person with a device sitting in A’s shop,
querying all the users visiting A continuously and ag- One half of the data was used for training and the other
gregating information about their Wi-Fi usages. B can half for testing.
use this information to appropriately provision its net- 6.2 Coverage and Accuracy
work, thereby obtaining information that A would not
have provided otherwise. The central server in global We measure the accuracy and coverage of using blue-
sharing will provide only representative information in tooth and cell-tower data individually for prediction, high-
response to queries. light their complementary properties and demonstrate the
benefits of using them in conjunction in the hybrid scheme.
While it is true that Wi-Fi frames themselves can be Bluetooth based Prediction: Figures 5 and 6 show the
passively scanned to get the required information, peer- accuracy and coverage (in %) for bluetooth-based prediction
to-peer sharing provides yet another way for this in- for the different users, for varying values of the prediction
formation to be leaked. reliability threshold, τ . We observe that accuracy is directly
254
User Duration (weeks) Cell-Towers* Wi-Fi SSIDs* Bluetooth Devices*
Preferred All
U1 2 121 (99%) 48.1% 490 (76.1%) 159 (50.1%)
U2 2 337 (99%) 56% 1156 (84.5%) 194 (71%)
U3 2 191 (98%) 32.1% 731 (68.1%) 181 (51.2%)
U4 2 287 (99%) 36% 846 (54.3%) 133 (66.4%)
U5 2 101 (99%) 68% 744 (81.2%) 99 (77.2%)
U6 2 202 (98%) 44.3% 553 (65.2%) 152 (49.6%)
U7 2 221 (99%) 55.8% 701 (77.4%) 201 (55.1%)
U8 2 188 (99%) 67.3% 553 (86.1%) 199 (51.8%)
U9 2 241 (98%) 58% 552 (71.1%) 288 (59.3%)
U10 2 302 (100%) 60.3% 774 (80.8%) 222 (63.7%)
U11 2 254 (99%) 53.2% 691 (63.7%) 241 (66.4%)
U12 2 198 (98%) 54.1% 801 (70.2%) 201 (62.2%)
( *− Fraction of times when at least one signal was observed on that interface)
255
Figure 8: Coverage of Cell-Tower based Prediction
256
Figure 11: Reduction in Accuracy because of peri-
odic Bluetooth discovery
Figure 13: Gains compared to Ecellular and EW i−F i
vary with download size for U3
257
User τ = 0.8 p2p Global
U1 59.6% 68.3% 79.4%
U2 57.8% 72.2% 84.5%
U3 51.1% 78.4% 86.3%
U4 73.4% 78.8% 89.1%
U5 74.2% 81.8% 90.1%
U6 50.2% 66.5% 88.1%
U7 58.8% 71.1% 90.1%
U8 61.2% 69.4% 83.3%
U9 44.6% 65.1% 80.8%
U10 60.2% 70.8% 76.4%
U11 60.1% 72.2% 77.3%
U12 64.5% 70.9% 73.2%
258
requests to popular webservers that did not require commu- of resouces like cooling (e.g., conference room A is uncom-
nication over secure HTTP (google.com and live.com). fortably cold) and Wi-Fi performance (e.g., Connectivity in
Checking using the size of the response is most accurate office B is spotty). Users log their sensed data (like Wi-
identifying all the pages in our redirected pages dataset. Fi performance) along with the visible reference bluetooth
The dataset had an average size of 62 KB and a mini- devices. The database of the locations of the reference blue-
mum and maximum of 13 KB and 132 KB respectively. tooth devices can be used to find the location of the point
Secure HTTP identifies only 68.4% of the authentication at which the data was collected and appropriate analysis
pages. This is because splash screens and end-user-license- can be conducted. We plan an extensive deployment and
agreement (EULA) notices are also served over unsecure evaluation of BlueDust.
HTTP. Differentiating between authentication webpages, and
EULA and splash screens is part of future work. 8.2 Prediction Models
Blue-Fi assumes that the sensing of each bluetooth device
7.2 Multi-hop Bluetooth Discovery is an independent event. But clearly, there is a rich opportu-
The discrepancy between the Wi-Fi and the bluetooth nity to incorporate mobility patterns and correlation across
ranges (i.e., 100m vs 10m) is the main reason behind the multiple bluetooth devices in our prediction models. Mo-
high accuracy of bluetooth prediction. On the downside, bility patterns can be used for predicting Wi-Fi availability
this discrepancy leads to low coverage, as a bluetooth de- — e.g., “Wi-Fi connectivity will be available ten minutes af-
vice may not be able to discover other nearby devices, even ter you spot the bluetooth device b”. Such predictions are
though all devices are in the same Wi-Fi coverage. useful for delay-tolerant applications to appropriately plan
One possible solution to reduce the discrepancy between their network activities in future.
the Wi-Fi and bluetooth ranges is to use multi-hop bluetooth Also, predictBT can be augmented to include sets of blue-
discovery. A device establishes a connection with each device tooth devices. This is useful in scenarios when, say, blue-
present in its immediate range, and queries for devices that tooth devices b1 and b2 are not sufficiently reliable on their
are in its range, recursively, for a preset number of hops. own, but whenever sensed together turn out to be reliable
This way, a mobile device will discover bluetooth devices indicators of Wi-Fi availability. Understanding the benefits
beyond its bluetooth range. This technique allows one to of such a correlated predictions on Blue-Fi’s coverage and
trade accuracy for coverage: the higher the number of hops accuracy is part of future work.
the higher the coverage and the lower the accuracy. The
overhead of multi-hop bluetooth discovery can be reduced 9. RELATED WORK
using the technique described in Section 3.
Improving energy efficiency of Wi-Fi networks is a long-
We performed an initial evaluation of the multi-hop dis-
standing problem in wireless networks and has been ap-
covery protocol by placing bluetooth monitoring devices in
proached from different directions. Techniques range from
a large lab area where the bluetooth devices tend to be clus-
protocol optimizations in the various layers of the network-
tered in two groups. We were able to see an increase of up
ing stack for a single Wi-Fi radio to techniques that leverage
to 234% in the number of discovered bluetooth devices by
multiple radios on the same device that often involve spe-
using multi-hop discovery.
cialized infrastructure elements.
The key idea of using a separate low-powered radio to
8. DISCUSSION wake up a high-powered radio was proposed in Wake-on-
In this section, we discuss extensions to Blue-Fi along with Wireless [15]. Wake-on-Wireless proposes the use of a sec-
fugure work: deploy “reference” devices to increase predic- ond special-purpose radio that serves as a wake-up chan-
tion coverage, and use correlated observation of bluetooth nel for a Wi-Fi radio. However the short range custom ra-
devices to improve accuracy. dio necessitates multiple intermediate proxies and presence
servers. Also, it requires significant modifications to exist-
8.1 Reference Bluetooth Devices ing mobile devices. While On-Demand-Paging [27] builds on
Blue-Fi depends fundamentally of the existence of land- this idea to use the widely available Bluetooth radio as the
mark bluetooth devices. However, as the coverage results low-powered channel, it still needs substantial infrastructure
suggest, in a non-trivial number of cases, the mobile device support in the form of specialized access points that have
is not able to identify such bluetooth devices. To address both Wi-Fi and bluetooth interfaces. Cell2Notify [28] uses
this issue, we propose BlueDust, a pervasive deployment of the cellular interface to wake up the Wi-Fi interfaces on an
reference bluetooth devices spatially distributed in a given incoming VOIP call using specialized servers. In contrast,
area. These devices are stationary and serve as means of Blue-Fi does not require any modification to the existing in-
providing contexts to the user. We envisage reference de- frastructure and can be deployed readily on mobile devices.
vices to be simple and inexpensive, for example bluetooth War-driving has been performed in prior work that col-
USB dongles or bluetooth mice. In contrast to Wi-Fi based lects and maps the Wi-Fi access points [7, 10, 24]. War-
indoor monitoring systems [20, 16], BlueDust’s advantage is driving is an expensive operation requiring investment of
power efficiency. Also, a clear benefit of such a system would time and money. While a few major cities have good war-
be increase in coverage for Blue-Fi. driving data, the majority of them have scarce or no map-
A simple and practical deployment mechanism, especially ping. In contrast, Blue-Fi adopts the approach of users auto-
for enterprise environments, is to plug in bluetooth dongles matically learning their own sorroundings and Wi-Fi avail-
into desktops [20]. Reference devices can also be placed us- ability. Also, war-driving data tend to become unreliable
ing systematic techniques. A database contains the locations and out-dated over time.
of the reference devices. Context-for-Wireless [12] aims to provide energy-efficient
BlueDust can be used for monitoring the spatial variation ubiquitous wireless connectivity, and their ideas of using
259
cell-tower information for predicting Wi-Fi availability are Fourteenth Annual International Conference on Mobile
closely related to our work. But as we demonstrate cell- Computing and Networking (Mobicom ’08), Sep 2008.
tower information is coarse-grained and can be beneficially [9] A. J. Nicholson, Y. Chawathe, M. Y. Chen, B. D.
combined with bluetooth contact-patterns for fine-grained Noble, and D. Wetherall. Improved access point
context localization. Intel Place Lab [19, 10] collected ex- selection. In Proceedings of The Fourth International
tensive network data on GSM cellular networks for the sake Conference on Mobile Systems, Applications, and
of positioning Wi-Fi hotspots. To the best of our knowl- Services (MobiSys ’06), June 2006.
edge, ours is the first work that demonstrates the benefits [10] A. LaMarca, Y. Chawathe, S. Consolvo, J. Hightower,
of using bluetooth contact-patterns (including mobile blue- I. Smith, J. Scott . Place lab: Device positioning using
tooth devices) for context localization. We are not aware of radio beacons in the wild. In Proceedings of The Third
prior work that demonstrates a beneficial convergence of the International Conference on Pervasive Computing
bluetooth, cellular and Wi-Fi interfaces. (Pervasive ’05), May 2005.
Our work has been supported by recent studies that show [11] A. Natarajan, M. Motani, and V. Srinivasan.
the existence of bluetooth contact-patterns in devices [11, Understanding Urban Interactions from Bluetooth
26]. CoolSpots [22] proposes the installation of “bluetooth Phone Contact Traces. In Proceedings of The Eighth
access-points”, which if deployed widely, strengthens our Passive and Active Measurement Conference (PAM
idea of using bluetooth contact-patterns for providing con- ’07), Apr 2007.
text information to mobile devices. [12] A. Rahmati and L. Zhong. Context-for-Wireless:
Context-Sensitive Energy-Efficient Wireless Data
10. CONCLUSIONS Transfer. In Proceedings of The Fifth International
Blue-Fi proposed using bluetooth contact-patterns as con- Conference on Mobile Systems, Applications, and
text identifiers for predicting Wi-Fi availability. The low Services (MobiSys ’07), Jun 2007.
range of bluetooth devices make them accurate predictors [13] B. Greenstein, R. Gummadi, J. Pang, M. Y. Chen, T.
of Wi-Fi availability; we compensated for their lack of cov- Kohno, S. Seshan, and D. Wetherall. Can ferris bueller
erage by using cell-tower identifiers. Our evaluation with still have his day off? protecting privacy in the
data collected from real users’ contact-patterns shows en- wireless era. In Proceedings of The Eleventh Workshop
couraging results in providing coverage as well as accuracy. on Hot Topics in Operating Systems (HotOS-XI), May
In addition, we also presented techniques to overcome 2007.
bluetooth’s high discovery time essentially using periodic [14] E. S. Hall, D. K. Vawdrey, and C. D. Knutson. RF
scanning. To speed up the learning process, Blue-Fi uses Rendez-Blue: reducing power and inquiry costs in
collaborative prediction through sharing of logs and Wi-Fi Bluetooth-enabled mobile systems. In Proceedings of
connectivity details. The Eleventh International Conf. on Computer
Communications and Networks (ICCCN ’02), Oct
11. ACKNOWLEDGMENTS 2002.
[15] E. Shih, P. Bahl, and M. J. Sinclair. Wake on wireless:
We would like to thank Joe Hellerstein , Dilip Joseph, An-
An event driven energy saving strategy for battery
thony Joseph, Randy Katz, Venkat Padmanabhan, Lucian
operated devices. In Proceedings of The Eighth Annual
Popa and Matei Zaharia for their advice and guidance re-
International Conference on Mobile Computing and
garding various technical aspects as well as writing of this
Networking (MobiCom ’02), 2002.
paper. We would also like to thank our shepherd, Albrecht
Schmidt, and the anonymous reviewers for their comments [16] F. Dabek, R. Cox, F. Kaashoek, and R. Morris.
and suggestions. Vivaldi: A decentralized network coordinate system.
In Proceedings of the 2004 conference on Applications,
technologies, architectures, and protocols for computer
12. REFERENCES communications (SIGCOMM ’04), Aug 2004.
[1] Companies Eye Location-Services Market. [17] G. Ananthanarayanan, V. N. Padmanabhan, L.
http://online.wsj.com/article/SB122722971742046469.html. Ravindranath, and C. A. Thekkath. COMBINE:
[2] IMAP IDLE monitor/notifier. Leveraging the Power of Wireless Peers through
http://www.hackint0sh.org/forum/f126/6116.htm. Collaborative Downloading. In Proceedings of The
[3] In The Hand. http://32fet.net. Fifth International Conference on Mobile Systems,
[4] Is WiFi draining when not connected. Applications, and Services (MobiSys ’07), Jun 2007.
http://forums.macrumors.com/archive/index.php/t- [18] Ke Chen. On k-Median Clustering in High
330279.html. Dimensions. In Proceedings of The Seventeenth
[5] Microsoft Pocket Outlook. ACM-SIAM Symposium on Discrete Algorithms
http://www.microsoft.com/windowsmobile/en- (SODA ’06), Jan 2006.
us/downloads/microsoft/office-outlook-mobile.mspx. [19] M. Chen, T. Sohn, D. Chmelev, D. Haehnel, J.
[6] Spearman Rank Correlation Coefficient. Hightower, J. Hughes, A. LaMarca, F. Potter, I.
http://mathworld.wolfram.com/SpearmanRankCorrelati Smith, and A. Varshavsky. Practical
onCoefficient.html. Metropolitan-Scale Positioning for GSM Phones. In
[7] WIGLE: Wireless Geographic Logging Engine. Proceedings of The Eighth International Conference on
http://wigle.net. Ubiquitous Computing (UbiComp ’06), Sep 2006.
[8] A. J. Nicholson and B. D. Noble. BreadCrumbs: [20] P. Bahl, R. Chandra, J. Padhye, L. Ravindranath, M.
Forecasting mobile connectivity. In Proceedings of The Singh, A. Wolman and B. Zill. Enhancing the security
260
of corporate wi-fi networks using dair. In Proceedings [25] V. Otsason, A. Varshavsky, A. LaMarca, and E. de
of The Fourth International Conference on Mobile Lara. Accurate GSM Indoor Localization. In The
Systems, Applications, and Services (MobiSys ’06), Seventh International Conference on Ubiquitous
Jun 2006. Computing (Ubicomp ’05), Sep 2005.
[21] P. Mohan, V. N. Padmanabhan, and R. Ramjee. [26] V. S. W. Wang and M. Motani. Adaptive contact
TrafficSense: Rich Monitoring of Road and Traffic probing mechanisms for delay tolerant applications. In
Conditions using Mobile Smartphones. In Microsoft Proceedings of The Thirteenth Annual International
Technical Report, MSR-TR-2008-59, Apr 2008. Conference on Mobile Computing and Networking
[22] T. Pering, Y. Agarwal, R. Gupta, and R. Want. (MobiCom ’07), Sep 2007.
Coolspots: Reducing the power consumption of [27] Y. Agarwal, C. Schurgers, and R. Gupta. Dynamic
wireless mobile devices with multiple radio interfaces. Power Management Using On Demand Paging for
In Proceedings of The Fourth International Conference Networked Embedded Systems. In Proceedings of The
on Mobile Systems, Applications, and Services 2005 Conference on Asia South Pacific Design
(MobiSys ’06), Jun 2006. Automation (ASP-DAC ’05), Jan 2005.
[23] T. Sohn, A. Varshavsky, A. Lamarca, M. Chen, T. [28] Y. Agarwal, R. Chandra, A. Wolman, P. Bahl, and R.
Choudhury, I. Smith, S. Consolvo, J. Hightower, W. Gupta. Wireless wakeups revisited: Energy
Griswold, and E. de Lara. Mobility detection using management for voip over wi-fi smartphones. In
everyday gsm traces. In Proceedings of The Eighth Proceedings of The Fifth International Conference on
International Conference on Ubiquitous Computing Mobile Systems, Applications, and Services (MobiSys
(UbiComp ’06), Sep 2006. ’07), Jun 2007.
[24] V. Bychkovsky, B. Hull, A. Miu, H. Balakrishnan, and
S. Madden. A measurement study of vehicular
internet access using in situ wi-fi networks. In
Proceedings of The Twelfth Annual International
Conference on Mobile Computing and Networking
(MobiCom ’06), 2006.
261