Next Article in Journal
Application of Machine Learning Methods for an Analysis of E-Nose Multidimensional Signals in Wastewater Treatment
Previous Article in Journal
Ultrasound Diagnostic and Physiotherapy Approach for a Patient with Parsonage–Turner Syndrome—A Case Report
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Non Intrusive Human Presence Detection Methodology Based on Channel State Information of Wi-Fi Networks

by
Carlos M. Mesa-Cantillo
1,
David Sánchez-Rodríguez
1,2,*,
Itziar Alonso-González
1,2,
Miguel A. Quintana-Suárez
2,
Carlos Ley-Bosch
1,2 and
Jesús B. Alonso-Hernández
1,3
1
Institute for Technological Development and Innovation in Communications, University of Las Palmas de Gran Canaria, 35017 Las Palmas de Gran Canaria, Spain
2
Telematic Engineering Department, University of Las Palmas de Gran Canaria, 35017 Las Palmas de Gran Canaria, Spain
3
Signal and Communications Department, University of Las Palmas de Gran Canaria, 35017 Las Palmas de Gran Canaria, Spain
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(1), 500; https://doi.org/10.3390/s23010500
Submission received: 7 November 2022 / Revised: 24 December 2022 / Accepted: 28 December 2022 / Published: 2 January 2023
(This article belongs to the Section Communications)

Abstract

:
In recent times, we have been witnessing the development of multiple applications and deployment of services through the indoors location of people as it allows the development of services of interest in areas related mainly to security, guiding people, or offering services depending on their localization. On the other hand, at present, the deployment of Wi-Fi networks is so advanced that a network can be found almost anywhere. In addition, security systems are more demanded and are implemented in many buildings. Thus, in order to provide a non intrusive presence detection system, in this manuscript, the development of a methodology is proposed which is able to detect human presence through the channel state information (CSI) of wireless communication networks based on the 802.11n standard. One of the main contributions of this standard is multiple-input multiple-output (MIMO) with orthogonal frequency division multiplexing (OFDM). This makes it possible to obtain channel state information for each subcarrier. In order to implement this methodology, an analysis and feature extraction in time-domain of CSI is carried out, and it is validated using different classification models trained through a series of samples that were captured in two different environments. The experiments show that the methodology presented in this manuscript obtains an average accuracy above 90%.

1. Introduction

Traditional presence detection systems usually make use of magnetic opening sensors or special video surveillance devices, such as cameras or infrared motion detectors. In addition to the typical systems, which are composed of visible light cameras as the system developed in [1], different alternatives have been used, those that exploit passive Radio Frequency Identification (RFID) technology for this purpose such as the authors in [2] or infrared light, such as the joint use of visible light and infrared light images as explained in [3] or the system developed in [4] for infrared pedestrian detection.
Bluetooth low energy (BLE) technology is also a very common low-cost and widely used, and there have been multiple occupant detection studies using BLE systems such as [5], a system composed of BLE beacons installed inside the building, a mobile application installed on occupant’s mobile phones and a remote control server, yielding high classification accuracy for different numbers of installed beacons and occupant movement patterns. In [6], a scalable and less intrusive system that takes advantage of smartphone BLE technology to carry out occupant location at the zone level, requiring no application installed on the phone is carried out. In addition, in [7], a hybrid method fusing sliding-window filtering, trilateration, dead reckoning and the Kalman filtering method to improve the performance of the BLE indoor positioning is proposed.
In the building domain, there are multiple human presence detection systems that have been proposed to enable some real-world applications such as building emergency management. In addition, in [8], a novel IoT-based occupancy-driven plug load management system is proposed. In [9], a system is presented that leverages existing WiFi infrastructure in commercial buildings, along with smartphones with WiFi connectivity carried by building occupants, to provide precise occupancy-based climate control. Furthermore, in [10], an occupancy prediction is carried out based on a minimum sensing strategy by using a comprehensive set of sensor data to identify the most crucial features.
On the other hand, Wi-Fi-based solutions have also become popular due to their low cost and wide deployment. Although some of the mentioned passive presence detection technologies do not require special equipment and are low-cost and easy to implement, there are some existing challenges to resolve.
The possibility of developing presence detection systems based on Wi-Fi network is a viable solution without the use of any additional device, such as the system developed in [11]. In addition, in [12], a system to locate breathing in a home employing commercial Wi-Fi devices is implemented. This is partly due to the fact that no additional hardware is required and that, since the emergence of the IEEE 802.11n standard, additional channel information can be obtained.
On the other hand, CSI represents most detailed physical layer information compared to RSSI and BLE, providing channel information such as amplitude and phase on the subcarriers. CSI has been employed for person localization as can be seen in [13,14,15], for sign detection developed in [16], gesture detection in [17], human activity recognition as shown in [18,19], and person recognition such as WifiU [20] analyzes unique variations in the CSI on the Wi-Fi receiver, and even intrusion detection such as APID in [21]. CSI does not require any additional applications or use additional devices to detect human presence, unlike BLE deployments that usually require the installation of several BLE beacons in different locations to function properly, as the coverage area of BLE beacons is smaller than WiFi zones.
The most relevant contributions of this manuscript are as follows:
  • CSI is used instead of RSSI because it provides more detailed physical layer information and can be used for location and tracking services with higher accuracy.
  • Exploiting the information of the subcarriers amplitude provided by CSI and a feature extraction our approach is able to detect human presence in different environments.
  • Only Wi-Fi networks are employed to detect human presence, and no additional hardware is needed.
  • Classifiers evaluation is carried out, such as Support Vector Machine (SVM), decision trees and K-nearest neighbors (KNN) in order to detect which one can return a more accurate system.
This article is organized as follows: Section 2 summarizes the related work about presence detection systems employing CSI. Section 3 presents the CSI and its behavior. After that, Section 4 introduces the methodology to carry and the human presence detection system employed. Section 5 describes the scenarios and datasets that were built. Next, Section 6, the setup of the classifiers, an analysis of the different results and a comparison of the different classifiers is carried out. Finally, in Section 7, the conclusions and future work are presented.

2. Related Work

In recent years, a lot of research on indoor localization, fall detection and even gesture detection using CSI provided by a Wi-Fi network interface card (NIC) can be found in the literature. Starting by a fall detection system, in [22], the authors use CSI of the physical layer as an activity indicator. They can detect human falls without hardware modifications and without any handheld device, just by analyzing the CSI generated from an AP to a computer. The work starts by addressing the wireless radio propagation model in indoor environments while there are human activities, analyzing the radio propagation during falling and presenting a model when the user is at the Non Line Of Sight location.
The variation of the signal in the time-domain caused by human presence or movement and detection of the direction of intrusion are analyzed in [23]. This is based on the observation that the phase difference over two antennas shows fascinating characteristics in the presence of fall and other human activities. They propose a transition-based segmentation method that uses the variance of the phase difference over a pair of receiving antennas as a salient feature to segment on fall activities. Then, the characteristics of the CSI amplitude and phase information are extracted to distinguish between fall and fall-like activities.
In addition, in [24], the authors presented a real-time detection system without calibration based on Wi-Fi. They present a Fine-grained Indoor Motion Detection (FIMD) system that provides high accuracy, employing commercial 802.11n NICs to collect CSI samples by detection points fixed in the area of interest. After results evaluation from real world experiments, they demonstrate that the CSI-based motion detection by FIMD can improve detection accuracy.
In [25], authors established a scalable and non-intrusive solution for motion detection in smart home environments replacing existing Passive Infrared (PIR) sensors with Raspberry Pi 4 using CSI for accurate course movement detection. Their system aims to detect movement using variations in the correlation of sequential CSI frames. Measuring periods of increased variation that are identified as being caused by collisions on the subject’s body, and applying statistical approaches, they can effectively perform both movement and occupancy detection.
Authors in [26] proposed that the phase is more sensitive than the amplitude when there is an intruder. They focus on extracting the meaningful phase information, eliminating the significant random noise by employing linear transformation on the raw CSI. They propose a eigenvalue of covariance matrix of normalized CSI. Its characteristics are designed to be power-irrelevant but variation-dependent. Lastly, they adopt the dynamic time window algorithm on the sequence of CSI eigenvalues to detect intrusion behaviors.
In [27], a device free PAsive Detection of moving humans with dynamic Speed (PADS) was proposed. Exploiting both amplitude and phase provided by CSI. First, they obtain meaningful phase information by employing a linear transformation on the raw CSI. Next, they extract a new unified feature from the normalized amplitude and phase information, and then introduce the SVM algorithm to find a cut-off line of the feature values for different states for estimation. Finally, to improve the detection accuracy, they implement CSI across multiple antennas in MIMO.
In [28], the authors proposed a multi-room presence detection system in which only a transmitter is required, and the number of receivers depends on the number of rooms. With their proposed C-MuRP system, they obtained an accuracy of over 90%.
On the other hand, a Wi-Fi CSI based passive human intrusion direction detection system is developed in [29]. They propose an algorithm to monitor changes in amplitude and angle of arrival distributions of reflections and perform human intrusion detection.
The authors in [30] propose a process that goes through different steps in order to establish a presence detection classifier and the relationship between CSI fingerprints and locations, and classification to detect presence or regression to estimate locations.
As can be observed, there has been considerable progress in the advancement of approaches for human detection, using CSI to deal with the amplitude and phase information of subcarriers in OFDM systems or combining it with RSS information. In our system, only the amplitude given by the CSI is considered to analyze different scenarios and check when a human intrusion occurred by analyzing some parameters of the signal. In this study, a simple and accurate methodology is presented yielding an average accuracy over 90%, and employing time domain features such as the mean, standard deviation (STD), root mean square (RMS), and the number of changes that occurred in the signal.

3. Channel State Information

In all wireless communication, the signal propagates from the transmitter to the receiver. This signal is affected by the elements that are present in the environment causing reflections and diffractions due to the multi-path effect. The OFDM scheme employs orthogonal multiple subcarrier modulation. Each subcarrier carries information and suffers from multi-path effects such as delay, attenuation and phase shift. CSI is the information of these subcarriers and its representation in Channel Frequency Response (CFR) is given by the following equation:
H ( f ; t ) = n N a n ( t ) e j 2 π f τ n ( t )
where a(t) is the amplitude attenuation factor, τ n ( t ) is the propagation delay, and f is the carrier frequency [31].
Movements of objects or people as well as presence of people directly influence the amplitude and phase of each subcarrier. This feature can be exploited in applications such as people detection as well as indoor location.
The OFDM technique enables simple least squares channel estimation for CSI per subcarrier in an efficient way in the frequency domain. The MIMO system allows for more pairs of CSI observations with multiple transmit and receive antennas. In the frequency domain, the channel model can be expressed as:
y k , l = h k , l x k , l + n k , l ,
where x k , l and y k , l are the Tx and Rx signal at k-th subcarrier of l-th antenna pair, respectively. h k , l and n k , l are the channel response and additive white Gaussian noise. In the OFDM system, the CSI of the k-th subcarrier and the l-th antenna pair can be estimated as:
h ^ k , l = y k , l x k , l .
The CSI matrix can be expressed as:
H ^ = h ^ 1 , 1 h ^ 1 , 2 h ^ 1 , L h ^ 2 , 1 h ^ 2 , 2 h ^ 2 , L h ^ K , 1 h ^ K , 2 h ^ K , L
where K is the number of subcarriers and L the antenna pair. Each element of the CSI matrix is represented as:
h ^ k , l = h ^ k , l e j h ^ k , l

4. Methodology

The methodology followed in this research work is presented in Figure 1, which is developed in five stages: data collection, CSI amplitude processing, filtering, feature extraction and classification.
The process followed in this methodology can be briefly introduced as follows:
  • First data are collected at every location previously defined from an IEEE 802.11 access point. CSI information specifies the amplitude and phase of the signal path between a single transmitter–receiver antenna pair.
  • In the next step, CSI amplitude processing, where CSI is processed to extract subcarriers amplitude for the transmission. After that, these signals are filtered to achieve better results with a low-pass filter implemented with a MATLAB function.
  • Next, the dataset is built with these vectors feature extraction.
  • In addition, finally, they are used as an input of the machine learning algorithm to create the different models.
Each stage is described in the following sub-sections.

4.1. Data Collection

In order to analyze the influence of a human presence in the transmission, the samples are captured in a known scenario. First, the system was configured so it worked at a 2.4 GHz WiFi band which was the supported by the access point. In that scenario, the position for the AP and the computer that capture the CSI is defined. In addition, after setting the position of the computer and the AP, the process of collecting samples without any human interfering is carried out. Once enough samples had been taken, additional samples are collected with human presence.
The process of capturing the human presence was carried out with different delays, 10 s, 20 s and about 30 s after the start.

4.2. CSI Amplitude Processing

In MIMO communication, not all receiver antennas are always used. In addition, the Tx–Rx antenna pair with the highest subcarrier amplitude has the highest stability. Figure 2 shows the amplitude of a set of samples, for each Tx–Rx antenna pair in a 2 × 3 communication.
As can be seen, each pair returns different values, and therefore it was necessary to make a selection of which pair would be used in the different tests. To select the best pair, the average of each pair is computed as:
C S I = 1 S i = 1 S H i 2 + H i 2
where S is the number of subcarrier, and H i and H i represent the phase and amplitude information of the i-th subcarrier, respectively. This information is provided as a complex number, and therefore, C S I represents the averaged magnitudes of S complex numbers. Once the C S I value of each pair is estimated, the pair with the highest amplitude value is selected. This pair is selected because it is the one with the highest stability, which allows a parameter extraction to be clearer when human presence is detected.

4.3. Signal Filtering

After the process of selection in which the Tx–Rx antenna pair is selected, a low pass filter is applied to reduce the noise added to the signal; this is also implemented with the MATLAB function lowpass(x, wpass).
Where x is the CSI amplitude matrix and wpass is the normalized pass band frequency. This function filters the input signal x using a lowpass filter with normalized passband frequency wpass in units of π r a d / s a m p l e . This function uses a minimum-order filter with a stopband attenuation of 60 dB and compensates for the delay introduced by the filter. This filter is required in order to attenuate the effect of possible interferences in our signal. In our methodology, we use a 0.5 value as a wpass parameter because it provided the best results at the classification phase.

4.4. Features Extraction

To carry out the classification, an evaluation of some features in time domain was implemented, such as the mean value, the number of relevant changes according to a threshold, the standard deviation, the quadratic mean, and the kurtosis. The combination of the first four indicated parameters obtained the best performance results in the classification phase. These parameters have been selected because they are fast to obtain and do not require much time to process. With these values, the following parameters are obtained:
  • Max Mean: gives the maximum value of the mean in the sample of amplitude information;
  • Max RMS: gives the maximum value of the root mean square in the sample;
  • NumberOfChanges: show the number of abrupt changes in the signal;
  • Max STD: gives the maximum value of the standard deviation in the signal.
Table 1 shows the parameters when there is a human presence besides those in which there is not. These parameters are related with the samples shown in Figure 3 that displays the difference between a signal that have been affected by an intrusion, on the left, and a signal without interference, on the right.
In addition, a human presence detection is shown in Figure 4. First, there is no human presence in the space being captured, then human access in the scenario about 25 s from starting data collection, and finally there is no human presence again.
As can be observed from Table 1 and Figure 4, the parameters suffer a high variation when a human interferes in a scenario.

4.5. Classification

Our methodology attempts to detect a human presence, and to achieve this, two different categories were created which are “Presence” that refers to when is a human presence and “No-Presence” that means that there was no human in the environment. In order to validate this data, different machine learning algorithms were used such as K-Nearest Neighbors (KNN), SVM, Decision trees, Linear discrimination, Quadratic discrimination, Naive Bayes, Neuronal Networks and Ensemble classifiers. There are different types of some of these classifiers that were studied such as Linear SVM or Quadratic SVM. Furthermore, in the case of the KNN classifiers, different models with a different number of neighbors were trained. The amount of neighbors selected was 1, 10 and 100. In addition, there were models with different distance weight formulas and distance metric. A total of 31 classification models have been studied, but only the classifiers with the best accuracy will be analyzed.

5. Datasets

Three datasets have been employed in order to validate this methodology. These datasets contain CSI measurements collected from a single IEEE 802.11n access point.
An Acer Travelmate 6293 laptop with Intel WiFi Link 5300 802.11n wireless network card was used to gather CSI measurements from the access point, which was configured using the Linux 802.11n CSI tool developed by [32]. This laptop has three internal antennas for wireless communications. The CSI tool provides CSI values in a format that reports the channel matrices for 30 subcarrier groups for every two subcarriers at 20 MHz. Each matrix entry is a complex number specifying amplitude and phase of the signal path between a Tx–Rx antenna pair.
On the other hand, an ASUS RT-N12E Wireless-N300 access point with two antennas was used. Therefore, since in both scenarios a 2 × 3 MIMO communication can be achieved, 90 raw CSI measurements (1 × 3 MIMO transmission) can be collected for each packet reception. This means that 30 raw CSI measures are collected from each receiver antenna.

5.1. Scenario 1

In this scenario, samples were taken placing the devices in two different places of the room and interfering with two different routes, as shown in Figure 5. In this case, a total of 264 samples were taken, 139 were taken without any presence, while the remaining 125 samples had a human presence interfering with the transmission signal for a period of time.

5.2. Scenario 2

This dataset was taken in a placed named as scenario 2, with 115 samples taken, 65 without any presence and the remaining samples with a human presence walking through the access point and the computer. In Figure 6, the path traveled by the person and the position of the access point and the computer are shown.

5.3. Both Scenarios

This dataset was created after all samples were taken and contains all samples taken in scenario 1 and scenario 2. In total, it contains 379 samples, of which 204 are samples with no human presence and 175 are samples that were interfered with by a human for a period of time.

6. Results and Discussion

In order to make the classification the easier and fastest, MATLAB classification learner app was employed because it can perform automated training to search for the best classification model type, including decision trees, discriminant analysis, support vector machines, logistic regression, nearest neighbors, naive Bayes, kernel approximation, ensemble, and neural network classification.
Since a different configuration for Tx–Rx antennas can be configured and, depending on which pair is selected, the amplitude values of the signal can differ. To select which pair was going to be used for the classification, all possible pairs were tested, and the results both graphically and numerically were evaluated. The pair Tx-2 and Rx-2 was selected after a study comparing the results for the six possible antenna pairs because it was the one that returned the most easily distinguishable values when there is human presence and when there is not. After this evaluation, all the tests and classifications were carried out with this pair.
In order to analyze the samples in each of the datasets described in Section 5, simulations were carried out implementing the 10-fold cross-validation technique. This means that in each experiment the data set is divided into 10 partitions, and 10 rounds are performed in which 9 partitions are used for training and 1 for testing. In addition, the results that are going to be analyzed are for the 3 best classifiers over the 31 that were trained.

6.1. Scenario 1

In Table 2, the results for the best 3 classifiers are shown.
As shown by the results, we can see how, depending on the percentage of samples used for the training of the model, the accuracy is higher when more samples are used. Moreover, in this case, we can conclude that the most accurate classifier is the linear SVM model with an average accuracy of 92.99% with an STD of 0.58.

6.2. Scenario 2

As in the previous scenario, in Table 3, the results for the best 3 classifiers are shown.
Analyzing the results for this scenario, as in the other scenario, the highest accuracy is given by the linear SVM model with an average accuracy of 93.58% and a STD of 0.57 when it is trained with 75% of the samples. In this scenario, the other classifiers obtained values that can outperform the linear SVM when trained with fewer samples, but as the number of samples used for training increases, their accuracy decreases. The only one that increased its accuracy when more samples are used is the linear SVM.

6.3. Both Scenarios

When both scenarios were analyzed simultaneously, the best classifiers were the same that are in scenario 2. However, in this case, the Quadratic discrimination model was not the best. The accuracy for this classifiers is shown in Table 4.
In this case, where samples from both scenarios are used for training, as in the previous datasets that were analyzed, the one with the highest accuracy is the linear SVM model, with an average accuracy of 93.24% and a STD of 0.31.

6.4. Performance Evaluation

Analyzing the whole datasets and its results for each of them, we can conclude which classifier is the best for each one. Reviewing the results of each scenarios, it can be concluded that the best average accuracy is given by the linear SVM; in Table 5, we can check the results of this classifier for each dataset.
As can be seen by the results obtained in all the different scenarios for this classifier model, when more samples are used for training, better results are obtained. In addition, when these results are compared with the other two models with the highest accuracy, this one is the only one that obtained an increasing accuracy when more samples are used for training, which is the expected result, since, when more samples are used, it should be clearer which samples contain a human presence. The other two classifier models sometimes show higher accuracy when trained with fewer samples, and may decrease in accuracy when given more samples to train.

7. Conclusions and Future Work

In this manuscript, a methodology using the CSI amplitude provided in Wi-Fi networks to infer the human presence is described. This methodology is based on features in time-domain in order to carry out the human presence detection. The evaluation of the proposed methodology indicates that deployed Wi-Fi networks can be used for intrusion event, leading to satisfactory accuracy. The proposal was verified and validated in two different real-world scenarios.
As shown in Section 6, we conclude that the linear SVM classifier was the most suitable in this case and scenario since it has an accuracy rate over 92% in all the scenarios and tests. In addition, we can conclude that, with this parameter setting and the classification learner app, it is possible to determine when a human interference is occurring.
One of the limitations of the system is that it is only able to detect one intrusion at a time, and it is not able to distinguish whether the intrusion has been caused by one or several people. In addition, if a previous and analyzed environment is modified, new samples are needed to retrain the classification models, since the values may vary from those previously obtained. In our ongoing work, one of the improvements that can be implemented is a model which is able to distinguish whether over time there is one or more intrusions by capturing the samples because, if an interference is performed in different time periods, it can be easily distinguishable. In addition, further parameterization of the CSI signal, including its phase, could be analyzed, which could address some of the limitations of the system and improve the accuracy rate of the classifiers. Furthermore, a study of several deep learning techniques employing different activation functions could be performed to evaluate the results of different classifiers over those studied aforementioned.

Author Contributions

Conceptualization, C.M.M.-C., D.S.-R. and I.A.-G.; methodology, C.M.M.-C., D.S.-R. and J.B.A.-H.; software, C.M.M.-C., D.S.-R. and J.B.A.-H.; validation, C.M.M.-C. and D.S.-R.; formal analysis, C.M.M.-C., D.S.-R., I.A.-G., M.A.Q.-S. and C.L.-B.; investigation, C.M.M.-C., D.S.-R., I.A.-G., M.A.Q.-S. and C.L.-B.; resources, C.M.M.-C., D.S.-R., I.A.-G. and M.A.Q.-S.; data curation, C.M.M.-C., D.S.-R., I.A.-G. and M.A.Q.-S.; writing—original draft preparation, C.M.M.-C., D.S.-R., I.A.-G. and M.A.Q.-S.; writing—review and editing, C.M.M.-C., D.S.-R., I.A.-G. and M.A.Q.-S.; visualization, D.S.-R. and I.A.-G.; supervision, D.S.-R., I.A.-G. and M.A.Q.-S.; project administration, D.S.-R.; funding acquisition, D.S.-R. All authors have read and agreed to the published version of the manuscript.

Funding

This research has been partially founded by the Consejería de Economía, Conocimiento y Empleo del Gobierno de Canarias, Agencia Canaria de Investigación, Innovación y Sociedad de la información under projects ProID2020010009 and CEI2020-08, Spain.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
BLEBluetooth Low Energy
CFRChannel Frequency Response
CSIChannel State Information
FMIDFine-Grained Indoor Motion Detection
IEEEInstitute of Electrical and Electronics Engineers
KNNK-Nearest Neighbors
MIMOMultiple Input Multiple Output
NICNetwork Interface Card
OFDMOrthogonal Frequency Division Multiplexing
PIRPassive Infrared
RFIDRadio Frequency Identification
RMSRoot Mean Square
RSSReceived signal strength
RSSIReceived Signal Strength Indicator
RxReceiver
STDStandard Deviation
SVMSupport-Vector Machines
TxTransmitter

References

  1. Nayak, R.; Behera, M.M.; Pati, U.C.; Das, S.K. Video-based Real-time Intrusion Detection System using Deep-Learning for Smart City Applications. In Proceedings of the 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Goa, India, 16–19 December 2019; pp. 1–6. [Google Scholar] [CrossRef]
  2. Fortin-Simard, D.; Bilodeau, J.S.; Bouchard, K.; Gaboury, S.; Bouchard, B.; Bouzouane, A. Exploiting Passive RFID Technology for Activity Recognition in Smart Homes. IEEE Intell. Syst. 2015, 30, 7–15. [Google Scholar] [CrossRef]
  3. Zhiming, W.; Li, Z.; Hong, B. Bi-channel Video Fusion Human Invasion Detection Based on Neural Network. Comput. Eng. 2012, 38, 63645549. [Google Scholar]
  4. Hu, J.; Zhao, Y.; Zhang, X. Application of Transfer Learning in Infrared Pedestrian Detection. In Proceedings of the 2020 IEEE 5th International Conference on Image, Vision and Computing (ICIVC), Beijing, China, 10–12 July 2020; pp. 1–4. [Google Scholar] [CrossRef]
  5. Filippoupolitis, A.; Oliff, W.; Loukas, G. Occupancy Detection for Building Emergency Management Using BLE Beacons. In Proceedings of the Computer and Information Sciences; Czachórski, T., Gelenbe, E., Grochla, K., Lent, R., Eds.; Springer International Publishing: Cham, Switzerland, 2016; pp. 233–240. [Google Scholar]
  6. Tekler, Z.D.; Low, R.; Gunay, B.; Andersen, R.K.; Blessing, L. A scalable Bluetooth Low Energy approach to identify occupancy patterns and profiles in office spaces. Build. Environ. 2020, 171, 106681. [Google Scholar] [CrossRef]
  7. Huang, K.; He, K.; Du, X. A Hybrid Method to Improve the BLE-Based Indoor Positioning in a Dense Bluetooth Environment. Sensors 2019, 19, 424. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  8. Tekler, Z.; Low, R.; Yuen, C.; Blessing, L. Plug-Mate: An IoT-based occupancy-driven plug load management system in smart buildings. Build. Environ. 2022, 223, 109472. [Google Scholar] [CrossRef]
  9. Balaji, B.; Xu, J.; Nwokafor, A.; Gupta, R.; Agarwal, Y. Sentinel: Occupancy based HVAC actuation using existing WiFi infrastructure within commercial buildings. In Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, Roma Italy, 11–15 November 2013. [Google Scholar] [CrossRef]
  10. Tekler, Z.D.; Chong, A. Occupancy prediction using deep learning approaches across multiple space types: A minimum sensing strategy. Build. Environ. 2022, 226, 109689. [Google Scholar] [CrossRef]
  11. Wang, X.; Yi, P. Security Framework for Wireless Communications in Smart Distribution Grid. IEEE Trans. Smart Grid 2011, 2, 809–818. [Google Scholar] [CrossRef]
  12. Patwari, N.; Brewer, L.; Tate, Q.; Kaltiokallio, O.; Bocca, M. Breathfinding: A Wireless Network That Monitors and Locates Breathing in a Home. IEEE J. Sel. Top. Signal Process. 2014, 8, 30–42. [Google Scholar] [CrossRef]
  13. Hsieh, C.H.; Chen, J.Y.; Nien, B.H. Deep Learning-Based Indoor Localization Using Received Signal Strength and Channel State Information. IEEE Access 2019, 7, 33256–33267. [Google Scholar] [CrossRef]
  14. Chang, R.Y.; Liu, S.J.; Cheng, Y.K. Device-Free Indoor Localization Using Wi-Fi Channel State Information for Internet of Things. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–7. [Google Scholar] [CrossRef]
  15. Liu, A.; Cheng, L.; Yu, C. SASMOTE: A Self-Attention Oversampling Method for Imbalanced CSI Fingerprints in Indoor Positioning Systems. Sensors 2022, 22, 5677. [Google Scholar] [CrossRef] [PubMed]
  16. Li, H.; Yang, W.; Wang, J.; Xu, Y.; Huang, L. WiFinger: Talk to your smart devices with finger-grained gesture. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, Heidelberg, Germany, 12–16 September 2016. [Google Scholar] [CrossRef]
  17. Yang, J.; Zou, H.; Zhou, Y.; Xie, L. Learning Gestures From WiFi: A Siamese Recurrent Convolutional Architecture. IEEE Internet Things J. 2019, 6, 10763–10772. [Google Scholar] [CrossRef]
  18. Yadav, S.K.; Sai, S.; Gundewar, A.; Rathore, H.; Tiwari, K.; Pandey, H.M.; Mathur, M. CSITime: Privacy-preserving human activity recognition using WiFi channel state information. Neural Netw. 2022, 146, 11–21. [Google Scholar] [CrossRef] [PubMed]
  19. Bokhari, S.M.; Sohaib, S.; Khan, A.R.; Shafi, M.; ur Rehman Khan, A. DGRU based human activity recognition using channel state information. Measurement 2021, 167, 108245. [Google Scholar] [CrossRef]
  20. Wang, W.; Liu, A.X.; Shahzad, M. Gait Recognition Using Wifi Signals. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp’16, Heidelberg, Germany, 12–16 September 2016; Association for Computing Machinery: New York, NY, USA, 2016; pp. 363–373. [Google Scholar] [CrossRef] [Green Version]
  21. Tian, Z.; Li, Y.; Zhou, M.; Li, Z. WiFi-Based Adaptive Indoor Passive Intrusion Detection. In Proceedings of the 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP), Shanghai, China, 19–21 November 2018; pp. 1–5. [Google Scholar] [CrossRef]
  22. Wang, Y.; Wu, K.; Ni, L.M. WiFall: Device-Free Fall Detection by Wireless Networks. IEEE Trans. Mob. Comput. 2017, 16, 581–594. [Google Scholar] [CrossRef]
  23. Wang, H.; Zhang, D.; Wang, Y.; Ma, J.; Wang, Y.; Li, S. RT-Fall: A Real-Time and Contactless Fall Detection System with Commodity WiFi Devices. IEEE Trans. Mob. Comput. 2017, 16, 511–526. [Google Scholar] [CrossRef]
  24. Xiao, J.; Wu, K.; Yi, Y.; Wang, L.; Ni, L.M. FIMD: Fine-grained Device-free Motion Detection. In Proceedings of the 2012 IEEE 18th International Conference on Parallel and Distributed Systems, Singapore, 17–19 December 2012; pp. 229–235. [Google Scholar] [CrossRef]
  25. Forbes, G.; Massie, S.; Craw, S.; Clare, C. Motion Detection using CSI from Raspberry Pi 4. arXiv 2021, arXiv:2111.09091. [Google Scholar]
  26. Hu, H.; Li, L. A new method using covariance eigenvalues and time window in passive human motion detection based on CSI phases. In Proceedings of the 2017 IEEE 5th International Symposium on Electromagnetic Compatibility (EMC-Beijing), Beijing, China, 28–31 October 2017; pp. 1–6. [Google Scholar] [CrossRef]
  27. Qian, K.; Wu, C.; Yang, Z.; Liu, Y.; Zhou, Z. PADS: Passive Detection of Moving Targets with Dynamic Speed using PHY Layer Information. In Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS), Hsinchu, Taiwan, 16–19 December 2014; Volume 2015. [Google Scholar] [CrossRef]
  28. Chu, F.Y.; Chiu, C.J.; Hsiao, A.H.; Feng, K.T.; Tseng, P.H. WiFi CSI-Based Device-free Multi-room Presence Detection using Conditional Recurrent Network. In Proceedings of the 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), Helsinki, Finland, 25–28 April 2021; pp. 1–5. [Google Scholar] [CrossRef]
  29. Wang, J.; Tian, Z.; Zhou, M.; Wang, J.; Yang, X.; Liu, X. Leveraging Hypothesis Testing for CSI Based Passive Human Intrusion Direction Detection. IEEE Trans. Veh. Technol. 2021, 70, 7749–7763. [Google Scholar] [CrossRef]
  30. Zhou, R.; Lu, X.; Zhao, P.; Chen, J. Device-Free Presence Detection and Localization With SVM and CSI Fingerprinting. IEEE Sens. J. 2017, 17, 7990–7999. [Google Scholar] [CrossRef]
  31. Tse, D.; Viswanath, P. Fundamentals of Wireless Communication; Wiley Series in Telecommunications; Cambridge University Press: Cambridge, UK, 2005. [Google Scholar]
  32. Halperin, D.; Hu, W.; Sheth, A.; Wetherall, D. Tool Release: Gathering 802.11n Traces with Channel State Information. SIGCOMM Comput. Commun. Rev. 2011, 41, 53. [Google Scholar] [CrossRef]
Figure 1. The proposed methodology with amplitude extraction.
Figure 1. The proposed methodology with amplitude extraction.
Sensors 23 00500 g001
Figure 2. Amplitude representation in a 2 × 3 communication.
Figure 2. Amplitude representation in a 2 × 3 communication.
Sensors 23 00500 g002
Figure 3. CSI amplitude representation: (a) with human presence; (b) without human presence.
Figure 3. CSI amplitude representation: (a) with human presence; (b) without human presence.
Sensors 23 00500 g003aSensors 23 00500 g003b
Figure 4. Parameter setting results for a human presence detection: (a) mean representation; (b) STD representation; (c) RMS representation; (d) number of changes in the signal.
Figure 4. Parameter setting results for a human presence detection: (a) mean representation; (b) STD representation; (c) RMS representation; (d) number of changes in the signal.
Sensors 23 00500 g004aSensors 23 00500 g004bSensors 23 00500 g004c
Figure 5. Paths taken in scenario 1: (a) returning to the initial position; (b) ending the path in a different room.
Figure 5. Paths taken in scenario 1: (a) returning to the initial position; (b) ending the path in a different room.
Sensors 23 00500 g005
Figure 6. Scenario 2.
Figure 6. Scenario 2.
Sensors 23 00500 g006
Table 1. Example of parameter results when there is human presence, and without it.
Table 1. Example of parameter results when there is human presence, and without it.
Max MeanMax RMSNumber of ChangesMax STDSIGNAL
9.272221.1972196.1864‘Presence’
3.40043.562711.0912‘No-Presence’
Table 2. Scenario 1 best classifiers.
Table 2. Scenario 1 best classifiers.
Models25%50%75%
Mean ± STDMean ± STDMean ± STD
Linear SVM89.71 ± 3.7692.4 ± 092.99 ± 0.58
Quadratic Discrimination90.9 ± 0.9590.73 ± 0.692.7 ± 0.25
Quadratic SVM88.49 ± 1.290.29 ± 1.291.4 ± 0.84
Table 3. Scenario 2 best results.
Table 3. Scenario 2 best results.
Models25%50%75%
Mean ± STDMean ± STDMean ± STD
Linear SVM91.67 ± 2.7691.74 ± 0.6993.58 ± 0.57
Quadratic Discrimination95.18 ± 1.7192.41 ± 0.8391.05 ± 0.86
Quadratic SVM93.08 ± 3.0888.95 ± 1.4191.73 ± 0.86
Table 4. Best results obtained with all the samples.
Table 4. Best results obtained with all the samples.
Models25%50%75%
Mean ± STDMean ± STDMean ± STD
Linear SVM90.35 ± 1.4793.4 ± 0.2593.24 ± 0.31
Quadratic Discrimination90.37 ± 0.6093.79 ± 0.3792.36 ± 0.22
Quadratic SVM84.2 ± 4.1593.14 ± 0.5492.92 ± 0.45
Table 5. Linear SVM classifier results.
Table 5. Linear SVM classifier results.
Models25%50%75%
Mean ± STDMean ± STDMean ± STD
Scenario 189.71 ± 3.7692.4 ± 092.99 ± 0.58
Scenario 291.67 ± 2.7691.74 ± 0.6993.58 ± 0.57
Both Scenarios90.35 ± 1.4793.4 ± 0.2593.24 ± 0.31
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Mesa-Cantillo, C.M.; Sánchez-Rodríguez, D.; Alonso-González, I.; Quintana-Suárez, M.A.; Ley-Bosch, C.; Alonso-Hernández, J.B. A Non Intrusive Human Presence Detection Methodology Based on Channel State Information of Wi-Fi Networks. Sensors 2023, 23, 500. https://doi.org/10.3390/s23010500

AMA Style

Mesa-Cantillo CM, Sánchez-Rodríguez D, Alonso-González I, Quintana-Suárez MA, Ley-Bosch C, Alonso-Hernández JB. A Non Intrusive Human Presence Detection Methodology Based on Channel State Information of Wi-Fi Networks. Sensors. 2023; 23(1):500. https://doi.org/10.3390/s23010500

Chicago/Turabian Style

Mesa-Cantillo, Carlos M., David Sánchez-Rodríguez, Itziar Alonso-González, Miguel A. Quintana-Suárez, Carlos Ley-Bosch, and Jesús B. Alonso-Hernández. 2023. "A Non Intrusive Human Presence Detection Methodology Based on Channel State Information of Wi-Fi Networks" Sensors 23, no. 1: 500. https://doi.org/10.3390/s23010500

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop