Petteri Nurmi
University of Helsinki
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Petteri Nurmi.
international conference on embedded networked sensor systems | 2013
Samuli Hemminki; Petteri Nurmi; Sasu Tarkoma
We present novel accelerometer-based techniques for accurate and fine-grained detection of transportation modes on smartphones. The primary contributions of our work are an improved algorithm for estimating the gravity component of accelerometer measurements, a novel set of accelerometer features that are able to capture key characteristics of vehicular movement patterns, and a hierarchical decomposition of the detection task. We evaluate our approach using over 150 hours of transportation data, which has been collected from 4 different countries and 16 individuals. Results of the evaluation demonstrate that our approach is able to improve transportation mode detection by over 20% compared to current accelerometer-based systems, while at the same time improving generalization and robustness of the detection. The main performance improvements are obtained for motorised transportation modalities, which currently represent the main challenge for smartphone-based transportation mode detection.
international conference on mobile systems, applications, and services | 2011
Mikkel Baun Kjærgaard; Sourav Bhattacharya; Henrik Blunck; Petteri Nurmi
Emergent location-aware applications often require tracking trajectories of mobile devices over a long period of time. To be useful, the tracking has to be energy-efficient to avoid having a major impact on the battery life of the mobile device. Furthermore, when trajectory information needs to be sent to a remote server, on-device simplification of the trajectories is needed to reduce the amount of data transmission. While there has recently been a lot of work on energy-efficient position tracking, the energy-efficient tracking of trajectories has not been addressed in previous work. In this paper we propose a novel on-device sensor management strategy and a set of trajectory updating protocols which intelligently determine when to sample different sensors (accelerometer, compass and GPS) and when data should be simplified and sent to a remote server. The system is configurable with regards to accuracy requirements and provides a unified framework for both position and trajectory tracking. We demonstrate the effectiveness of our approach by emulation experiments on real world data sets collected from different modes of transportation (walking, running, biking and commuting by car) as well as by validating with a real-world deployment. The results demonstrate that our approach is able to provide considerable savings in the battery consumption compared to a state-of-the-art position tracking system while at the same time maintaining the accuracy of the resulting trajectory, i.e., support of specific accuracy requirements and different types of applications can be ensured.
international conference on mobile and ubiquitous systems: networking and services | 2006
Miquel Martin; Petteri Nurmi
The complexity associated to gathering and processing contextual data makes testing mobile context-aware applications and services difficult Furthermore, the lack of standard data sets and simulation tools makes the evaluation of machine learning algorithms in context-aware settings an even harder task. To ease the situation, we introduce a generic simulator that has been designed with the above mentioned purposes in mind. The simulator has also proven to be a good demonstration tool for mobile services and applications that are aimed at groups. The simulator is highly customizable and it can output context information of individual entities both through an interactive GUI and as data streams consisting of comma separated values. To support a wide range of tasks and scenarios, we have separated the three main information sources: behavior of agents, the scenario being simulated and the used context variable. The simulator has been implemented using Java, and the data streams have been made available through a Web service interface
IEEE Pervasive Computing | 2009
Joonas Kukkonen; Eemil Lagerspetz; Petteri Nurmi; Mikael Andersson
BeTelGeuse is an extensible data collection platform for mobile devices, which also automatically infers higher level context from sensor data. In this article, the authors introduce BeTelGeuses architecture and current features, and evaluate its impact on mobile phone performance.
international conference on mobile and ubiquitous systems: networking and services | 2006
Petteri Nurmi; Johan Koolwaaij
Existing context-aware mobile applications often rely on location information. However, raw location data such as GPS coordinates or GSM cell identifiers are usually meaningless to the user and, as a consequence, researchers have proposed different methods for inferring so-called places from raw data. The places are locations that carry some meaning to user and to which the user can potentially attach some (meaningful) semantics. Examples of places include home, work and airport. A lack in existing work is that the labeling has been done in an ad hoc fashion and no motivation has been given for why places would be interesting to the user. As our first contribution we use social identity theory to motivate why some locations really are significant to the user. We also discuss what potential uses for location information social identity theory implies. Another flaw in the existing work is that most of the proposed methods are not suited to realistic mobile settings as they rely on the availability of GPS information. As our second contribution we consider a more realistic setting where the information consists of GSM cell transitions that are enriched with GPS information whenever a GPS device is available. We present four different algorithms for this problem and compare them using real data gathered throughout Europe. In addition, we analyze the suitability of our algorithms for mobile devices
Pervasive and Mobile Computing | 2014
Sourav Bhattacharya; Petteri Nurmi; Nils Y. Hammerla; Thomas Plötz
We propose a sparse-coding framework for activity recognition in ubiquitous and mobile computing that alleviates two fundamental problems of current supervised learning approaches. (i) It automatically derives a compact, sparse and meaningful feature representation of sensor data that does not rely on prior expert knowledge and generalizes well across domain boundaries. (ii) It exploits unlabeled sample data for bootstrapping effective activity recognizers, i.e., substantially reduces the amount of ground truth annotation required for model estimation. Such unlabeled data is easy to obtain, e.g., through contemporary smartphones carried by users as they go about their everyday activities.Based on the self-taught learning paradigm we automatically derive an over-complete set of basis vectors from unlabeled data that captures inherent patterns present within activity data. Through projecting raw sensor data onto the feature space defined by such over-complete sets of basis vectors effective feature extraction is pursued. Given these learned feature representations, classification backends are then trained using small amounts of labeled training data.We study the new approach in detail using two datasets which differ in terms of the recognition tasks and sensor modalities. Primarily we focus on a transportation mode analysis task, a popular task in mobile-phone based sensing. The sparse-coding framework demonstrates better performance than the state-of-the-art in supervised learning approaches. More importantly, we show the practical potential of the new approach by successfully evaluating its generalization capabilities across both domain and sensor modalities by considering the popular Opportunity dataset. Our feature learning approach outperforms state-of-the-art approaches to analyzing activities of daily living.
international world wide web conferences | 2014
Hien Thi Thu Truong; Eemil Lagerspetz; Petteri Nurmi; Adam J. Oliner; Sasu Tarkoma; N. Asokan; Sourav Bhattacharya
There is little information from independent sources in the public domain about mobile malware infection rates. The only previous independent estimate (0.0009%) [11], was based on indirect measurements obtained from domain-name resolution traces. In this paper, we present the first independent study of malware infection rates and associated risk factors using data collected directly from over 55,000 Android devices. We find that the malware infection rates in Android devices estimated using two malware datasets (0.28% and 0.26%), though small, are significantly higher than the previous independent estimate. Based on the hypothesis that some application stores have a greater density of malicious applications and that advertising within applications and cross-promotional deals may act as infection vectors, we investigate whether the set of applications used on a device can serve as an indicator for infection of that device. Our analysis indicates that, while not an accurate indicator of infection by itself, the application set does serve as an inexpensive method for identifying the pool of devices on which more expensive monitoring and analysis mechanisms should be deployed. Using our two malware datasets we show that this indicator performs up to about five times better at identifying infected devices than the baseline of random checks. Such indicators can be used, for example, in the search for new or previously undetected malware. It is therefore a technique that can complement standard malware scanning. Our analysis also demonstrates a marginally significant difference in battery use between infected and clean devices.
sensor, mesh and ad hoc communications and networks | 2004
Petteri Nurmi
Mobile agents acting in wireless ad hoc networks are energy constrained, which leads to potential selfishness as nodes are not necessarily willing to forward packets for other nodes. Situations like this are traditionally analyzed using game theory and recently also the ad hoc networking community has witnessed game-theoretic approaches to especially routing. However, from a theoretical point-of-view the contemporary game-theoretic approaches have mainly ignored two important aspects: non-simultaneous decision making and incorporating history information into the decision making process. In this article we propose a new model that fills these gaps and allows to analyze routing theoretically.
ubiquitous computing | 2013
Antti Jylhä; Petteri Nurmi; Miika Sirén; Samuli Hemminki; Giulio Jacucci
With the advances in smartphone technologies, sustainable mobility has become an active research topic in the field of ubiquitous computing. We present a persuasive mobile application that automatically tracks the transportation modes and CO2 emissions of the trips of the user and utilizes this information to present a set of actionable mobility challenges to the user. A longitudinal pilot experiment with the system showed that subjects perceived the concept of challenges as positive, with constructive findings to inform further development of the application especially related to personalized challenges.
ieee international conference on pervasive computing and communications | 2014
Hien Thi Thu Truong; Xiang Gao; Babins Shrestha; Nitesh Saxena; N. Asokan; Petteri Nurmi
Zero-Interaction Authentication (ZIA) refers to approaches that authenticate a user to a verifier (terminal) without any user interaction. Currently deployed ZIA solutions are predominantly based on the terminal detecting the proximity of the users personal device, or a security token, by running an authentication protocol over a short-range wireless communication channel. Unfortunately, this simple approach is highly vulnerable to low-cost and practical relay attacks which completely offset the usability benefits of ZIA. The use of contextual information, gathered via on-board sensors, to detect the co-presence of the user and the verifier is a recently proposed mechanism to resist relay attacks. In this paper, we systematically investigate the performance of different sensor modalities for co-presence detection with respect to a standard Dolev-Yao adversary. First, using a common data collection framework run in realistic everyday settings, we compare the performance of four commonly available sensor modalities (WiFi, Bluetooth, GPS, and Audio) in resisting ZIA relay attacks, and find that WiFi is better than the rest. Second, we show that, compared to any single modality, fusing multiple modalities improves resilience against ZIA relay attacks while retaining a high level of usability. Third, we motivate the need for a stronger adversarial model to characterize an attacker who can compromise the integrity of context sensing itself. We show that in the presence of such a powerful attacker, each individual sensor modality offers very low security. Positively, the use of multiple sensor modalities improves security against such an attacker if the attacker cannot compromise multiple modalities simultaneously.