Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Petteri Nurmi is active.

Publication


Featured researches published by Petteri Nurmi.


international conference on embedded networked sensor systems | 2013

Accelerometer-based transportation mode detection on smartphones

Samuli Hemminki; Petteri Nurmi; Sasu Tarkoma

We present novel accelerometer-based techniques for accurate and fine-grained detection of transportation modes on smartphones. The primary contributions of our work are an improved algorithm for estimating the gravity component of accelerometer measurements, a novel set of accelerometer features that are able to capture key characteristics of vehicular movement patterns, and a hierarchical decomposition of the detection task. We evaluate our approach using over 150 hours of transportation data, which has been collected from 4 different countries and 16 individuals. Results of the evaluation demonstrate that our approach is able to improve transportation mode detection by over 20% compared to current accelerometer-based systems, while at the same time improving generalization and robustness of the detection. The main performance improvements are obtained for motorised transportation modalities, which currently represent the main challenge for smartphone-based transportation mode detection.


international conference on mobile systems, applications, and services | 2011

Energy-efficient trajectory tracking for mobile devices

Mikkel Baun Kjærgaard; Sourav Bhattacharya; Henrik Blunck; Petteri Nurmi

Emergent location-aware applications often require tracking trajectories of mobile devices over a long period of time. To be useful, the tracking has to be energy-efficient to avoid having a major impact on the battery life of the mobile device. Furthermore, when trajectory information needs to be sent to a remote server, on-device simplification of the trajectories is needed to reduce the amount of data transmission. While there has recently been a lot of work on energy-efficient position tracking, the energy-efficient tracking of trajectories has not been addressed in previous work. In this paper we propose a novel on-device sensor management strategy and a set of trajectory updating protocols which intelligently determine when to sample different sensors (accelerometer, compass and GPS) and when data should be simplified and sent to a remote server. The system is configurable with regards to accuracy requirements and provides a unified framework for both position and trajectory tracking. We demonstrate the effectiveness of our approach by emulation experiments on real world data sets collected from different modes of transportation (walking, running, biking and commuting by car) as well as by validating with a real-world deployment. The results demonstrate that our approach is able to provide considerable savings in the battery consumption compared to a state-of-the-art position tracking system while at the same time maintaining the accuracy of the resulting trajectory, i.e., support of specific accuracy requirements and different types of applications can be ensured.


international conference on mobile and ubiquitous systems: networking and services | 2006

A Generic Large Scale Simulator for Ubiquitous Computing

Miquel Martin; Petteri Nurmi

The complexity associated to gathering and processing contextual data makes testing mobile context-aware applications and services difficult Furthermore, the lack of standard data sets and simulation tools makes the evaluation of machine learning algorithms in context-aware settings an even harder task. To ease the situation, we introduce a generic simulator that has been designed with the above mentioned purposes in mind. The simulator has also proven to be a good demonstration tool for mobile services and applications that are aimed at groups. The simulator is highly customizable and it can output context information of individual entities both through an interactive GUI and as data streams consisting of comma separated values. To support a wide range of tasks and scenarios, we have separated the three main information sources: behavior of agents, the scenario being simulated and the used context variable. The simulator has been implemented using Java, and the data streams have been made available through a Web service interface


IEEE Pervasive Computing | 2009

BeTelGeuse: A Platform for Gathering and Processing Situational Data

Joonas Kukkonen; Eemil Lagerspetz; Petteri Nurmi; Mikael Andersson

BeTelGeuse is an extensible data collection platform for mobile devices, which also automatically infers higher level context from sensor data. In this article, the authors introduce BeTelGeuses architecture and current features, and evaluate its impact on mobile phone performance.


international conference on mobile and ubiquitous systems: networking and services | 2006

Identifying meaningful locations

Petteri Nurmi; Johan Koolwaaij

Existing context-aware mobile applications often rely on location information. However, raw location data such as GPS coordinates or GSM cell identifiers are usually meaningless to the user and, as a consequence, researchers have proposed different methods for inferring so-called places from raw data. The places are locations that carry some meaning to user and to which the user can potentially attach some (meaningful) semantics. Examples of places include home, work and airport. A lack in existing work is that the labeling has been done in an ad hoc fashion and no motivation has been given for why places would be interesting to the user. As our first contribution we use social identity theory to motivate why some locations really are significant to the user. We also discuss what potential uses for location information social identity theory implies. Another flaw in the existing work is that most of the proposed methods are not suited to realistic mobile settings as they rely on the availability of GPS information. As our second contribution we consider a more realistic setting where the information consists of GSM cell transitions that are enriched with GPS information whenever a GPS device is available. We present four different algorithms for this problem and compare them using real data gathered throughout Europe. In addition, we analyze the suitability of our algorithms for mobile devices


Pervasive and Mobile Computing | 2014

Using unlabeled data in a sparse-coding framework for human activity recognition

Sourav Bhattacharya; Petteri Nurmi; Nils Y. Hammerla; Thomas Plötz

We propose a sparse-coding framework for activity recognition in ubiquitous and mobile computing that alleviates two fundamental problems of current supervised learning approaches. (i) It automatically derives a compact, sparse and meaningful feature representation of sensor data that does not rely on prior expert knowledge and generalizes well across domain boundaries. (ii) It exploits unlabeled sample data for bootstrapping effective activity recognizers, i.e., substantially reduces the amount of ground truth annotation required for model estimation. Such unlabeled data is easy to obtain, e.g., through contemporary smartphones carried by users as they go about their everyday activities.Based on the self-taught learning paradigm we automatically derive an over-complete set of basis vectors from unlabeled data that captures inherent patterns present within activity data. Through projecting raw sensor data onto the feature space defined by such over-complete sets of basis vectors effective feature extraction is pursued. Given these learned feature representations, classification backends are then trained using small amounts of labeled training data.We study the new approach in detail using two datasets which differ in terms of the recognition tasks and sensor modalities. Primarily we focus on a transportation mode analysis task, a popular task in mobile-phone based sensing. The sparse-coding framework demonstrates better performance than the state-of-the-art in supervised learning approaches. More importantly, we show the practical potential of the new approach by successfully evaluating its generalization capabilities across both domain and sensor modalities by considering the popular Opportunity dataset. Our feature learning approach outperforms state-of-the-art approaches to analyzing activities of daily living.


international world wide web conferences | 2014

The company you keep: mobile malware infection rates and inexpensive risk indicators

Hien Thi Thu Truong; Eemil Lagerspetz; Petteri Nurmi; Adam J. Oliner; Sasu Tarkoma; N. Asokan; Sourav Bhattacharya

There is little information from independent sources in the public domain about mobile malware infection rates. The only previous independent estimate (0.0009%) [11], was based on indirect measurements obtained from domain-name resolution traces. In this paper, we present the first independent study of malware infection rates and associated risk factors using data collected directly from over 55,000 Android devices. We find that the malware infection rates in Android devices estimated using two malware datasets (0.28% and 0.26%), though small, are significantly higher than the previous independent estimate. Based on the hypothesis that some application stores have a greater density of malicious applications and that advertising within applications and cross-promotional deals may act as infection vectors, we investigate whether the set of applications used on a device can serve as an indicator for infection of that device. Our analysis indicates that, while not an accurate indicator of infection by itself, the application set does serve as an inexpensive method for identifying the pool of devices on which more expensive monitoring and analysis mechanisms should be deployed. Using our two malware datasets we show that this indicator performs up to about five times better at identifying infected devices than the baseline of random checks. Such indicators can be used, for example, in the search for new or previously undetected malware. It is therefore a technique that can complement standard malware scanning. Our analysis also demonstrates a marginally significant difference in battery use between infected and clean devices.


sensor, mesh and ad hoc communications and networks | 2004

Modelling routing in wireless ad hoc networks with dynamic Bayesian games

Petteri Nurmi

Mobile agents acting in wireless ad hoc networks are energy constrained, which leads to potential selfishness as nodes are not necessarily willing to forward packets for other nodes. Situations like this are traditionally analyzed using game theory and recently also the ad hoc networking community has witnessed game-theoretic approaches to especially routing. However, from a theoretical point-of-view the contemporary game-theoretic approaches have mainly ignored two important aspects: non-simultaneous decision making and incorporating history information into the decision making process. In this article we propose a new model that fills these gaps and allows to analyze routing theoretically.


ubiquitous computing | 2013

MatkaHupi: a persuasive mobile application for sustainable mobility

Antti Jylhä; Petteri Nurmi; Miika Sirén; Samuli Hemminki; Giulio Jacucci

With the advances in smartphone technologies, sustainable mobility has become an active research topic in the field of ubiquitous computing. We present a persuasive mobile application that automatically tracks the transportation modes and CO2 emissions of the trips of the user and utilizes this information to present a set of actionable mobility challenges to the user. A longitudinal pilot experiment with the system showed that subjects perceived the concept of challenges as positive, with constructive findings to inform further development of the application especially related to personalized challenges.


ieee international conference on pervasive computing and communications | 2014

Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication

Hien Thi Thu Truong; Xiang Gao; Babins Shrestha; Nitesh Saxena; N. Asokan; Petteri Nurmi

Zero-Interaction Authentication (ZIA) refers to approaches that authenticate a user to a verifier (terminal) without any user interaction. Currently deployed ZIA solutions are predominantly based on the terminal detecting the proximity of the users personal device, or a security token, by running an authentication protocol over a short-range wireless communication channel. Unfortunately, this simple approach is highly vulnerable to low-cost and practical relay attacks which completely offset the usability benefits of ZIA. The use of contextual information, gathered via on-board sensors, to detect the co-presence of the user and the verifier is a recently proposed mechanism to resist relay attacks. In this paper, we systematically investigate the performance of different sensor modalities for co-presence detection with respect to a standard Dolev-Yao adversary. First, using a common data collection framework run in realistic everyday settings, we compare the performance of four commonly available sensor modalities (WiFi, Bluetooth, GPS, and Audio) in resisting ZIA relay attacks, and find that WiFi is better than the rest. Second, we show that, compared to any single modality, fusing multiple modalities improves resilience against ZIA relay attacks while retaining a high level of usability. Third, we motivate the need for a stronger adversarial model to characterize an attacker who can compromise the integrity of context sensing itself. We show that in the presence of such a powerful attacker, each individual sensor modality offers very low security. Positively, the use of multiple sensor modalities improves security against such an attacker if the attacker cannot compromise multiple modalities simultaneously.

Collaboration


Dive into the Petteri Nurmi's collaboration.

Top Co-Authors

Avatar

Patrik Floréen

Helsinki Institute for Information Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Andreas Forsblom

Helsinki Institute for Information Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Teemu Pulkkinen

Helsinki Institute for Information Technology

View shared research outputs
Top Co-Authors

Avatar

Antti Salovaara

Helsinki Institute for Information Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge