{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T22:48:06Z","timestamp":1776984486813,"version":"3.51.4"},"reference-count":55,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T00:00:00Z","timestamp":1732147200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1955805"],"award-info":[{"award-number":["CNS-1955805"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"VeChain Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2024,11,21]]},"abstract":"<jats:p>Smart-home technology is now pervasive, demanding increased attention to the security of the devices and the privacy of the home's residents. To assist residents in making security and privacy decisions - e.g., whether to allow a new device to connect to the network, or whether to be alarmed when an unknown device is discovered - it helps to know whether the device is inside the home, or outside.<\/jats:p>\n          <jats:p>In this paper we present MOAT, a system that leverages Wi-Fi sniffers to analyze the physical properties of a device's wireless transmissions to infer whether that device is located inside or outside of a home. MOAT can adaptively self-update to accommodate changes in the home indoor environment to ensure robust long-term performance. Notably, MOAT does not require prior knowledge of the home's layout or cooperation from target devices, and is easy to install and configure.<\/jats:p>\n          <jats:p>We evaluated MOAT in four different homes with 21 diverse commercial smart devices and achieved an overall balanced accuracy rate of up to 95.6%. Our novel periodic adaptation technique allowed our approach to maintain high accuracy even after rearranging furniture in the home. MOAT is a practical and efficient first step for monitoring and managing devices in a smart home.<\/jats:p>","DOI":"10.1145\/3699751","type":"journal-article","created":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T12:23:32Z","timestamp":1732191812000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Moat: Adaptive Inside\/Outside Detection System for Smart Homes"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1923-6318","authenticated-orcid":false,"given":"Chixiang","family":"Wang","sequence":"first","affiliation":[{"name":"Dartmouth College, Hanover, New Hampshire, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1189-7063","authenticated-orcid":false,"given":"Weijia","family":"He","sequence":"additional","affiliation":[{"name":"University of Southampton, Southampton, UK"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2262-3097","authenticated-orcid":false,"given":"Timothy J.","family":"Pierson","sequence":"additional","affiliation":[{"name":"Dartmouth College, Hanover, New Hampshire, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7411-2783","authenticated-orcid":false,"given":"David","family":"Kotz","sequence":"additional","affiliation":[{"name":"Dartmouth College, Hanover, New Hampshire, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,11,21]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3422604.3425951"},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3495243.3560530"},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025485"},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445691"},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622407.1622416"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462058"},{"key":"e_1_2_2_7_1","unstructured":"Udayan Deshpande. 2008. A Dynamically Refocusable Sampling Infrastructure for 802.11 Networks. Ph.D. Dissertation. Dartmouth College Computer Science Hanover NH. https:\/\/www.cs.dartmouth.edu\/~kotz\/research\/deshpande-thesis\/index.html Available as Dartmouth Computer Science Technical Report TR2008-620."},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2016.7732967"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3149048"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1946.234568"},{"key":"e_1_2_2_11_1","unstructured":"Sidney Fussell. 2019. Airbnb Has a Hidden-Camera Problem. https:\/\/www.theatlantic.com\/technology\/archive\/2019\/03\/what-happens-when-you-find-cameras-your-airbnb\/585007\/."},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3349623.3355477"},{"key":"e_1_2_2_13_1","volume-title":"2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence). IEEE, 1322--1328","author":"He Haibo","year":"2008","unstructured":"Haibo He, Yang Bai, Edwardo A Garcia, and Shutao Li. 2008. ADASYN: Adaptive synthetic sampling approach for imbalanced learning. In 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence). IEEE, 1322--1328."},{"key":"e_1_2_2_14_1","unstructured":"Humboldt-Universit\u00e4t. 2017. Packet transmission time in 802.11. https:\/\/sarwiki.informatik.hu-berlin.de\/Packet_transmission_time_in_802.11."},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241555"},{"key":"e_1_2_2_16_1","unstructured":"IEEE Standards Association. 2016. IEEE Standard for Information technology-Telecommunications and information exchange between systems Local and metropolitan area networks-Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications."},{"key":"e_1_2_2_17_1","volume-title":"Survey: Do Airbnb Guests Trust Their Hosts? https:\/\/www.ipx1031.com\/airbnb-guests-trust-hosts\/.","year":"2019","unstructured":"IPX1031. 2019. Survey: Do Airbnb Guests Trust Their Hosts? https:\/\/www.ipx1031.com\/airbnb-guests-trust-hosts\/."},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287049"},{"key":"e_1_2_2_19_1","unstructured":"David Janssen. 2023. Many Airbnbs have cameras installed especially in the US Canada and Singapore. https:\/\/vpnoverview.com\/news\/camera-presence-airbnb-accommodations\/."},{"key":"e_1_2_2_20_1","unstructured":"Sophie Jeong and James Griffiths. 2019. Hundreds of motel guests were secretly filmed and live-streamed online. https:\/\/edition.cnn.com\/2019\/03\/20\/asia\/south-korea- hotel-spy-cam- intl\/."},{"key":"e_1_2_2_21_1","first-page":"1","article-title":"Exploring the Needs of Users for Supporting Privacy-Protective Behaviors in Smart Homes. In Proceedings of the Conference on Human Factors in Computing Systems (CHI)","volume":"449","author":"Jin Haojian","year":"2022","unstructured":"Haojian Jin, Boyuan Guo, Rituparna Roychoudhury, Yaxing Yao, Swarun Kumar, Yuvraj Agarwal, and Jason I. Hong. 2022. Exploring the Needs of Users for Supporting Privacy-Protective Behaviors in Smart Homes. In Proceedings of the Conference on Human Factors in Computing Systems (CHI). ACM, 449:1--449:19.","journal-title":"ACM"},{"key":"e_1_2_2_22_1","volume-title":"Symposium on Security and Privacy. IEEE, 303--320","author":"Jin Haojian","unstructured":"Haojian Jin, Gram Liu, David Hwang, Swarun Kumar, Yuvraj Agarwal, and Jason I. Hong. 2022. Peekaboo: A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes. In Symposium on Security and Privacy. IEEE, 303--320."},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906406"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787487"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370280"},{"key":"e_1_2_2_26_1","volume-title":"11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)","author":"Li Liqun","year":"2014","unstructured":"Liqun Li, Pan Hu, Chunyi Peng, Guobin Shen, and Feng Zhao. 2014. Epsilon: A visible light based positioning system. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14). 331--343."},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639118"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632149"},{"key":"e_1_2_2_29_1","volume-title":"Survey of wireless based indoor localization technologies. Department of Science & Engineering","author":"Liu Junjie","year":"2014","unstructured":"Junjie Liu. 2014. Survey of wireless based indoor localization technologies. Department of Science & Engineering, Washington University (2014)."},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2710542"},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594393"},{"key":"e_1_2_2_32_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS). USENIX, 399--412","author":"Naeini Pardis E","year":"2017","unstructured":"Pardis E Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Cranor, and Norman Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. In Symposium on Usable Privacy and Security (SOUPS). USENIX, 399--412."},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057183"},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503631"},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2668332.2668347"},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2018.00056"},{"key":"e_1_2_2_38_1","volume-title":"Nexmon: The C-based Firmware Patching Framework. https:\/\/nexmon.org","author":"Schulz Matthias","year":"2017","unstructured":"Matthias Schulz, Daniel Wegemer, and Matthias Hollick. 2017. Nexmon: The C-based Firmware Patching Framework. https:\/\/nexmon.org"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.106"},{"key":"e_1_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070580"},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376264"},{"key":"e_1_2_2_42_1","volume-title":"USENIX Security Symposium. 1095--1112","author":"Sharma Rahul Anand","year":"2022","unstructured":"Rahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, and Vyas Sekar. 2022. Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment. In USENIX Security Symposium. 1095--1112."},{"key":"e_1_2_2_43_1","volume-title":"Proceedings of USENIX Security Symposium. USENIX, 3379--3395","author":"Sharma Vandit","year":"2022","unstructured":"Vandit Sharma and Mainack Mondal. 2022. Understanding and Improving Usability of Data Dashboards for Simplified Privacy Control of Voice Assistant Data. In Proceedings of USENIX Security Symposium. USENIX, 3379--3395."},{"key":"e_1_2_2_44_1","volume-title":"Proceedings of the USENIX Security Symposium (2021)","author":"Singh Akash Deep","year":"2021","unstructured":"Akash Deep Singh, Luis Garcia, Joseph Noor, and Mani Srivastava. 2021. I always feel like somebody's sensing me! A framework to detect, identify, and localize clandestine wireless sensors. Proceedings of the USENIX Security Symposium (2021), 1829--1846."},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3111083"},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210347"},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2016.10.006"},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847924"},{"key":"e_1_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307655"},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.49"},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2933232"},{"key":"e_1_2_2_52_1","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation. USENIX, 71--84","author":"Xiong Jie","year":"2013","unstructured":"Jie Xiong and Kyle Jamieson. 2013. ArrayTrack: A Fine-Grained Indoor Location System. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation. USENIX, 71--84."},{"key":"e_1_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790125"},{"key":"e_1_2_2_54_1","volume-title":"Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys). ACM, 205--218","author":"Youssef Moustafa","unstructured":"Moustafa Youssef and Ashok K. Agrawala. 2005. The Horus WLAN location determination system. In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys). ACM, 205--218."},{"key":"e_1_2_2_55_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Zeng Eric","year":"2019","unstructured":"Eric Zeng and Franziska Roesner. 2019. Understanding and improving security and privacy in multi-user smart homes: A design exploration and in-home user study. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 159--176. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/zeng"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3699751","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3699751","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T16:30:00Z","timestamp":1758817800000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3699751"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,21]]},"references-count":55,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,11,21]]}},"alternative-id":["10.1145\/3699751"],"URL":"https:\/\/doi.org\/10.1145\/3699751","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,21]]},"assertion":[{"value":"2024-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}