The folder contains a dataset of Wi-Fi packet captures using a passive sniffing technique as described in :
M. I. Syed, A. Fladenmuller, M. Dias de Amorim. Unity is strength: Improving Wi-Fi passive measurements through sniffer redundancy. Ad Hoc Networks, 2023, 151, pp.103287. https://doi.org/10.1016/j.adhoc.2023.103287
M. I. Syed. Wireless passive measurements: tool, redundancy, measurements, and analyses. Networking and Internet Architecture [cs.NI]. Sorbonne Université, 2023. English. https://theses.hal.science/tel-04258062
M. I. Syed, A. Fladenmuller, M. Dias de Amorim. PyPal: Wi-Fi Trace Synchronization and Merging Python Tool. [Technical Report] LIP6 UMR 7606, Sorbonne Université, France. 2022. https://hal.science/hal-03618014
Dataset
In the experiment, ten sniffers capture packets from a given single source node at multiple distances (1m, 10m, 20m, 30m, 40m, and 50m). Each folder contains the dataset for a specific distance. In each folder, you will find three files:
The raw data in pcap
format.
The raw data in csv
format.
Synchronized data in csv
format after using the PyPal tool (https://hal.science/hal-03618014).
In the file name, Sx
indicates the number of the sniffer (S01
to S10
).
Each file contains eight columns:
| Frame_number | Frame_time_epoch | RSSI_dBm | Channel | Frame_type | Frame_subtype | Retransmission | Source_MAC_address | Sequence_number |`
Note that :
Frame_number
: number of the received frame in the trace captured by the sniffer.
Sequence_number
: sequence number of the frame sent by our transmitter (Note that missing sequence numbers refers to frames that haven't been captured by the sniffer).
The Source_MAC_address
is identical in each trace as it refers to the MAC address of our transmitter.
Devices
The devices in the experiment were composed of a Raspberry Pi 4 node and an external Alfa antenna (AlfaAWUS051NH), both for the source node and the sniffers.
Wireshark, 4.4.1