InnerSpace MAC Address Hashing Options
When using InnerSpace for space utilization analytics, customers have several options regarding the handling and hashing of MAC addresses. This article outlines the key methods available and the implications of MAC tumbling.
Standard InnerSpace Hashing Process
By default, InnerSpace receives Wi-Fi Real-Time Location System (RTLS) data directly from the network infrastructure. Upon receipt, InnerSpace hashes all MAC addresses using the SHA-1 algorithm before processing the data for analytics. This ensures that the data is anonymized while maintaining the ability to track patterns over time without identifying individuals.
Customer-Side Hashing via Proxy Service
For organizations with stringent data privacy requirements, it is possible to implement a proxy service that collects RTLS data before it reaches InnerSpace. In this configuration:
The proxy service collects all RTLS data from the network (e.g., Aruba infrastructure).
The MAC addresses are hashed on the customer’s side before being forwarded to InnerSpace.
This ensures InnerSpace never receives raw MAC addresses, enhancing data privacy.
Important Consideration:
For accurate calibration and system performance, access point-to-access point (AP-to-AP) RTLS data may need to remain unhashed. This data is critical for calibration algorithms that optimize location accuracy.
Understanding MAC Tumbling and Its Impact
MAC tumbling refers to the frequent changing of a device’s MAC address, primarily designed to enhance user privacy. Its impact on space utilization analytics varies based on device connectivity:
Unconnected devices: MAC tumbling significantly affects unconnected devices, as these devices frequently randomize their MAC addresses, making consistent tracking challenging.
Connected devices: In office environments, employees typically have at least one device (e.g., a laptop) connected to the corporate Wi-Fi. While these connected devices often use randomized MAC addresses, the randomization remains consistent for the same SSID over extended periods. This consistency allows for more reliable tracking.
De-duplication Strategy
To prevent double-counting individuals who carry multiple devices (e.g., a laptop, phone, and tablet), InnerSpace employs sophisticated de-duplication algorithms. These algorithms identify and consolidate data from multiple devices to ensure that each person is counted only once, maintaining the accuracy of utilization metrics.
Conclusion
InnerSpace provides flexible options for MAC address hashing to meet diverse privacy and security requirements. Whether using standard hashing processes or customer-side proxy services, InnerSpace maintains robust mechanisms to ensure data privacy while delivering accurate space utilization insights.