The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.11 - Nov. (2012 vol.11)
pp: 1734-1748
Wei-Jen Hsu , University of Florida, Gainesville
Debojyoti Dutta , Cisco Systems, San Jose
Ahmed Helmy , University of Florida, Gainesville
ABSTRACT
Wireless networks and personalized mobile devices are deeply integrated and embedded in our lives. Such wide adoptions of new technologies will impact user behavior and in turn will affect network performance. It is imperative to characterize the fundamental structure of wireless user behavior in order to model, manage, leverage and design efficient mobile networks. One major challenge in characterizing user behavior stems from the significant size and complexity of user behavioral data. Without summarization and dimension reduction, the sheer amount of data does not provide much useful information. The key contribution of the paper is a novel similarity metric based on a matrix representation of mobility preferences and its decomposition. This method provides an efficient way to reduce important spatiotemporal dynamics in user mobility into a few eigen-behavior vectors. This also facilitates nodes to exchange their mobility summaries and determine their mutual similarity locally. Without any assumption on the properties of user population, we use unsupervised learning (clustering) techniques to classify WLAN users. Such a user grouping scheme based on learned user behavior is crucial for applications relying on the usage context of each mobile device (e.g., participatory sensing, social-relationship-aware message forwarding). In this study, using our systematic TRACE approach, we analyze wireless users' behavioral patterns by extensively mining wireless network logs from two major university campuses to showcase its efficacy. While our findings partly validate intuitive repetitive behavioral trends and user grouping, it is surprising to find the qualitative commonalities and striking consistency of user behavior from the two universities. We discover multimodal user behavior for more than 60 percent of the users, and there are hundreds of distinct groups with unique behavioral patterns in both campuses. The sizes of the major groups follow a power-law distribution.
INDEX TERMS
Wireless LAN, Mobile computing, Measurement, Sensors, Mobile handsets, Educational institutions, Mobile communication, wireless communication, Clustering analysis, mobile environments, mobile user behavior, network monitoring
CITATION
Wei-Jen Hsu, Debojyoti Dutta, Ahmed Helmy, "Structural Analysis of User Association Patterns in University Campus Wireless LANs", IEEE Transactions on Mobile Computing, vol.11, no. 11, pp. 1734-1748, Nov. 2012, doi:10.1109/TMC.2011.254
REFERENCES
[1] A. Jain, M. Murty, and P. Flynn, "Data Clustering: A Review," ACM Computing Surveys, vol. 31, no. 3, pp. 264-323, Sept. 1999.
[2] I.T. Jolliffe, Principal Component Analysis, second ed. Springer, 2002.
[3] R. Horn and C. Johnson, Matrix Analysis. Cambridge Univ., 1990.
[4] N. Eagle and A. Pentland, "Reality Mining: Sensing Complex Social Systems," J. Personal and Ubiquitous Computing, vol. 10, no. 4, pp. 255-268, May 2006.
[5] M. Kim and D. Kotz, "Periodic Properties of User Mobility and Access-Point Popularity," J. Personal and Ubiquitous Computing, vol. 11, no. 6, pp. 465-479, Aug. 2007.
[6] W. Hsu and A. Helmy, "On Nodal Encounter Patterns in Wireless LAN Traces," IEEE Trans. Mobile Computing, vol. 9, no. 11, pp. 1563-1577, Nov. 2010.
[7] J. Kang, W. Welbourne, B. Stewart, and G. Borriello, "Extracting Places from Traces of Locations," SIGMOBILE Mobile Computing and Comm. Rev., vol. 9, no. 3, pp. 58-68, July 2005.
[8] A. Lakhina, K. Papagiannaki, M. Crovella, C. Diot, E.D. Kolaczyk, and N. Taft, "Structural Analysis of Network Traffic Flows," Proc. ACM Joint Int'l Conf. Measurement and Modeling of Computer Systems (SIGMETRICS), June 2004.
[9] T. Henderson, D. Kotz, and I. Abyzov, "The Changing Usage of a Mature Campus-Wide Wireless Network," Proc. ACM MobiCom, Sept. 2004.
[10] M. Balazinska and P. Castro, "Characterizing Mobility and Network Usage in a Corporate Wireless Local-Area Network," Proc. ACM MobiSys, May 2003.
[11] M. McNett and G. Voelker, "Access and Mobility of Wireless PDA Users," ACM SIGMOBILE Mobile Computing and Comm. Rev., vol.7, no. 4, pp. 55-57, Oct. 2003.
[12] MobiLib: Community-Wide Library of Mobility and Wireless Networks Measurements, http://nile.cise.ufl.eduMobiLib, 2012.
[13] CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth, http:/crawdad.cs.dartmouth.edu, 2012.
[14] D. Kotz, T. Henderson, and I. Abyzov, CRAWDAD Data Set Dartmouth/Campus/Movement/01_04 (v. 2005-03-08), http://crawdad.cs.dartmouth.edu/dartmouth/ campus/movement01_04, Mar. 2005.
[15] C.J.F. ter Braak,, "Principal Components Biplots and Alpha and Beta Diversity," Ecology, vol. 64, pp. 454-462, 1983.
[16] W. Hsu and A. Helmy, "On Important Aspects of Modeling User Associations in Wireless LAN Traces," Proc. Second Int'l Workshop Wireless Network Measurement (WiNMee '06), Apr. 2006.
[17] R. Jain, D. Lelescu, and M. Balakrishnan, "Model T: An Empirical Model for User Registration Patterns in a Campus Wireless LAN," Proc. ACM MobiCom, Aug. 2005.
[18] D. Lelescu, U. Kozat, R. Jain, and M. Balakrishnan, "Model T++: An Empirical Joint Space-Time Registration Model," Proc. ACM Int'l Symp. Mobile Ad Hoc Networking and Computing, May 2006.
[19] C. Tuduce and T. Gross, "A Mobility Model Based on WLAN Traces and Its Validation," Proc. IEEE INFOCOM, Mar. 2005.
[20] M. Papadopouli, H. Shen, and M. Spanakis, "Characterizing the Duration and Association Patterns of Wireless Access in a Campus," Proc. 11th European Wireless Conf. Apr. 2005.
[21] A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott, "Impact of Human Mobility on the Design of Opportunistic Forwarding Algorithms," Proc. IEEE INFOCOM, Apr. 2006.
[22] E. Daly and M. Haahr, "Social Network Analysis for Routing in Disconnected Delay-Tolerant MANETs," Proc. ACM MobiHoc, Sept. 2007.
[23] X. Hong, M. Gerla, G. Pei, and C. Chiang, "A Group Mobility Model for Ad Hoc Wireless Networks," Proc. ACM Second Int'l Workshop Modeling, Analysis and Simulation of Wireless and Mobile Systems, Aug. 1999.
[24] W. Hsu, T. Spyropoulos, K. Psounis, and A. Helmy, "Modeling Time-Variant User Mobility in Wireless Mobile Networks," IEEE/ACM Trans. Networking, vol. 17, no. 5, pp. 1564-1577, Oct. 2009.
[25] M. Gonzalez, C. Hidalgo, and A. Barabasi, "Understanding Individual Human Mobility Patterns," Nature, vol. 453 pp. 779-782, June 2008.
[26] W. Hsu, D. Dutta, and A. Helmy, "Extended Abstract: Mining Behavioral Groups in Large Wireless LANs," Proc. ACM MobiCom, Sept. 2007.
[27] W. Hsu, D. Dutta, and A. Helmy, "Profile-Cast: Behavior-Aware Mobile Networking," Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), Mar. 2008.
[28] W. Hsu, D. Dutta, and A. Helmy, "Mining Behavioral Groups in Large Wireless LANs," technical report, http://arxiv.org/abs/cs0606002, 2012.
[29] S. Reddy, D. Estrin, and M. Srivastava, "Recruitment Framework for Participatory Sensing Data Collections," Proc. Eight Int'l Conf. Pervasive Computing, pp. 17-20, May 2010.
[30] K. Shilton, J. Burke, D. Estrin, R. Govindan, and J. Kang, "Designing the Personal Data Stream: Enabling Participatory Privacy in Mobile Personal Sensing," Proc. 37th Research Conf. Comm., Information and Internet Policy (TPRC), pp. 25-27, Sept. 2009.
[31] S. Reddy, K. Shilton, J. Burke, D. Estrin, M. Hansen, and M. Srivastava, "Using Context Annotated Mobility Profiles to Recruit Data Collectors in Participatory Sensing," Proc. Fourth Int'l Symp. Location and Context Awareness, May 2009.
[32] U. Kumar and A. Helmy, "Human Behavior and Challenges of Anonymizing WLAN Traces," Proc. IEEE GlobeCom, 2009.
[33] U. Kumar, G. Thakur, and A. Helmy, "PROTECT: Proximity-Based Trust-Advisor Using Encounters for Mobile Societies," Proc. ACM Sixth Int'l Wireless Comm. and Mobile Computing Conf. (IWCMC), June 2010.
[34] W. Hsu, D. Dutta, and A. Helmy, "CSI: A Paradigm for Behavior-Oriented Profile-Cast Services in Mobile Networks," Ad Hoc Networks, in press.
[35] G.S. Thakur, A. Helmy, and W. Hsu, "Similarity Analysis and Modeling in Mobile Societies: The Missing Link," Proc. ACM Workshop Challenged Networks (CHANTS '10), Sept. 2010.
[36] J. Ghosh, M.J. Beal, H.Q. Ngo, and C. Qiao, "On Profiling Mobility and Predicting Locations of Wireless Users," Proc. ACM Second Int'l Workshop Multihop Ad Hoc Networks (REALMAN), May 2006.
[37] D. Crandall, L. Backstrom, D. Cosley, S. Suri, D. Huttenlocher, and J. Kleinberg, "Inferring Social Ties from Geographic Coincidences," Proc. Nat'l Academy of Sciences of USA, vol. 107, pp. 22436-22441, Dec. 2010.
[38] R. Hogg and E. Tanis, Probability and Statistical Inference, sixth ed. Prentice Hall, 2001.
[39] A. Vahdat and D. Becker, "Epidemic Routing for Partially Connected Ad Hoc Networks," Technical Report CS-200006, Duke Univ., Apr. 2000.
[40] A. Helmy et al., "Behavior-Based Mobile Communities," technical report, Univ. of Florida, Computer and Information Science and Eng. Dept., Aug. 2011.
25 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool