The Community for Technology Leaders
RSS Icon
Issue No.12 - December (2010 vol.9)
pp: 1713-1731
Jeffrey Pang , Carnegie Mellon University, Pittsburgh
Ben Greenstein , Intel Labs, Seattle
Michael Kaminsky , Intel Labs, Pittsburgh
Damon McCoy , University of California, San Diego
Srinivasan Seshan , Carnegie Mellon University, Pittsburgh
Wi-Fi clients can obtain much better performance at some commercial hot spots than others. Unfortunately, there is currently no way for users to determine which hot spot access points (APs) will be sufficient to run their applications before purchasing access. To address this problem, this paper presents Wifi-Reports, a collaborative service that provides Wi-Fi clients with historical information about AP performance and application support. The key research challenge in Wifi-Reports is to obtain accurate user-submitted reports. This is challenging because two conflicting goals must be addressed in a practical system: preserving the privacy of users' reports and limiting fraudulent reports. We introduce a practical cryptographic protocol that achieves both goals, and address the important engineering challenges in building Wifi-Reports. Using a measurement study of APs in a busy commercial district, we show that Wifi-Reports would improve the performance over previous AP selection approaches in 30-60 percent of locations.
Privacy, anonymity, wireless, reputation, 802.11.
Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Damon McCoy, Srinivasan Seshan, "Wifi-Reports: Improving Wireless Network Selection with Collaboration", IEEE Transactions on Mobile Computing, vol.9, no. 12, pp. 1713-1731, December 2010, doi:10.1109/TMC.2010.151
[1] Amazon Elastic Compute Cloud,, 2010.
[2] Broadband Reports, http:/, 2010.
[3] HTTP Analyzer, http://www.ieinspector.comhttpanalyzer, 2010.
[4] Illegal Sale of Phone Records,, 2010.
[5] iPass, http:/, 2010.
[6] Jiwire, http:/, 2010.
[7] Skyhook Wireless, http:/, 2010.
[8], http:/, 2010.
[9] T-Mobile Germany Blocks iphone Skype over 3g and Wifi, iphone-skype-over-3g-too , 2010.
[10] Wireless Geographic Logging Engine, http:/, 2010.
[11] Fraud and Related Activity in Connection with Access Devices, Homeland Security Act (18 U.S.C. Section 1029), 2002.
[12] ”Wireless Location Tracking Draws Privacy Questions,“ CNET, privacy+questions 2100-1028_3-6072992.html , May 2006.
[13] IEEE Std 802.11k-2008 (Amendment to IEEE Std 802.11-2007), IEEE Standard for Information Technology—Telecommunications and Information Exchange between Systems—Local and Metropolitan Area Networks—Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (Phy) Specifications Amendment 1: Radio Resource Measurement of Wireless LANs, IEEE, June 2008.
[14] T. Abdelzaher, Y. Anokwa, P. Boda, J. Burke, D. Estrin, L. Guibas, A. Kansal, S. Madden, and J. Reich, “Mobiscopes for Human Spaces,” IEEE Pervasive Computing, vol. 6, no. 2, pp. 20-29, Apr. 2007.
[15] G. Adomavicius and A. Tuzhilin, “Toward the Next Generation of Recommender Systems: A Survey of the State-of-the-Art and Possible Extensions,” IEEE Trans. Knowledge and Data Eng., vol. 17, no. 6, pp. 734-749, June 2005.
[16] L. Balzano and R. Nowak, “Blind Calibration of Sensor Networks,” Proc. Int'l Conf. Information Processing in Sensor Networks (IPSN), 2007.
[17] M. Bellare, C. Namprempre, D. Pointcheval, and M. Semanko, “The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme,” J. Cryptology, vol. 16, no. 3, pp. 185-215, 2003.
[18] A.R. Beresford and F. Stajano, “Location Privacy in Pervasive Computing,” IEEE Pervasive Computing, vol. 2, no. 1, pp. 46-55, Jan.-Mar. 2003.
[19] J. Canny, “Collaborative Filtering with Privacy,” Proc. IEEE Symp. Security and Privacy, 2002.
[20] J. Canny, “Collaborative Filtering with Privacy via Factor Analysis,” Proc. SIGIR, 2002.
[21] D. Chaum, “Blind Signatures for Untraceable Payments,” Proc. Advances in Cryptology, pp. 199-203, 1982.
[22] D. Chaum, A. Fiat, and M. Naor, “Untraceable Electronic Cash,” Proc. Ann. Int'l Cryptology Conf. (CRYPTO), pp. 319-327, 1990.
[23] C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin, and N. Triandopoulos, “Anonysense: Privacy-Aware People-Centric Sensing,” Proc. MobiSys, pp. 211-224, 2008.
[24] R. Dingledine, N. Mathewson, and P. Syverson, “TOR: The Second-Generation Onion Router,” Proc. USENIX Security Symp., 2004.
[25] C. Doctorow, “Why Hotel WiFi Sucks,” http://www.boingboing. net/2005/10/12why-hotel-wifi-sucks.html , Oct. 2005.
[26] A. Fujioka, T. Okamoto, and K. Ohta, “A Practical Secret Voting Scheme for Large Scale Elections,” Proc. Int'l Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT), 1993.
[27] B. Greenstein, D. McCoy, J. Pang, T. Kohno, S. Seshan, and D. Wetherall, “Improving Wireless Privacy with an Identifier-Free Link Layer Protocol,” Proc. MobiSys, 2008.
[28] M. Gruteser and B. Hoh, “On the Anonymity of Periodic Location Samples,” Proc. Int'l Conf. Security in Pervasive Computing, 2005.
[29] D. Han, A. Agarwala, D.G. Andersen, M. Kaminsky, K. Papagiannaki, and S. Seshan, “Mark-and-Sweep: Getting the “Inside” Scoop on Neighborhood Networks,” Proc. Internet Measurement Conf. (IMC), 2008.
[30] G. Judd and P. Steenkiste, “Using Emulation to Understand and Improve Wireless Networks and Applications,” Proc. Symp. Networked Systems Design and Implementation (NSDI), 2005.
[31] A. Krause, E. Horvitz, A. Kansal, and F. Zhao, “Toward Community Sensing,” Proc. Int'l Conf. Information Processing in Sensor Networks (IPSN), 2008.
[32] A. LaMarca, Y. Chawathe, S. Consolvo, J. Hightower, I. Smith, J. Scott, T. Sohn, J. Howard, J. Hughes, F. Potter, J. Tabert, P. Powledge, G. Borriello, and B. Schilit, “Place Lab: Device Positioning Using Radio Beacons in the Wild,” Proc. Int'l Conf. Pervasive, 2005.
[33] A.J. Nicholson, Y. Chawathe, M.Y. Chen, B.D. Noble, and D. Wetherall, “Improved Access Point Selection,” Proc. MobiSys, 2006.
[34] J. Pang, CRAWDAD Data Set cmu/hotspot (v. 2009-04-15), , Apr. 2009.
[35] J. Pang, B. Greenstein, and M. Kaminsky, CRAWDAD Tool Tools/Collect/802.11/Wifi-Scanner (v. 2009-04-15), http://crawdad.cs. 802.11Wifi-Scanner, Apr. 2009.
[36] J. Pang, B. Greenstein, D. Mccoy, S. Seshan, and D. Wetherall, “Tryst: The Case for Confidential Service Discovery,” Proc. Workshop Hot Topics in Networks (HotNets), 2007.
[37] R.S. Prasad, M. Murray, C. Dovrolis, and K. Claffy, “Bandwidth Estimation: Metrics, Measurement Techniques, and Tools,” IEEE Network, vol. 17, no. 6, pp. 27-35, Nov./Dec. 2003.
[38] N.B. Salem, J.-P. Hubaux, and M. Jakobsson, “Reputation-Based Wi-Fi Deployment Protocols and Security Analysis,” Proc. Int'l Workshop Wireless Mobile Applications and Services on WLAN Hotspots (WMASH), 2004.
[39] K. Sundaresan and K. Papagiannaki, “The Need for Cross-Layer Information in Access Point Selection Algorithms,” Proc. Internet Measurement Conf. (IMC), 2006.
[40] United States Census Bureau, Table 1: Annual Estimates of the Population for Incorporated Places over 100,000, SUB-EST2007-01.csv, 2007.
[41] S. Vasudevan, K. Papagiannaki, C. Diot, J. Kurose, and D. Towsley, “Facilitating Access Point Selection in IEEE 802.11 Wireless Networks,” Proc. Internet Measurement Conf. (IMC), 2005.
[42] K. Walsh and E.G. Sirer, “Experience with an Object Reputation System for Peer-to-Peer Filesharing,” Proc. Symp. Networked Systems Design and Implementation (NSDI), 2006.
[43] H. Yu, P.B. Gibbons, M. Kaminsky, and F. Xiao, “SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks,” Proc. IEEE Int'l Symp. Security and Privacy, 2008.
[44] H. Yu, C. Shi, M. Kaminsky, P.B. Gibbons, and F. Xiao, “DSybil: Optimal Sybil-Resistance for Recommendation Systems,” Proc. IEEE Int'l Symp. Security and Privacy, 2009.
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool