The Community for Technology Leaders
RSS Icon
Issue No.03 - March (2014 vol.13)
pp: 664-677
Huy Nguyen , University of Houston, Houston
Gabriel Scalosub , Ben-Gurion University of the Negev, Beer Sheva
Rong Zheng , University of Houston, Houston
Passive monitoring utilizing distributed wireless sniffers is an effective technique to monitor activities in wireless infrastructure networks for fault diagnosis, resource management, and critical path analysis. In this paper, we introduce a quality of monitoring (QoM) metric defined by the expected number of active users monitored, and investigate the problem of maximizing QoM by judiciously assigning sniffers to channels based on the knowledge of user activities in a multichannel wireless network. Two types of capture models are considered. The user-centric model assumes the frame-level capturing capability of sniffers such that the activities of different users can be distinguished while the sniffer-centric model only utilizes the binary channel information (active or not) at a sniffer. For the user-centric model, we show that the implied optimization problem is NP-hard, but a constant approximation ratio can be attained via polynomial complexity algorithms. For the sniffer-centric model, we devise stochastic inference schemes to transform the problem into the user-centric domain, where we are able to apply our polynomial approximation algorithms. The effectiveness of our proposed schemes and algorithms is further evaluated using both synthetic data as well as real-world traces from an operational WLAN.
Monitoring, Mobile computing, Wireless networks, Wireless sensor networks, Ad hoc networks, Hardware,binary independent component analysis, Wireless network, mobile computing, approximation algorithm
Huy Nguyen, Gabriel Scalosub, Rong Zheng, "On Quality of Monitoring for Multichannel Wireless Infrastructure Networks", IEEE Transactions on Mobile Computing, vol.13, no. 3, pp. 664-677, March 2014, doi:10.1109/TMC.2013.23
[1] J. Yeo, M. Youssef, and A. Agrawala, "A Framework for Wireless LAN Monitoring and Its Applications," Proc. Third ACM Workshop Wireless Security (WiSE), pp. 70-79, 2004.
[2] J. Yeo, M. Youssef, T. Henderson, and A. Agrawala, "An Accurate Technique for Measuring the Wireless Side of Wireless Networks," Proc. Workshop Wireless Traffic Measurements and Modeling, pp. 13-18, 2005.
[3] M. Rodrig, C. Reis, R. Mahajan, D. Wetherall, and J. Zahorjan, "Measurement-Based Characterization of 802.11 in a Hotspot Setting," Proc. ACM Special Interest Group on Data Comm. (SIGCOMM), pp. 5-10, 2005.
[4] Y.-C. Cheng, J. Bellardo, P. Benkö, A.C. Snoeren, G.M. Voelker, and S. Savage, "Jigsaw: Solving the Puzzle of Enterprise 802.11 Analysis," Proc. ACM Special Interest Group on Data Comm. (SIGCOMM), 2006.
[5] A. Chhetri and R. Zheng, "WiserAnalyzer: A Passive Monitoring Framework for WLANs," Proc. Fifth Int'l Conf. Mobile Ad-hoc and Sensor Networks (MSN), 2009.
[6] Y.-C. Cheng, J. Bellardo, P. Benkö, A.C. Snoeren, G.M. Voelker, and S. Savage, "Jigsaw: Solving the Puzzle of Enterprise 802.11 Analysis," ACM Special Interest Group on Data Comm. (SIGCOMM) Computer Comm. Rev., vol. 36, no. 4, pp. 39-50, Aug. 2006.
[7] K. Premkumar and A. Kumar, "Optimal Sleep-Wake Scheduling for Quickest Intrusion Detection Using Wireless Sensor Networks," Proc. IEEE INFOCOM, pp. 1400-1408, Apr. 2008.
[8] M. Kodialam and T. Lakshman, "Detecting Network Intrusions via Sampling: A Game Theoretic Approach," Proc. IEEE INFOCOM, vol. 3, pp. 1880-1889, Mar.-Apr. 2003.
[9] T. Wang, M. Srivatsa, D. Agrawal, and L. Liu, "Learning, Indexing, and Diagnosing Network Faults," Proc. 15th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining (KDD '09), pp. 857-866, 2009.
[10] S. Rayanchu, A. Mishra, D. Agrawal, S. Saha, and S. Banerjee, "Diagnosing Wireless Packet Losses in 802.11: Separating Collision from Weak Signal," Proc. IEEE INFOCOM, pp. 735-743, Apr. 2008.
[11] P. Arora, C. Szepesvári, and R. Zheng, "Sequential Learning for Optimal Monitoring of Multi-Channel Wireless Networks," Proc. IEEE INFOCOM, pp. 1152-1160, 2011.
[12] A. Hyvärinen and E. Oja, "Independent Component Analysis: Algorithms and Applications," Neural Networks, vol. 13, nos. 4-5, pp. 411-430, 2000.
[13] H. Nguyen and R. Zheng, "Binary Independent Component Analysis with OR Mixtures," IEEE Trans. Signal Processing, vol. 59, no. 7, pp. 3168-3181, July 2011.
[14] A. Balachandran, G.M. Voelker, P. Bahl, and P.V. Rangan, "Characterizing User Behavior and Network Performance in a Public Wireless LAN," ACM SIGMETRICS Performance Evaluation Rev., vol. 30, no. 1, pp. 195-205, 2002.
[15] T. Henderson, D. Kotz, and I. Abyzov, "The Changing Usage of a Mature Campus-Wide Wireless Network," Proc. ACM MobiCom, pp. 187-201, 2004.
[16] R. Chandra, V.N. Padmanabhan, and M. Zhang, "WiFiProfiler: Cooperative Diagnosis in Wireless LANs," Proc. Fourth Int'l Conf. Mobile Systems, Applications, and Services (MobiSys), pp. 205-219, 2006.
[17] Y.-C. Cheng, M. Afanasyev, P. Verkaik, P. Benkö, J. Chiang, A.C. Snoeren, S. Savage, and G.M. Voelker, "Automating Cross-Layer Diagnosis of Enterprise Wireless Networks," Proc. ACM Special Interest Group on Data Comm. (SIGCOMM), 2007.
[18] L. Qiu, P. Bahl, A. Rao, and L. Zhou, "Troubleshooting Wireless Mesh Networks," ACM Special Interest Group on Data Comm. (SIGCOMM) Computer Comm. Rev., vol. 36, no. 5, pp. 17-28, 2006.
[19] D.-H. Shin and S. Bagchi, "Optimal Monitoring in Multi-Channel Multi-Radio Wireless Mesh Networks," Proc. ACM MobiHoc, pp. 229-238, 2009.
[20] C. Chekuri and A. Kumar, "Maximum Coverage Problem with Group Budget Constraints and Applications," Lecture Notes in Computer Science (LNCS), vol. 3122, pp 72-83 2004.
[21] A. Yeredor, "ICA in Boolean XOR Mixtures," Proc. Sevnth Int'l Conf. Independent Component Analysis and Signal Separation (ICA), pp. 827-835, 2007.
[22] F.W. Computer and F. Wood, "A Non-Parametric Bayesian Method for Inferring Hidden Causes," Proc. 22nd Ann. Conf. Uncertainty in Artificial Intelligence (UAI), pp. 536-543, 2006.
[23] A.P. Streich, M. Frank, D. Basin, and J.M. Buhmann, "Multi-Assignment Clustering for Boolean Data," Proc. 26th Ann. Int'l Conf. Machine Learning (ICML), pp. 969-976, 2009.
[24] A. Kabán and E. Bingham, "Factorisation and Denoising of 0-1 Data: A Variational Approach," Neurocomputing, vol. 71, nos. 10-12, pp. 2291-2308, 2009.
[25] A.A. Garba, R.M.H. Yim, J. Bajcsy, and L.R. Chen, "Analysis of Optical CDMA Signal Transmission: Capacity Limits and Simulation Results," EURASIP J. Applied Signal Processing, vol. 2005, pp. 1603-1616, 2005.
[26] S. Kandeepan, R. Piesiewicz, and I. Chlamtac, "Spectrum Sensing for Cognitive Radios with Transmission Statistics: Considering Linear Frequency Sweeping," EURASIP J. Wireless Comm. and Networking, vol. 2010, article no. 6, 2010.
[27] E.M. Gold, "Complexity of Automaton Identification from Given Data," Information and Control, vol. 37, no. 3, pp. 302-320, 1978.
[28] M.R. Garey and D.S. Johnson, Computers and Intractability—A Guide to the Theory of NP-Completeness. W.H. Freeman and Company, 1979.
[29] A. Chhetri, H. Nguyen, G. Scalosub, and R. Zheng, "On Quality of Monitoring for Multi-Channel Wireless Infrastructure Networks," Proc. ACM MobiHoc, pp. 111-120, 2010.
[30] V. Guruswami and S. Khot, "Hardness of Max 3SAT with no Mixed Clauses," Proc. IEEE 20th Ann. Conf. Computational Complexity (CCC), pp. 154-162, 2005.
[31] A. Srinivasan, "Distributions on Level-Sets with Applications to Approximation Algorithms," Proc. IEEE 42nd Symp. Foundations of Computer Science, pp. 588-597, 2001.
[32] J. Himberg and A. Hyvärinen, "Independent Component Analysis for Binary Data: An Experimental Study," Proc. Third Int'l Conf. Independent Component Analysis (ICA), pp. 552-556, 2001.
[33] P. Arora, N. Xia, and R. Zheng, "A Gibbs Sampler Approach for Optimal Distributed Monitoring of Multi-Channel Wireless Networks," Proc. Global Comm. Conf. (GlobeCom), 2011.
7 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool