Www.swan.ac.uk/lis. Crowd-Sourcing Wi-Fi Coverage Data to build Self- Mapping Radio Maps TNC2013 Gareth Ayres (Speaker) Jason Jones 2013.

Slides:



Advertisements
Similar presentations
Motorola Mobility Management Suite: RF Management
Advertisements

Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Mobile Smart Solutions Smart E-Purse the Debit/Credit System and mobile job report» – paying for itself Mobile Smart Solutions Smart E-Purse the Debit/Credit.
X Deployment with SU1X By Gareth Ayres.
Application Guide For Mesh AP – MAP-3120
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
Secure Lync mobile Authentication
Ruckus Planner powered by AirMagnet. 2 Why should you use Ruckus Planner?  Ruckus AP’s are easier for planning.. Resellers can verify with 3 rd party.
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
TNC 2003 Wireless Campus project Coletta Elisa Marchioro -
Swansea: When eduroam doesn't fit By Gareth Ayres Gregynog Colloquium Conf 2011.
802.1x EAP Authentication Protocols
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Wireless LANs A Case Study of Baylor University’s Wireless Network Copyright Bob Hartland 2002 This work is the intellectual property of the author. Permission.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
MNO Cloud Use Case 2 Source: Rogers Wireless Contact: Ed O’Leary George Babut 3GPP/SA3-LI#43Tdoc SA3LI11_115.
RADIUS Secured and Authenticated WiFi Robert Leahy Charles Bodman Brandon Ellis.
CSC – Tieteen tietotekniikan keskus Oy CSC – IT Center for Science Ltd. WLAN Infrastructure Monitoring and Supplicants Workshop on Wireless Belgrade -
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
Kutscher / Ott / Bartsch Supporting Network Access and Service Location in Dynamic Environments Dirk Kutscher Jörg Ott Steffen Bartsch TNC.
Education roaming Secure Wireless Service for Research and Education.
Interworking (802.11u) Scott Armitage.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Basic Wireless Concepts & Configuration Chapter.
RIPE69 – MAT-WG – Wednesday, 5 November 2014 Brook Schofield, GÉANT Association eduroam: The Value of WLAN measurements for the R&E.
© 2009 Mobile VCE 6 October 2011 Core 4 Secure Applications ‘Instant Knowledge’ Programme Achievements Nigel Jefferies Huawei.
GROUP INVOLVED IN A WEB APPLICATION DEVELOPMENT Continue.
Michal Procházka, Jan Oppolzer CESNET.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
L OC P RI S: A S ECURITY AND P RIVACY P RESERVING L OCATION B ASED S ERVICES D EVELOPMENT F RAMEWORK Presenter: Gareth Ayres Authors: Gareth Ayres, Rashid.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
PRESENTATION ON WI-FI TECHNOLOGY
Page 1 Alliver™ Page 2 Scenario Users Contents Properties Contexts Tags Users Context Listener Set of contents Service Reasoner GPS Navigator.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Wireless Authentication & 802.1X By Gareth Ayres.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Supporting a Wireless Network By Gareth Ayres.
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
2009 International Conference on New Trends in Information and Service Science Haosheng Huang1, Georg Gartner, Manuela Schmidt, and Yan Li1 Speaker: Chun-Hung.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
KAIS T On the problem of placing Mobility Anchor Points in Wireless Mesh Networks Lei Wu & Bjorn Lanfeldt, Wireless Mesh Community Networks Workshop, 2006.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Foundations of Location Based Service
Contents Introduction What are Location-based services Working of Location-based services Location Tracking Technologies Power profiling a mobile phone.
IPS Infrastructure Technological Overview of Work Done.
Submission May 2013 BUPT Slide 1 Potential Solutions to D2D Assisted WLAN Date: May 16, 2013 Authors:
Exploring Mobile Device Networking Lesson 4. Exam Objective Matrix Skills/ConceptsMTA Exam Objectives Understanding Networking for Mobile Devices Network.
Easy 802.1X Onboarding with EAPConfig files and Supplicant Configuration Automatic Discovery (SCAD) Gareth Ayres (Speaker) Stefan.
GSU Indoor Navigation Senior Project Fall Semester 2013 Michael W Tucker.
Deploying Eduroam at Swansea University By Gareth Ayres RSC Wales Technical Conf 2011.
Location Awareness Lancaster Keith Mitchell Computing Department Paul Astle Information Systems Services (ISS)
C ONTEXT AWARE SMART PHONE YOGITHA N. & PREETHI G.D. 6 th SEM, B.E.(C.S.E) SIDDAGANGA INSTITUTE OF TECHNOLOGY TUMKUR
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
Introduction to Port-Based Network Access Control EAP, 802.1X, and RADIUS Anthony Critelli Introduction to Port-Based Network Access Control.
Wi-Fi: opportunities & deployments Frans Panken:
Meeting High Speed Wi-Fi Needs in Difficult Dorm Environments ANGELO D. SANTABARBARA DIRECTOR NETWORKS & SYSTEMS.
Port Based Network Access Control
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Understand Wireless Security LESSON Security Fundamentals.
Mixus Daniel Mittelman Tomer Brosh
Cognitive Wi-Fi.
By Sachin Kumar Korenga & Rochita Thakkallapally
The Internet of Things (IoT)
CS & CS Capstone Project & Software Development Project
This is a typical Windows user desktop
Wireless Campus project
Presentation transcript:

Crowd-Sourcing Wi-Fi Coverage Data to build Self- Mapping Radio Maps TNC2013 Gareth Ayres (Speaker) Jason Jones 2013

About the Authors Gareth Ayres (me) Wireless Network Officer, Swansea University PhD Student (part-time) Author of SU1X Jason Jones Lecturer Swansea University My PhD Tutor

Introduction – Key Terms I know I don’t need this slide here, but just in case… eduroam – (education roaming) is the secure, world-wide roaming access service developed for the international research and education community. Wi-Fi – WLAN based on any standard LBS – Location Based Service – A service that makes use of the context of a devices location

Introduction – Key Terms Supplicant – Software used to authenticate a device to a 802.1x network Location Fingerprint – a record of information (signal strength in this case) derived by a device about a given location at a specific time. (Coverage Data) Radio Map – A map of information (location fingerprints) about RF properties such as signal strength or signal-noise-ratio and associations between nodes. Abstract, not geographic.

The Problem/Solution Problem: Poor wireless coverage maps LBS’s poor as no location data Need rough AP locations at least Solution: Build self-mapping radio maps using crowd-sourced data Not brilliant, but a first step and better than present

Graph (or radio map) Graph theory is the study of graphs, which are mathematical structures used to model pairwise relations between objects. - wikipediagraphs Vertices – nodes, in this case wireless access points Edges – An association between nodes (not that type!) Weights – Used to describe proximity between associated nodes/vertices in this case

Simple Graph

Introduction – Setting the Scene Wi-Fi at Swansea University: CISCO WLAN controllers >1000 Wireless Access Points ~3000 staff, ~10000 students ~8000 users a day, ~6000 consecutively connected devices eduroam primary ssid Use SU1X for Windows configuration

Introduction – SU1X Supplicant Configuration Tool: SU1X – Open Source, Windows XPSP3->Win8 Configures a wireless profile Sets EAP credentials Like eduroamCAT…

Introduction - LocPriS LocPriS – A security and privacy preserving location based services development framework Paper: _60http://link.springer.com/chapter/ %2F _60 Part of my PhD project

Crowd-Sourcing Data The Idea: SU1X modified to capture location fingerprints Opt-out during installer Only runs on first-run and reauths. Location Fingerprints sent to LocPriS server HTTPS GET request PHP parses, cleans, validates data etc Fingerprint stored in MySQL DB

Typical Location Fingerprint Location Fingerprint: SSID, BSSID, ID, RSS, TYPE, TIME March 14 th 2012: rows from 172 devices eduroam AAAA g :38:52 eduroam FFFF g :38:52 eduroam BBBB g :38:52

Example Location Fingerprinting Two Devices: MN1 & MN2 Three Buildings, A, B & C 7 Access Points, A1..C3 (Potentially multiple BSSIDs but ignore this for now as we use eduroam)

Example Location Fingerprinting Two Location Fingerprints: MN1: [{A1, 80},{A2,46},{C1,72}] MN2: [{B2, 52},{C2,59},{C3,49}]

Example Location Fingerprinting E(Vx,Vy) = {MNi,Vx} + {MNi,Vy} Where: E(Vx,Vy)=Edge weight between Vx,Vy MNi = Mobile Node i Vx,Vy= Two Wi-Fi Access Points (Vertices)

Example Location Fingerprinting E(x,y) = {MN1,A1} + {MN1,A2} E(A1,A2)=80+46=126 E(B2,C3)=52+49=101 E(A2,C1)=72+46=118 E(B2,C2)=52+59=111 E(A1,C1)=80+72=152 E(C2,C3)=59+49=108

Force-Directed Layouts Force-Directed Graph Draws graphs according to an algorithm of physical system Forces set between edges (weights) Attract and Repel like springs Graph visualisation Using Gephi for visualisation in the following slides Moving to DS3.js for web based visualisation More control over force-directed layout algorithm

Data from March 11 th – 12 th Vertices Edges 167 Devices

Data from March 11 th - 13 th Vertices Edges 302 Devices

Data from March 11 th - 14 th Vertices Edges 461Devices

Data from March 11 th - 15 th Vertices Edges 633 Devices

Data from March 11 th - 16 th Vertices Edges 724 Devices

Data from March 11 th - 17 th Vertices Edges 856 Devices

Augmented Map and Anchors Radio map lacks orientation, position and scale in real world. Also suffers from flipping. Solutions is Anchor Nodes to produce an Augmented Radio Map (ARM): 1.Users manually locate themselves on map 2.GPS outside to give building periphery AP’s –Gathered from eduroam apps on smart phones?

Sharing and Distribution of Radio Maps Graph Exchange XML Format (GEXF) Use standard xml techniques Share and combine graphs/radio maps

Future Work Explorer/Improve new Force-Directed layout algorithms Different sources of fingerprints: RADIUS authentication logs Association logs D3.js visualisation of graphs

End Questions? Gareth Ayres