Slide 1 Toward Optimal Sniffer-Channel Assignment for Reliable Monitoring in Multi-Channel Wireless Networks Donghoon Shin, Saurabh Bagchi and Chih-Chun.

Slides:



Advertisements
Similar presentations
Fast Algorithms For Hierarchical Range Histogram Constructions
Advertisements

Coverage by Directional Sensors Jing Ai and Alhussein A. Abouzeid Dept. of Electrical, Computer and Systems Engineering Rensselaer Polytechnic Institute.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Randomized Sensing in Adversarial Environments Andreas Krause Joint work with Daniel Golovin and Alex Roper International Joint Conference on Artificial.
Maximizing the Spread of Influence through a Social Network
EMIS 8373: Integer Programming Valid Inequalities updated 4April 2011.
1 EL736 Communications Networks II: Design and Algorithms Class8: Networks with Shortest-Path Routing Yong Liu 10/31/2007.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Haiming Jin, He Huang, Lu Su and Klara Nahrstedt University of Illinois at Urbana-Champaign State University of New York at Buffalo October 22, 2014 Cost-minimizing.
Approximation Algoirthms: Semidefinite Programming Lecture 19: Mar 22.
Distributed Algorithms for Secure Multipath Routing
Kuang-Hao Liu et al Presented by Xin Che 11/18/09.
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Jie Gao Joint work with Amitabh Basu*, Joseph Mitchell, Girishkumar Stony Brook Distributed Localization using Noisy Distance and Angle Information.
Energy-Efficient Target Coverage in Wireless Sensor Networks Mihaela Cardei, My T. Thai, YingshuLi, WeiliWu Annual Joint Conference of the IEEE Computer.
Cache Placement in Sensor Networks Under Update Cost Constraint Bin Tang, Samir Das and Himanshu Gupta Department of Computer Science Stony Brook University.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
Approximation Algorithms
[1][1][1][1] Lecture 5-7: Cell Planning of Cellular Networks June 22 + July 6, Introduction to Algorithmic Wireless Communications David Amzallag.
Jan 6-10th, 2007VLSI Design A Reduced Complexity Algorithm for Minimizing N-Detect Tests Kalyana R. Kantipudi Vishwani D. Agrawal Department of Electrical.
Achieving Minimum Coverage Breach under Bandwidth Constraints in Wireless Sensor Networks Maggie X. Cheng, Lu Ruan and Weili Wu Dept. of Comput. Sci, Missouri.
Maximum Network lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Mihaela Cardei, Jie Wu, Mingming Lu, and Mohammad O. Pervaiz Department.
Distributed Combinatorial Optimization
1 Target-Oriented Scheduling in Directional Sensor Networks Yanli Cai, Wei Lou, Minglu Li,and Xiang-Yang Li* The Hong Kong Polytechnic University, Hong.
Approximation Algorithms: Bristol Summer School 2008 Seffi Naor Computer Science Dept. Technion Haifa, Israel TexPoint fonts used in EMF. Read the TexPoint.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
MATE: MPLS Adaptive Traffic Engineering Anwar Elwalid, et. al. IEEE INFOCOM 2001.
NTU IM OPLAB Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks Journal of Network and Computer Applications.
DEXA 2005 Quality-Aware Replication of Multimedia Data Yicheng Tu, Jingfeng Yan and Sunil Prabhakar Department of Computer Sciences, Purdue University.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
CS 712 | Fall 2007 Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua. National University.
Slide 1/38 Algorithms For Distributed Monitoring In Multi-Channel Ad Hoc Wireless Networks Donghoon Shin Ph.D. Final Examination Advisor: Prof. Saurabh.
Network Aware Resource Allocation in Distributed Clouds.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Efficient and Scalable Computation of the Energy and Makespan Pareto Front for Heterogeneous Computing Systems Kyle M. Tarplee 1, Ryan Friese 1, Anthony.
© 2009 IBM Corporation 1 Improving Consolidation of Virtual Machines with Risk-aware Bandwidth Oversubscription in Compute Clouds Amir Epstein Joint work.
June 21, 2007 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta.
Low-Power Gated Bus Synthesis for 3D IC via Rectilinear Shortest-Path Steiner Graph Chung-Kuan Cheng, Peng Du, Andrew B. Kahng, and Shih-Hung Weng UC San.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
On Energy-Efficient Trap Coverage in Wireless Sensor Networks Junkun Li, Jiming Chen, Shibo He, Tian He, Yu Gu, Youxian Sun Zhejiang University, China.
The Fast Optimal Voltage Partitioning Algorithm For Peak Power Density Minimization Jia Wang, Shiyan Hu Department of Electrical and Computer Engineering.
DISCERN: Cooperative Whitespace Scanning in Practical Environments Tarun Bansal, Bo Chen and Prasun Sinha Ohio State Univeristy.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Optimal Selection of Power Saving Classes in IEEE e Lei Kong, Danny H.K. Tsang Department of Electronic and Computer Engineering Hong Kong University.
A Node and Load Allocation Algorithm for Resilient CPSs under Energy-Exhaustion Attack Tam Chantem and Ryan M. Gerdes Electrical and Computer Engineering.
Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints Yao Zhao, Zhaosheng Zhu, Yan Chen, Northwestern University Dan.
Scheduling Optimization in Wireless MESH Networks with Power Control and Rate Adaptation SECON 2006 Antonio Capone and Giuliana Carello Keon Jang 2007.
1 11 Channel Assignment for Maximum Throughput in Multi-Channel Access Point Networks Xiang Luo, Raj Iyengar and Koushik Kar Rensselaer Polytechnic Institute.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Efficient k-Coverage Algorithms for Wireless Sensor Networks Mohamed Hefeeda.
Optimal Resource Allocation for Protecting System Availability against Random Cyber Attack International Conference Computer Research and Development(ICCRD),
Maximizing Lifetime per Unit Cost in Wireless Sensor Networks
Implicit Hitting Set Problems Richard M. Karp Erick Moreno Centeno DIMACS 20 th Anniversary.
Resource Allocation in Hospital Networks Based on Green Cognitive Radios 王冉茵
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Distributed Optimization Yen-Ling Kuo Der-Yeuan Yu May 27, 2010.
Coverage and Scheduling in Wireless Sensor Networks Yong Hwan Kim Korea University of Technology and Education Laboratory of Intelligent.
Multi-Objective Optimization for Topology Control in Hybrid FSO/RF Networks Jaime Llorca December 8, 2004.
Efficient Point Coverage in Wireless Sensor Networks Jie Wang and Ning Zhong Department of Computer Science University of Massachusetts Journal of Combinatorial.
Euro-Par, HASTE: An Adaptive Middleware for Supporting Time-Critical Event Handling in Distributed Environments ICAC 2008 Conference June 2 nd,
Optimal Relay Placement for Indoor Sensor Networks Cuiyao Xue †, Yanmin Zhu †, Lei Ni †, Minglu Li †, Bo Li ‡ † Shanghai Jiao Tong University ‡ HK University.
Placing Relay Nodes for Intra-Domain Path Diversity Meeyoung Cha Sue Moon Chong-Dae Park Aman Shaikh Proc. of IEEE INFOCOM 2006 Speaker 游鎮鴻.
1 Power Efficient Monitoring Management in Sensor Networks A.Zelikovsky Georgia State joint work with P. BermanPennstate G. Calinescu Illinois IT C. Shah.
Linear Programming Piyush Kumar Welcome to CIS5930.
A Maximum Fair Bandwidth Approach for Channel Assignment in Wireless Mesh Networks Bahador Bakhshi and Siavash Khorsandi WCNC 2008.
Approximation Algorithms based on linear programming.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Prof. Yu-Chee Tseng Department of Computer Science
A Study of Group-Tree Matching in Large Scale Group Communications
Multi-Objective Optimization for Topology Control in Hybrid FSO/RF Networks Jaime Llorca December 8, 2004.
Maximum Lifetime of Sensor Networks with Adjustable Sensing Range
Presentation transcript:

Slide 1 Toward Optimal Sniffer-Channel Assignment for Reliable Monitoring in Multi-Channel Wireless Networks Donghoon Shin, Saurabh Bagchi and Chih-Chun Wang Dependable Computing Systems Lab (DCSL) School of Electrical and Computer Engineering Purdue University

Slide 2 Outline Introduction: Passive Monitoring in Wireless Networks Existing Works and Motivation Problem Statement: Optimal Sniffer-Channel Assignment for Reliable Monitoring Proposed Algorithms Simulation Results Conclusion

Slide 3 Introduction Passive monitoring in wireless networks  A set of sniffers are used to capture and analyze network traffic to estimate network conditions and performance −Sniffers are software or hardware devices that intercept and log packets  Such estimates are utilized for efficient network operation such as: −Resource management −Network configuration −Fault detection/diagnosis −Network intrusion detection A major issue with passive monitoring in multi-channel wireless networks: “sniffer-channel assignment problem” How to assign a set of channels to the sniffers’ radios so as to capture as large an amount of traffic as possible?

Slide 4 Existing Studies on Monitoring in Multi-Channel Wireless Networks [Shin et al, MobiHoc’09] Optimal placement and channel assignment of sniffers in wireless mesh networks [Chhetri et al, MobiHoc’10] Two models of sniffers that assume different capabilities of sniffers’ capturing traffic [Arora et al., INFOCOM’11] Trade-off between assigning sniffers’ radios to the channels known to be busiest based on the current knowledge, versus exploring channels that are under-observed [Arora et al., GLOBECOM’11], [Shin et al, INFOCOM’12] Distributed algorithms for optimal sniffer-channel assignment

Slide 5 Motivation and Solution Approach All previous works assumed that sniffers are perfect In practice, sniffers may probabilistically stop functioning and/or generate erroneous reports on monitoring due to:  Poor reception (due to packet collisions or poor channel conditions)  Compromise by an adversary  Operational failure  Sleep mode for saving energy In this paper, we allow for imperfect sniffers For accurate and reliable monitoring, we provide sniffer redundancy to each node  That is, each node has to meet a coverage requirement, i.e., the minimum number of sniffers required to reliably monitor the node

Slide 6 Notation & Terminology S: Set of sniffers N: Set of nodes  Each node’s radio is tuned to a specific wireless channel C: Set of available wireless channels w n : Weight assigned to node n  Captures various application-specific objectives of monitoring r n : Coverage requirement assigned to node n  Minimum number of sniffers required to reliably monitor node n K s,c : Coverage-set of sniffer s on channel c  Contains the nodes that can be overheard by sniffer s operating on channel c Sniffer-channel assignment: A collection of coverage-sets that include only one coverage-set for each sniffer

Slide 7 Channel Assignment for Reliable Monitoring Full-Coverage Reliable Monitoring (FCRM): Find a sniffer-channel assignment that covers all nodes in the network  A node is covered if it is overhead by at least r n sniffers Theorem 1:  Complexity grows exponentially with the number of sniffers Maximum-Coverage Reliable Monitoring (MCRM): Find a sniffer- channel assignment that maximizes the total weight of nodes being covered Corollary 1: FCRM is NP-hard, even for |C| = 2 and r n = 2 for some node n MCRM is NP-hard, even for |C| = 2 and r n = 2 for some node n

Slide 8 Channel Assignment for Reliable Monitoring Corollary 2: Theorem 2:  Intuitively, submodularity is a diminishing-return property  Submodularity allows to efficiently find provably (near-)optimal solutions −Similar to convexity in continuous optimization  Known that non-submodular functions are difficult to deal with For any ε > 0, it is NP-hard to solve MCRM within a factor of 7/8 + ε of the maximum coverage, even for |C| = 2 and r n = 2 for all n For MCRM with r n = 1 for all n, the weight function w is submodular. However, MCRM with r n ≥ 2 for some n, the weight function w is not submodular.

Slide 9 Greedy Approach Naïve greedy algorithms: at each iteration, pick one coverage-set that maximizes:  Coverage improvement  Sum of the weights of the hitherto uncovered nodes Look-ahead greedy algorithms: consider combinations of multiple coverage-sets at each step  Look-t-steps-ahead greedy algorithm −At each step, picks one coverage-set through the following procedure: 1.Find a collection of t + 1 coverage-sets that achieve the maximum coverage improvement for the current step and the next t steps 2.Among the coverage-sets in the selected collection, picks one coverage-set that maximizes coverage improvement at the current step  t-sniffers-at-one-step greedy algorithm −At each step, picks a collection of at most t coverage-sets that maximize the per-sniffer coverage improvement

Slide 10 Relaxation-and-Rounding Approach Steps for relaxation-and-rounding algorithms to solve MCRM 1)Formulate MCRM into an integer program (IP) 2)Transform the IP into a relaxed program by removing the integer constraints −Find as tight a relaxed program as possible, while keeping the relaxed program solvable in polynomial time 3)Solve the relaxed program to find the optimal fractional solution 4)Round the non-integer values from Step 3 to obtain an integer solution feasible for the original IP −In rounding, the goal is to minimize the degradation of the quality of the resulting integer solution Two relaxations devised i.Linear Program (LP) relaxation ii.SemiDefinite Program (SDP) relaxation  tighter relaxation

Slide 11 Relaxation-and-Rounding Approach Two rounding algorithms designed  Randomized Rounding Algorithm (RRA) −Probabilistically round the optimal LP/SDP solution {y s,c * } such that: where Y s,c is the integer value resulted from rounding  Greedy Rounding Algorithm (GRA) −At each iteration, rounds (at least) one fractional value as the followings: 1.For each sniffer-channel pair (s, c) whose value is not rounded to an integer, adjust the fractional values of the sniffer s according to: 2.Find the sniffer-channel pair (s #, c # ) whose associated adjusted values achieve the maximum coverage improvement 3.Update the fractional values of sniffer s # to the adjusted values P(Y s,c = 1) = y s,c * y s,c * = 1 indicates that sniffer s tunes its radio to channel c

Slide 12 Simulation Settings Two metrics  Coverage  Running time Two kinds of networks  Random network: Nodes are randomly deployed in the network with a uniform distribution  Scale-free network: Nodes are deployed such that the distribution of the nodes with degree d follows a power law in a form of d -r Parameter settings  Number of nodes: 40  Number of channels: 3  All nodes have the same weight of one (i.e., w n = 1) and the same coverage requirement of two (i.e., r n = 2)

Slide 13 Coverage in Random Network Look-ahead greedy algorithms show reasonably good performance (at least 92% of maximum coverage) SDP + GRA and LP + GRA show coverage comparable to the maximum achievable coverage (i.e., at least 95% and 94% of maximum coverage) Look-ahead greedy algorithms ILP optimum (maximum coverage) Rounding by GRA Rounding by RRA After rounding, GRA maintains the solution quality closer to the maximum coverage, while RRA results in the degradation of the solution quality Naïve greedy algorithm-2 (which picks the coverage-set that achieves the maximum total weight of the uncovered nodes) Naïve greedy algorithm-1 (which picks the coverage-set of the maximum coverage improvement) Naïve greedy algorithm-2 shows reasonable coverage, while naïve greedy algorithm-1 shows poor coverage

Slide 14 Coverage in Scale-free Network SDP-based algorithms achieve a higher coverage improvement (by 2~5%) compared to LP-based algorithms, than in random network SDP-relaxation based algorithms LP-relaxation based algorithms Gap from the upper bound by SDP relaxation Gap from the upper bound by LP relaxation SDP relaxation shows a noticeable improvement on the upper bound of the maximum achievable coverage (by 4~7%)

Slide 15 Running Time in Random Network SDP-relaxation and rounding algorithms show reasonably fast running time LP-relaxation and rounding algorithms show the fastest running time CPU: 2.4 GHz Memory: 4 GB Bus: 1.07 GHz y-axis for look- ahead greedy algorithms (5x left y-axis) y-axis for the other algorithms LP-relaxation based algorithms Look-ahead greedy algorithms show the slowest running time  Grow rapidly as the number of sniffers increases  Running time of the t-sniffers-at-one-step greedy algorithm is almost half of the running time of the look-t-steps-ahead greedy algorithm Look-ahead greedy algorithms SDP-relaxation based algorithms

Slide 16 Summary of Simulation Results SDP + GRA achieves the highest coverage close to the maximum coverage, but shows a (relatively) slow running time  Favored, especially, for monitoring applications where a higher coverage is more emphasized (e.g., critical security monitoring) LP + GRA attains the coverage comparable to the coverage of the SDP + GRA, and also shows a fast running time  A good compromise between coverage and running-time  Favored for monitoring applications requiring fast running-time (e.g., monitoring dynamic network environments)

Slide 17 Conclusion Studied the optimal sniffer-channel assignment problem for reliable monitoring in multi-channel wireless networks Showed that the problem is fundamentally differs from the previously studied problems that assume perfect sniffers and thus do not need to consider sniffer redundancy Proposed various approximation algorithms based on two basic approaches:  Greedy  Relaxation and rounding Present a comparative analysis of the proposed algorithms through simulations

Slide 18 Thank You Contact Info: Donghoon Shin Questions?