WiFi-Reports: Improving Wireless Network Selection with Collaboration Presented By Tim McDowell.

Slides:



Advertisements
Similar presentations
Context-awareness, cloudlets and the case for AP-embedded, anonymous computing Anthony LaMarca Associate Director Intel Labs Seattle.
Advertisements

Colyseus: A Distributed Architecture for Online Multiplayer Games
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
BBN: Throughput Scaling in Dense Enterprise WLANs with Blind Beamforming and Nulling Wenjie Zhou (Co-Primary Author), Tarun Bansal (Co-Primary Author),
FM-BASED INDOOR LOCALIZATION TsungYun 1.
VTrack: Accurate, Energy-Aware Road Traffic Delay Estimation Using Mobile Phones Arvind Thiagarajan, Lenin Ravindranath, Katrina LaCurts, Sivan Toledo,
CSLI 5350G - Pervasive and Mobile Computing Week 6 - Paper Presentation “Exploiting Beacons for Scalable Broadcast Data Dissemination in VANETs” Name:
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Predicting Tor Path Compromise by Exit Port IEEE WIDA 2009December 16, 2009 Kevin Bauer, Dirk Grunwald, and Douglas Sicker University of Colorado Client.
CSE 222a Final Project - UCSD Spring 2007 p2p DNS addressing Presented By- Anup Tapadia Alexander Loukissas Justin Wu.
Pushing the Envelope of Indoor Wireless Spatial Reuse using Directional Access Points and Clients Xi Liu 1, Anmol Sheth 2, Konstantina Papagiannaki 3,
Jean-Eudes Ranvier 17/05/2015Planet Data - Madrid Trustworthiness assessment (on web pages) Task 3.3.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
1 Tryst: Making Local Service Discovery Confidential Jeffrey Pang Ben Greenstein Srinivasan Seshan David Wetherall.
Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,
Wifi-Reports Improving Wireless Network Selection with Collaboration Jeffrey Pang (CMU) Ben Greenstein (Intel Research Seattle) Michael Kaminsky (Intel.
1 Defragmenting DHT-based Distributed File Systems Jeffrey Pang, Srinivasan Seshan Carnegie Mellon University Phillip B. Gibbons, Michael Kaminsky Intel.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Carnegie Mellon University Complex queries in distributed publish- subscribe systems Ashwin R. Bharambe, Justin Weisz and Srinivasan Seshan.
Choosing Beacon Periods to Improve Response Times for Wireless HTTP Clients Suman Nath Zachary Anderson Srinivasan Seshan Carnegie Mellon University.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
1 Making Local Service Discovery Confidential with Tryst Jeffrey Pang CMU Ben Greenstein Intel Research Srinivasan Seshan CMU David Wetherall University.
WiFi-Reports: Improving Wireless Network Selection Jeffrey Pang (CMU) with Ben Greenstein (IRS) Michael Kaminsky (IRP) Damon McCoy (U. Colorado) Srinivasan.
Wide-area cooperative storage with CFS
Homework 2 Similar to the experiments done in the paper “Online Game QoE Evaluation using Paired Comparisons “ “Online Game QoE Evaluation using Paired.
MobiSteer: Using Steerable Beam Directional Antenna for Vehicular Network Access Vishnu Navda, Anand Prabhu Subramanian, Kannon Dhanasekaran, Andreas Timm-Giel,
Wifi-Reports: Improving Wireless Network Selection with Collaboration Jeffrey Pang (CMU) Ben Greenstein (Intel Research Seattle) Michael Kaminsky (Intel.
A Measurement Study of Vehicular Internet Access Using In Situ Wi-Fi Networks Vladimir Bychkovsky, Bret Hull, Allen Miu, Hari Balakrishnan, and Samuel.
Presented by Tao HUANG Lingzhi XU. Context Mobile devices need exploit variety of connectivity options as they travel. Operating systems manage wireless.
Chapter 10 Publishing and Maintaining Your Web Site.
Hashing it Out in Public Common Failure Modes of DHT-based Anonymity Schemes Andrew Tran, Nicholas Hopper, Yongdae Kim Presenter: Josh Colvin, Fall 2011.
BreadCrumbs: Forecasting Mobile Connectivity Presented by Hao He Slides adapted from Dhruv Kshatriya Anthony J. Nicholson and Brian D. Noble.
A measurement study of vehicular internet access using in situ Wi-Fi networks Vladimir Bychkovsky, Bret Hull, Allen Miu, Hari Balakrishnan, and Samuel.
A Locality Preserving Decentralized File System Jeffrey Pang, Suman Nath, Srini Seshan Carnegie Mellon University Haifeng Yu, Phil Gibbons, Michael Kaminsky.
1 T HE A NDREW F ILE S YSTEM (AFS) Michael Moeng Summer 2008.
1 Chapter Overview Wireless Technologies Wireless Security.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
4/29/03 Presented by Justin Fain Group Collaboration Tools Segment 2.
Introduction and Overview Questions answered in this lecture: What is an operating system? How have operating systems evolved? Why study operating systems?
HERO: Online Real-time Vehicle Tracking in Shanghai Xuejia Lu 11/17/2008.
National Datawarehouse for Traffic Information – Big Data supplier Els Rijnierse.
FaceTrust: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos, Kyungbaek Kim and Xiaowei Yang in collaboration with J.W.
Do incentives build robustness in BitTorrent? Michael Piatek, Tomas Isdal, Thomas Anderson, Arvind Krishnamurthy, Arun Venkataramani.
WiFi-Reports: Improving Wireless Network Selection Jeffrey Pang (CMU) with Ben Greenstein (IRS) Michael Kaminsky (IRP) Damon McCoy (U. Colorado) Srinivasan.
Socially-aware pub-sub system for human networks Yaxiong Zhao Jie Wu Department of Computer and Information Sciences Temple University Philadelphia
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Accuracy Characterization for Metropolitan-scale Wi-Fi Localization Yu-Chung Cheng (UCSD, Intel Research) Yatin Chawathe (Intel Research) Anthony LaMarca.
Doc.: IEEE /0834r0 Submission July 2015 Thomas Handte, SonySlide 1 Further Use Cases for Next Generation Positioning Date: 2015/07/13 Authors:
Components of wireless LAN & Its connection to the Internet
Performance Evaluation of Mobile Hotspots in Densely Deployed WLAN Environments Presented by Li Wen Fang Personal Indoor and Mobile Radio Communications.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Library Online Resource Analysis (LORA) System Introduction Electronic information resources and databases have become an essential part of library collections.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
NETWORKING COMPONENTS lLTEC 4550 JGuadalupe. HUB -THIS IS A HARDWARE DEVICE THAT IS USED TO NETWORK MULTIPLE COMPUTERS TOGETHER. IT IS A CENTRAL CONNECTION.
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
INTRO TO NETWORKING. OVERVIEW Transmitting data Across a physical media Ethernet Wi-fi Bluetooth Etc. Cross-platform (usually) Challenges Varying network.
Revision Unit 1 – The Online World Online Services Online Documents Online Communication Cloud Computing The Internet Internet Infrastructure Internet.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Facebook privacy policy
chownIoT Secure Handling of Smart Home IoT Devices Ownership Change
Dude, where’s that IP? Circumventing measurement-based geolocation
Phillipa Gill University of Toronto
Presentation transcript:

WiFi-Reports: Improving Wireless Network Selection with Collaboration Presented By Tim McDowell

WiFi-Reports  Authors: ◦ Jeffrey Pang, Carnegie Mellon University ◦ Srinivasan Seshan, Carnegie Mellon University ◦ Michael Kaminsky, Intel Research Pittsburgh ◦ Ben Greenstein, Intel Research Seattle ◦ Damon McCoy, University of Colorado

Overview Background Setup Experimental Results Discussion Future Work Conclusions

Background: The Problem Figure 1: Measured Hotspots Near the University of Washington

Background: The Problem Commercial Access Points ◦ May block certain applications (e.g. SSH, File- sharing, Online Games) ◦ Often exhibit poorer than advertised performance ◦ ‘Official AP’ is not always best!

Background: The Problem Figure 2: (a) AP Connection Success Rate, (b) TCP Download Speed, (c) google.com Fetch Time

Setup Official AP is shown to have the lowest median latency ~70% of the time. Why should we care about the remaining 30%?

Setup Performance depends on many factors ◦ Ranking depends on application requirements ◦ Reports include estimated back-haul capacity, ports blocked, and connectivity failures Historical information, {AP, SNR, date, connectivity}, is collected and sent to a central database

Setup Figure 3: Wifi-Reports Components & Procedure

Setup: Key Challenges Maintain user privacy Limit Fraudulent Reports

Setup: Privacy Issues Want to report on AP without revealing user’s location ‘Blind signature’ allows users to remain anonymous while preventing fraud. Anonymous data is matched to location using existing war-driving databases. Introduces processing overhead

Setup: Privacy Issues Table 1: Blind Signature Method Processing Times (ms)

Setup: Preventing Fraud Client must contact account authority to obtain credentials ( verification, text message, etc.) before reporting on an AP Prevents a single user from submitting many fraudulent reports Using median performance values allows reports to be robust to a small fraction of outliers

Experimental Results Figure 4: Box Plots of (a) TCP Download Speed & (b) google.com Fetch Time for 5 Different AP selection methods

Experimental Results: Handling Fraudulent Reports Figure 5: CDF of AP Prediction Accuracy for Varying Percentages of Fraudulent Reports  Robust enough to handle some frauds  Users lured to poor APs will submit correct reports

Discussion: Limitations AP performance still varies over time Blind signature introduces significant computation overhead in order to maintain privacy & prevent fraud Persistent attackers can join together and submit fraudulent reports independently

Discussion: Limitations Selection is subjective (depends on cost, venue, service providers’ reputations) Historical information looses accuracy over time, does not account for new APs Not beneficial in regions with sparse Wifi coverage Heavily reliant on war-driving

Future Work Geo-locating moving access points to deal with mobile users. Improve robustness to fraud More accurate location determination

Conclusions Wifi Reports allows users to make informed decisions in areas of dense AP coverage Users must decide for themselves if freedom of AP choice is worth the extra overhead

Questions?