Detecting Node encounters through WiFi By: Karim Keramat Jahromi Supervisor: Prof Adriano Moreira Co-Supervisor: Prof Filipe Meneses Oct 2013.

Slides:



Advertisements
Similar presentations
Robin Kravets Tarek Abdelzaher Department of Computer Science University of Illinois The Phoenix Project.
Advertisements

Comparison Of Network On Chip Topologies Ahmet Salih BÜYÜKKAYHAN Fall.
Supporting Cooperative Caching in Disruption Tolerant Networks
Communications Research Centre (CRC) Defence R&D Canada – Ottawa 1 Properties of Mobile Tactical Radio Networks on VHF Bands Li Li & Phil Vigneron Communications.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Power Laws By Cameron Megaw 3/11/2013. What is a Power Law?
Preference-based Mobility Model and the Case for Congestion Relief in WLANs using Ad hoc Networks Wei-jen Hsu, Kashyap Merchant, Haw-wei Shu, Chih-hsin.
Finding Self-similarity in People Opportunistic Networks Ling-Jyh Chen, Yung-Chih Chen, Paruvelli Sreedevi, Kuan-Ta Chen Chen-Hung Yu, Hao Chu.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
SLAW: A Mobility Model for Human Walks Lee et al..
IEEE PIMRC A Comparative Measurement Study of the Workload of Wireless Access Points in Campus Networks Maria Papadopouli Assistant Professor Department.
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
1 William Lee Duke University Department of Electrical and Computer Engineering Durham, NC Analysis of a Campus-wide Wireless Network February 13,
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
Finding Self-similarity in Opportunistic People Networks Yung-Chih Chen 1 Ling-Jyh Chen 1, Yung-Chih Chen 1, Tony Sun 2 Paruvelli Sreedevi 1, Kuan-Ta Chen.
Wireless LAN Support For 3COM Palm Pilot Winter/Spring 2000 Technion – Israeli Institute of Technology Computer Networks and Digital Labs Yuval Frandzel.
1 BotGraph: Large Scale Spamming Botnet Detection Yao Zhao EECS Department Northwestern University.
Evaluating the Cost of Frequency Diversity in Communication and Routing Overview Jorge Ortiz* ♦ David Culler* Causes of Loss  Pairs of nodes sharing a.
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
Impact of Different Mobility Models on Connectivity Probability of a Wireless Ad Hoc Network Tatiana K. Madsen, Frank H.P. Fitzek, Ramjee Prasad [tatiana.
UNDERSTANDING PERIODICITY AND REGULARITY OF NODAL ENCOUNTERS IN MOBILE NETWORKS: A SPECTRAL ANALYSIS Sungwook Moon, Ahmed Helmy Dept. of Computer and Information.
Classroom Presenter: Supporting Active Learning with the Tablet PC Richard Anderson University of Washington March 19, 2007 Asia-Pacific Regional Workshop.
Low Latency Wireless Video Over Networks Using Path Diversity John Apostolopolous Wai-tian Tan Mitchell Trott Hewlett-Packard Laboratories Allen.
Yung-Chih Chen Jim Kurose and Don Towsley Computer Science Department University of Massachusetts Amherst A Mixed Queueing Network Model of Mobility in.
STOCHASTIC GEOMETRY AND RANDOM GRAPHS FOR THE ANALYSIS AND DESIGN OF WIRELESS NETWORKS Haenggi et al EE 360 : 19 th February 2014.
Modeling client arrivals at access points in wireless campus-wide networks Maria Papadopouli Assistant Professor Department of Computer Science University.
«Tag-based Social Interest Discovery» Proceedings of the 17th International World Wide Web Conference (WWW2008) Xin Li, Lei Guo, Yihong Zhao Yahoo! Inc.,
1 CIS 6930: Workshop III Encounter-based Networks Presenter: Sapon Tanachaiwiwat Instructor: Dr. Helmy 2/5/2007.
EXTRACT: MINING SOCIAL FEATURES FROM WLAN TRACES: A GENDER-BASED CASE STUDY By Udayan Kumar Ahmed Helmy University of Florida Presented by Ahmed Alghamdi.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
Gender based analysis Udayan Kumar Computer and Information Science and Engineering (CISE) Department, University Of Florida, Gainesville, FL.
1 Contact Prediction, Routing and Fast Information Spreading in Social Networks Kazem Jahanbakhsh Computer Science Department University of Victoria August.
Stochastic sleep scheduling (SSS) for large scale wireless sensor networks Yaxiong Zhao Jie Wu Computer and Information Sciences Temple University.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
Modularized Two Step Vertical Handoff Scheme In Integrated WWAN and WLAN Shimin Li Ying Wang.
Extract: Mining Social Features from WLAN Traces A Gender-Based Case Study Udayan Kumar and Ahmed Helmy Computer and Information Sciences and Engineering,
Find regular encounter pattern from mobile users. Regular encounter indicates an encounter trend that is repetitive and consistent. Using this metric can.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
De-Nian Young Ming-Syan Chen IEEE Transactions on Mobile Computing Slide content thanks in part to Yu-Hsun Chen, University of Taiwan.
Wireless Trace Analysis Suyong Lee and Renata Aryanti Advisor: Prof. Suman Banerjee With assistance of : Vladimir Brik and Michael Blodget Fall 2007.
MOJO: A Distributed Physical Layer Anomaly Detection System for WLANs Richard D. Gopaul CSCI 388.
On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering.
Content Sharing over Smartphone-Based Delay- Tolerant Networks.
Doc.: IEEE /0648r0 Submission May 2014 Chinghwa Yu et. al., MediaTekSlide 1 Performance Observation of a Dense Campus Network Date:
Universität Stuttgart Institute of Parallel and Distributed Systems (IPVS) Universitätsstraße 38 D Stuttgart Contact-Based Mobility Metrics for Delay-
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
Preserving Location Privacy in Wireless LANs Jiang, Wang and Hu MobiSys 2007 Presenter: Bibudh Lahiri.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Performance Debugging for Distributed Systems of Black Boxes Marcos K. Aguilera Jeffrey C. Mogul Janet L. Wiener HP Labs Patrick Reynolds, Duke Athicha.
© 2008 Frans Ekman Mobility Models for Mobile Ad Hoc Network Simulations Frans Ekman Supervisor: Jörg Ott Instructor: Jouni Karvo.
Measurement in the Internet Measurement in the Internet Paul Barford University of Wisconsin - Madison Spring, 2001.
1 Architecture and Behavioral Model for Future Cognitive Heterogeneous Networks Advisor: Wei-Yeh Chen Student: Long-Chong Hung G. Chen, Y. Zhang, M. Song,
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
Deploying Sensors for Maximum Coverage in Sensor Network Ruay-Shiung Chang Shuo-Hung Wang National Dong Hwa University IEEE International Wireless Communications.
A New Class of Mobility Models for Wireless Mobile Communication Networks Joshua Gabet Advisor: Carl Baum Clemson University SURE 2005.
A New Class of Mobility Models for Ad Hoc Wireless Networks Rahul Amin Advisor: Dr. Carl Baum Clemson University SURE 2006.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Presenting: Shlomo Ben-Shoshan, Nir Straze Supervisors: Dr. Ofer Hadar, Dr. Evgeny Kaminsky.
doc.: IEEE <doc#>
SLAW: A Mobility Model for Human Walks
1 Exploiting Friendship Relations for Efficient Routing in Mobile Social Networks Eyuphan Bulut, Student Member, IEEE, and Boleslaw K Szymanski, Fellow,
OO Methodology OO Architecture.
Wireless Epidemic The wireless epidemic (Nature 449, ; 2007) by Jon Kleinberg ‘Digital traffic flows not only over the wired backbone of the Internet,
Network Data Use Case for Wavelength Division Service
Protocols.
Protocols.
Presentation transcript:

Detecting Node encounters through WiFi By: Karim Keramat Jahromi Supervisor: Prof Adriano Moreira Co-Supervisor: Prof Filipe Meneses Oct 2013

Motivation  Analysis of Wi-Fi data for understanding Encounter Pattern can provide significant knowledge about human mobility patterns.  Human Mobility Modeling can be used in many application domain: Urban Planning, Social Science, Epidemiology, Network Communications.  In Network Communications, realistic human mobility models have an important role in simulations of wireless networks.  Understanding of nodal encounter patterns have important role in design of protocols and efficient deployment of mobile networks.

Objectives  Detecting Pairs Node Encounters.  Solution for Detecting and Smoothing Ping-Pong Events.  Analyzing Statistics of Pair Encounters.

 Physical encounters  Detecting Node Encounters

 Observed Encounters Encounters observed through the Wi-Fi network, using usage logs (RADIUS ) Definition of Encounter: two or more devices connected to the same AP simultaneously. Direct and Indirect Encounters

 Detecting Node Encounters  Challenges  Nodes aren’t necessarily associated with the geographically nearest AP.  Different devices have different aggressiveness for changing association with different APs.  Ping-Pong Events.  Overlap among coverage areas of different APs.

 Detecting Node Encounters  Related Work  “On Nodal Encounter Patterns in Wireless LAN Traces”, Nov 2010, by Ahmad Helmy: Analyzing multiple wireless LAN traces from university and corporate campuses Looking for understanding encounter patterns using graph analyzing approach  “On Modeling of User Associations in Wireless LAN Traces on University Campuses”, April 2006, by Ahmad Helmy: Study Large scale data Trace Proposing metrics for describing Individual Mobile Node behavior

 Detecting Node Encounters  Wi-Fi Data Set idacessoTimestampAcct_Session_IdAPSTAAcct_Session_TimeAcct_Status_Type /1/2011 0: Mac 1Mac 7NULLStart /1/2011 0: B8Mac 2Mac 8NULLStart /1/2011 0: BBMac 3Mac 894Stop /1/2011 0:009554Mac 4Mac 959Stop /1/2011 0: CBMac 5Mac 10NULLStart /1/2011 0:000000BCD2Mac 6Mac 1061Stop Anonymized part of Wi Fi Trace

 Detecting Node Encounters  Workflow for finding Pairs Encounters

 Detecting Node Encounters idacessoTimestampAcct_Session_IdAPSTA Access Session Time[s] Acct_Status_Type Start TimeEnd Time /1/2011 0:00: Mac 1Mac 6 94stop :58: :00: /1/2011 0:00: B8 Mac 2Mac 7 59stop :59: :00: /1/2011 0:00: BB Mac 3Mac 8 61Stop :59: :00: /1/2011 0:00: Mac 4Mac Stop :33: :00: /1/2011 0:00: CB Mac 5Mac stop :43: :00:25 Anonymzed Part of Wi-Fi Trace after filtering and adding start time

 Detecting and Smoothing Ping-Pong Events  Detecting Ping-Pong Events  Frequent Change in APs association.  Transition Time should be short ( as threshold).  Short Access Session Time ( as threshold ).

 Detecting and Smoothing Ping-Pong Events  Detecting Ping-Pong Events Flag Ping-PongSTAAP_Primary Access Session Time[s] Start TimeEnd Time 0Mac 1Mac :38: :38:08 0Mac 1Mac :55: :55:47 1Mac 1Mac :55: :55:53 1Mac 1Mac :55: :56:04 1Mac 1Mac :56: :56:08 1Mac 1Mac :56: :56:22 0Mac 1Mac :56: :44:28

 Detecting and Smoothing Ping-Pong Events  Smoothing Ping-Pong Events  Non Ping-Pong APs are kept unchanged.  APs which involves in Ping-Pong Intervals, will be replaced by one of nearest Non Ping-Pong APs based on max Access Session Time and/or summation Access Session Time in Ping-Pong Interval.

 Detecting Node Encounters  Finding Pair Encounters APSTA_ASTA_BEncounter Start TimeEncounter End Time Mac-1Mac-3Mac :40: :02:17 Mac-1Mac-3Mac :02: :39:34 Mac-2Mac-4Mac :37: :38:41 Mac-2Mac-5Mac :14: :09:00 Mac-2Mac-6Mac :17: :17:19 Mac-2Mac-6Mac :42: :42:32 Anonymized part of Pair Encounter List  Algorithm for finding pair encounters is based on common definition of Pairs Encounters but after Smoothing Ping-Pong.  Usually the number of Pair Encounters is larger than the initial number of Wi-Fi observations (after filtering).

 Detecting Node Encounters  Merged Pairs Encounters APSTA_ASTA_BEncounter Start TimeEncounter End Time Merged Encounter Start Time Merged Encounter End Time MAC-1 MAC-2MAC :50: :50: :50: :50:43 MAC-1 MAC-2MAC :06: :07: :06: :09:02 MAC-1 MAC-2MAC :07: :08:01NULL MAC-1 MAC-2MAC :08: :08:27NULL MAC-1 MAC-2MAC :08: :09:02NULL MAC-1 MAC-2MAC :09: :10: :09: :46:19 MAC-1 MAC-2MAC :10: :10:37NULL MAC-1 MAC-2MAC :10: :11:28NULL MAC-1 MAC-2MAC :11: :28:30NULL MAC-1 MAC-2MAC :28: :36:04NULL MAC-1 MAC-2MAC :36: :46:19NULL MAC-1 MAC-2MAC :46: :52: :46: :53:15 Anonymized part of merged Pair Encounter List

 Detecting Node Encounters  Choosing values for time Thresholds Time Threshold[s]Number of Ping- Pong events Number of distinct APs in WiFi trace Number of distinct APs in encounters list Number of encounters / variation after smoothing (%) Without smoothing ( ) ,

 Statistics of Pair Encounters Contact Time Inter- Contact Time an inter-contact time a contact time STA-a STA-b STA-a STA-b STA-a STA-b STA-a STA-b Time Comparison of Contact Time distributions for a specific pair of nodes. Comparison of Aggregate Contact Time distributions.

 Statistics of Pair Encounters  Inter- Contact Time Comparison of Inter Contact Time distributions for a specific pair of nodes. Comparison of Aggregate Inter Contact Time distributions.

 Statistics of Pair Encounters Comparison of Aggregate Inter Contact Time distributions. Inter Contact Time Distributions for a few pairs of nodes with different number of encounter events (3 months).  Aggregate Encounter Distribution isn’t always representative of Pair Encounter Distribution.

 Scale Free behavior  Main properties of human mobility indicate Scale behavior on temporal dimension. Aggregate Inter Contact Time Distributions on different observation periods.Aggregate Contact Time Distributions on different observation periods.

 Next Step  Analysis Periodicity in Pair Encounters  Transform List of Pair Encounters into Time Series  Analyze periodicity by applying power spectral analysis (autocorrelation (ACF)+ Fourier Analysis )  Calculating of Encounters by considering overlap coverage areas.  Strategies for calculating number of encounters

 Conclusion  Power law trends illustrate heterogeneity in human movement characteristics.  Human Mobility Connectivity properties show scale free behavior on temporal dimension.  Aggregate Encounter Distribution isn’t always representative of Pair Encounter Distribution.

 Questions and Suggestions Thank You