ABSTRACT
Wi-Fi clients can obtain much better performance at some commercial hotspots than at others. Unfortunately, there is currently no way for users to determine which hotspot access points (APs) will be sufficient to run their applications before purchasing access. To address this problem, this paper presents Wifi-Reports, a collaborative service that provides Wi-Fi clients with historical information about AP performance and application support. The key research challenge in Wifi-Reports is to obtain accurate user-submitted reports. This is challenging because two conflicting goals must be addressed in a practical system: preserving the privacy of users' reports and limiting fraudulent reports. We introduce a practical cryptographic protocol that achieves both goals, and we address the important engineering challenges in building Wifi-Reports. Using a measurement study of commercial APs in Seattle, we show that Wifi-Reports would improve performance over previous AP selection approaches in 30%-60% of locations.
- Amazon elastic compute cloud. http://aws.amazon.com/ec2/. Accessed on 03/Google Scholar
- Broadband reports. http://www.dslreports.com/.Google Scholar
- Http analyzer. http://www.ieinspector.com/httpanalyzer/.Google Scholar
- Illegal sale of phone records. http://epic.org/privacy/iei/.Google Scholar
- iPass. http://www.ipass.com.Google Scholar
- Jiwire. http://www.jiwire.com.Google Scholar
- Skyhook wireless. http://www.skyhookwireless.com/.Google Scholar
- Speedtest.net. http://www.speedtest.net/.Google Scholar
- Wireless geographic logging engine. http://www.wigle.net/.Google Scholar
- You can't send secure email from starbuck's (at least not easily). http://staff.washington.edu/oren/blog/2004/04/you-cant-send-s.html.Google Scholar
- Fraud and related activity in connection with access devices. Homeland Security Act (18 U.S.C. §1029), 2002.Google Scholar
- Wireless location tracking draws privacy questions. CNET News.com, May 2006. http://news.com.com/ Wireless+location+tracking+draws+privacy+questions/ 2100-1028 3-6072992.html.Google Scholar
- T. Abdelzaher, Y. Anokwa, P. Boda, J. Burke, D. Estrin, L. Guibas, A. Kansal, S. Madden, and J. Reich. Mobiscopes for human spaces. IEEE Pervasive Computing, 6(2):20--29, 2007. Google ScholarDigital Library
- G. Adomavicius and A. Tuzhilin. Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Trans. on Knowl. and Data Eng., 17(6):734--749, 2005. Google ScholarDigital Library
- L. Balzano and R. Nowak. Blind calibration of sensor networks. In IPSN, 2007. Google ScholarDigital Library
- M. Bellare, C. Namprempre, D. Pointcheval, and M. Semanko. The one-more-rsa-inversion problems and the security of chaum's blind signature scheme. Journal of Cryptology, 16(3):185--215, 2003.Google ScholarCross Ref
- A. R. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46--55, 2003. Google ScholarDigital Library
- J. Canny. Collaborative filtering with privacy. In IEEE Security and Privacy, 2002. Google ScholarDigital Library
- J. Canny. Collaborative filtering with privacy via factor analysis. In SIGIR, New York, NY, USA, 2002. Google ScholarDigital Library
- D. Chaum. Blind signatures for untraceable payments. In Advances in Cryptology, pages 199--203. Springer-Verlag, 1982.Google Scholar
- D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In CRYPTO, pages 319--327, 1990. Google ScholarDigital Library
- C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin, and N. Triandopoulos. Anonysense: privacy-aware people-centric sensing. In MobiSys, pages 211--224, 2008. Google ScholarDigital Library
- R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In USENIX Security, 2004. Google ScholarDigital Library
- C. Doctorow. Why hotel WiFi sucks. http://www.boingboing.net/2005/10/12/why-hotel-wifi-sucks.html, Oct. 2005.Google Scholar
- A. Fujioka, T. Okamoto, and K. Ohta. A practical secret voting scheme for large scale elections. In ASIACRYPT, 1993. Google ScholarDigital Library
- B. Greenstein, D. McCoy, J. Pang, T. Kohno, S. Seshan, and D. Wetherall. Improving wireless privacy with an identifier-free link layer protocol. In MobiSys, 2008. Google ScholarDigital Library
- M. Gruteser and B. Hoh. On the anonymity of periodic location samples. In Security in Pervasive Computing, 2005. Google ScholarDigital Library
- D. Han, A. Agarwala, D. G. Andersen, M. Kaminsky, K. Papagiannaki, and S. Seshan. Mark-and-sweep: getting the "inside" scoop on neighborhood networks. In IMC, 2008. Google ScholarDigital Library
- G. Judd and P. Steenkiste. Using emulation to understand and improve wireless networks and applications. In NSDI, 2005. Google ScholarDigital Library
- A. Krause, E. Horvitz, A. Kansal, and F. Zhao. Toward community sensing. In IPSN, 2008. Google ScholarDigital Library
- A. LaMarca, Y. Chawathe, S. Consolvo, J. Hightower, I. Smith, J. Scott, T. Sohn, J. Howard, J. Hughes, F. Potter, J. Tabert, P. Powledge, G. Borriello, and B. Schilit. Place lab: Device positioning using radio beacons in the wild. In Pervasive, 2005. Google ScholarDigital Library
- A. J. Nicholson, Y. Chawathe, M. Y. Chen, B. D. Noble, and D. Wetherall. Improved access point selection. In MobiSys, 2006. Google ScholarDigital Library
- J. Pang, B. Greenstein, D. Mccoy, S. Seshan, and D. Wetherall. Tryst: The case for confidential service discovery. In HotNets, 2007.Google Scholar
- R. S. Prasad, M. Murray, C. Dovrolis, and K. Claffy. Bandwidth estimation: Metrics, measurement techniques, and tools. IEEE Network, 17:27--35, 2003. Google ScholarDigital Library
- N. B. Salem, J.-P. Hubaux, and M. Jakobsson. Reputation-based Wi-Fi deployment protocols and security analysis. In WMASH, 2004. Google ScholarDigital Library
- K. Sundaresan and K. Papagiannaki. The need for cross-layer information in access point selection algorithms. In IMC, 2006. Google ScholarDigital Library
- United States Census Bureau. Table 1: Annual estimates of the population for incorporated places over 100,000. 2007. http://www.census.gov/popest/cities/tables/SUB-EST2007-01.csv.Google Scholar
- S. Vasudevan, K. Papagiannaki, C. Diot, J. Kurose, and D. Towsley. Facilitating access point selection in IEEE 802.11 wireless networks. In IMC, 2005. Google ScholarDigital Library
- K. Walsh and E. G. Sirer. Experience with an object reputation system for peer-to-peer filesharing. In NSDI, 2006. Google ScholarDigital Library
- H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. SybilLimit: A near-optimal social network defense against sybil attacks. In IEEE Security and Privacy, 2008. Google ScholarDigital Library
- H. Yu, C. Shi, M. Kaminsky, P. B. Gibbons, and F. Xiao. DSybil: Optimal sybil-resistance for recommendation systems. In IEEE Security and Privacy, 2009. Google ScholarDigital Library
Index Terms
- Wifi-reports: improving wireless network selection with collaboration
Recommendations
Wifi-Reports: Improving Wireless Network Selection with Collaboration
Wi-Fi clients can obtain much better performance at some commercial hot spots than others. Unfortunately, there is currently no way for users to determine which hot spot access points (APs) will be sufficient to run their applications before purchasing ...
Extension of an Efficient 3GPP Authentication and Key Agreement Protocol
Recently, Zhang and Fang proposed a security analysis and enhancements of 3GPP authentication and key agreement protocol (AP-AKA for short). The enhancements of 3GPP authentication and key agreement protocol is proposed to improve some drawbacks of the ...
Virtual WiFi: bring virtualization from wired to wireless
VEE '11As virtualization trend is moving towards "client virtualization", wireless virtualization remains to be one of the technology gaps that haven't been addressed satisfactorily. Today's approaches are mainly developed for wired network, and are not ...
Comments