skip to main content
10.1145/1555816.1555830acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

Wifi-reports: improving wireless network selection with collaboration

Published:22 June 2009Publication History

ABSTRACT

Wi-Fi clients can obtain much better performance at some commercial hotspots than at others. Unfortunately, there is currently no way for users to determine which hotspot access points (APs) will be sufficient to run their applications before purchasing access. To address this problem, this paper presents Wifi-Reports, a collaborative service that provides Wi-Fi clients with historical information about AP performance and application support. The key research challenge in Wifi-Reports is to obtain accurate user-submitted reports. This is challenging because two conflicting goals must be addressed in a practical system: preserving the privacy of users' reports and limiting fraudulent reports. We introduce a practical cryptographic protocol that achieves both goals, and we address the important engineering challenges in building Wifi-Reports. Using a measurement study of commercial APs in Seattle, we show that Wifi-Reports would improve performance over previous AP selection approaches in 30%-60% of locations.

References

  1. Amazon elastic compute cloud. http://aws.amazon.com/ec2/. Accessed on 03/Google ScholarGoogle Scholar
  2. Broadband reports. http://www.dslreports.com/.Google ScholarGoogle Scholar
  3. Http analyzer. http://www.ieinspector.com/httpanalyzer/.Google ScholarGoogle Scholar
  4. Illegal sale of phone records. http://epic.org/privacy/iei/.Google ScholarGoogle Scholar
  5. iPass. http://www.ipass.com.Google ScholarGoogle Scholar
  6. Jiwire. http://www.jiwire.com.Google ScholarGoogle Scholar
  7. Skyhook wireless. http://www.skyhookwireless.com/.Google ScholarGoogle Scholar
  8. Speedtest.net. http://www.speedtest.net/.Google ScholarGoogle Scholar
  9. Wireless geographic logging engine. http://www.wigle.net/.Google ScholarGoogle Scholar
  10. You can't send secure email from starbuck's (at least not easily). http://staff.washington.edu/oren/blog/2004/04/you-cant-send-s.html.Google ScholarGoogle Scholar
  11. Fraud and related activity in connection with access devices. Homeland Security Act (18 U.S.C. §1029), 2002.Google ScholarGoogle Scholar
  12. Wireless location tracking draws privacy questions. CNET News.com, May 2006. http://news.com.com/ Wireless+location+tracking+draws+privacy+questions/ 2100-1028 3-6072992.html.Google ScholarGoogle Scholar
  13. T. Abdelzaher, Y. Anokwa, P. Boda, J. Burke, D. Estrin, L. Guibas, A. Kansal, S. Madden, and J. Reich. Mobiscopes for human spaces. IEEE Pervasive Computing, 6(2):20--29, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. G. Adomavicius and A. Tuzhilin. Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Trans. on Knowl. and Data Eng., 17(6):734--749, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. L. Balzano and R. Nowak. Blind calibration of sensor networks. In IPSN, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. Bellare, C. Namprempre, D. Pointcheval, and M. Semanko. The one-more-rsa-inversion problems and the security of chaum's blind signature scheme. Journal of Cryptology, 16(3):185--215, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  17. A. R. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46--55, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Canny. Collaborative filtering with privacy. In IEEE Security and Privacy, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Canny. Collaborative filtering with privacy via factor analysis. In SIGIR, New York, NY, USA, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. D. Chaum. Blind signatures for untraceable payments. In Advances in Cryptology, pages 199--203. Springer-Verlag, 1982.Google ScholarGoogle Scholar
  21. D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In CRYPTO, pages 319--327, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin, and N. Triandopoulos. Anonysense: privacy-aware people-centric sensing. In MobiSys, pages 211--224, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In USENIX Security, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. C. Doctorow. Why hotel WiFi sucks. http://www.boingboing.net/2005/10/12/why-hotel-wifi-sucks.html, Oct. 2005.Google ScholarGoogle Scholar
  25. A. Fujioka, T. Okamoto, and K. Ohta. A practical secret voting scheme for large scale elections. In ASIACRYPT, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. B. Greenstein, D. McCoy, J. Pang, T. Kohno, S. Seshan, and D. Wetherall. Improving wireless privacy with an identifier-free link layer protocol. In MobiSys, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. M. Gruteser and B. Hoh. On the anonymity of periodic location samples. In Security in Pervasive Computing, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. D. Han, A. Agarwala, D. G. Andersen, M. Kaminsky, K. Papagiannaki, and S. Seshan. Mark-and-sweep: getting the "inside" scoop on neighborhood networks. In IMC, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. G. Judd and P. Steenkiste. Using emulation to understand and improve wireless networks and applications. In NSDI, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. A. Krause, E. Horvitz, A. Kansal, and F. Zhao. Toward community sensing. In IPSN, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. A. LaMarca, Y. Chawathe, S. Consolvo, J. Hightower, I. Smith, J. Scott, T. Sohn, J. Howard, J. Hughes, F. Potter, J. Tabert, P. Powledge, G. Borriello, and B. Schilit. Place lab: Device positioning using radio beacons in the wild. In Pervasive, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. A. J. Nicholson, Y. Chawathe, M. Y. Chen, B. D. Noble, and D. Wetherall. Improved access point selection. In MobiSys, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. J. Pang, B. Greenstein, D. Mccoy, S. Seshan, and D. Wetherall. Tryst: The case for confidential service discovery. In HotNets, 2007.Google ScholarGoogle Scholar
  34. R. S. Prasad, M. Murray, C. Dovrolis, and K. Claffy. Bandwidth estimation: Metrics, measurement techniques, and tools. IEEE Network, 17:27--35, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. N. B. Salem, J.-P. Hubaux, and M. Jakobsson. Reputation-based Wi-Fi deployment protocols and security analysis. In WMASH, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. K. Sundaresan and K. Papagiannaki. The need for cross-layer information in access point selection algorithms. In IMC, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. United States Census Bureau. Table 1: Annual estimates of the population for incorporated places over 100,000. 2007. http://www.census.gov/popest/cities/tables/SUB-EST2007-01.csv.Google ScholarGoogle Scholar
  38. S. Vasudevan, K. Papagiannaki, C. Diot, J. Kurose, and D. Towsley. Facilitating access point selection in IEEE 802.11 wireless networks. In IMC, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. K. Walsh and E. G. Sirer. Experience with an object reputation system for peer-to-peer filesharing. In NSDI, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. SybilLimit: A near-optimal social network defense against sybil attacks. In IEEE Security and Privacy, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. H. Yu, C. Shi, M. Kaminsky, P. B. Gibbons, and F. Xiao. DSybil: Optimal sybil-resistance for recommendation systems. In IEEE Security and Privacy, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Wifi-reports: improving wireless network selection with collaboration

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MobiSys '09: Proceedings of the 7th international conference on Mobile systems, applications, and services
      June 2009
      370 pages
      ISBN:9781605585666
      DOI:10.1145/1555816

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 June 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate274of1,679submissions,16%

      Upcoming Conference

      MOBISYS '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader