首页> 外文会议>2013 10th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks >Toward optimal sniffer-channel assignment for reliable monitoring in multi-channel wireless networks
【24h】

Toward optimal sniffer-channel assignment for reliable monitoring in multi-channel wireless networks

机译:寻求最佳嗅探器信道分配,以便在多信道无线网络中进行可靠的监视

获取原文
获取原文并翻译 | 示例

摘要

This paper studies the optimal sniffer-channel assignment for reliable monitoring in multi-channel wireless networks. This problem concerns how to deploy certain sniffers in a network (and tune their channels) so that they can overhear and verify communication among the other nodes, referred to as normal nodes. Prior works have studied the optimal sniffer-channel assignment, but they assume perfect sniffers. However, in practice, sniffers may probabilistically make errors in monitoring, e.g., due to poor reception and compromise by an adversary. Hence, to maintain acceptable monitoring quality, a node needs to be overheard by multiple sniffers. We show that the optimal sniffer-channel assignment with sniffer redundancy differs fundamentally from the previous works due to the absence of a desirable property called submodularity. As a result, in our problem, the prior approximation algorithms no longer maintain their performance guarantees. We propose a variety of approximation algorithms based on two approaches—greedy strategy and relaxation-and-rounding approach. We present an empirical performance analysis of the proposed algorithms through simulations in practical networks. Our results suggest that our two algorithms show a performance trade-off between coverage and running time and are therefore suitable for different kinds of deployment.
机译:本文研究了用于在多信道无线网络中进行可靠监视的最佳嗅探器信道分配。此问题与如何在网络中部署某些嗅探器(以及调整其通道)有关,以便它们可以监听和验证其他节点(称为普通节点)之间的通信。先前的工作已经研究了最佳的嗅探器通道分配,但是它们假定了完美的嗅探器。然而,实际上,例如由于接收者的不良接收和对手的妥协,嗅探者可能会在监视中出错。因此,为了维持可接受的监视质量,一个节点需要被多个监听器窃听。我们表明具有嗅探器冗余的最优嗅探器信道分配与先前的工作根本不同,这是由于缺少称为子模数的理想属性。结果,在我们的问题中,现有的近似算法不再保持其性能保证。我们基于两种方法(贪婪策略和松弛和舍入方法)提出了多种近似算法。通过在实际网络中的仿真,我们对提出的算法进行了实证性能分析。我们的结果表明,我们的两种算法显示出覆盖范围和运行时间之间的性能折衷,因此适用于不同类型的部署。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号