...
首页> 外文期刊>Computer networks >Reputation-based crowdsourced Wi-Fi topology discovery
【24h】

Reputation-based crowdsourced Wi-Fi topology discovery

机译:基于信誉的众包Wi-Fi拓扑发现

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

The ubiquity of Wi-Fi networks, coupled with their anarchic deployment, gives rise to the problem of accurately determining their topology in order to employ it for tuning and optimization. Knowledge of the Wi-Fi topology is particularly important for reconfiguration mechanisms, such as channel assignment and power control schemes, which depend on it to operate. Furthermore, with the advent of WLAN-based positioning schemes, the robustness of the spatial databases where wireless topology is encoded becomes crucial for the accuracy of the respective localization algorithms. In this work, we propose a scheme where monitoring the topology of Wi-Fi deployments is crowdsourced to mobile users, who submit reports about Wi-Fi coverage in their vicinity. However, users cannot be assumed trustworthy. They can engage in fraudulent reporting, which, unless specific countermeasures are in place, can severely impact one's view of the network topology. To this end, we have designed and implemented an architecture for accurate Wi-Fi topology discovery, devising a reputation-based mechanism to tackle realistic and simple to implement (and therefore potentially widespread) attacks. We show analytically and via simulation that, even in the presence of large numbers of attackers, our user-centric scheme significantly outperforms pure infrastructure-based approaches, where monitoring is carried out only by trusted Access Points. (C) 2015 Elsevier B.V. All rights reserved.
机译:Wi-Fi网络的普遍存在,再加上其无政府状态的部署,带来了准确确定其拓扑以便将其用于调整和优化的问题。 Wi-Fi拓扑的知识对于重新配置机制(例如,依赖于它进行操作的信道分配和功率控制方案)特别重要。此外,随着基于WLAN的定位方案的出现,对无线拓扑进行编码的空间数据库的鲁棒性对于各个定位算法的准确性变得至关重要。在这项工作中,我们提出了一种方案,其中监视Wi-Fi部署的拓扑是众包给移动用户的,移动用户提交有关其附近Wi-Fi覆盖范围的报告。但是,不能认为用户是可信赖的。他们可能参与欺诈性报告,除非采取了适当的对策,否则它们可能会严重影响人们对网络拓扑的看法。为此,我们设计并实现了一种用于精确Wi-Fi拓扑发现的体系结构,设计了一种基于信誉的机制来应对现实且易于实施(因此可能广泛存在)的攻击。我们通过分析和仿真显示,即使在存在大量攻击者的情况下,我们以用户为中心的方案也明显优于仅基于受信任的访问点进行监视的纯基于基础结构的方法。 (C)2015 Elsevier B.V.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号