The Importance of Being Wireless - PowerPoint PPT Presentation

1 / 91
About This Presentation
Title:

The Importance of Being Wireless

Description:

The Importance of Being Wireless Romit Roy Choudhury – PowerPoint PPT presentation

Number of Views:122
Avg rating:3.0/5.0
Slides: 92
Provided by: romit1
Category:

less

Transcript and Presenter's Notes

Title: The Importance of Being Wireless


1
The Importance of Being Wireless
Romit Roy Choudhury
2
The Context
  • The edge of the internet becoming wireless
  • 167,000 hotspots by 2008 end GartnerSurvey06
  • 75 million user base
  • Mesh extensions offered VoIP in rural regions
  • Future predictions are unanimously positive
  • Mobile phone sales will soon surpass computers
  • OLPC Wireless will bridge the digital divide
  • The Vision
  • Lets make wireless like electricity
  • Let everyone take it for granted

3
Wireless Networking Mobile Computing
Internet
Offering information access anytime, anywhere
Mesh Networks
Personal Networks
RFID, Sensors Networks
4
Miles To Go
Mobile Social Apps
Localization
Application
Privacy
Security
Eavesdropping
Loss Discrimination
Transport
Mobility
Network
Energy Savings
MAC / Link
Spatial Reuse
Interference Mgmt.
PHY
Channel fluctuations
5
Webpage
http//synrg.ee.duke.edu
SyNRG
6
Our Research
Application Driven Research (top down)
Application
Security
Transport
Network
MAC / Link
PHY
Exploiting PHY Layer Capabilities (bottom up)
7
Selected Projects
Shuffle
Micro-Blog
Mobile Computing
Wireless Networking
Spotlight
Mingle
8
Selected Projects
Shuffle
Micro-Blog
Mobile Computing
Wireless Networking
Spotlight
Mingle
9
  • Spotlight
  • Exploiting Smart Antennas for Wireless Networks

10
Wireless Networking Mobile Computing
Internet
Offering information access anytime, anywhere
Mesh Networks
Personal Networks
RFID, Sensors Networks
11
Omnidirectional Antennas
12
IEEE 802.11 with Omni Antenna
silenced
M
Interference management A crucial challenge
for dense multihop networks
S
Data
D
ACK
silenced
X
K
silenced
13
Managing Interference
  • Several approaches
  • Dividing network into different channels
  • Power control
  • Rate Control

Recent Approach Exploiting antenna capabilities
to improve the performance of wireless multihop
networks
14
From Omni Antennas (Bulbs)
silenced
M
S
D
silenced
X
K
silenced
15
To Beamforming Antennas (Spotlights)
M
S
D
X
K
16
To Beamforming Antennas (Spotlights)
M
S
D
X
K
17
However
Throughput (Kbps)
Sending Rate (Kbps)
18
Selected Projects
Shuffle
Micro-Blog
Mobile Computing
Wireless Networking
Spotlight
Mingle
19
  • Shuffle
  • A New Way to Cope with Wireless Interference

20
Successive Interference Cancellation (SIC)
  • State of the art allows only one reception
  • The stronger one
  • SIC enables a receiver to receive both signals
  • Stronger signal decoded and subtracted
  • Residual signal decoded from the residue

21
SIC based WLANs
  • Existing schemes require SINR gt ?
  • Game of out-shouting each other
  • SIC offers payoff if transmitter
  • Either out-shouts or whispers
  • Fundamental changes for protocol design

22
MIM SIC
  • Ongoing work on GNU radios
  • SIC MIM implementation can enable protocols

23
Wireless BEN
  • Questions / thoughts
  • Should BEN venture into the wireless world
  • Or is that something to build once we have the
    wired infrastructure
  • Wireless networks have several interdependences
    with wired backend
  • Important to take these issues during system
    design
  • BEN has the potential to become one such system
  • Wireless network management critical
  • Wired network management tools/expertise is a new
    opportunity
  • Can BEN be the bridge between research prototype
    and real deployments
  • Disaster relief
  • Rural internet access
  • Healthcare and education

24
Selected Projects
Shuffle
Micro-Blog
Mobile Computing
Wireless Networking
Spotlight
Mingle
25
  • Mingle
  • Exploiting Social Behavior for Routing in
  • Delay Tolerant Networks

26
Delay Tolerant Networks
  • Exploit mobility as an opportunity
  • When wireless connection unavailable

27
Selected Projects
Shuffle
Micro-Blog
Mobile Computing
Wireless Networking
Spotlight
Mingle
28
  • Virtual Information Telescope

29
Context
  • Next generation mobile phones will have
  • large number of sensors
  • Cameras, microphones, accelerometers, GPS,
  • compasses, health monitors,

30
Context
  • Each phone may be viewed as
  • a micro lens
  • Exposing a micro view of the physical world
  • to the Internet

31
Context
  • With 3 billion active phones
  • in the world today
  • (the fastest growing comuting platform )
  • Our Vision is

32
A Virtual Information Telescope
Internet
33
  • One instantiation of this vision through
  • a system called Micro-Blog

- Content sharing - Content querying - Content
floating
34
Content Sharing
Virtual Telescope
Web Service
Cellular, WiFi
Visualization Service
People
Phones
Physical Space
35
Content Querying
Virtual Telescope
Web Service
Cellular, WiFi
Visualization Service
People
Phones
Physical Space
36
Content Floating on physical space
superb sushi
Safe_at_ Nite?
37
  • If designed carefully, a variety of
  • applications may emerge on Micro-Blog

38
Applications
  • Tourism
  • View multimedia blogs query for specifics
  • Micro Reporters
  • News service with feeds from individuals
  • On-the-fly Ride Sharing
  • Ride givers advertize intension w/ space-time
    sticky notes
  • Respond to sticky notes once you arrive there
  • Negotiate deal on third party server
  • Virtual order on physical disorder
  • Land in a new place, and get step by step
    information on your mobile

39
  • Micro-Blog Beta live at
  • http//synrg.ee.duke.edu/microblog.html

40
Prototype
41
Thoughts
  • Micro-Blog
  • Rich space for applications and services

42
  • Several research challenges and opportunities
  • Energy-efficient localization
  • Symbolic localization through ambience sensing
  • Location privacy
  • Incentives
  • Spam
  • Information distillation
  • User Inerfacing

Our Research
43
  • Problem I
  • Energy Efficient Localization
  • (EnLoc)

44
To GPS or not to GPS
  • GPS is popular localization scheme
  • Good error characteristics 10m
  • Apps naturally assume GPS
  • Shockingly, first Micro-Blog demo lasted lt 10
    hours

45
Cost of Localization
  • Performed extensive measurements
  • GPS consumes 400 mW, AGPS marginally better
  • Idle power consumption 55 mW

46
Alternate Localization
  • WiFi fingerprinting, GSM triangulation
  • Place Lab, SkyHook
  • Improved energy savings
  • WiFi 20 hours
  • GSM 40 hours
  • At the cost of accuracy
  • 40m
  • 400m

47
Tradeoff Summary
40
20
400
48
Formulation
L(t2) L(t3) L(t4)
L(t0)
L(t1)
L(t6)
L(t5)
L(t7)
Error
t0
t1
t2
t3
t4
t5
t6
t6
Given energy budget, E, Trace T, and location
reading costs, egps , ewifi , egsm Schedule
location readings to minimize avg. error
49
Dynamic Program
  • Minimize the area under the curve
  • By cutting the curve at appropriate points
  • Number of (GPS WiFi GSM) cuts must cost lt
    budget

50
  • Offline optimal offers lower bound on error
  • Online algorithm necessary
  • Online optimal difficult
  • Need to design heuristics

51
Our Approach
  • Do not invest energy if you can
  • predict (even partially)

52
Predictive Heuristics
  • Prediction opportunities exist
  • Exploit habitual mobility patterns / inertia
  • Population distribution can be leveraged
  • Prediction also incorporated into Dynamic Program
  • Optimal computed on a given predictor

Error
Prediction generates different error curve
t0
t1
t2
t3
t4
t5
t6
t6
53
1. Simple Interpolation
  • Take GPS reading, followed by WiFi
  • Extrapolate GPS in the direction of WiFi
  • Reset prediction after threshold time, take GPS
    again

54
2. Mobility Profiling
  • Build logical mobility tree per-user
  • Each link an uncertainty point (UP)
  • Sample location only when uncertain
  • Location predictable between UPs
  • Exploit acclerometers
  • Predict traffic turns
  • Periodically localize to reset errors

55
3. Exploit Group Behavior
  • Characterize how masses behave at uncertainties
  • Example At traffic intersections
  • Predict individual mobility based on mass behavior

Goodwin Green U-Turn Straight Right Left
E on Green 0 0.881 0.039 0.078
W on Green 0 0 0.596 0.403
N on Goodwin 0 0.640 0.359 0
S on Goodwin 0 0.513 0 0.486
56
Buy Accuracy with Energy
  • Comparison of optimal with simple interpolation
  • GPS clearly not the right choice

57
Thoughts
  • Localization cannot be taken for granted
  • Critical tradeoff between energy and accuracy
  • Substantial room for saving energy
  • While sustaining reasonably good accuracy
  • However, physical localization
  • May not be the way to go
  • Several motivations to pursue symbolic
    localization

58
  • Problem/Opportunity 2
  • Symbolic localization via ambience sensing
  • (SurroundSense AAMPL)

59
Symbolic Localization
  • Services may not care about physical location
  • Symbolic location often sufficient
  • E.g., coffee shop, movie, park, in-car
  • Physical to Symbolic conversion possible
  • Lookup location name based on GPS coordinate
  • However, risky

Walmart
Starbucks
GPS Error range
60
Our Approach
  • Build symbolic localization algorithms
  • Use low accuracy physical localization as
    baseline
  • Low accuracy conserves energy

61
SurroundSense
  • Sense ambient light, sound, colors
  • Combine sensor readings to generate soft
    fingerprint
  • For localization, gather fingerprint from mobile
  • Match with database of fingerprints
  • Of course, fingerprint may not be globally unique
  • Use rough physical localization as a pre-filter

GSM physical location says you are in the
mall SurroundSense augments that with you are
in Apple Store
62
SurroundSense Design
  • Prototype on Tmote Invent sensors
  • Sound and light sensors
  • Low acoustic frequency range 20, 250 Hz
  • Currently porting on Nokia N95 phones

63
Fingerprint Extraction
  • Light intensity and sound signals recorded
  • Fourier transform on sound
  • Overlapping frequency blocks generated
  • Each block 23 bands, 10 Hz each
  • Extract simple features
  • Each 10 Hz band one feature
  • Variance of each band another feature
  • Normalized light intensity another feature
  • Total - 48 features
  • Train the system with half the data
  • 48 dimensional fingerprint

64
Fingerprint Generation and Matching
  • Match test fingerprint with trained database
  • Use Nearest Neighbor algorithm for
    classification

Feature Extract
Location
Feature Extract
48 features
65
Results
  • SurroundSense offers consistent localization
  • Database contains nearby shops in Duke campus
  • Both sensors gt sound gt light

Pairwise Similarity
66
  • Symbolic localization can be augmented with
  • phone accelerometers
  • Additional benefits in activity recognition

67
Hypothesis
  • Movement partially indicative of location
  • People sit in cafes
  • Run in gyms
  • Walk up/down aisles in grocery stores
  • Time duration spent may depend on location
  • Augment location accuracy with acc. signatures
  • Enable activity recognition as well
  • E.g., Advertize shoes to users running in the gym

68
AAMPL Classification
69
Evaluation
  • Gathered acc. signatures from many restaurants
  • Classified with AAMPL, compared with Google

Store Apple Wholefoods Journeys Solstice
Fast Food Chipotle Jimmy Johns
Restaurant Chais Verde Rockfish
70
Evaluation
  • AAMPL classified each location
  • Compared corresponding location with Google

71
Thoughts
  • Main Idea is that the surrounding is a
    fingerprint.
  • Effective for separating out nearby contexts.
  • In reality,
  • Spatially clustered shops are diverse by design
  • Aids AAMPL and SurroundSense

72
  • Problem 3
  • Location Privacy
  • (CacheCloak)

73
(3) Location Privacy
  • Location information reveals context
  • Thin line between utility and privacy
  • Pseudonymns
  • Effective only when infrequent querying from
    mobiles
  • Else, spatio-temporal patterns enough to
    deanonymize

Leslie
Jack
John
Susan
Alex
Romits Office
74
Location Privacy
  • K-anonymity
  • Convert location to a space-time bounding box
  • Ensure K users in the box
  • Location Service (LS) replies to the boxed region
  • Issues
  • Not real-time
  • Poor quality of location
  • Degrades in sparse regions

Bounding Box
You
K4
75
Confusion Privacy
  • Mixing or Cloaking users in space-time
  • Can offer good QoL
  • Issues
  • Users need to be present in same space-time
    location
  • Else, cloaking needs to be performed post priori

?
A
?
B
76
Our Objective
  • Real-time,
  • high QoL,
  • entropy guarantees,
  • even in sparse populations

77
Our Approach
  • Exploit mobility prediction to deliberately
  • create mix zones
  • Accurate locations can be revealed
  • that are all confusing to adversary

78
CacheCloak
  • Assume trusted privacy provider
  • Reveal location to CacheCloak
  • CacheCloak exposes anonymized location to LS

Loc. App1
Loc. App2
Loc. App3
Loc. App4
CacheCloak
79
CacheCloak Design
  • User A drives down path P1
  • P1 is a sequence of locations
  • CacheCloak has cached response for each location
  • User A takes a new turn (no cached response)
  • CacheCloak predicts mobility
  • Deliberately intersects predicted path with other
    path (P2)
  • Exposes predicted path to application
  • Application must reply to queries for entire path
  • Application/adversary confused
  • New path emanates from both P1 and P2
  • Not clear where the user came from

80
Example
81
Quantifying Privacy
  • City converted into grid of small sqaures
    (pixels)
  • Users are located at a pixel at a given time
  • Each pixel associated with 8x8 matrix
  • Element (i, j) probability that user enters i
    and exits j
  • Probabilities diffuse
  • At intersections
  • Over time
  • Privacy entropy

j
i
pixel
82
Diffusion
  • Probability of users presence diffuses
  • Diffusion gradient computed based on history
  • i.e., what fraction of users take right turn at
    this intersection
  • When entropy needs to be increased
  • Generate spurious branches

Time t1
Time t2
Time t3
Road Intersection
83
CacheCloak Benefits
  • Real-time
  • Response ready when user arrives at predicted
    location
  • High QoL
  • Responses can be specific to location
  • Of course, high overhead due to many responses
  • Entropy guarantees
  • Entropy increases at traffic intersections
  • In low regions, desired entropy through false
    branching
  • Sparse population
  • Can be handled with dummy users

84
Evaluation
  • Trace based simulation
  • VanetMobiSim US Census Bureau trace data
  • Durham map with traffic lights, speed limits,
    etc.
  • Vehicles follow Google map paths
  • Performs collision avoidance

6km x 6km 10m x 10m pixel 1000 cars
85
Results
  • High average entropy
  • Quite insensitive to user density (good for
    sparse regions)
  • Minimum entropy reasonably high

86
Results
  • Length of predictions
  • Remains reasonably short
  • Overhead proportional to this length

87
Issues and Limitations
  • CacheCloak overhead
  • Application replies to lots of queries
  • However, overhead on wired infrastructure
  • Caching reduces this overhead significantly
  • CacheCloak assumes same, indistinguishable query
  • If user asks different query at each road segment
  • Overhead increases
  • Adaptive branching dummy users
  • Offer user-specified privacy guarantee

88
Closing Thoughts
  • Two nodes may intersect in space but not in time
  • Mixing not possible
  • Mobility prediction allows space-time
    intersections
  • Enables better privacy

89
Conclusion
  • The Virtual Information Telescope
  • A generalization of mobile, location
  • based, social computing
  • Just developing apps
  • Not enough
  • Many challenges
  • Energy
  • Localization
  • Privacy
  • Incentives, data distillation

Internet
90
Conclusion
  • Project Micro-Blog
  • Addressing the challenges systematically
  • Building a fully functional system with
    applications
  • The project snapshot as of today, includes

Micro-Blog Overall system and application EnLoc
Energy Efficient Localization SurroundSense
AAMPL Context aware localization CacheCloak
Location privacy via mobility prediction
91
  • Stay tuned for more at
  • http//synrg.ee.duke.edu
  • Thank You
Write a Comment
User Comments (0)
About PowerShow.com