A Location-based Management System for Enterprise Wireless LANS Ranveer Chandra, Jitendra Padhye, Alec Wolman, Brian Zill Microsoft Research, NSDI 2007.

Slides:



Advertisements
Similar presentations
Enterprise Wireless LAN (WLAN) Management and Services
Advertisements

1 DAIR: Dense Array of Inexpensive Radios Managing Enterprise Wireless Networks Using Desktop Infrastructure Victor Bahl, Jitendra Padhye, Lenin Ravnindranath,
Overview How to crack WEP and WPA
Rohan Murty Harvard University Jitendra Padhye, Ranveer Chandra, Alec Wolman, and Brian Zill Microsoft Research 1.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
CONFIDENTIAL © Copyright Aruba Networks, Inc. All rights reserved AOS & CPPM INTEGRATION CONFIGURATION & TESTING EAP TLS & EAP PEAP by Abilash Soundararajan.
Service Manager Service Desk Overview
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
RANSAC experimentation Slides by Marc van Kreveld 1.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Software Quality Engineering Roadmap
More routing protocols Alec Woo June 18 th, 2002.
CS351 © 2003 Ray S. Babcock Cost Estimation ● I've got Bad News and Bad News!
Advancing Wireless Link Signatures for Location Distinction J. Zhang, M. H. Firooz, N. Patwari, S. K. Kasera MobiCom’ 08 Presenter: Yuan Song.
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
1 DAIR: Dense Array of Inexpensive Radios Managing Enterprise Wireless Networks Using Desktop Infrastructure Victor Bahl †, Jitendra Padhye †, Lenin Ravnindranath.
A second example of Chi Square Imagine that the managers of a particular factory are interested in whether each line in their assembly process is equally.
Challenges: Device-free Passive Localization for Wireless Environments Moustafa Youssef, Matthew Mah, Ashok Agrawala University of Maryland College Park.
Cluster Analysis (1).
Ivy Equipment Inventory System Jaein Jeong Barbara Hohlt Kris Pister.
A Location-Based Management System for Enterprise Wireless LANs Ranveer Chandra, Jitendra Padhye, Alec Wolman and Brian Zill Microsoft Research.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
RADAR: An In-Building RF-Based User Location and Tracking system Paramvir Bahl and Venkata N. Padmanabhan Microsoft Research Presented by: Ritu Kothari.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
CARROM: Client Association, Rate and Redundancy Optimization for Wi-Fi Multicast Vishnu Navda, Ram Ramjee, Lenin Ravindranath (MSR India) Ranveer Chandra,
Ch. 5 – Access Points. Overview Access Point Connection.
Wi-Fi Neighborcast: Enabling communication among nearby clients
Extracting Places and Activities from GPS Traces Using Hierarchical Conditional Random Fields Yong-Joong Kim Dept. of Computer Science Yonsei.
Indoor Localization using Wireless LAN infrastructure Location Based Services Supervised by Prof. Dr. Amal Elnahas Presented by Ahmed Ali Sabbour.
Wireless and Security CSCI 5857: Encoding and Encryption.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Towards Highly Reliable Enterprise Network Services via Inference of Multi-level Dependencies Paramvir Bahl, Ranveer Chandra, Albert Greenberg, Srikanth.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
WiFiProfiler: Cooperative Diagnosis in Wireless LANs Ranveer Chandra, Venkat Padmanabhan, Ming Zhang Microsoft Research.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
1 Architecture and Techniques for Diagnosing Faults in IEEE Infrastructure Networks Atul Adya, Victor Bahl, Ranveer Chandra, Lili Qiu Microsoft.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
1 Motivation Web query is usually two or three words long. –Prone to ambiguity –Example “keyboard” –Input device of computer –Musical instruments How can.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Relative Location Estimation on Wireless Environment 2005 Fall CS492 - Term Project CS492 Team 6 안국진, 이혁준.
Opportunistic Use of Client Repeaters to Improve Performance of WLANs Victor Bahl 1, Ranveer Chandra 1, Patrick P. C. Lee 2, Vishal Misra 2, Jitendra Padhye.
Accuracy Characterization for Metropolitan-scale Wi-Fi Localization Yu-Chung Cheng (UCSD, Intel Research) Yatin Chawathe (Intel Research) Anthony LaMarca.
Enhancing the Security of Corporate Wi-Fi Networks Using DAIR Paramvir Bahl, Ranveer Chandra, Jitendra Padhye, Lenin Ravindranath, Manpreet Singh, Alec.
Recognizing Action at a Distance Alexei A. Efros, Alexander C. Berg, Greg Mori, Jitendra Malik Computer Science Division, UC Berkeley Presented by Pundik.
Designing for High Density Wireless LANs Last Update Copyright Kenneth M. Chipps Ph.D.
802.11n Sniffer Design Overview Vladislav Mordohovich Igor Shtarev Luba Brouk.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Solving the Security Risks of WLAN Tuukka Karvonen
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
1 Software Quality Engineering. 2 Quality Management Models –Tools for helping to monitor and manage the quality of software when it is under development.
I Am the Antenna Accurate Outdoor AP Location Using Smartphones Zengbin Zhang†, Xia Zhou†, Weile Zhang†§, Yuanyang Zhang†, Gang Wang†, Ben Y. Zhao† and.
MIMO: Challenges and Opportunities Lili Qiu UT Austin New Directions for Mobile System Design Mini-Workshop.
Clustering Algorithms Sunida Ratanothayanon. What is Clustering?
Networking Components Assignment 3 Corbin Watkins.
Resolve today’s IT management dilemma Enable generalist operators to localize user perceptible connectivity problems Raise alerts prioritized by the amount.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Impact Research 1 Deploying Wireless LANs for Business Benefit Summary Document.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Avoiding Multipath to Revive Inbuilding WiFi Localization
ITMT 1371 – Window 7 Configuration 1 ITMT Windows 7 Configuration Chapter 8 – Managing and Monitoring Windows 7 Performance.
Virtual Local Area Networks In Security By Mark Reed.
Doc.: IEEE /457 Submission May 2003 Hart/Ryan/Skellern CiscoSlide 1 Use of EVM to Measure Rx Output Signal Quality Brian Hart, Phil Ryan, David.
Securing A Wireless Network
Wireless Network Security
Enhancing the Security of Corporate Wi-Fi Networks Using DAIR
CIS 4930/6930, Spring 2018 Experiment 1: Encounter Tracing using Bluetooth Due Date: Feb 19, beginning of class Ph.D. student lead: Mimonah Al-Qathrady.
Shashika Biyanwila Research Engineer
Presentation transcript:

A Location-based Management System for Enterprise Wireless LANS Ranveer Chandra, Jitendra Padhye, Alec Wolman, Brian Zill Microsoft Research, NSDI 2007

Motivation Location information in WLAN management tool Helpful to address: – Is AP placement adequate? – Any areas that clients consistently experience poor performance? – How does distance affect a client’s performance? – Any areas that have no coverage?

System Architecture

Air Monitors: packet logging and filtering Database: storage of summaries of data Inference engine: does complex data analysis and answers management questions

System Design Determining AirMonitor location – Use login history to determine the primary user – Get the location of AirMon based on user-office # mapping – Security and privacy? Locating a Transmitter: – StrongestAM – Centroid – Spring-and-ball AP tracking, each AirMon is assigned to track the 3 nearest Aps Address matching: Determine who sent what data

StrongestAM Given the start and end time and sender MAC address, find out the avg RSSI seen by each AirMon for that transmitter Report the location of the AirMon as the location of the client Disadvantages: – Fluctuations make it impossible to pick strongest AirMom without ambiguity

Centroid Choose all AirMons within 15% of the strongest AirMon and the center of all these AirMons No AirMons within 15%, then choose the location of the strongest AirMon Not affected by fluctuation in the RSSI Disadvantage: the placement of AirMons is all on one side, a significant error

Spring-and-Ball Each AirMon broadcasts probes for the others to compute avg RSSI; a profile is then generated for each AirMon that captures the RSSI-distance relationship Use Centroid to get the approximate location of the transmitter Compute the difference bet. the estimated RSSI and the actual RSSI observed by each AirMon

Spring-and-Ball (cont.) Each difference is a force, sign signifies whether the “spring” is compressed or stretched Compute the cumulative force of all these force vectors Move the estimated location by a small distance Recalculate the cumulative force until: – 5000 iterations have elapsed – The magnitude of the error falls below 0.1 – The force at the new location exceeds by 10% the min force seen so far Take the location that generates the min force

Spring-and-Ball (cont.) Overcome the key limitation of Centroid algorithm, i.e., all AirMons are on one side Issues: – Frequency of profiling – Do time-of-day effects create significant errors? – What type of curve to fit the data?