Commit 42872f771f96aeea90f736e6998d3fc4ae9bb402

Authored by Geoffrey Challen
1 parent 20901b6d

Intro.

abstract.tex
... ... @@ -20,12 +20,12 @@
20 20 existing human relationships and can be maintained without elaborate
21 21 reputation mechanisms.
22 22  
23   - To evaluate the effectiveness of reciprocal \wifi{} sharing, we analyze
24   - 21~M \wifi{} scans collected from 254~smartphones over 5~months. Our
25   - results show that even in a sparsely-populated suburban area, reciprocal
26   - \wifi{} sharing is needed. And surprisingly, several reciprocal \wifi{}
27   - sharing opportunities exist even among our extremely-small sample of users.
28   - Motivated by these results, we present the design of \wisefi{}, a system
29   - enabling reciprocal \wifi{} sharing.
  23 + To evaluate the potential for reciprocal \wifi{} sharing, we analyze 21~M
  24 + \wifi{} scans collected from 254~smartphones over 5~months. Our results
  25 + show that even in a sparsely-populated suburban area, reciprocal \wifi{}
  26 + sharing can be beneficial. And surprisingly, we detected several reciprocal
  27 + \wifi{} sharing opportunities even within our tiny user sample. Motivated
  28 + by these results, we present the design of \wisefi{}, a system enabling
  29 + reciprocal \wifi{} sharing.
30 30  
31 31 \end{abstract}
... ...
introduction.tex
... ... @@ -14,7 +14,10 @@ other nearby private home APs.
14 14  
15 15 \begin{figure}[t]
16 16 %
17   - \includegraphics[width=\columnwidth]{./figures/motivation.pdf}
  17 + \centering
  18 + \includegraphics[width=0.9\columnwidth]{./figures/motivation.pdf}
  19 + %
  20 + %\vspace*{-0.1in}
18 21 %
19 22 \caption{\textbf{Example of Reciprocal \wifi{} Sharing.} Solid arrows
20 23 represent weak connections, while dashed lines represent strong
... ... @@ -22,60 +25,54 @@ other nearby private home APs.
22 25 %
23 26 \label{fig:motivation}
24 27 %
  28 + \vspace*{-0.1in}
25 29 \end{figure}
26 30  
27 31 Unfortunately, uncoordinated deployment of overlapping private networks can
28 32 create interference that degrades performance, which may then cause users to
29   -respond in ways that further exacerbate the problem. Consider Alice and Bob's
30   -neighboring apartments shown in Figure~\ref{fig:motivation}. Alice has
31   -deployed her AP in her living room, while Bob has deployed his in his
32   -bedroom. Due to the proximity of their apartments, Alice receives a stronger
33   -signal from Bob's router when she is in her bedroom. But because she cannot
34   -connect to Bob's router, she must either use the lower-bandwidth connection
35   -to her existing AP or deploy an additional AP in her bedroom. Both of these
36   -options generate additional wireless interference for her neighbors,
37   -including Bob. And while we have used Alice as an example, Bob also faces the
38   -same poor choice.
39   -
40   -However, due to factors such as blockage or fading in wireless signal
41   -propagation, home \wifi{} AP usually does not provide equally satisfying \wifi{}
42   -coverage at all places within the house. Instead, it is likely that the user
43   -receives better \wifi{} signal from a neighbor's AP at certain spots. For
44   -instance, consider Alice and Bob who live in neighbor apartments, as shown in
45   -Figure~\ref{fig:motivation}, each of them receives a stronger \wifi{} signal
46   -from the other's home AP than their own at certain places within their
47   -apartments, revealing a \textit{reciprocal} \wifi{} sharing opportunity where
48   -both parties can improve their \wifi{} performance by allowing each other to
49   -access their own private networks.
50   -
51   -Compared to traditional community networks such as FON~\cite{fon} or
52   -OpenWireless~\cite{openwireless}, such reciprocal sharing opportunity has
53   -several unique properties that make it interesting to explore. First, such
54   -opportunity is usually \textit{immediate} between two physically colocated
55   -parties, such as two neighbors. This helps relief the concerns of sharing
56   -network to random strangers in traditional community networks and makes it more
57   -practical to establish the sharing. Second, bonding to physical colocation
58   -relationship makes the opportunity \textit{stable} over time, enabling
59   -asynchronous fair sharing over longer period of time.
  33 +respond in ways that further exacerbate the problem. Consider Alice's/Bob's
  34 +apartment shown in Figure~\ref{fig:motivation}. Alice/Bob has deployed
  35 +her/his AP in her/his living room/bedroom. Due to the proximity of their
  36 +apartments, Alice/Bob receives a stronger signal from Bob's/Alice's router
  37 +when she/he is in her/his bedroom/living room. But because Alice/Bob cannot
  38 +connect to Bob's/Alice's router, she/he must either use the lower-bandwidth
  39 +connection to her/his existing AP or deploy an additional AP in her/his
  40 +bedroom/living room. Both options generate additional wireless interference
  41 +for her/his neighbors, including Bob/Alice.
60 42  
  43 +Ideally, Alice/Bob would allow Bob/Alice to use her/his router. Obviously
  44 +this solution requires less hardware. But it also improves performance while
  45 +reducing interference and client energy consumption, both by allowing the APs
  46 +to coordinate overlapping transmissions and by allowing clients to achieve
  47 +higher bitrates at lower transmission powers. We refer to this
  48 +mutually-beneficial arrangement as \textit{reciprocal \wifi{} sharing}.
61 49  
62   -Nevertheless, there are several challenges in fulfilling the vision of
63   -reciprocal \wifi{} sharing shown in Figure~\ref{fig:motivation}. First, although
64   -the motivating example is inspired by the authors' own experience, it is not
65   -clear how often such opportunity exists for broader range of users in real life
66   -scenarios. Second, suppose the sharing opportunity does exist and is detected,
67   -there is no systematic solutions to enable the \wifi{} sharing without
68   -compromising the security and privacy of user's home network. Finally, after the
69   -\wifi{} sharing is established, it is challenging to ensure that the
70   -relationship remains reciprocal for both parties.
  50 +Reciprocal \wifi{} sharing has benefits compared to attempts to use private
  51 +APs to establish community networks such as FON~\cite{fon} or
  52 +OpenWireless~\cite{openwireless}. Reciprocal \wifi{} sharing opportunities
  53 +are more likely to align with existing human relationships, such as this
  54 +example involving two neighbors, rather than requiring users to open their
  55 +private networks to strangers. And because reciprocal \wifi{} sharing
  56 +involves only pairwise cooperation, agreements can be established and
  57 +monitored without the elaborate reputation systems or credit mechanisms
  58 +required to prevent freeloading in large communities. Once Alice notices that
  59 +the sharing agreement with Bob is no longer beneficial---either because she
  60 +no longer needs his connection or because he is degrading her service to the
  61 +point where it is no longer useful---she can immediately terminate it.
71 62  
72   -To address these challenges, we first present extensive analysis of the
73   -\PhoneLab{} \wifi{} dataset which contains \num{21192417} scan results from 254
74   -smartphones over 5 months (Section~\ref{sec:investigation}). The results show
75   -that such reciprocal \wifi{} sharing opportunities does exists even in a spatial
76   -sparse dataset. Inspired by the results, we present the design of \wisefi{}
77   -(Section~\ref{sec:design}), a system that detects such reciprocal \wifi{}
78   -sharing opportunities using smartphones, enables \wifi{} sharing on APs with or
79   -without guest network support, and ensures the sharing remain reciprocal.
80   -Finally, we discuss some open challenges in implementing such a system and point
81   -directions for future works (Section~\ref{sec:challenges}).
  63 +But how often is reciprocal \wifi{} sharing beneficial and possible in
  64 +practice? To explore these questions, we begin in
  65 +Section~\ref{sec:investigation} by analyzing a dataset collected on the
  66 +\PhoneLab{}~smartphone testbed containing \num{21192417} \wifi{} scan results
  67 +from 254~smartphones over 5~months (\S~\ref{sec:investigation}). Despite the
  68 +fact that the geographic extent of the dataset is suburban Buffalo, which as
  69 +a city has a population density an order of magnitude lower than
  70 +densely-populated areas like Manhattan, we still find that many users would
  71 +benefit from being able to connect to neighboring private networks. Even more
  72 +surprisingly, despite monitoring only several hundred users we were still
  73 +able to identify several reciprocal \wifi{} sharing opportunities in our tiny
  74 +sample. Motivated by these results Section~\ref{sec:design} presents the
  75 +design of \wisefi{}, a system addressing the practical challenges of
  76 +establishing and monitoring reciprocal \wifi{} sharing agreements. We
  77 +conclude by identifying some open challenges in implementing such a system as
  78 +future work in Section~\ref{sec:challenges}.
... ...
investigation.tex
... ... @@ -2,12 +2,12 @@
2 2 \label{sec:investigation}
3 3  
4 4 To investigate reciprocal sharing opportunity in real life scenarios, we
5   -obtained a \wifi{} scan result dataset from \PhoneLab{}
6   -(\S\ref{subsec:phonelab}). We first discuss some heuristics to identify the home
7   -AP for each device (\S\ref{subsec:homeap}). Then we show the RSSI comparison
8   -between a user's home and neighbor APs (\S\ref{subsec:better}). Finally, we
9   -explore the reciprocal sharing relationships in the dataset
10   -(\S\ref{subsec:reciprocal}).
  5 +obtained a \wifi{} scan result dataset from
  6 +\PhoneLab{}\footnote{\url{http://www.phone-lab.org}} (\S\ref{subsec:phonelab}).
  7 +We first discuss some heuristics to identify the home AP for each device
  8 +(\S\ref{subsec:homeap}). Then we show the RSSI comparison between a user's
  9 +home and neighbor APs (\S\ref{subsec:better}). Finally, we explore the
  10 +reciprocal sharing relationships in the dataset (\S\ref{subsec:reciprocal}).
11 11  
12 12 \subsection{PhoneLab \wifi{} Dataset}
13 13 \label{subsec:phonelab}
... ... @@ -31,20 +31,19 @@ explore the reciprocal sharing relationships in the dataset
31 31 \label{tab:summary}
32 32 \end{table}
33 33  
34   -\PhoneLab{}\cite{phonelab-sensemine13} is a public smartphone platform testbed
35   -operated at the University at Buffalo. Several hundreds of participants carry
36   -instrumented Nexus 5 smartphones as their primary device. In particular, the
37   -smartphone platform was modified to log each \wifi{} scan result and \wifi{}
38   -connection events naturally generated by the Android system. Note that from data
39   -collection point of view, platform instrumentation is not necessary, and the
40   -same information can also be logged by applications with appropriate
41   -permissions. Table~\ref{tab:summary} summarizes the \PhoneLab{} \wifi{} dataset.
42   -
43   -A \wifi{} scan result represents the device's network visibility, and consists
44   -of multiple entries---each corresponds to one \wifi{} AP the device observed.
45   -The content of one entry includes: (1) beacon timestamp, (2) AP SSID and BSSID,
46   -(3) AP channel and (4) RSSI. Additionally, the timestamp when the scan was
47   -performed is also logged.
  34 +\PhoneLab{}\cite{phonelab-sensemine13} is a public smartphone platform
  35 +testbed operated at the University at Buffalo. Several hundreds of
  36 +participants carry instrumented Nexus 5 smartphones as their primary device.
  37 +In particular, the smartphone platform was modified to log each \wifi{} scan
  38 +result and \wifi{} connection events naturally generated by the Android
  39 +system. Note that from data collection point of view, platform
  40 +instrumentation is not necessary, and the same information can also be logged
  41 +by applications with appropriate permissions. A \wifi{} scan result
  42 +represents the device's network visibility, and consists of multiple
  43 +entries---each corresponds to one \wifi{} AP the device observed. The content
  44 +of one entry includes: (1) beacon timestamp, (2) AP SSID and BSSID, (3) AP
  45 +channel and (4) RSSI. The timestamp when the scan was performed is also
  46 +logged. Table~\ref{tab:summary} summarizes the \PhoneLab{} \wifi{} dataset.
48 47  
49 48 \subsection{Home AP Detection}
50 49 \label{subsec:homeap}
... ...