Approximation algorithms for NP-hard problems
A framework for wireless LAN monitoring and its applications
Proceedings of the 3rd ACM workshop on Wireless security
Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks
Proceedings of the 10th annual international conference on Mobile computing and networking
An accurate technique for measuring the wireless side of wireless networks
WiTMeMo '05 Papers presented at the 2005 workshop on Wireless traffic measurements and modeling
Understanding link-layer behavior in highly congested IEEE 802.11b wireless networks
Proceedings of the 2005 ACM SIGCOMM workshop on Experimental approaches to wireless network design and analysis
Enhancing the security of corporate Wi-Fi networks using DAIR
Proceedings of the 4th international conference on Mobile systems, applications and services
MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs
Proceedings of the 4th international conference on Mobile systems, applications and services
Jigsaw: solving the puzzle of enterprise 802.11 analysis
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Analyzing the MAC-level behavior of wireless networks in the wild
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Automating cross-layer diagnosis of enterprise wireless networks
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Optimal monitoring in multi-channel multi-radio wireless mesh networks
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
Sniffer Channel Selection for Monitoring Wireless LANs
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
WiserAnalyzer: A Passive Monitoring Framework for WLANs
MSN '09 Proceedings of the 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks
Robust Detection of Unauthorized Wireless Access Points
Mobile Networks and Applications
On quality of monitoring for multi-channel wireless infrastructure networks
Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing
A location-based management system for enterprise wireless LANs
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
FLUID: improving throughputs in enterprise wireless lans through flexible channelization
MobiCom '11 Proceedings of the 17th annual international conference on Mobile computing and networking
Map: a scalable monitoring system for dependable 802.11 wireless networks
IEEE Wireless Communications
Hi-index | 0.24 |
Wireless sniffers are often used to monitor access points (APs) in wireless LANs (WLANs) for network management, fault detection, and traffic characterization. It is cost effective to deploy single-radio sniffers that can monitor multiple nearby APs. To achieve this, a sniffer needs to switch among multiple channels since these APs often operate on orthogonal channels. In this paper, we formulate and solve two optimization problems on sniffer channel selection. Both problems require that each AP be monitored by at least one sniffer. In addition, one optimization problem requires minimizing the maximum number of channels that a sniffer listens to, and the other requires minimizing the total number of channels that the sniffers listen to. We prove that both optimization problems are NP-hard. For each problem, we propose three algorithms to solve it, one based on integer programming (IP), one based on LP-relaxation, and the third based on a greedy heuristic. We evaluate the performance of the various algorithms using two real-world datasets. Our results show that, for each problem, all the three algorithms are effective in achieving their optimization goals, and overall, the LP-based algorithm outperforms the other two algorithms.