An optimization framework for monitoring multi-channel multi-radio wireless mesh networks

This paper studies an optimal monitoring problem for behavior-based detection in multi-channel multi-radio wireless mesh networks. In behavior-based detection, nodes overhear communications in their neighborhood to determine if the behaviors of their neighbors are legitimate. The objective of this work is to maximize the number of nodes being monitored by judiciously choosing a set of monitoring nodes and also channels for the chosen monitoring nodes. This problem is NP-hard, growing exponentially with the number of monitoring nodes. We develop three approximation algorithms, each of which achieves at least a constant factor of the optimum. Furthermore, one of our algorithms achieves the best possible approximation ratio among all polynomial-time algorithms, unless P=NP. We conduct simulations in random networks and scale-free networks to evaluate the coverage and the execution time of the three algorithms.

[1]  Rong Zheng,et al.  On Quality of Monitoring for Multichannel Wireless Infrastructure Networks , 2010, IEEE Transactions on Mobile Computing.

[2]  Ridha Soua,et al.  A Distributed Joint Channel and Slot Assignment for Convergecast in Wireless Sensor Networks , 2014, 2014 6th International Conference on New Technologies, Mobility and Security (NTMS).

[3]  Saurabh Bagchi,et al.  Distributed online channel assignment toward optimal monitoring in multi-channel wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.

[4]  Dorit S. Hochbaum,et al.  Approximation Algorithms for NP-Hard Problems , 1996 .

[5]  Saurabh Bagchi,et al.  Optimal monitoring in multi-channel multi-radio wireless mesh networks , 2009, MobiHoc '09.

[6]  Tzi-cker Chiueh,et al.  Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[7]  Saswati Sarkar,et al.  A framework for misuse detection in ad hoc networks- part II , 2006, IEEE Journal on Selected Areas in Communications.

[8]  Jean-Pierre Hubaux,et al.  Securing wireless mesh networks , 2006, IEEE Wireless Communications.

[9]  Saswati Sarkar,et al.  A framework for misuse detection in ad hoc Networks-part I , 2006, IEEE Journal on Selected Areas in Communications.

[10]  Edward W. Knightly,et al.  The IEEE 802.11s Extended Service Set Mesh Networking Standard , 2008, IEEE Communications Magazine.

[11]  Paramvir Bahl,et al.  MultiNet: connecting to multiple IEEE 802.11 networks using a single wireless card , 2004, IEEE INFOCOM 2004.

[12]  Aravind Srinivasan,et al.  Distributions on level-sets with applications to approximation algorithms , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.

[13]  Kurt M. Anstreicher,et al.  Linear Programming in O([n3/ln n]L) Operations , 1999, SIAM J. Optim..

[14]  Xiaojun Lin,et al.  A Distributed Joint Channel-Assignment, Scheduling and Routing Algorithm for Multi-Channel Ad-hoc Wireless Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[15]  Nitin H. Vaidya,et al.  Multichannel mesh networks: challenges and protocols , 2006, IEEE Wireless Communications.

[16]  Lakshminarayanan Subramanian,et al.  Practical, distributed channel assignment and routing in dual-radio mesh networks , 2009, SIGCOMM '09.

[17]  Maxim Sviridenko,et al.  Pipage Rounding: A New Method of Constructing Algorithms with Proven Performance Guarantee , 2004, J. Comb. Optim..

[18]  Rong Zheng,et al.  Sequential learning for optimal monitoring of multi-channel wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[19]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[20]  Nitin H. Vaidya,et al.  Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..

[21]  H. Chandler Practical , 1982, Digital Transformation of the Laboratory.

[22]  Saswati Sarkar,et al.  A Statistical Framework for Intrusion Detection in Ad Hoc Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[23]  Randeep Bhatia,et al.  Joint Channel Assignment and Routing for Throughput Optimization in Multiradio Wireless Mesh Networks , 2005, IEEE Journal on Selected Areas in Communications.

[24]  Issa M. Khalil,et al.  LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[25]  Amit Kumar,et al.  Maximum Coverage Problem with Group Budget Constraints and Applications , 2004, APPROX-RANDOM.