Structural Analysis of User Association Patterns in University Campus Wireless LANs

Wireless networks and personalized mobile devices are deeply integrated and embedded in our lives. Such wide adoptions of new technologies will impact user behavior and in turn will affect network performance. It is imperative to characterize the fundamental structure of wireless user behavior in order to model, manage, leverage and design efficient mobile networks. One major challenge in characterizing user behavior stems from the significant size and complexity of user behavioral data. Without summarization and dimension reduction, the sheer amount of data does not provide much useful information. The key contribution of the paper is a novel similarity metric based on a matrix representation of mobility preferences and its decomposition. This method provides an efficient way to reduce important spatiotemporal dynamics in user mobility into a few eigen-behavior vectors. This also facilitates nodes to exchange their mobility summaries and determine their mutual similarity locally. Without any assumption on the properties of user population, we use unsupervised learning (clustering) techniques to classify WLAN users. Such a user grouping scheme based on learned user behavior is crucial for applications relying on the usage context of each mobile device (e.g., participatory sensing, social-relationship-aware message forwarding). In this study, using our systematic TRACE approach, we analyze wireless users' behavioral patterns by extensively mining wireless network logs from two major university campuses to showcase its efficacy. While our findings partly validate intuitive repetitive behavioral trends and user grouping, it is surprising to find the qualitative commonalities and striking consistency of user behavior from the two universities. We discover multimodal user behavior for more than 60 percent of the users, and there are hundreds of distinct groups with unique behavioral patterns in both campuses. The sizes of the major groups follow a power-law distribution.

[1]  C. Braak,et al.  Principal Components Biplots and Alpha and Beta Diversity , 1983 .

[2]  Ahmed Helmy,et al.  Modeling Time-Variant User Mobility in Wireless Mobile Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[3]  Alex Pentland,et al.  Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.

[4]  Dan Cosley,et al.  Inferring social ties from geographic coincidences , 2010, Proceedings of the National Academy of Sciences.

[5]  Mads Haahr,et al.  Social network analysis for routing in disconnected delay-tolerant MANETs , 2007, MobiHoc '07.

[6]  Ahmed Helmy,et al.  On Nodal Encounter Patterns in Wireless LAN Traces , 2010, IEEE Transactions on Mobile Computing.

[7]  Pan Hui,et al.  Impact of Human Mobility on the Design of Opportunistic Forwarding Algorithms , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[8]  Ahmed Helmy,et al.  PROTECT: proximity-based trust-advisor using encounters for mobile societies , 2010, IWCMC.

[9]  Heng Tao Shen,et al.  Principal Component Analysis , 2009, Encyclopedia of Biometrics.

[10]  Chunming Qiao,et al.  On profiling mobility and predicting locations of wireless users , 2006, REALMAN '06.

[11]  Anil K. Jain,et al.  Data clustering: a review , 1999, CSUR.

[12]  PentlandAlex,et al.  Reality mining: sensing complex social systems , 2006 .

[13]  Min Y. Mun,et al.  Designing the Personal Data Stream: Enabling Participatory Privacy in Mobile Personal Sensing , 2009 .

[14]  Ahmed Helmy,et al.  Human Behavior and Challenges of Anonymizing WLAN Traces , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[15]  Ahmed Helmy,et al.  Modeling Spatial and Temporal Dependencies of User Mobility in Wireless Mobile Networks , 2008, IEEE/ACM Transactions on Networking.

[16]  Ahmed Helmy,et al.  Profile-Cast: Behavior-Aware Mobile Networking , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[17]  Gaetano Borriello,et al.  Extracting places from traces of locations , 2004, MOCO.

[18]  Ahmed Helmy,et al.  Mining behavioral groups in large wireless LANs , 2006, MobiCom '07.

[19]  Konstantina Papagiannaki,et al.  Structural analysis of network traffic flows , 2004, SIGMETRICS '04/Performance '04.

[20]  Magdalena Balazinska,et al.  Characterizing mobility and network usage in a corporate wireless local-area network , 2003, MobiSys '03.

[21]  Ravi Jain,et al.  Model T++: an empirical joint space-time registration model , 2006, MobiHoc '06.

[22]  Ahmed Helmy,et al.  Extended Abstract : Mining Behavioral Groups in Large Wireless LANs , 2007 .

[23]  David Kotz,et al.  Periodic properties of user mobility and access-point popularity , 2007, Personal and Ubiquitous Computing.

[24]  Geoffrey M. Voelker,et al.  Access and mobility of wireless PDA users , 2003, MOCO.

[25]  Ahmed Helmy,et al.  CSI: A paradigm for behavior-oriented profile-cast services in mobile networks , 2012, Ad Hoc Networks.

[26]  Thomas R. Gross,et al.  A mobility model based on WLAN traces and its validation , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[27]  Ahmed Helmy,et al.  Similarity analysis and modeling in mobile societies: the missing link , 2010, CHANTS '10.

[28]  Albert-László Barabási,et al.  Understanding individual human mobility patterns , 2008, Nature.

[29]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[30]  Haipeng Shen,et al.  Characterizing the duration and association patterns of wireless access in a campus , 2005 .

[31]  Ahmed Helmy,et al.  On Important Aspects of Modeling User Associations in Wireless LAN Traces , 2006 .

[32]  Tristan Henderson,et al.  CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth , 2005, IEEE Pervasive Comput..

[33]  Deborah Estrin,et al.  Recruitment Framework for Participatory Sensing Data Collections , 2010, Pervasive.

[34]  Tristan Henderson,et al.  The changing usage of a mature campus-wide wireless network , 2004, MobiCom '04.

[35]  Deborah Estrin,et al.  Using Context Annotated Mobility Profiles to Recruit Data Collectors in Participatory Sensing , 2009, LoCA.

[36]  Ravi Jain,et al.  Model T: an empirical model for user registration patterns in a campus wireless LAN , 2005, MobiCom '05.

[37]  Xiaoyan Hong,et al.  A group mobility model for ad hoc wireless networks , 1999, MSWiM '99.

[38]  Tristan Henderson,et al.  CRAWDAD: a community resource for archiving wireless data at Dartmouth , 2005, CCRV.

[39]  M. Kendall Probability and Statistical Inference , 1956, Nature.

[40]  Amin Vahdat,et al.  Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .