Toward Optimal Sniffer-Channel
Assignment for Reliable Monitoring in
Multi-Channel Wireless Networks
Donghoon Shin, Saurabh Bagchi and Chih-Chun Wang
Dependable Computing Systems Lab (DCSL)
School of Electrical and Computer Engineering
Purdue University
Slide 1
Outline
Introduction: Passive Monitoring in Wireless Networks
Existing Works and Motivation
Problem Statement: Optimal Sniffer-Channel Assignment
for Reliable Monitoring
Proposed Algorithms
Simulation Results
Conclusion
Slide 2
Introduction
Passive monitoring in wireless networks
A set of sniffers are used to capture and analyze network traffic to
estimate network conditions and performance
− Sniffers are software or hardware devices that intercept and log packets
Such estimates are utilized for efficient network operation such as:
−
−
−
−
Resource management
Network configuration
Fault detection/diagnosis
Network intrusion detection
A major issue with passive monitoring in multi-channel wireless
networks: “sniffer-channel assignment problem”
How to assign a set of channels to the sniffers’ radios so as
to capture as large an amount of traffic as possible?
Slide 3
Existing Studies on Monitoring in
Multi-Channel Wireless Networks
[Shin et al, MobiHoc’09]
Optimal placement and channel assignment of sniffers in wireless
mesh networks
[Chhetri et al, MobiHoc’10]
Two models of sniffers that assume different capabilities of
sniffers’ capturing traffic
[Arora et al., INFOCOM’11]
Trade-off between assigning sniffers’ radios to the channels known
to be busiest based on the current knowledge, versus exploring
channels that are under-observed
[Arora et al., GLOBECOM’11], [Shin et al, INFOCOM’12]
Distributed algorithms for optimal sniffer-channel assignment
Slide 4
Motivation and Solution Approach
All previous works assumed that sniffers are perfect
In practice, sniffers may probabilistically stop functioning and/or
generate erroneous reports on monitoring due to:
Poor reception (due to packet collisions or poor channel conditions)
Compromise by an adversary
Operational failure
Sleep mode for saving energy
In this paper, we allow for imperfect sniffers
For accurate and reliable monitoring, we provide sniffer redundancy
to each node
That is, each node has to meet a coverage requirement, i.e., the
minimum number of sniffers required to reliably monitor the node
Slide 5
Notation & Terminology
S: Set of sniffers
N: Set of nodes
Each node’s radio is tuned to a specific wireless channel
C: Set of available wireless channels
wn: Weight assigned to node n
Captures various application-specific objectives of monitoring
rn: Coverage requirement assigned to node n
Minimum number of sniffers required to reliably monitor node n
Ks,c: Coverage-set of sniffer s on channel c
Contains the nodes that can be overheard by sniffer s operating on
channel c
Sniffer-channel assignment: A collection of coverage-sets that
include only one coverage-set for each sniffer
Slide 6
Channel Assignment for Reliable Monitoring
Full-Coverage Reliable Monitoring (FCRM): Find a sniffer-channel
assignment that covers all nodes in the network
A node is covered if it is overhead by at least rn sniffers
Theorem 1:
FCRM is NP-hard, even for |C| = 2 and rn = 2 for some node n
Complexity grows exponentially with the number of sniffers
Maximum-Coverage Reliable Monitoring (MCRM): Find a snifferchannel assignment that maximizes the total weight of nodes being
covered
Corollary 1:
MCRM is NP-hard, even for |C| = 2 and rn = 2 for some node n
Slide 7
Channel Assignment for Reliable Monitoring
Corollary 2:
For any ε > 0, it is NP-hard to solve MCRM within a factor of 7/8
+ ε of the maximum coverage, even for |C| = 2 and rn = 2 for all n
Theorem 2:
For MCRM with rn = 1 for all n, the weight function w is
submodular. However, MCRM with rn ≥ 2 for some n, the weight
function w is not submodular.
Intuitively, submodularity is a diminishing-return property
Submodularity allows to efficiently find provably (near-)optimal
solutions
− Similar to convexity in continuous optimization
Known that non-submodular functions are difficult to deal with
Slide 8
Greedy Approach
Naïve greedy algorithms: at each iteration, pick one coverage-set that
maximizes:
Coverage improvement
Sum of the weights of the hitherto uncovered nodes
Look-ahead greedy algorithms: consider combinations of multiple
coverage-sets at each step
Look-t-steps-ahead greedy algorithm
− At each step, picks one coverage-set through the following procedure:
1. Find a collection of t + 1 coverage-sets that achieve the maximum
coverage improvement for the current step and the next t steps
2. Among the coverage-sets in the selected collection, picks one
coverage-set that maximizes coverage improvement at the current step
t-sniffers-at-one-step greedy algorithm
− At each step, picks a collection of at most t coverage-sets that maximize
the per-sniffer coverage improvement
Slide 9
Relaxation-and-Rounding Approach
Steps for relaxation-and-rounding algorithms to solve MCRM
1) Formulate MCRM into an integer program (IP)
2) Transform the IP into a relaxed program by removing the integer
constraints
−
Find as tight a relaxed program as possible, while keeping the relaxed
program solvable in polynomial time
3) Solve the relaxed program to find the optimal fractional solution
4) Round the non-integer values from Step 3 to obtain an integer
solution feasible for the original IP
−
In rounding, the goal is to minimize the degradation of the quality of
the resulting integer solution
Two relaxations devised
i.
ii.
Linear Program (LP) relaxation
SemiDefinite Program (SDP) relaxation tighter relaxation
Slide 10
Relaxation-and-Rounding Approach
Two rounding algorithms designed
ys,c* = 1 indicates that sniffer
Randomized Rounding Algorithm (RRA) s
tunes its{y
radio*}tosuch
channel
− Probabilistically round the optimal LP/SDP solution
that:c
s,c
P(Ys,c = 1) = ys,c*
where Ys,c is the integer value resulted from rounding
Greedy Rounding Algorithm (GRA)
− At each iteration, rounds (at least) one fractional value as the followings:
1. For each sniffer-channel pair (s, c) whose value is not rounded to an
integer, adjust the fractional values of the sniffer s according to:
y *s, c 0,
y *s, c y *s, c / y *s, c c c
c C
2.
3.
(s#,
c#)
Find the sniffer-channel pair
whose associated adjusted values
achieve the maximum coverage improvement
Update the fractional values of sniffer s# to the adjusted values
Slide 11
Simulation Settings
Two metrics
Coverage
Running time
Two kinds of networks
Random network: Nodes are randomly deployed in the network with a
uniform distribution
Scale-free network: Nodes are deployed such that the distribution of
the nodes with degree d follows a power law in a form of d-r
Parameter settings
Number of nodes: 40
Number of channels: 3
All nodes have the same weight of one (i.e., wn = 1) and the same
coverage requirement of two (i.e., rn = 2)
Slide 12
Coverage in Random Network
ILP optimum
(maximum coverage)
Rounding by GRA
Look-ahead
greedyalgorithm-2
algorithms
Naïve greedy
Rounding
bythe
RRA
(which picks
coverage-set that achieves the
maximum total weight of the uncovered nodes)
Naïve greedy algorithm-1
(which picks the coverage-set of the
maximum coverage improvement)
Naïve
SDP
+rounding,
GRA greedy
and
LPalgorithms
+maintains
GRA shows
show
comparable
to to
the
maximum
Look-ahead
show
reasonably
good
performance
(at
After
GRA
thecoverage
solution
quality
closer
the
maximum
greedy
algorithm-2
reasonable
coverage,
while
naïve
achievable
coverage
at least
and 94% of
of the
maximum
least 92%
of
maximum
coverage)
coverage,
while
RRA(i.e.,
results
in the95%
degradation
solutioncoverage)
quality
greedy
algorithm-1
shows
poor
coverage
Slide 13
Coverage in Scale-free Network
Gap from the upper
bound by LP relaxation
Gap from the upper
bound by SDP relaxation
SDP-relaxation
based algorithms
LP-relaxation
based algorithms
SDP relaxation
SDP-based
algorithms
shows aachieve
noticeable
a higher
improvement
coverage on
improvement
the upper (by
2~5%) of
bound
compared
the maximum
to LP-based
achievable
algorithms,
coverage
than
(byin4~7%)
random network
Slide 14
Running Time in Random Network
y-axis for the
other algorithms
LP-relaxation
based algorithms
SDP-relaxation
based algorithms
Look-ahead
greedy algorithms
y-axis for lookahead greedy
algorithms
(5x left y-axis)
CPU: 2.4 GHz
Memory: 4 GB
Bus: 1.07 GHz
LP-relaxation and rounding algorithms show the fastest running time
SDP-relaxation and rounding algorithms show reasonably fast running time
Look-ahead greedy algorithms show the slowest running time
Grow rapidly as the number of sniffers increases
Running time of the t-sniffers-at-one-step greedy algorithm is almost half of the
running time of the look-t-steps-ahead greedy algorithm
Slide 15
Summary of Simulation Results
SDP + GRA achieves the highest coverage close to the maximum
coverage, but shows a (relatively) slow running time
Favored, especially, for monitoring applications where a higher
coverage is more emphasized (e.g., critical security monitoring)
LP + GRA attains the coverage comparable to the coverage of the
SDP + GRA, and also shows a fast running time
A good compromise between coverage and running-time
Favored for monitoring applications requiring fast running-time (e.g.,
monitoring dynamic network environments)
Slide 16
Conclusion
Studied the optimal sniffer-channel assignment problem for reliable
monitoring in multi-channel wireless networks
Showed that the problem is fundamentally differs from the
previously studied problems that assume perfect sniffers and thus
do not need to consider sniffer redundancy
Proposed various approximation algorithms based on two basic
approaches:
Greedy
Relaxation and rounding
Present a comparative analysis of the proposed algorithms through
simulations
Slide 17
Thank You
Questions?
Contact Info:
Donghoon Shin
([email protected])
Slide 18
© Copyright 2026 Paperzz