Network Topology Inference based on Timing Meta-Data

10/11/2022
by   Wenbo Du, et al.
0

Consider a processor having access only to meta-data consisting of the timings of data packets and acknowledgment (ACK) packets from all nodes in a network. The meta-data report the source node of each packet, but not the destination nodes or the contents of the packets. The goal of the processor is to infer the network topology based solely on such information. Prior work leveraged causality metrics to identify which links are active. If the data timings and ACK timings of two nodes – say node 1 and node 2, respectively – are causally related, this may be taken as evidence that node 1 is communicating to node 2 (which sends back ACK packets to node 1). This paper starts with the observation that packet losses can weaken the causality relationship between data and ACK timing streams. To obviate this problem, a new Expectation Maximization (EM)-based algorithm is introduced – EM-causality discovery algorithm (EM-CDA) – which treats packet losses as latent variables. EM-CDA iterates between the estimation of packet losses and the evaluation of causality metrics. The method is validated through extensive experiments in wireless sensor networks on the NS-3 simulation platform.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/21/2018

Age of Information Performance of Multiaccess Strategies with Packet Management

We consider a system consisting of N source nodes communicating with a c...
research
02/10/2021

TDMA-based scheduling for multi-hop wireless sensor networks with 3-egress gateway linear topology

Packet transmission scheduling on multi-hop wireless sensor networks wit...
research
06/26/2018

Network-level Cooperation in Random Access IoT Networks with Aggregators

In this work, we consider a random access IoT wireless network assisted ...
research
12/29/2022

Timestomping Vulnerability of Age-Sensitive Gossip Networks

We consider gossip networks consisting of a source that maintains the cu...
research
05/17/2022

Susceptibility of Age of Gossip to Timestomping

We consider a fully connected network consisting of a source that mainta...
research
10/18/2021

Data Flow Dissemination in a Network

We consider the following network model motivated, in particular, by blo...

Please sign up or login with your details

Forgot password? Click here to reset