Ana Nika
University of California, Santa Barbara
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ana Nika.
internet measurement conference | 2014
Gang Wang; Bolun Wang; Tianyi Wang; Ana Nika; Haitao Zheng; Ben Y. Zhao
Social interactions and interpersonal communication has undergone significant changes in recent years. Increasing awareness of privacy issues and events such as the Snowden disclosures have led to the rapid growth of a new generation of anonymous social networks and messaging applications. By removing traditional concepts of strong identities and social links, these services encourage communication between strangers, and allow users to express themselves without fear of bullying or retaliation. Despite millions of users and billions of monthly page views, there is little empirical analysis of how services like Whisper have changed the shape and content of social interactions. In this paper, we present results of the first large-scale empirical study of an anonymous social network, using a complete 3-month trace of the Whisper network covering 24 million whispers written by more than 1 million unique users. We seek to understand how anonymity and the lack of social links affect user behavior. We analyze Whisper from a number of perspectives, including the structure of user interactions in the absence of persistent social links, user engagement and network stickiness over time, and content moderation in a network with minimal user accountability. Finally, we identify and test an attack that exposes Whisper users to detailed location tracking. We have notified Whisper and they have taken steps to address the problem.
Proceedings of the 1st ACM workshop on Hot topics in wireless | 2014
Ana Nika; Zengbin Zhang; Xia Zhou; Ben Y. Zhao; Haitao Zheng
We are facing an increasingly difficult challenge in spectrum management: how to perform real-time spectrum monitoring with strong coverage of deployed regions. Todays spectrum measurements are carried out by government employees driving around with specialized hardware that is usually bulky and expensive, making the task of gathering real-time, large-scale spectrum monitoring data extremely difficult and cost prohibitive. In this paper, we propose a solution to the spectrum monitoring problem by leveraging the power of the masses, i.e. millions of wireless users, using low-cost, commoditized spectrum monitoring hardware. We envision an ecosystem where crowdsourced smartphone users perform automated and continuous spectrum measurements using their mobile devices, and report the results to a monitoring agency in real-time. We perform an initial feasibility study to verify the efficacy of our mobile monitoring platform compared to that of conventional monitoring devices like USRP GNU radios. Results indicate that commoditized real-time spectrum monitoring is indeed feasible in the near future. We conclude by presenting a set of open challenges and potential directions for follow-up research.
international world wide web conferences | 2015
Ana Nika; Yibo Zhu; Ning Ding; Abhilash Jindal; Y. Charlie Hu; Xia Zhou; Ben Y. Zhao; Haitao Zheng
Most of todays mobile devices come equipped with both cellular LTE and WiFi wireless radios, making radio bundling (simultaneous data transfers over multiple interfaces) both appealing and practical. Despite recent studies documenting the benefits of radio bundling with MPTCP, many fundamental questions remain about potential gains from radio bundling, or the relationship between performance and energy consumption in these scenarios. In this study, we seek to answer these questions using extensive measurements to empirically characterize both energy and performance for radio bundling approaches. In doing so, we quantify potential gains of bundling using MPTCP versus an ideal protocol. We study the links between traffic partitioning and bundling performance, and use a novel componentized energy model to quantify the energy consumed by CPUs (and radios) during traffic management. Our results show that MPTCP achieves only a fraction of the total performance gain possible, and that its energy-agnostic design leads to considerable power consumption by the CPU. We conclude that not only there is room for improved bundling performance, but an energy-aware bundling protocol is likely to achieve a much better tradeoff between performance and power consumption.
international conference on embedded networked sensor systems | 2016
Ana Nika; Zhijing Li; Yanzi Zhu; Yibo Zhu; Ben Y. Zhao; Xia Zhou; Haitao Zheng
We describe our efforts to empirically validate a distributed spectrum monitoring system built on commodity smartphones and embedded low-cost spectrum sensors. This system enables real-time spectrum sensing, identifies and locates active transmitters, and generates alarm events when detecting anomalous transmitters. To evaluate the feasibility of such a platform, we perform detailed experiments using a prototype hardware platform using smartphones and RTL dongles. We identify multiple sources of error in the sensing results and the end-user overhead (i.e. smartphone energy draw). We propose and implement a variety of techniques to identify and overcome errors and uncertainty in the data, and to reduce energy consumption. Our work demonstrates the basic viability of user-driven spectrum monitoring on commodity devices.
international world wide web conferences | 2017
Zhijing Li; Ana Nika; Xinyi Zhang; Yanzi Zhu; Yuanshun Yao; Ben Y. Zhao; Haitao Zheng
While crowdsourcing is an attractive approach to collect large-scale wireless measurements, understanding the quality and variance of the resulting data is difficult. Our work analyzes the quality of crowdsourced cellular signal measurements in the context of basestation localization, using large international public datasets (419M signal measurements and 1M cells) and corresponding ground truth values. Performing localization using raw received signal strength (RSS) data produces poor results and very high variance. Applying supervised learning improves results moderately, but variance remains high. Instead, we propose feature clustering, a novel application of unsupervised learning to detect hidden correlation between measurement instances, their features, and localization accuracy. Our results identify RSS standard deviation and RSS-weighted dispersion mean as key features that correlate with highly predictive measurement samples for both sparse and dense measurements respectively. Finally, we show how optimizing crowdsourcing measurements for these two features dramatically improves localization accuracy and reduces variance.
Mobile Networks and Applications | 2016
Ana Nika; Asad Khalid Ismail; Ben Y. Zhao; Sabrina Gaito; Gian Paolo Rossi; Haitao Zheng
The unprecedented growth in mobile data usage is posing significant challenges to cellular operators. One key challenge is how to provide quality of service to subscribers when their residing cell is experiencing a significant amount of traffic, i.e. becoming a traffic hotspot. In this paper, we perform an empirical study on data hotspots in today’s cellular networks using a 9-week cellular dataset with 734K+ users and 5327 cell sites. Our analysis examines in details static and dynamic characteristics, predictability, and causes of data hotspots, and their correlation with call hotspots. We show that using standard machine learning methods, future hotspots can be accurately predicted from past observations. We believe the understanding of these key issues will lead to more efficient and responsive resource management and thus better QoS provision in cellular networks. To the best of our knowledge, our work is the first to empirically characterize traffic hotspots in today’s cellular networks.
international conference on heterogeneous networking for quality, reliability, security and robustness | 2014
Ana Nika; Asad Khalid Ismail; Ben Y. Zhao; Sabrina Gaito; Gian Paolo Rossi; Haitao Zheng
The unprecedented growth in mobile data usage is posing significant challenges to cellular operators. One key challenge is how to provide quality of service to subscribers when their residing cell is experiencing a significant amount of traffic, i.e. becoming a traffic hotspot. In this paper, we perform an empirical study on data hotspots in todays cellular networks using a 9-week cellular dataset with 734K+ users and 5327 cell sites. Our analysis examines in details static and dynamic characteristics, predictability, and causes of data hotspots, and their correlation with call hotspots. We believe the understanding of these key issues will lead to more efficient and responsive resource management and thus better QoS provision in cellular networks. To the best of our knowledge, our work is the first to characterize in detail traffic hotspots in todays cellular networks using real data.
IEEE ACM Transactions on Networking | 2018
Gang Wang; Bolun Wang; Tianyi Wang; Ana Nika; Haitao Zheng; Ben Y. Zhao
Real-time crowdsourced maps, such as Waze provide timely updates on traffic, congestion, accidents, and points of interest. In this paper, we demonstrate how lack of strong location authentication allows creation of software-based Sybil devices that expose crowdsourced map systems to a variety of security and privacy attacks. Our experiments show that a single Sybil device with limited resources can cause havoc on Waze, reporting false congestion and accidents and automatically rerouting user traffic. More importantly, we describe techniques to generate Sybil devices at scale, creating armies of virtual vehicles capable of remotely tracking precise movements for large user populations while avoiding detection. To defend against Sybil devices, we propose a new approach based on co-location edges, authenticated records that attest to the one-time physical co-location of a pair of devices. Over time, co-location edges combine to form large proximity graphs that attest to physical interactions between devices, allowing scalable detection of virtual vehicles. We demonstrate the efficacy of this approach using large-scale simulations, and how they can be used to dramatically reduce the impact of the attacks. We have informed Waze/Google team of our research findings. Currently, we are in active collaboration with Waze team to improve the security and privacy of their system.
IEEE Transactions on Cognitive Communications and Networking | 2017
Ana Nika; Zengbin Zhang; Ben Y. Zhao; Haitao Zheng
As spectrum is being released from legacy technologies, reforms in policies and regulations promise to spur wireless growth by distributing spectrum dynamically across wireless networks matching their traffic demands. However, a major obstacle to its adoption remains. There is no effective solution to protect licensed users from spectrum misuse, where users transmit without properly licensing spectrum, and in doing so, interfere and disrupt legitimate flows to whom the spectrum is assigned (and sold). In this paper, we discuss an initial step toward enforcing dynamic spectrum allocation using the concept of spectrum permit, where authorized spectrum users embed secure spectrum permits into data transmissions, enabling patrolling trusted devices to detect devices transmitting without authorization. We highlight the development of spectrum permits, and describe Gelato, a spectrum misuse detection system that minimizes both hardware costs and performance overhead on legitimate data transmissions. We implement Gelato using USRP2 with laptops and lower cost RTL-SDR devices with smartphones. We show that both implementations are robust against attacks and can reliably detect spectrum permits in real time.
hot topics in networks | 2016
Yanzi Zhu; Yibo Zhu; Ana Nika; Ben Y. Zhao; Haitao Zheng
Network transmissions are the cornerstone of most mobile apps today, and a main contributor to energy consumption. We use a componentized energy model to quantify energy use by device, and observe significant energy consumption by the CPU in network operations. We assert that optimizing network operations in the CPU can produce significant energy savings, and explore the impact of two potential approaches: one-copy data moves and offloading the network stack to the basestation.