{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:03Z","timestamp":1750307283543,"version":"3.41.0"},"reference-count":30,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2011,1,22]],"date-time":"2011-01-22T00:00:00Z","timestamp":1295654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2011,1,22]]},"abstract":"<jats:p>Accurate measurements of deployed wireless networks are vital for researchers to perform realistic evaluation of proposed systems. Unfortunately, the difficulty of performing detailed measurements limits the consistency in parameters and methodology of current datasets. Using different datasets, multiple research studies can arrive at conflicting conclusions about the performance of wireless systems. Correcting this situation requires consistent and comparable wireless traces collected from a variety of deployment environments. In this paper, we describe AirLab, a distributed wireless data collection infrastructure that uses uniformly instrumented measurement nodes at heterogeneous locations to collect consistent traces of both standardized and user-defined experiments. We identify four challenges in the AirLab platform, consistency, fidelity, privacy, security, and describe our approaches to address them.<\/jats:p>","DOI":"10.1145\/1925861.1925872","type":"journal-article","created":{"date-parts":[[2011,1,24]],"date-time":"2011-01-24T14:58:13Z","timestamp":1295881093000},"page":"60-65","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["AirLab"],"prefix":"10.1145","volume":"41","author":[{"given":"Vinod","family":"Kone","sequence":"first","affiliation":[{"name":"University of California Santa Barbara, Santa Barbara, USA"}]},{"given":"Mariya","family":"Zheleva","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, USA"}]},{"given":"Mile","family":"Wittie","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, USA"}]},{"given":"Ben Y.","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, USA"}]},{"given":"Elizabeth M.","family":"Belding","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, USA"}]},{"given":"Haitao","family":"Zheng","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, USA"}]},{"given":"Kevin","family":"Almeroth","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,1,22]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"http:\/\/www.hacom.net.  http:\/\/www.hacom.net."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452531"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015482"},{"key":"e_1_2_1_4_1","volume-title":"July","author":"AGUILARA J.","year":"2008","unstructured":"AGUILARA . J. Packet trace anonymization with pktanon. Hack a day , July 2008 . http:\/\/hackaday.com\/2008\/07\/11\/ packet-trace-anonymization-with-pktanon. AGUILARA.J. Packet trace anonymization with pktanon. Hack a day, July 2008. http:\/\/hackaday.com\/2008\/07\/11\/ packet-trace-anonymization-with-pktanon."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080829.1080849"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1403006"},{"key":"e_1_2_1_7_1","volume-title":"Proc. of NSDI (March","author":"BAVIER A.","year":"2004","unstructured":"BAVIER , A. , ET AL . Operating system support for planetary-scale network services . In Proc. of NSDI (March 2004 ). BAVIER, A., ET AL. Operating system support for planetary-scale network services. In Proc. of NSDI (March 2004)."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159916"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287884"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1672308.1672310"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.24"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159920"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282384"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.03.033"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452532"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023720.1023739"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251086.1251111"},{"key":"e_1_2_1_18_1","volume-title":"Proc. of NSDI","author":"JUDD G.","year":"2005","unstructured":"JUDD , G. , AND STEENKISTE , P. Using emulation to understand and improve wireless networks and applications . In Proc. of NSDI ( 2005 ). JUDD, G., AND STEENKISTE, P. Using emulation to understand and improve wireless networks and applications. In Proc. of NSDI (2005)."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570659"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159923"},{"key":"e_1_2_1_21_1","volume-title":"Proc. of NSDI","author":"MURTY R.","year":"2008","unstructured":"MURTY , R. , ET AL . Designing high performance enterprise wi-fi networks . In Proc. of NSDI ( 2008 ). MURTY, R., ET AL. Designing high performance enterprise wi-fi networks. In Proc. of NSDI (2008)."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111330"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064264"},{"key":"e_1_2_1_24_1","volume-title":"Proc. of IMC (Oct.","author":"RAGHAVENDRA R.","year":"2007","unstructured":"RAGHAVENDRA , R. , ET AL . Unwanted link layer traffic in large IEEE 802.11 wireless networks . In Proc. of IMC (Oct. 2007 ). RAGHAVENDRA, R., ET AL. Unwanted link layer traffic in large IEEE 802.11 wireless networks. In Proc. of IMC (Oct. 2007)."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424763"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24668-8_17"},{"key":"e_1_2_1_27_1","volume-title":"Proc. of IPSN (April","author":"WERNER-ALLEN G.","year":"2005","unstructured":"WERNER-ALLEN , G. , SWIESKOWSKI , P. , ANDWELSH , M. Motelab : A wireless sensor network testbed . In Proc. of IPSN (April 2005 ). WERNER-ALLEN,G.,SWIESKOWSKI,P.,ANDWELSH,M. Motelab: A wireless sensor network testbed. In Proc. of IPSN (April 2005)."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2006.11"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1554126.1554139"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287876"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1925861.1925872","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1925861.1925872","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:33Z","timestamp":1750244373000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1925861.1925872"}},"subtitle":["consistency, fidelity and privacy in wireless measurements"],"short-title":[],"issued":{"date-parts":[[2011,1,22]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1,22]]}},"alternative-id":["10.1145\/1925861.1925872"],"URL":"https:\/\/doi.org\/10.1145\/1925861.1925872","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2011,1,22]]},"assertion":[{"value":"2011-01-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}