Srikanth V. Krishnamurthy

University of California, Riverside, Riverside, California, United States

Are you Srikanth V. Krishnamurthy?

Claim your profile

Publications (191)120.14 Total impact

  • Jongwon Yoon · Mustafa Y. Arslan · Karthikeyan Sundaresan · Srikanth V. Krishnamurthy · Suman Banerjee ·
    [Show abstract] [Hide abstract]
    ABSTRACT: Next generation wireless networks (i.e., WiMAX, LTE) provide higher bandwidth and spectrum efficiency leveraging smaller (femto) cells with orthogonal frequency division multiple access (OFDMA). The uncoordinated, dense deployments of femtocells however, pose several unique challenges relating to interference and resource management in OFDMA femtocell networks. Towards addressing these challenges, we propose RADION, a distributed resource management framework that effectively manages interference across femtocells. RADION’s core building blocks enable femtocells to opportunistically determine the available resources in a completely distributed and efficient manner. Further, RADION’s modular nature paves the way for different resource management solutions to be incorporated in the framework. We implement RADION on a real WiMAX femtocell testbed deployed in a typical indoor setting. Two distributed solutions are enabled through RADION and their performance is studied to highlight their quick self-organization into efficient resource allocations.
    IEEE Transactions on Mobile Computing 04/2015; 14(4):843-857. DOI:10.1109/TMC.2014.2338302 · 2.54 Impact Factor

  • IEEE Transactions on Mobile Computing 01/2015; DOI:10.1109/TMC.2015.2405532 · 2.54 Impact Factor
  • Mustafa Y. Arslan · Karthikeyan Sundaresan · Srikanth V. Krishnamurthy · Sampath Rangarajan ·

    IEEE/ACM Transactions on Networking 01/2015; DOI:10.1109/TNET.2015.2393356 · 1.81 Impact Factor

  • IEEE/ACM Transactions on Networking 01/2015; DOI:10.1109/TNET.2015.2438775 · 1.81 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: Every night, many smartphones are plugged into a power source for recharging the battery. Given the increasing computing capabilities of smartphones, these idle phones constitute a sizeable computing infrastructure. Therefore, for an enterprise which supplies its employees with smartphones, we argue that a computing infrastructure that leverages idle smartphones being charged overnight is an energy-efficient and cost-effective alternative to running certain tasks on traditional servers. While parallel execution models and schedulers exist for servers, smartphones face a unique set of technical challenges due to the heterogeneity in CPU clock speed, variability in network bandwidth, and lower availability than servers. In this paper, we address many of these challenges to develop CWC—a distributed computing infrastructure using smartphones. We implement and evaluate a prototype of CWC that employs a novel scheduling algorithm to minimize the makespan of a set of computing tasks. Our evaluations using a testbed of $18$ Android phones show that CWC’s scheduler yields a makespan that is 1.6x faster than other simpler approaches.
    IEEE Transactions on Mobile Computing 01/2014; 14(8):1-1. DOI:10.1109/TMC.2014.2362753 · 2.54 Impact Factor
  • George Papageorgiou · Shailendra Singh · Srikanth V. Krishnamurthy · Ramesh Govindan · Tom La Porta ·
    [Show abstract] [Hide abstract]
    ABSTRACT: Traditional routing metrics designed for wireless networks are application-agnostic. In this paper, we consider a wireless network where the application flows consist of video traffic. From a user perspective, reducing the level of video distortion is critical. We ask the question “Should the routing policies change if the end-to-end video distortion is to be minimized?” Popular link-quality-based routing metrics (such as ETX) do not account for dependence (in terms of congestion) across the links of a path; as a result, they can cause video flows to converge onto a few paths and, thus, cause high video distortion. To account for the evolution of the video frame loss process, we construct an analytical framework to, first, understand and, second, assess the impact of the wireless network on video distortion. The framework allows us to formulate a routing policy for minimizing distortion, based on which we design a protocol for routing video traffic. We find via simulations and testbed experiments that our protocol is efficient in reducing video distortion and minimizing the user experience degradation.
    IEEE/ACM Transactions on Networking 01/2014; 23(2):1-1. DOI:10.1109/TNET.2014.2302815 · 1.81 Impact Factor
  • George Papageorgiou · John Gasparis · Srikanth V. Krishnamurthy · Ramesh Govindan · Tom La Porta ·
    [Show abstract] [Hide abstract]
    ABSTRACT: Video transfers using smartphones are becoming increasingly popular. To prevent the interception of content from eavesdroppers, video flows must be encrypted. However, encryption results in a cost in terms of processing delays and energy consumed on the user's device. We argue that encrypting only certain parts of the flow can create sufficiently high distortion at an eavesdropper preserving content confidentiality as a result. By selective encryption, one can reduce delay and the battery consumption on the mobile device. We develop a mathematical framework that captures the impact of the encryption process on the delay experienced by a flow, and the distortion seen by an eavesdropper. This provides a quick and efficient way of determining the right parts of a video flow that must be encrypted to preserve confidentiality, while limiting performance penalties. In practice, it can aid a user in choosing the right level of encryption. We validate our model via extensive experiments with different encryption policies using Android smartphones. We observe that by selectively encrypting parts of a video flow one can preserve the confidentiality while reducing delay by as much as 75% and the energy consumption by as much as 92%.
    Proceedings of the ninth ACM conference on Emerging networking experiments and technologies; 12/2013
  • Mustafa Y. Arslan · Jongwon Yoon · Karthikeyan Sundaresan · Srikanth V. Krishnamurthy · Suman Banerjee ·
    [Show abstract] [Hide abstract]
    ABSTRACT: To meet the capacity demands from ever-increasing mobile data usage, mobile network operators are moving toward smaller cell structures. These small cells, called femtocells, use sophisticated air interface technologies such as orthogonal frequency division multiple access (OFDMA). While femtocells are expected to provide numerous benefits such as energy efficiency and better throughput, the interference resulting from their dense deployments prevents such benefits from being harnessed in practice. Thus, there is an evident need for a resource management solution to mitigate the interference that occurs between collocated femtocells. In this paper, we design and implement one of the first resource management systems, FERMI, for OFDMA-based femtocell networks. As part of its design, FERMI: 1) provides resource isolation in the frequency domain (as opposed to time) to leverage power pooling across cells to improve capacity; 2) uses measurement-driven triggers to intelligently distinguish clients that require just link adaptation from those that require resource isolation; 3) incorporates mechanisms that enable the joint scheduling of both types of clients in the same frame; and 4) employs efficient, scalable algorithms to determine a fair resource allocation across the entire network with high utilization and low overhead. We implement FERMI on a prototype four-cell WiMAX femtocell testbed and show that it yields significant gains over conventional approaches.
    IEEE/ACM Transactions on Networking 10/2013; 21(5):1447-1460. DOI:10.1109/TNET.2012.2226245 · 1.81 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: Malicious interference injection or jamming is one of the simplest ways to disrupt wireless communications. Prior approaches can alleviate jamming interference to a limited extent; they are especially vulnerable to a reactive jammer i.e., a jammer that injects noise upon sensing a legitimate transmission or wideband jamming. In this paper, we leverage the inherent features of OFDM (Orthogonal Frequency Division Multiplexing) to cope with such attacks. Specifically, via extensive experiments, we observe that the jamming signal experiences differing levels of fading across the composite sub-carriers in its transmission bandwidth. Thus, if the legitimate transmitter were to somehow exploit the relatively unaffected sub-carriers to transmit data to the receiver, it could achieve reasonable throughputs, even in the presence of the active jammer. We design and implement JIMS, a Jamming Interference Mitigation Scheme that exploits the above characteristic by overcoming key practical challenges. Via extensive testbed experiments and simulations we show that JIMS achieves a throughput restoration of up to 75% in the presence of an active jammer.
    2013 21st IEEE International Conference on Network Protocols (ICNP); 10/2013
  • [Show abstract] [Hide abstract]
    ABSTRACT: Cloud-based radio access networks (C-RAN) have been proposed as a cost-efficient way of deploying small cells. Unlike conventional RANs, a C-RAN decouples the baseband processing unit (BBU) from the remote radio head (RRH), allowing for centralized operation of BBUs and scalable deployment of light-weight RRHs as small cells. In this work, we argue that the intelligent configuration of the front-haul network between the BBUs and RRHs, is essential in delivering the performance and energy benefits to the RAN and the BBU pool, respectively. We then propose FluidNet - a scalable, light-weight framework for realizing the full potential of C-RAN. FluidNet deploys a logically re-configurable front-haul to apply appropriate transmission strategies in different parts of the network and hence cater effectively to both heterogeneous user profiles and dynamic traffic load patterns. FluidNet's algorithms determine configurations that maximize the traffic demand satisfied on the RAN, while simultaneously optimizing the compute resource usage in the BBU pool. We prototype FluidNet on a 6 BBU, 6 RRH WiMAX C-RAN testbed. Prototype evaluations and large-scale simulations reveal that FluidNet's ability to re-configure its front-haul and tailor transmission strategies provides a 50% improvement in satisfying traffic demands, while reducing the compute resource usage in the BBU pool by 50% compared to baseline transmission schemes.
    Proceedings of the 19th annual international conference on Mobile computing & networking; 09/2013
  • Source
    Tae-Suk Kim · Gentian Jakllari · Srikanth V. Krishnamurthy · Michalis Faloutsos ·
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we propose a new integrated framework for joint routing and rate adaptation in multi-rate multi-hop wireless networks. Unlike many previous efforts, our framework considers several factors that affect end-to-end performance. Among these factors, the framework takes into account the effect of the relative positions of the links on a path when choosing the rates of operation and the importance of avoiding congested areas. The key element of our framework is a new comprehensive path metric that we call ETM (for expected transmission cost in multi-rate wireless networks). We analytically derive the ETM metric. We show that the ETM metric can be used to determine the best end-to-end path with a greedy routing approach. We also show that the metric can be used to dynamically select the best transmission rate for each link on the path via a dynamic programming approach. We implement the ETM-framework on an indoor wireless mesh network and compare its performance with that of frameworks based on the popular ETT and the recently proposed ETOP metrics. Our experiments demonstrate that the ETM-framework can yield throughput improvements of up to 253 and 368 % as compared with the ETT and ETOP frameworks.
    Wireless Networks 07/2013; 19(5). DOI:10.1007/s11276-012-0513-5 · 0.96 Impact Factor
  • Jianxia Ning · Konstantinos Pelechrinis · S.V. Krishnamurthy · Ramesh Govindan ·
    [Show abstract] [Hide abstract]
    ABSTRACT: Transmission Evidence (TE for short) refers to a historic trail of the packet transmissions in the network. TE is collected and maintained in a distributed manner by the nodes in the network and can be queried on demand by a network forensics system to trace past events. The latter can facilitate crucial applications such as identifying malicious or malfunctioning nodes. Recently, we developed an analytical framework towards computing the likelihood of TE availability in wireless networks. Our prior efforts [1] brought to light the impact of the network's operational parameters (such as transmission rate and packet length) on the availability of TE. However, provisioning for TE could impact the network performance in terms of throughput and/or delay. Our objective in this work is to capture and quantify the trade-offs between provisioning transmission evidence and achieving high performance in wireless networks. In particular, we investigate the network performance hit, under the constraint of TE availability guarantees. Our results indicate that the performance remains unaffected up to a certain TE requirement. Beyond this, the throughput could degrade and the delay could increase by as much as 30%. To the best of our knowledge, this is the first study of its kind.
    Communications (ICC), 2013 IEEE International Conference on; 06/2013
  • [Show abstract] [Hide abstract]
    ABSTRACT: The wide channels feature combines two adjacent channels to form a new, wider channel to facilitate high-data-rate transmissions in multiple-input-multiple-output (MIMO)-based IEEE 802.11n networks. Using a wider channel can exacerbate interference effects. Furthermore, contrary to what has been reported by prior studies, we find that wide channels do not always provide benefits in isolation (i.e., one link without interference) and can even degrade performance. We conduct an in-depth, experimental study to understand the implications of wide channels on throughput performance. Based on our measurements, we design an auto-configuration framework called ACORN for enterprise 802.11n WLANs. ACORN integrates the functions of user association and channel allocation since our study reveals that they are tightly coupled when wide channels are used. We show that the channel allocation problem with the constraints of wide channels is NP-complete. Thus, ACORN uses an algorithm that provides a worst-case approximation ratio of O(1/Δ + 1), with Δ being the maximum node degree in the network. We implement ACORN on our 802.11n testbed. Our evaluations show that ACORN: 1) outperforms previous approaches that are agnostic to wide channels constraints; it provides per-AP throughput gains ranging from 1.5 × 6×; and 2) in practice, its channel allocation module achieves an approximation ratio much better than the theoretically predicted O(1/Δ + 1).
    IEEE/ACM Transactions on Networking 06/2013; 21(3):896-909. DOI:10.1109/TNET.2012.2218125 · 1.81 Impact Factor
  • Tae-Suk Kim · Yong Yang · J.C. Hou · S.V. Krishnamurthy ·
    [Show abstract] [Hide abstract]
    ABSTRACT: Many next generation applications (such as video flows) are likely to have associated minimum data rate requirements in order to ensure satisfactory quality as perceived by end-users. In this paper, we develop a framework to address the problem of maximizing the aggregate utility of traffic flows in a multi-hop wireless network, with constraints imposed both due to self-interference and minimum rate requirements. The parameters that are tuned in order to maximize the utility are (i) transmission powers of individual nodes and (ii) the channels assigned to the different communication links. Our framework is based on using a cross-decomposition technique that takes both inter-flow interference and self-interference into account. The output of our framework is a schedule that dictates what links are to be activated in each slot and the parameters associated with each of those links. If the minimum rate constraint cannot be satisfied for all of the flows, the framework intelligently rejects a sub-set of the flows and recomputes a schedule for the remaining flows. We also design an admission control module that determines if new flows can be admitted without violating the rate requirements of the existing flows in the network. We provide numerical results to demonstrate the efficacy of our framework.
    IEEE Transactions on Wireless Communications 05/2013; 12(5):2046-2054. DOI:10.1109/TWC.2013.021213.120285 · 2.50 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: Although today's online social networks provide some privacy controls to protect a user's shared content from other users, these controls aren't sufficiently expressive to provide fine-grained protection. Twitsper offers fine-grained control over who sees a Twitter user's messages, enabling private group communication while preserving Twitter's commercial interests.
    IEEE Security and Privacy Magazine 05/2013; 11(3):46-50. DOI:10.1109/MSP.2013.3 · 0.73 Impact Factor
  • Zi Feng · George Papageorgiou · Srikanth V. Krishnamurthy · Ramesh Govindan · Tom La Porta ·
    [Show abstract] [Hide abstract]
    ABSTRACT: The end-user experience in viewing a video depends on the distortion; however, also of importance is the delay experienced by the packets of the video flow since it impacts the timeliness of the information contained and the playback rate at the receiver. Unfortunately, these performance metrics are in conflict with each other in a wireless network. Packet losses can be minimized by perfectly avoiding interference by separating transmissions in time or frequency; however, this decreases the rate at which transmissions occur, and this increases delay. Relaxing the requirement for interference avoidance can lead to packet losses and thus increase distortion, but can decrease the delay for those packets that are delivered. In this paper, we investigate this trade-off between distortion and delay for video. To understand the trade-off between video quality and packet delay, we develop an analytical framework that accounts for characteristics of the network (e.g. interference, channel variations) and the video content (motion level), assuming as a basis, a simple channel access policy that provides flexibility in managing the interference in the network. We validate our model via extensive simulations. Surprisingly, we find that the trade-off depends on the specific features of the video flow: it is better to trade-off high delay for low distortion with fast motion video, but not with slow motion video. Specifically, for an increase in PSNR (a metric that quantifies distortion) from 20 to 25 dB, the penalty in terms of the increase in mean delay with fast motion video is 91 times that with slow motion video. Our simulation results further quantify the trade-offs in various scenarios.
    INFOCOM, 2013 Proceedings IEEE; 04/2013
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Network coding has been shown to offer significant throughput benefits over store-and-forward routing in certain wireless network topologies. However, the application of network coding may not always improve the network performance. In this paper1, we provide a comprehensive analytical study, which helps in assessing when network coding is preferable to a traditional store-and-forward approach. Interestingly, our study reveals that in many topological scenarios, network coding can in fact hurt the throughput performance; in such scenarios, applying the store-and-forward approach leads to higher network throughput. We validate our analytical findings via extensive testbed experiments, and we extract guidelines on when network coding should be applied instead of store-and-forward.
    INFOCOM, 2013 Proceedings IEEE; 01/2013
  • [Show abstract] [Hide abstract]
    ABSTRACT: Every night, a large number of idle smartphones are plugged into a power source for recharging the battery. Given the increasing computing capabilities of smartphones, these idle phones constitute a sizeable computing infrastructure. Therefore, for an enterprise which supplies its employees with smartphones, we argue that a computing infrastructure that leverages idle smartphones being charged overnight is an energy-efficient and cost-effective alternative to running tasks on traditional server infrastructure. While parallel execution and scheduling models exist for servers (e.g., MapReduce), smartphones present a unique set of technical challenges due to the heterogeneity in CPU clock speed, variability in network bandwidth, and lower availability compared to servers. In this paper, we address many of these challenges to develop CWC---a distributed computing infrastructure using smartphones. Specifically, our contributions are: (i) we profile the charging behaviors of real phone owners to show the viability of our approach, (ii) we enable programmers to execute parallelizable tasks on smartphones with little effort, (iii) we develop a simple task migration model to resume interrupted task executions, and (iv) we implement and evaluate a prototype of CWC (with 18 Android smartphones) that employs an underlying novel scheduling algorithm to minimize the makespan of a set of tasks. Our extensive evaluations demonstrate that the performance of our approach makes our vision viable. Further, we explicitly evaluate the performance of CWC's scheduling component to demonstrate its efficacy compared to other possible approaches.
    Proceedings of the 8th international conference on Emerging networking experiments and technologies; 12/2012
  • [Show abstract] [Hide abstract]
    ABSTRACT: User privacy has been an increasingly growing concern in online social networks (OSNs). While most OSNs today provide some form of privacy controls so that their users can protect their shared content from other users, these controls are typically not sufficiently expressive and/or do not provide fine-grained protection of information. In this paper, we consider the introduction of a new privacy control---group messaging on Twitter, with users having fine-grained control over who can see their messages. Specifically, we demonstrate that such a privacy control can be offered to users of Twitter today without having to wait for Twitter to make changes to its system. We do so by designing and implementing Twitsper, a wrapper around Twitter that enables private group communication among existing Twitter users while preserving Twitter's commercial interests. Our design preserves the privacy of group information (i.e., who communicates with whom) both from the Twitsper server as well as from undesired Twitsper users. Furthermore, our evaluation shows that our implementation of Twitsper imposes minimal server-side bandwidth requirements and incurs low client-side energy consumption. Our Twitsper client for Android-based devices has been downloaded by over 1000 users and its utility has been noted by several media articles.
    Proceedings of the 28th Annual Computer Security Applications Conference; 12/2012
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: With ever increasing usage of handheld devices and vast deployment of wireless networks, we observe that it is possible to collect data from mobile devices and reveal personal relationships of their owners. In the paper, we exploit the hidden information collected from WLAN devices and infer individual relationships between device pairs based on three observation dimensions: network association history, physical proximity and spatio-temporal behavior. By measuring WLAN data, we demonstrate that device owners with social relationship tend to share access points, or show similar behavior patterns in wireless communications (e.g. go to the same place periodically to access the same WLAN network). These results can be exploited for various network analytic purposes.

Publication Stats

4k Citations
120.14 Total Impact Points


  • 2002-2013
    • University of California, Riverside
      • Department of Computer Science and Engineering
      Riverside, California, United States
  • 2011
    • University of Thessaly
      Iolcus, Thessaly, Greece
  • 1997-2001
    • California State University
      • Department of Electrical & Computer Engineering
      Long Beach, California, United States
  • 2000
    • University of Illinois, Urbana-Champaign
      • Coordinated Science Laboratory
      Urbana, IL, United States
  • 1998-2000
    • HRL Laboratories, LLC
      Malibu, California, United States
    • Concordia University Montreal
      Montréal, Quebec, Canada
  • 1999
    • University of California, San Diego
      • Department of Electrical and Computer Engineering
      San Diego, CA, United States