Show simple item record

Inference methods for message endpoint localization in networks.

dc.contributor.authorJustice, Derek H.
dc.contributor.advisorIII, Alfred O. Hero,
dc.date.accessioned2016-08-30T16:09:35Z
dc.date.available2016-08-30T16:09:35Z
dc.date.issued2006
dc.identifier.urihttp://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:3237987
dc.identifier.urihttps://hdl.handle.net/2027.42/126185
dc.description.abstractPeople often build or organize networks in order to establish lines of communication. The subjects might utilize a telephone or computer network, or perhaps even something much more low-tech where certain individuals are designated to deliver messages in person. When certain parties of interest are communicating, it is desirable to monitor these networks in order to discover their motives, identities, and locations. Presently, government and private agencies are investing heavily in the development of equipment for network surveillance and algorithms for gleaning useful information from collected data. This thesis develops several tools for inference in networks with a focus on determining the locations of the sender and receiver of an intercepted message. We begin by deriving a distance metric that allows comparisons between different network topologies. The metric quantifies the distance between networks by the total cost of edit operations (such as node or link insertion or deletion) necessary to make the two networks isomorphic. We derive this graph edit distance through a sort of embedding scheme, and show how to compute it with a binary linear program. Upper and lower bounds are computable in polynomial time through relaxation to an assignment problem and standard linear programming, respectively. We move next to the estimation of an intercepted message's source and destination in a network of unknown topology. Sensors placed on some links or nodes in the network are capable of indicating whenever a specific message passes their assigned elements with a limited degree of timing precision. The source and destination (endpoints) are localized using a possibly unordered sensor activation pattern along with some prior information on the unknown network topology. We first use a semidefinite programming driven Monte Carlo approach to build approximate endpoint posterior distributions. Maximum a posteriori endpoint estimates can then be read directly from these. Next we utilize a hierarchical Bayesian model and a recursive expectation-maximization algorithm to develop online techniques for endpoint localization. Finally, some preliminary derivations are given for the application of well-known Markov chain Monte Carlo algorithms to this problem.
dc.format.extent153 p.
dc.languageEnglish
dc.language.isoEN
dc.subjectInference
dc.subjectIntercepted Messages
dc.subjectLocalization
dc.subjectMessage Endpoint
dc.subjectMethods
dc.subjectNetworks
dc.subjectSurveillance
dc.titleInference methods for message endpoint localization in networks.
dc.typeThesis
dc.description.thesisdegreenamePhDen_US
dc.description.thesisdegreedisciplineApplied Sciences
dc.description.thesisdegreedisciplineElectrical engineering
dc.description.thesisdegreedisciplineSystems science
dc.description.thesisdegreegrantorUniversity of Michigan, Horace H. Rackham School of Graduate Studies
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/126185/2/3237987.pdf
dc.owningcollnameDissertations and Theses (Ph.D. and Master's)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.