Article
Version 1
Preserved in Portico This version is not peer-reviewed
Detection of Misconfigured Wi-Fi Tethering in Managed Networks
Version 1
: Received: 12 February 2020 / Approved: 14 February 2020 / Online: 14 February 2020 (04:54:35 CET)
How to cite: Choi, J. Detection of Misconfigured Wi-Fi Tethering in Managed Networks. Preprints 2020, 2020020189. https://doi.org/10.20944/preprints202002.0189.v1 Choi, J. Detection of Misconfigured Wi-Fi Tethering in Managed Networks. Preprints 2020, 2020020189. https://doi.org/10.20944/preprints202002.0189.v1
Abstract
Wi-Fi tethering using a mobile device (e.g., a smartphone or a tablet) as a hotspot for other devices has become a common practice. Despite the potential benefits of Wi-Fi tethering, the open source nature of mobile operating systems (e.g., Google Android) can be abused by a selfish device to manipulate channel-access parameters to gain an unfair advantage in throughput performance. This can cause serious performance problems within a well-planned Wi-Fi network due to an unauthorized selfish or misconfigured tethering device interfering with nearby well-planned access points (APs). In this paper, we demonstrate that the selfish behavior of a tethering node that adjusts the clear channel assessment (CCA) threshold has strong adverse effects in a multi-AP network, while providing the selfish node a high throughput gain. To mitigate this problem, we present a passive online detection scheme that identifies the network condition and detects selfish tethering nodes with high accuracy by exploiting the packet loss information of on-going transmissions. To the best of our knowledge, this is the first research to consider the problem of detecting a selfish tethering node in managed Wi-Fi networks.
Keywords
network monitoring; spectrum sharing; Wi-Fi tethering; sensing of misbehavior
Subject
Engineering, Electrical and Electronic Engineering
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment