Detection of Misconfigured BYOD Devices in Wi-Fi Networks

As Bring Your Own Device (BYOD) policy has become widely accepted in the enterprise, anyone with a mobile device that supports Wi-Fi tethering can provide an active wireless Internet connection to other devices without restriction from network administrators. Despite the potential benefits of Wi-Fi...

Full description

Bibliographic Details
Main Author: Jaehyuk Choi
Format: Article
Language:English
Published: MDPI AG 2020-10-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/10/20/7203
_version_ 1797550878031347712
author Jaehyuk Choi
author_facet Jaehyuk Choi
author_sort Jaehyuk Choi
collection DOAJ
description As Bring Your Own Device (BYOD) policy has become widely accepted in the enterprise, anyone with a mobile device that supports Wi-Fi tethering can provide an active wireless Internet connection to other devices without restriction from network administrators. Despite the potential benefits of Wi-Fi tethering, it raises new security issues. The open source nature of mobile operating systems (e.g., Google Android or OpenWrt) can be easily manipulated by selfish users to provide an unfair advantage throughput performance to their tethered devices. The unauthorized tethering can interfere with nearby well-planned access points (APs) within Wi-Fi networks, which results in serious performance problems. In this paper, we first conduct an extensive evaluation study and demonstrate that the abuse of Wi-Fi tethering that adjusts the clear channel access parameters has strong adverse effects in Wi-Fi networks, while providing the manipulated device a high throughput gain. Subsequently, an online detection scheme diagnoses the network condition and detects selfish tethering devices by passively exploiting the packet loss information of on-going transmissions. Our evaluation results show that the proposed method accurately distinguishes the manipulated tethering behavior from other types of misbehavior, including the hidden node problem.
first_indexed 2024-03-10T15:35:43Z
format Article
id doaj.art-a413765f5a9645508d3adb8059633211
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-10T15:35:43Z
publishDate 2020-10-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-a413765f5a9645508d3adb80596332112023-11-20T17:15:49ZengMDPI AGApplied Sciences2076-34172020-10-011020720310.3390/app10207203Detection of Misconfigured BYOD Devices in Wi-Fi NetworksJaehyuk Choi0Department of Software, Gachon University, 1342 Seongnamdaero, Seongnam-si 1320, KoreaAs Bring Your Own Device (BYOD) policy has become widely accepted in the enterprise, anyone with a mobile device that supports Wi-Fi tethering can provide an active wireless Internet connection to other devices without restriction from network administrators. Despite the potential benefits of Wi-Fi tethering, it raises new security issues. The open source nature of mobile operating systems (e.g., Google Android or OpenWrt) can be easily manipulated by selfish users to provide an unfair advantage throughput performance to their tethered devices. The unauthorized tethering can interfere with nearby well-planned access points (APs) within Wi-Fi networks, which results in serious performance problems. In this paper, we first conduct an extensive evaluation study and demonstrate that the abuse of Wi-Fi tethering that adjusts the clear channel access parameters has strong adverse effects in Wi-Fi networks, while providing the manipulated device a high throughput gain. Subsequently, an online detection scheme diagnoses the network condition and detects selfish tethering devices by passively exploiting the packet loss information of on-going transmissions. Our evaluation results show that the proposed method accurately distinguishes the manipulated tethering behavior from other types of misbehavior, including the hidden node problem.https://www.mdpi.com/2076-3417/10/20/7203network monitoringdynamic sensitivity controlWi-Fi tetheringsensing of misbehavior
spellingShingle Jaehyuk Choi
Detection of Misconfigured BYOD Devices in Wi-Fi Networks
Applied Sciences
network monitoring
dynamic sensitivity control
Wi-Fi tethering
sensing of misbehavior
title Detection of Misconfigured BYOD Devices in Wi-Fi Networks
title_full Detection of Misconfigured BYOD Devices in Wi-Fi Networks
title_fullStr Detection of Misconfigured BYOD Devices in Wi-Fi Networks
title_full_unstemmed Detection of Misconfigured BYOD Devices in Wi-Fi Networks
title_short Detection of Misconfigured BYOD Devices in Wi-Fi Networks
title_sort detection of misconfigured byod devices in wi fi networks
topic network monitoring
dynamic sensitivity control
Wi-Fi tethering
sensing of misbehavior
url https://www.mdpi.com/2076-3417/10/20/7203
work_keys_str_mv AT jaehyukchoi detectionofmisconfiguredbyoddevicesinwifinetworks