Detection of Misconfigured BYOD Devices in Wi-Fi Networks
As Bring Your Own Device (BYOD) policy has become widely accepted in the enterprise, anyone with a mobile device that supports Wi-Fi tethering can provide an active wireless Internet connection to other devices without restriction from network administrators. Despite the potential benefits of Wi-Fi...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-10-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/10/20/7203 |
_version_ | 1797550878031347712 |
---|---|
author | Jaehyuk Choi |
author_facet | Jaehyuk Choi |
author_sort | Jaehyuk Choi |
collection | DOAJ |
description | As Bring Your Own Device (BYOD) policy has become widely accepted in the enterprise, anyone with a mobile device that supports Wi-Fi tethering can provide an active wireless Internet connection to other devices without restriction from network administrators. Despite the potential benefits of Wi-Fi tethering, it raises new security issues. The open source nature of mobile operating systems (e.g., Google Android or OpenWrt) can be easily manipulated by selfish users to provide an unfair advantage throughput performance to their tethered devices. The unauthorized tethering can interfere with nearby well-planned access points (APs) within Wi-Fi networks, which results in serious performance problems. In this paper, we first conduct an extensive evaluation study and demonstrate that the abuse of Wi-Fi tethering that adjusts the clear channel access parameters has strong adverse effects in Wi-Fi networks, while providing the manipulated device a high throughput gain. Subsequently, an online detection scheme diagnoses the network condition and detects selfish tethering devices by passively exploiting the packet loss information of on-going transmissions. Our evaluation results show that the proposed method accurately distinguishes the manipulated tethering behavior from other types of misbehavior, including the hidden node problem. |
first_indexed | 2024-03-10T15:35:43Z |
format | Article |
id | doaj.art-a413765f5a9645508d3adb8059633211 |
institution | Directory Open Access Journal |
issn | 2076-3417 |
language | English |
last_indexed | 2024-03-10T15:35:43Z |
publishDate | 2020-10-01 |
publisher | MDPI AG |
record_format | Article |
series | Applied Sciences |
spelling | doaj.art-a413765f5a9645508d3adb80596332112023-11-20T17:15:49ZengMDPI AGApplied Sciences2076-34172020-10-011020720310.3390/app10207203Detection of Misconfigured BYOD Devices in Wi-Fi NetworksJaehyuk Choi0Department of Software, Gachon University, 1342 Seongnamdaero, Seongnam-si 1320, KoreaAs Bring Your Own Device (BYOD) policy has become widely accepted in the enterprise, anyone with a mobile device that supports Wi-Fi tethering can provide an active wireless Internet connection to other devices without restriction from network administrators. Despite the potential benefits of Wi-Fi tethering, it raises new security issues. The open source nature of mobile operating systems (e.g., Google Android or OpenWrt) can be easily manipulated by selfish users to provide an unfair advantage throughput performance to their tethered devices. The unauthorized tethering can interfere with nearby well-planned access points (APs) within Wi-Fi networks, which results in serious performance problems. In this paper, we first conduct an extensive evaluation study and demonstrate that the abuse of Wi-Fi tethering that adjusts the clear channel access parameters has strong adverse effects in Wi-Fi networks, while providing the manipulated device a high throughput gain. Subsequently, an online detection scheme diagnoses the network condition and detects selfish tethering devices by passively exploiting the packet loss information of on-going transmissions. Our evaluation results show that the proposed method accurately distinguishes the manipulated tethering behavior from other types of misbehavior, including the hidden node problem.https://www.mdpi.com/2076-3417/10/20/7203network monitoringdynamic sensitivity controlWi-Fi tetheringsensing of misbehavior |
spellingShingle | Jaehyuk Choi Detection of Misconfigured BYOD Devices in Wi-Fi Networks Applied Sciences network monitoring dynamic sensitivity control Wi-Fi tethering sensing of misbehavior |
title | Detection of Misconfigured BYOD Devices in Wi-Fi Networks |
title_full | Detection of Misconfigured BYOD Devices in Wi-Fi Networks |
title_fullStr | Detection of Misconfigured BYOD Devices in Wi-Fi Networks |
title_full_unstemmed | Detection of Misconfigured BYOD Devices in Wi-Fi Networks |
title_short | Detection of Misconfigured BYOD Devices in Wi-Fi Networks |
title_sort | detection of misconfigured byod devices in wi fi networks |
topic | network monitoring dynamic sensitivity control Wi-Fi tethering sensing of misbehavior |
url | https://www.mdpi.com/2076-3417/10/20/7203 |
work_keys_str_mv | AT jaehyukchoi detectionofmisconfiguredbyoddevicesinwifinetworks |