Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Detection of Misconfigured Wi-Fi Tethering in Managed Networks

Version 1 : Received: 12 February 2020 / Approved: 14 February 2020 / Online: 14 February 2020 (04:54:35 CET)

How to cite: Choi, J. Detection of Misconfigured Wi-Fi Tethering in Managed Networks. Preprints 2020, 2020020189. Choi, J. Detection of Misconfigured Wi-Fi Tethering in Managed Networks. Preprints 2020, 2020020189.


Wi-Fi tethering using a mobile device (e.g., a smartphone or a tablet) as a hotspot for other devices has become a common practice. Despite the potential benefits of Wi-Fi tethering, the open source nature of mobile operating systems (e.g., Google Android) can be abused by a selfish device to manipulate channel-access parameters to gain an unfair advantage in throughput performance. This can cause serious performance problems within a well-planned Wi-Fi network due to an unauthorized selfish or misconfigured tethering device interfering with nearby well-planned access points (APs). In this paper, we demonstrate that the selfish behavior of a tethering node that adjusts the clear channel assessment (CCA) threshold has strong adverse effects in a multi-AP network, while providing the selfish node a high throughput gain. To mitigate this problem, we present a passive online detection scheme that identifies the network condition and detects selfish tethering nodes with high accuracy by exploiting the packet loss information of on-going transmissions. To the best of our knowledge, this is the first research to consider the problem of detecting a selfish tethering node in managed Wi-Fi networks.


network monitoring; spectrum sharing; Wi-Fi tethering; sensing of misbehavior


Engineering, Electrical and Electronic Engineering

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0

Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.