• DocumentCode
    16017
  • Title

    On Selfish Configuration in Wi-Fi Tethering

  • Author

    Jaehyuk Choi ; Min, Alexander W. ; Shin, Kang G.

  • Author_Institution
    Dept. of Software Design & Manage., Gachon Univ., Seongnam, South Korea
  • Volume
    17
  • Issue
    5
  • fYear
    2013
  • fDate
    May-13
  • Firstpage
    841
  • Lastpage
    843
  • Abstract
    Due to the ease of setting up a Wi-Fi hotspot and the availability of readily configurable mobile operating systems, Wi-Fi tethering can be abused by misbehaving users to gain an unfair advantage in throughput performance. In this paper, we study the problem of detecting selfish nodes in Wi-Fi tethering environments. In particular, selfish nodes can manipulate carrier sensing thresholds to exploit recent advances in physical-layer concurrent transmission technologies as well as short link distance in a tethered network so as to achieve unfair throughput gains while evading detection. We propose a new MAC-layer detection algorithm based on frame sequence numbers that accurately detects selfish nodes.
  • Keywords
    access protocols; wireless LAN; MAC-layer detection algorithm; Wi-Fi tethering environment; carrier sensing thresholds; configurable mobile operating systems; frame sequence numbers; physical-layer concurrent transmission technology; selfish configuration; selfish node detection; IEEE 802.11 Standards; Interference; Monitoring; Protocols; Receivers; Silicon; Throughput; IEEE 802.11; Selfish behavior; Wi-Fi tethering; detection algorithm; sequence number;
  • fLanguage
    English
  • Journal_Title
    Communications Letters, IEEE
  • Publisher
    ieee
  • ISSN
    1089-7798
  • Type

    jour

  • DOI
    10.1109/LCOMM.2013.040213.122488
  • Filename
    6496986