Tetherway: a framework for tethering camouflage

Steffen Schulz*, Ahmad Reza Sadeghi, Maria Zhdanova, Hossen A. Mustafa, Wenyuan Xu, Vijay Varadharajan

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

8 Citations (Scopus)

Abstract

The rapidly increasing data usage and overload in mobile broadband networks has driven mobile network providers to actively detect and bill customers who tether tablets and laptops to their mobile phone for mobile Internet access. However, users may not be willing to pay additional fees only because they use their bandwidth differently, and may consider tethering detection as violation of their privacy. Furthermore, accurate tethering detection is becoming harder for providers as many modern smartphones are under full control of the user, running customized, complex software and applications similar to desktop systems. In this work, we analyze the network characteristics available to network providers to detect tethering customers. We present and categorize possible detection mechanisms and derive cost factors based on how well the approach scales with large customer bases. For those characteristics that appear most reasonable and practical to deploy by large providers, we present elimination or obfuscation mechanisms and substantiate our design with a prototype Android App.

Original languageEnglish
Title of host publicationWiSec'12 - Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks
EditorsMarwan Krunz
Place of PublicationNew York
PublisherACM
Pages149-159
Number of pages11
ISBN (Print)9781450312653
DOIs
Publication statusPublished - 2012
Event5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec'12 - Tucson, AZ, United States
Duration: 16 Apr 201218 Apr 2012

Other

Other5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec'12
Country/TerritoryUnited States
CityTucson, AZ
Period16/04/1218/04/12

Fingerprint

Dive into the research topics of 'Tetherway: a framework for tethering camouflage'. Together they form a unique fingerprint.

Cite this