TU Darmstadt / ULB / TUbiblio

Tetherway: A Framework for Tethering Camouflage

Schulz, Steffen and Sadeghi, Ahmad-Reza and Zhdanova, Maria and Xu, Wenyuan and Mustafa, Hossen and Varadharajan, Vijay (2012):
Tetherway: A Framework for Tethering Camouflage.
In: Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), ACM Press, Tuscon, Arizona, ISBN 978-1-4503-1265-3,
[Conference or Workshop Item]

Abstract

The rapidly increasing data usage and overload in mobile broadband networks has driven mobile network providers to actively detect and bill customers who tether tablets and laptops to their mobile phone for mobile Internet access. However, users may not be willing to pay additional fees only because they use their bandwidth differently, and may con- sider tethering detection as violation of their privacy. Fur- thermore, accurate tethering detection is becoming harder for providers as many modern smartphones are under full control of the user, running customized, complex software and applications similar to desktop systems. In this work, we analyze the network characteristics avail- able to network providers to detect tethering customers. We present and categorize possible detection mechanisms and derive cost factors based on how well the approach scales with large customer bases. For those characteristics that appear most reasonable and practical to deploy by large providers, we present elimination or obfuscation mechanisms and substantiate our design with a prototype Android App.

Item Type: Conference or Workshop Item
Erschienen: 2012
Creators: Schulz, Steffen and Sadeghi, Ahmad-Reza and Zhdanova, Maria and Xu, Wenyuan and Mustafa, Hossen and Varadharajan, Vijay
Title: Tetherway: A Framework for Tethering Camouflage
Language: German
Abstract:

The rapidly increasing data usage and overload in mobile broadband networks has driven mobile network providers to actively detect and bill customers who tether tablets and laptops to their mobile phone for mobile Internet access. However, users may not be willing to pay additional fees only because they use their bandwidth differently, and may con- sider tethering detection as violation of their privacy. Fur- thermore, accurate tethering detection is becoming harder for providers as many modern smartphones are under full control of the user, running customized, complex software and applications similar to desktop systems. In this work, we analyze the network characteristics avail- able to network providers to detect tethering customers. We present and categorize possible detection mechanisms and derive cost factors based on how well the approach scales with large customer bases. For those characteristics that appear most reasonable and practical to deploy by large providers, we present elimination or obfuscation mechanisms and substantiate our design with a prototype Android App.

Title of Book: Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)
Publisher: ACM Press
ISBN: 978-1-4503-1265-3
Uncontrolled Keywords: Secure Things;Secure Architectures
Divisions: 20 Department of Computer Science
20 Department of Computer Science > System Security Lab
Profile Areas
Profile Areas > Cybersecurity (CYSEC)
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
Event Location: Tuscon, Arizona
Date Deposited: 04 Aug 2016 10:13
Identification Number: TUD-CS-2012-0026
Related URLs:
Export:
Suche nach Titel in: TUfind oder in Google

Optionen (nur für Redakteure)

View Item View Item