Assessing the Cooperativeness of Users in Wi-Fi Networks
Szymon Szott, Grzegorz Ptaszek and Lucjan Janowski
AGH University of Science and Technology, 30-059 Krakow, Poland
Keywords:
Wi-Fi, Network, Selfish, Cheating, Misbehaviour.
Abstract:
Wi-Fi networks are based on the cooperation of users in sharing a common resource – the radio channel. This
is a security risk because users may behave selfishly to increase their own throughput but at the same time
decrease the overall network performance. Many scientific analyses have focused on this problem, but none
have taken into account real user behavior. We present the initial results of a work-in-progress in which we
studied a group of users in terms of their online behavior as well as their psychological characteristics. We
have found that users behave selfishly in a wireless setting, regardless of their cooperative nature. We provide
lessons learned as well as pose open questions for further research in this field.
1 INTRODUCTION
Wi-Fi networks are a popular means of wireless com-
munication: they can be found in homes, offices, and
public places. These networks are based on the prin-
ciple of users sharing a common resource – the ra-
dio channel. This need for cooperation leads to cer-
tain security issues, which are known in the literature
as selfish attacks (the terms cheating and misbehav-
ior are also common). These attacks are specific be-
cause they are insider attacks, i.e., they are performed
by users which have already gained access to the net-
work. Selfish attacks are becoming a problembecause
the standard which defines the communication proto-
col for Wi-Fi networks (IEEE 802.11) contains no in-
centives for users to cooperate (Szott, 2014). In fact,
manufacturers exploit this trait to increase the perfor-
mance of their devices (Bianchi et al., 2007).
A prominent example of such behavior is a traf-
fic remapping attack (Konorski and Szott, 2014), in
which a user takes advantage of the quality of ser-
vice (QoS) traffic prioritization mechanism of 802.11
(Natkaniec et al., 2013) and assigns high priority
identifiers to regular, best effort traffic (Figure 1).
This means that regular traffic (e.g., a file transfer) is
treated as if it required low delay (as, e.g., a Skype
call), thus disturbing the operation of the network.
This attack is relatively easy to perform as it requires
adding only one rule in the user’s firewall software.
Non-cooperative behavior has been well-studied
in wireless communications literature, both in terms
of the potential benefit to the misbehaving user (Szott
et al., 2010) as well as countermeasure methods (Szott
et al., 2013a; Szott et al., 2013b). However, de-
spite the multitude of theoretical analyses, practical
user behavior has not been studied in real world Wi-
Fi deployments. This raises the question: Are users
willing to cooperate in a wireless setting? Com-
parable studies conducted for peer-to-peer networks
show that this is not the case (Anagnostakis et al.,
2006). Therefore, we propose the following hypoth-
esis: users of Wi-Fi networks will, given the chance,
exhibit non-cooperative behavior regardless of their
personal character. Towards this end we conducted a
study in which we compared the online behavior of
users (in a simulated environment) with the outcome
of several psychological tests. The initial results are
promising and we report several lessons learned. To
the best of our knowledge, this work in progress is the
first reported study of this kind for Wi-Fi networks.
2 METHODOLOGY
Our study was conducted separately for each partic-
ipant. It consisted of two parts. First, we assessed
their online behavior in a simulated test. Then, we
determined their overall willingness to cooperate us-
ing psychological surveys.
2.1 Online Behavior Test
The participants were provided with a laptop and
asked to test a new application for transferring data
60
Szott S., Ptaszek G. and Janowski L..
Assessing the Cooperativeness of Users in Wi-Fi Networks.
DOI: 10.5220/0005117300600064
In Proceedings of the 11th International Conference on Wireless Information Networks and Systems (WINSYS-2014), pages 60-64
ISBN: 978-989-758-047-5
Copyright
c
2014 SCITEPRESS (Science and Technology Publications, Lda.)