International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 43 - Number 20 |
Year of Publication: 2012 |
Authors: Murali Kotha, Madhavi Singirikonda, Madhula Nirosha, G. Manjunath |
10.5120/6219-8709 |
Murali Kotha, Madhavi Singirikonda, Madhula Nirosha, G. Manjunath . A Unique Wireless Device Fingerprinting Technique for Secured Data Communication in Wireless Network. International Journal of Computer Applications. 43, 20 ( April 2012), 14-19. DOI=10.5120/6219-8709
Wireless network suffers from security threats which are of different nature. One of the most significant reasons for weak security of the wireless network is the lack of strong key exchange technique. In 802. 11 adaptation of wireless protocol, generally end users selects the key for current session and exchange encrypted data with same key for extended period of time. As the basic keys are weak, it is highly vulnerable to attacks and the packets are easy to intrude/read/modify. In this work we propose a unique solution of generating a strong key fingerprint automatically from the device of the user and use the same as key. We consider file transmission security between an AP and STA where the STA is a mobile node. We demonstrate the effectiveness of the technique with the help of real time setup and by synthesizing attacks like MAC address duplicating, using duplicate SIM and packet injection. The system is tested with 800MB of data transmission under different scenario and has yielded a zero hacking success of the data. As the system does not require any special hardware or software for implementing the same, it is easy to adopt and is acceptably scalable.