CFP last date
20 January 2025
Reseach Article

A Novel Technique to Protect Wireless Network against accidental Association

by Geetha Manchi Reddy, Keerthi Priya Nallan, Abhilash Reddy Kantu, G. Manjunath
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 44 - Number 16
Year of Publication: 2012
Authors: Geetha Manchi Reddy, Keerthi Priya Nallan, Abhilash Reddy Kantu, G. Manjunath
10.5120/6347-8679

Geetha Manchi Reddy, Keerthi Priya Nallan, Abhilash Reddy Kantu, G. Manjunath . A Novel Technique to Protect Wireless Network against accidental Association. International Journal of Computer Applications. 44, 16 ( April 2012), 22-25. DOI=10.5120/6347-8679

@article{ 10.5120/6347-8679,
author = { Geetha Manchi Reddy, Keerthi Priya Nallan, Abhilash Reddy Kantu, G. Manjunath },
title = { A Novel Technique to Protect Wireless Network against accidental Association },
journal = { International Journal of Computer Applications },
issue_date = { April 2012 },
volume = { 44 },
number = { 16 },
month = { April },
year = { 2012 },
issn = { 0975-8887 },
pages = { 22-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume44/number16/6347-8679/ },
doi = { 10.5120/6347-8679 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:35:43.417490+05:30
%A Geetha Manchi Reddy
%A Keerthi Priya Nallan
%A Abhilash Reddy Kantu
%A G. Manjunath
%T A Novel Technique to Protect Wireless Network against accidental Association
%J International Journal of Computer Applications
%@ 0975-8887
%V 44
%N 16
%P 22-25
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With increasing numbers of corporate and organizations deploying wireless network and allowing the company personnel to access the internet or the wired backbone through wireless access points are increasingly getting exposed to hacking attacks. Due to easy hacking tools and less concerns about the security threats of the deployed, various crucial data of the private network is hacked. One of the important forms of a security loophole in the wireless network is accidental association. In this paper we propose a novel technique to secure the wireless signal to prevent accidental association. Layer 2 of each device is assigned with a unique time bound key and non time bound primary key. As soon as a new device is detected in the proximity by any node, it requests for the time independent primary key from the device. If the device fails to respond with the key then the network connection is withdrawn with immediate effect after the node propagates an alert message encrypted with time bound session key through which it is communicating securely with other wireless peers. A periodic search for checking new devices which may get associated with the existing network accidently is avoided with utmost efficiency. The protocol is tested with Omnet++ simulator and results shows that the proposed technique performs much better than basic protection against such an attack offered by WEP.

References
  1. Min-kyu Choi, Rosslin John Robles, Chang-hwa Hong, Tai-hoon Kim, "Wireless Network Security: Vulnerabilities, Threats and Countermeasures", International Journal of Multimedia and Ubiquitous Engineering Vol. 3, No. 3, July, 2008.
  2. Mina Malekzadeh, Abdul Azim Abdul Ghani, Jalil Desa, and Shamala Subramaniam,"An Experimental Evaluation of DoS Attack and Its Impact on Throughput of IEEE 802. 11 Wireless Networks", IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 8, August 2008.
  3. Wireless LAN Security – What Hackers Know That You Don't, White Paper.
  4. http://homepage. ntlworld. com/leon. stringer/cs/FCC/ Detecting_and_Investigating_Wireless_LAN_Security_Breaches. pdf
  5. Best Practices for Rogue Detection and Annihilation, A Technical Whitepaper, November, 2004.
  6. Sithirasenan E. , Muthukkumarasamy V. , and Powell D. 2005. IEEE 802. 11i WLAN Security Protocol – A Software Engineer's Model. Proceedings of the 4th Asia Pacific Information Technology Security Conference. pp. 39–50.
  7. Ravneet Kaur, "Protection of Data for Unauthorized Access in Wireless Netwoks Security Aspects", IJCEM International Journal of Computational Engineering & Management, Vol. 15, Issue 1, January 2012.
  8. Edward N. Udo, Imo J. Eyo, Ini J. Umoeka, "Developing a Security Protocol For a Wireless Computer Virtual Laboratory (WCVLAB)", Indian Journal of Computer Science and Engineering (IJCSE), Vol. 2 No. 6 Dec 2011-Jan 2012.
  9. D. M. Gharge and S. V. Halse, "WI-FI (802. 11) SECURITY ISSUES AND ITS SOLUTION", International Journal of Computer Science and Communication Vol. 2, No. 2, July-December 2011, pp. 587-591.
  10. www. ja. net/documents/services/wtas/known-wireless-attacks. pdf
Index Terms

Computer Science
Information Sciences

Keywords

Wep Accidental Association Wireless Network Security Dual Key Protection Scheme