CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Unique Wireless Device Fingerprinting Technique for Secured Data Communication in Wireless Network

by Murali Kotha, Madhavi Singirikonda, Madhula Nirosha, G. Manjunath
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 43 - Number 20
Year of Publication: 2012
Authors: Murali Kotha, Madhavi Singirikonda, Madhula Nirosha, G. Manjunath
10.5120/6219-8709

Murali Kotha, Madhavi Singirikonda, Madhula Nirosha, G. Manjunath . A Unique Wireless Device Fingerprinting Technique for Secured Data Communication in Wireless Network. International Journal of Computer Applications. 43, 20 ( April 2012), 14-19. DOI=10.5120/6219-8709

@article{ 10.5120/6219-8709,
author = { Murali Kotha, Madhavi Singirikonda, Madhula Nirosha, G. Manjunath },
title = { A Unique Wireless Device Fingerprinting Technique for Secured Data Communication in Wireless Network },
journal = { International Journal of Computer Applications },
issue_date = { April 2012 },
volume = { 43 },
number = { 20 },
month = { April },
year = { 2012 },
issn = { 0975-8887 },
pages = { 14-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume43/number20/6219-8709/ },
doi = { 10.5120/6219-8709 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:33:54.363985+05:30
%A Murali Kotha
%A Madhavi Singirikonda
%A Madhula Nirosha
%A G. Manjunath
%T A Unique Wireless Device Fingerprinting Technique for Secured Data Communication in Wireless Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 43
%N 20
%P 14-19
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless network suffers from security threats which are of different nature. One of the most significant reasons for weak security of the wireless network is the lack of strong key exchange technique. In 802. 11 adaptation of wireless protocol, generally end users selects the key for current session and exchange encrypted data with same key for extended period of time. As the basic keys are weak, it is highly vulnerable to attacks and the packets are easy to intrude/read/modify. In this work we propose a unique solution of generating a strong key fingerprint automatically from the device of the user and use the same as key. We consider file transmission security between an AP and STA where the STA is a mobile node. We demonstrate the effectiveness of the technique with the help of real time setup and by synthesizing attacks like MAC address duplicating, using duplicate SIM and packet injection. The system is tested with 800MB of data transmission under different scenario and has yielded a zero hacking success of the data. As the system does not require any special hardware or software for implementing the same, it is easy to adopt and is acceptably scalable.

References
  1. J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. Van Randwyk, and D. Sicker. Passive Data Link Layer 802. 11 Wireless Device Driver Fingerprinting. Usenix Security Symposium, 2006.
  2. M. Brunato and R. Battiti, "Statistical learning theory for location fingerprinting in wireless LANs," Comput. Netw. , vol. 47, pp. 825–845, 2005.
  3. M. Azizyan, I. Constandache, and R. Roy Choudhury, "Surround-Sense: Mobile Phone Localization via Ambience Fingerprinting," Proc. 15th ACM MobiCom, 2009, pp. 261–72.
  4. K. Kaemarungsi and P. Krishnamurthy, "Properties of indoor received signal strength for WLAN location fingerprinting", Proc. 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous '04), Boston, Mass, USA, August 2004, pp. 14-23.
  5. Jeffrey Pang, Ben Greenstein, Ramakrishna Gummadi, Srinivasan Seshan, and David Wetherall. 802. 11 user fingerprinting. In MobiCom '07: Proceedings of the 13th annual ACM international conference on Mobile computing and networking, pages 99–110, New York, NY, USA, 2007. ACM.
  6. C. C. Loh et al. , "Identifying unique devices through wireless fingerprinting," in Proc. of the first ACM conference on Wireless network security, Mar. 2008, pp. 46–55.
  7. C. Arackaparambil, S. Bratus, A. Shubina, and D. Kotz. On the Reliability of Wireless Fingerprinting Using Clock Skews. In Proceedings of the 3rd ACM Conference on Wireless Network Security (WiSec), 2010.
  8. Dempster, A. G. ; Binghao Li; Quader, I. , "Errors in Determinstic Wireless Fingerprinting Systems for Localisation", International Symposium on Wireless Pervasive Computing, 2008.
  9. Kannan Srinivasan, Maria A. Kazandjieva, Jung Il Choi, Edward S. Kim, Mayank Jain, and Philip Levis, "SWAT: Fingerprinting Your Wireless Network", Demo at SIGCOMM 2009.
  10. Mirza, M. ; Barford, P. ; Xiaojin Zhu; Banerjee, S. ; Blodgett, M. ; "Fingerprinting 802. 11 rate adaption algorithms ", Proceedings of IEEE Infocom, 2011.
  11. Shan Kang; Naiwen Chen; Mi Yan; Xiaoxiao Chen; "Detecting identity-spoof attack based on BP network in cognitive radio network ", in: Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC), 2011.
  12. K. B. Rasmussen and S. Capkun. Implications of Radio Fingerprinting on the Security of Sensor Networks. Proceedings of IEEE SecureComm, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Packet Injection Mac Spoofing Wireless Device Finger Printing