Call for Paper - November 2023 Edition
IJCA solicits original research papers for the November 2023 Edition. Last date of manuscript submission is October 20, 2023. Read More

A Unique Wireless Device Fingerprinting Technique for Secured Data Communication in Wireless Network

International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 43 - Number 20
Year of Publication: 2012
Murali Kotha
Madhavi Singirikonda
Madhula Nirosha
G. Manjunath

Murali Kotha, Madhavi Singirikonda, Madhula Nirosha and G Manjunath. Article: A Unique Wireless Device Fingerprinting Technique for Secured Data Communication in Wireless Network. International Journal of Computer Applications 43(20):14-19, April 2012. Full text available. BibTeX

	author = {Murali Kotha and Madhavi Singirikonda and Madhula Nirosha and G. Manjunath},
	title = {Article: A Unique Wireless Device Fingerprinting Technique for Secured Data Communication in Wireless Network},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {43},
	number = {20},
	pages = {14-19},
	month = {April},
	note = {Full text available}


Wireless network suffers from security threats which are of different nature. One of the most significant reasons for weak security of the wireless network is the lack of strong key exchange technique. In 802. 11 adaptation of wireless protocol, generally end users selects the key for current session and exchange encrypted data with same key for extended period of time. As the basic keys are weak, it is highly vulnerable to attacks and the packets are easy to intrude/read/modify. In this work we propose a unique solution of generating a strong key fingerprint automatically from the device of the user and use the same as key. We consider file transmission security between an AP and STA where the STA is a mobile node. We demonstrate the effectiveness of the technique with the help of real time setup and by synthesizing attacks like MAC address duplicating, using duplicate SIM and packet injection. The system is tested with 800MB of data transmission under different scenario and has yielded a zero hacking success of the data. As the system does not require any special hardware or software for implementing the same, it is easy to adopt and is acceptably scalable.


  • J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. Van Randwyk, and D. Sicker. Passive Data Link Layer 802. 11 Wireless Device Driver Fingerprinting. Usenix Security Symposium, 2006.
  • M. Brunato and R. Battiti, "Statistical learning theory for location fingerprinting in wireless LANs," Comput. Netw. , vol. 47, pp. 825–845, 2005.
  • M. Azizyan, I. Constandache, and R. Roy Choudhury, "Surround-Sense: Mobile Phone Localization via Ambience Fingerprinting," Proc. 15th ACM MobiCom, 2009, pp. 261–72.
  • K. Kaemarungsi and P. Krishnamurthy, "Properties of indoor received signal strength for WLAN location fingerprinting", Proc. 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous '04), Boston, Mass, USA, August 2004, pp. 14-23.
  • Jeffrey Pang, Ben Greenstein, Ramakrishna Gummadi, Srinivasan Seshan, and David Wetherall. 802. 11 user fingerprinting. In MobiCom '07: Proceedings of the 13th annual ACM international conference on Mobile computing and networking, pages 99–110, New York, NY, USA, 2007. ACM.
  • C. C. Loh et al. , "Identifying unique devices through wireless fingerprinting," in Proc. of the first ACM conference on Wireless network security, Mar. 2008, pp. 46–55.
  • C. Arackaparambil, S. Bratus, A. Shubina, and D. Kotz. On the Reliability of Wireless Fingerprinting Using Clock Skews. In Proceedings of the 3rd ACM Conference on Wireless Network Security (WiSec), 2010.
  • Dempster, A. G. ; Binghao Li; Quader, I. , "Errors in Determinstic Wireless Fingerprinting Systems for Localisation", International Symposium on Wireless Pervasive Computing, 2008.
  • Kannan Srinivasan, Maria A. Kazandjieva, Jung Il Choi, Edward S. Kim, Mayank Jain, and Philip Levis, "SWAT: Fingerprinting Your Wireless Network", Demo at SIGCOMM 2009.
  • Mirza, M. ; Barford, P. ; Xiaojin Zhu; Banerjee, S. ; Blodgett, M. ; "Fingerprinting 802. 11 rate adaption algorithms ", Proceedings of IEEE Infocom, 2011.
  • Shan Kang; Naiwen Chen; Mi Yan; Xiaoxiao Chen; "Detecting identity-spoof attack based on BP network in cognitive radio network ", in: Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC), 2011.
  • K. B. Rasmussen and S. Capkun. Implications of Radio Fingerprinting on the Security of Sensor Networks. Proceedings of IEEE SecureComm, 2007.