A Novel Technique to Protect Wireless Network against accidental Association

Reddy, Geetha Manchi; Chakravarthula, Keerthi Priya Nallan; Kantu, Abhilash Reddy; Manjunath, G.
April 2012
International Journal of Computer Applications;Apr2012, Vol. 44, p22
Academic Journal
With increasing numbers of corporate and organizations deploying wireless network and allowing the company personnel to access the internet or the wired backbone through wireless access points are increasingly getting exposed to hacking attacks. Due to easy hacking tools and less concerns about the security threats of the deployed, various crucial data of the private network is hacked. One of the important forms of a security loophole in the wireless network is accidental association. In this paper we propose a novel technique to secure the wireless signal to prevent accidental association. Layer 2 of each device is assigned with a unique time bound key and non time bound primary key. As soon as a new device is detected in the proximity by any node, it requests for the time independent primary key from the device. If the device fails to respond with the key then the network connection is withdrawn with immediate effect after the node propagates an alert message encrypted with time bound session key through which it is communicating securely with other wireless peers. A periodic search for checking new devices which may get associated with the existing network accidently is avoided with utmost efficiency. The protocol is tested with Omnet++ simulator and results shows that the proposed technique performs much better than basic protection against such an attack offered by WEP.


Related Articles

  • Analysis of Detecting Wormholc Attack in Wireless Networks. Win, Khin Sandar // Proceedings of World Academy of Science: Engineering & Technolog;Dec2008, Vol. 48, p1247 

    In multi hop wireless systems, such as ad hoc and sensor networks, mobile ad hoc network applications are deployed, security emerges as a central requirement. A particularly devastating attack is known as the wormhole attack, where two or more malicious colluding nodes create a higher level...

  • Security Uses for Wireless Networks. Engebretson, David // SDM: Security Distributing & Marketing;Jan2005, Vol. 35 Issue 1, p66 

    The article reports on several electronic security systems. Many of today's electronic security systems are designed to operate on a communications or computer network. The common wireless network systems in use today fall under the general description of Wi-Fi, which stands for wireless...

  • A Link Layer Solution to Location Identification of Emergency VoIP Callers. Ashtarifar, Saeideh; Matrawy, Ashraf // International Journal of Computer Networks & Communications;Sep2010, Vol. 2 Issue 5, p16 

    Identifying the geographical location of a host on the Internet is a very challenging task. Due to a number of reasons, there is no direct mechanism that could enable this identification. Several approaches have been proposed to solve this problem but these have not proved to be suitable for...

  • An Essential of Security in Vehicular Ad hoc Network.  // International Journal of Computer Applications;Nov2010, Vol. 10, p11 

    The article presents the problems and security issues surrounding the Vehicle Ad hoc Networks (VANET). VANETs are a specific kind of wireless ad-hoc networks which are created with short range wireless communication devices wherein each one represents a vehicle on the road or a static device. It...

  • City firms still failing to guard WLans. Goodwin, Bill // Computer Weekly;6/22/2004, p4 

    Businesses in Europe's leading financial centres are failing to secure their wireless access points despite the risk of "drive-by" hacking. More than 33% of businesses surveyed in London, Milan, Paris and Frankfurt are still making fundamental security mistakes, research by RSA Security Inc....

  • AIRMAGNET, COLUBRIS TEAM UP TO SECURE WLANs. Spiwak, Marc // CRN;5/30/2005, Issue 1149, p39 

    The article reports that wireless connectivity has made life easier in vertical markets such as medicine, education and banking but the technology has also introduced new headaches for IT departments. AirMagnet Inc., a wireless security and performance vendor, and Colubris Networks, a Waltham,...

  • A New Modulation for Intrinsically Secure Radio Channel in Wireless Systems. Mucchi, Lorenzo; Ronga, Luca; Cipriani, Leonardo // Wireless Personal Communications;Nov2009, Vol. 51 Issue 1, p67 

    Due to the enormous spreading of applied wireless networks, security is actually one of the most important issues for telecommunications. One of the main issue in the field of securing wireless information exchanging is the initial common knowledge between source and destination. A shared secret...

  • Third of firms go wireless.  // New Media Age;4/22/2004, p13 

    This article reports that a third of British companies are wireless-enabled as of April 2004, compared to just 2 percent in 2002, according to the Information Security Breaches survey of the Department of Trade and Industry (DTI). Despite such massive increase in the use of wireless networks...

  • Wireless security - a contradiction in terms?  // Accountancy Ireland;Oct2004, Vol. 36 Issue 5, p53 

    Reports on the introduction of the Irish Honeynet Project, a survey on wireless network security in Ireland.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics