Provided by: International Journal of Computer Applications
Date Added: Apr 2012
Wireless network suffers from security threats which are of different nature. One of the most significant reasons for weak security of the wireless network is the lack of strong key exchange technique. In 802.11 adaptation of wireless protocol, generally end users selects the key for current session and exchange encrypted data with same key for extended period of time. As the basic keys are weak, it is highly vulnerable to attacks and the packets are easy to intrude/read/modify. In this paper, the authors propose a unique solution of generating a strong key fingerprint automatically from the device of the user and use the same as key. They consider file transmission security between an AP and STA where the STA is a mobile node.