UGC Approved Journal no 63975

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 9 | Issue 1 | January 2022

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 6
June-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIRCO06025


Registration ID:
216121

Page Number

123-131

Share This Article


Jetir RMS

Title

WIFI DATA LEAKAGE DETECTION

Abstract

The paper demonstrates a mechanism for inferring the behavior of the user from encrypted wireless network activity. This mechanism also operates without any level of network access and without the need of breaking any encryptions. It also shows how an entirely passive, external observer can detect the information that is being transmitted over the network. The large number of applications that we install on our smartphones generates huge amount of network traffic patterns. The traffic that is generated by the user while using these applications also contains some characteristic traffic generated by various applications including their background activities or periodic updates or some specific information of particular applications. Although the encryption system present in various networks for transmitting the data prevents malicious intruders or eavesdropper from getting access to analyze the content of the data, the periodic traffic patterns generated by the applications leak side channel information such as data packet size, data transfer timing and the volume of the data. Since, wireless communications are broadcast in nature, various information that can be transmitted like data packet size, it’s volume, frame size and the modulation scheme used get exposed. This information can be used and exploited by an intruder to passively attack or steal confidential user information. Such kind of problem cannot be avoided even though we encrypt the frame headers and the payloads of the data. With the long range wireless communications becoming more prevalent and increased commercial interest in tracking and analyzing publicly broadcast wireless data, this paper highlights the threat to users private activities.

Key Words

Wi-Fi; Mobile-Apps; Privacy; Security ;Data Protection; Information Inference; Data Leakage

Cite This Article

"WIFI DATA LEAKAGE DETECTION", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 6, page no.123-131, June-2019, Available :http://www.jetir.org/papers/JETIRCO06025.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"WIFI DATA LEAKAGE DETECTION", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 6, page no. pp123-131, June-2019, Available at : http://www.jetir.org/papers/JETIRCO06025.pdf

Publication Details

Published Paper ID: JETIRCO06025
Registration ID: 216121
Published In: Volume 6 | Issue 6 | Year June-2019
DOI (Digital Object Identifier):
Page No: 123-131
Country: Bikaner, Rajasthan, India .
Area: Engineering
ISSN Number: 2349-5162


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002695

Print This Page

Current Call For Paper

Jetir RMS