Prevention Of Session Hijacking And IP spoofing With Sensor Nodes And Cryptographic Approach
Keywords:
Session Hijacking, Fake Access Point, IP spoofingAbstract
Many web applications available today make use of some way of session to be able to communicate between the server and client. Unfortunately, it is possible for an attacker to exploit session in order to impersonate another user at a web application. The session hijacking is the most common type of attack in the infrastructure type of network. The confidentially is not providing under this attack to user information. Session hijacking attack is launched by making fake access point. If we detect the fake access point then we can stop session hijacking, and various techniques had been proposed. In this paper, we are giving a new mechanism to detect the fake access point with the use of sensor nodes in the network. In this mechanism we are also giving the protection against IP Spoofing by the use of public private key cryptography key exchange algorithm. We also discuss the results through simulations in Network Simulator 2.
References
Thawatchai Chomsiri
Srikanth Kamuni, S.ShreehaTejaswini, Bhaskar.J
Rupinder Gill, and Smith, Jason and Clark, Andrew
Bhavna C.K. Nathani Erwin Adi
Al-Sammarraie Hosam ,Adli Mustafa and Shakeel
Mrs. Mridu Sahu and Rainey C. Lal
Vimal Upadhyay , Rajeev kumar
Noureldien A. Noureldien, Mashair O. Hussein
N.Arumugam, Dr.C.Venkatesh
Algorithm
Hemanshu Kamboj, Gurpreet Singh
Kiruthiga.S and Yuvarani.G
Jianping Song, Song Han, Aloysius K. Mok, Deji Chen, Mike Lucas, Mark Nixon
Suman Jana and Sneha k. Kasera
Stephen Glass NICTA
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2012 International Journal of Sciences: Basic and Applied Research (IJSBAR)
![Creative Commons License](http://i.creativecommons.org/l/by-nc-nd/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who submit papers with this journal agree to the following terms.