Prevention Of Session Hijacking And IP spoofing With Sensor Nodes And Cryptographic Approach

Authors

  • Abhishek Kumar Bharti Computer Science Department YCoE , Punjabi Univeristy

Keywords:

Session Hijacking, Fake Access Point, IP spoofing

Abstract

Many web applications available today make use of some way of session to be able to communicate between the server and client. Unfortunately, it is possible for an attacker to exploit session in order to impersonate another user at a web application. The session hijacking is the most common type of attack in the infrastructure type of network. The confidentially is not providing under this attack to user information. Session hijacking attack is launched by making fake access point. If we detect the fake access point then we can stop session hijacking, and various techniques had been proposed. In this paper, we are giving a new mechanism to detect the fake access point with the use of sensor nodes in the network. In this mechanism we are also giving the protection against IP Spoofing by the use of public private key cryptography key exchange algorithm. We also discuss the results through simulations in Network Simulator 2.

References

Thawatchai Chomsiri

Srikanth Kamuni, S.ShreehaTejaswini, Bhaskar.J

Rupinder Gill, and Smith, Jason and Clark, Andrew

Bhavna C.K. Nathani Erwin Adi

Al-Sammarraie Hosam ,Adli Mustafa and Shakeel

Mrs. Mridu Sahu and Rainey C. Lal

Vimal Upadhyay , Rajeev kumar

Noureldien A. Noureldien, Mashair O. Hussein

N.Arumugam, Dr.C.Venkatesh

Algorithm

Hemanshu Kamboj, Gurpreet Singh

Kiruthiga.S and Yuvarani.G

Jianping Song, Song Han, Aloysius K. Mok, Deji Chen, Mike Lucas, Mark Nixon

Suman Jana and Sneha k. Kasera

Stephen Glass NICTA

Downloads

Published

2012-10-14

How to Cite

Bharti, A. K. (2012). Prevention Of Session Hijacking And IP spoofing With Sensor Nodes And Cryptographic Approach. International Journal of Sciences: Basic and Applied Research (IJSBAR), 6(1), 14–23. Retrieved from https://gssrr.org/index.php/JournalOfBasicAndApplied/article/view/953

Issue

Section

Articles