CFP last date
20 December 2024
Reseach Article

Prevention of Session Hijacking and Ipspoofing with Sensor Nodes and Cryptographic Approach

by Abhishek Kumar Bharti, Manoj Chaudhary
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 76 - Number 9
Year of Publication: 2013
Authors: Abhishek Kumar Bharti, Manoj Chaudhary
10.5120/13275-0821

Abhishek Kumar Bharti, Manoj Chaudhary . Prevention of Session Hijacking and Ipspoofing with Sensor Nodes and Cryptographic Approach. International Journal of Computer Applications. 76, 9 ( August 2013), 22-28. DOI=10.5120/13275-0821

@article{ 10.5120/13275-0821,
author = { Abhishek Kumar Bharti, Manoj Chaudhary },
title = { Prevention of Session Hijacking and Ipspoofing with Sensor Nodes and Cryptographic Approach },
journal = { International Journal of Computer Applications },
issue_date = { August 2013 },
volume = { 76 },
number = { 9 },
month = { August },
year = { 2013 },
issn = { 0975-8887 },
pages = { 22-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume76/number9/13275-0821/ },
doi = { 10.5120/13275-0821 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:45:27.592485+05:30
%A Abhishek Kumar Bharti
%A Manoj Chaudhary
%T Prevention of Session Hijacking and Ipspoofing with Sensor Nodes and Cryptographic Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 76
%N 9
%P 22-28
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Many web applications available today make use of some way of session to be able to communicate between the server and client. Unfortunately, it is possible for an attacker to exploit session in order to impersonate another user at a web application. The session hijacking is the most common type of attack in the infrastructure type of network. The confidentially is not providing under this attack to user information. Session hijacking attack is launched by making fake access point. If we detect the fake access point then we can stop session hijacking, and various techniques had been proposed. In this paper, we are giving a new mechanism to detect the fake access point with the use of sensor nodes in the network. In this mechanism we are also giving the protection against IP Spoofing by the use of public private key cryptography key exchange algorithm. We also discuss the results through simulations in Network Simulator 2.

References
  1. Thawatchai Chomsiri "A Comparative Study of Security Level of Hotmail, Gmail and Yahoo Mail by Using Session Hijacking Hacking Test" in International Journal of Computer Science and Network Security, VOL. 8 No. 5, May 2008.
  2. Srikanth Kamuni, S. ShreehaTejaswini, Bhaskar. J "Wavelet Based Real Time Session Hijack Detection Based On Bluetooth Signal Analysis" in GJCAT, Vol 2 (2), 2012, 1210-1213 ISSN: 2249-1945.
  3. Rupinder Gill, and Smith, Jason and Clark, Andrew "Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802. 11 Networks" in: Proceedings of 4th Australasian Information Security Workshop (Network Security), 16-19 January 2006, Hobart, Tasmania.
  4. Bhavna C. K. Nathani Erwin Adi "Website Vulnerability to Session Fixation Attacks" Journal of Information Engineering and Applications ISSN 2224-5782 (print) ISSN 2225-0506 (online)Vol 2, No. 7, 2012.
  5. Al-Sammarraie Hosam ,Adli Mustafa and Shakeel "Exception Agent Detection System for IP Spoofing Over Online Environments" International Journal of Computer Science and Information Security, Vol. 6, No. 1, 2009.
  6. Mrs. Mridu Sahu and Rainey C. Lal "Controlling IP spoofing through packet filtering" Int. J. Computer Techology & Applications,Vol 3 (1),155-159 ISSN:2229-6093.
  7. Vimal Upadhyay , Rajeev kumar "Detection and preventing IP spoofing attack by Hashed Encryption" International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849 Vol. 1 Issue 2 July 2011.
  8. Noureldien A. Noureldien, Mashair O. Hussein "Block Spoofed Packets at Source (BSPS): A method for Detecting and Preventing All Types of Spoofed Source IP Packets and SYN Flooding Packets at Source: A Theoretical Framework" International Journal of Networks and Communications 2012, 2(3): 33-37 DOI: 10. 5923/j. ijnc. 20120203. 03.
  9. N. Arumugam, Dr. C. Venkatesh "A Dynamic Method to Detect IP Spoofing on Data Network Using Ant Algorithm" IOSR Journal of Engineering (IOSRJEN) e-ISSN: 2250-3021, p-ISSN: 2278-8719, www. iosrjen. org Volume 2, Issue 10 (October 2012), PP 09-16.
  10. Hemanshu Kamboj, Gurpreet Singh " Detection of Fake Access Point to Prevent Session Hijacking" International Journal for Advance Research and Technology Vol. 1, Issue II, Mar. 2013 ISSN 2320-6802.
  11. Kiruthiga. S and Yuvarani. G "Fast and Accurate Detection of Fake Access Points Using Non-crypto Method in WLAN" International Journal of Communications and Engineering Volume 05– No. 5, Issue: 03 March2012.
  12. Jianping Song, Song Han, Aloysius K. Mok, Deji Chen, Mike Lucas, Mark Nixon "WirelessHART: Applying Wireless Technology in Real-Time Industrial Process Control" IEEE Real-Time and Embedded Technology and Applications Symposium 1080-1812/08 2008 IEEE DOI 10. 1109/RTAS. 2008. 15.
  13. Suman Jana and Sneha k. Kasera " On Fast and Accurate Detection of Unauthorized Wireless Access Point Using Clock Skews" IEEE TRANSACTION ON MOBILE COMPUTING , VOL. 9 NO. 3 MARCH 2010.
  14. Stephen Glass NICTA "Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks" 1550-445X/09 2009 IEEE DOI 10. 1109/AINA. 2009. 131.
Index Terms

Computer Science
Information Sciences

Keywords

Session Hijacking Fake Access Point IP spoofing