TCP attacks are the major problem faced by Mobile Ad hoc Networks (MANETs) due to its limited network and host resources. Although the session hijacking is not in the forefront of everyone mind, it still remains a commonly used attack in MANET. Session hijack attacks are defined as taking over an active TCP/IP communication session without their permission or knowledge. When implemented successfully, attackers assume the identity of the compromised user, enjoying the same access to resources as the compromised user. Network protocols like FTP, Telnet, and rlogin are especially attractive to the attacker, because of the session oriented nature of their connections, and lack of implementation of any security during login, authentication, or data transmission. We introduce a novel method for defending session hijacking attack in MANET: Pseudo Random Alteration of Sequence Numbers (PRAS). Based on the comprehensive evaluation based on simulations, it is shown that PRAS can successfully defend session hijacking under diverse mobile multi-hop network environment with low communication, computation, and memory overhead.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.