2020
DOI: 10.34257/gjcstgvol20is2pg9
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Framework for IoT Smart Home by Resolving Session Hijacking

Abstract: IoT is a blessing in the field of information and technology. It is developing and deploying day by day. It is working for our betterment in the section of home, environment, retail, security, factory, industry, agriculture, education, energy, healthcare, and so on. In the Smart Home section, there are a numerous inventions. Vast analysis and working can be possible if needed. We have worked with session hijacking and implement it in our Smart Home Prototype. This pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 2 publications
0
10
0
Order By: Relevance
“…There are many types of MITM attacks that attackers can use to exploit insecure applications and user data. Some of the most common types of MITM attacks include rogue access point attacks [109], address resolution protocol (ARP) spoofing [110], domain name system (DNS) spoofing [111], session hijacking [112], and SSL/TLS interception [113].…”
Section: Man-in-the-middle Attack (Mitm) [108]mentioning
confidence: 99%
“…There are many types of MITM attacks that attackers can use to exploit insecure applications and user data. Some of the most common types of MITM attacks include rogue access point attacks [109], address resolution protocol (ARP) spoofing [110], domain name system (DNS) spoofing [111], session hijacking [112], and SSL/TLS interception [113].…”
Section: Man-in-the-middle Attack (Mitm) [108]mentioning
confidence: 99%
“…Session Hijacking: Session hijacking [151] occurs when an attacker steals an HTTP session by intercepting and capturing packets using a packet sniffer [152]- [156]. Successful hijacking grants the attacker full access to the session, redirecting communication from the client to the web server to the attacker.…”
Section: Security Concerns In Web Applications and Browsersmentioning
confidence: 99%
“…Spooling is another method to gain access to the data by malicious users at input and output devices, from where data is originated and delivered [9]. Furthermore, Session Hijacking (SH) seizes the whole web session and gathers all the data [10]. Lastly, Man-In-The-Middle (MITM) is a kind of attack in which the attacker overhears the network without permission [11].…”
Section: Introductionmentioning
confidence: 99%
“…Among these web attacks, Man-in-the-middle assaults, phishing, and session hijacking are the most prevalent kinds of online attacks. Man-In-The-Middle (MITM) [11] and session hijacking [10] is a type of invasion that includes an attacker who tries to breach the privacy of the user. The Web-based application depends upon Hypertext Transfer Protocol Secure (HTTPS) to ensure privacy and security during user communication [12].…”
Section: Introductionmentioning
confidence: 99%