Preventing Health Care Web Applications from Session Hijack Attacks Using Session Key Authentication and Distributed Session Id

نویسندگان

  • S. S. Manivannan
  • E. Sathiyamoorthy
چکیده

Usage of health care web applications by network of hospitals and health care service providers are increases in the current technology world. Accessing the confidential healthcare information by doctors, patients over the wireless network is at the risk of information theft by various attacks. Most of the multispeciality hospitals situated in metropolitan cities, chief doctors are sending the prescriptions to the junior doctors over the internet after successful completion of the surgery. Individual session is created for each user to access the health care data in a web application. Hackers make use of sniffer tools to crack the session ID and hijack the session in order to steal the confidential data of the patients. In this paper, we have proposed the session key authentication method and distributed session ID to secure the medical data against session hijack attacks in wireless networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Session Fixation Vulnerability in Web-based Applications

Many web-based applications employ some kind of session management to create a user-friendly environment. Sessions are stored on server and associated with respective users by session identifiers (IDs). Naturally, session IDs present an attractive target for attackers, who, by obtaining them, effectively hijack users’ identities. Knowing that, web servers are employing techniques for protecting...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Evaluation of OpenID-Based Double-Factor Authentication for Preventing Session Hijacking in Web Applications

Web users often find it difficult to manage their identities (IDs) due to large number of web applications. An effective and convenient ID management system is needed to handle the problem. OpenID is one of the better solutions to manage this task on heterogeneous web applications due to its lightweight and simple protocol. However, it is quite vulnerable to session hijacking, resulting in iden...

متن کامل

Serene: Self-Reliant Client-Side Protection against Session Fixation

The web is the most wide-spread and de facto distributed platform, with a plethora of valuable applications and services. Building stateful services on the web requires a session mechanism that keeps track of server-side session state, such as authentication data. These sessions are an attractive attacker target, since taking over an authenticated session fully compromises the user’s account. T...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016