Secure Verification Technique for Defending IP Spoofing Attacks

Secure Verification Technique for Defending IP Spoofing Attacks

Alwar Rengarajan1, Rajendran Sugumar2, and Chinnappan Jayakumar3

1, 2Department of Computer Science and Engineering, Veltech Multitech SRS Engineering College

3Department of Computer Science and Engineering, RMK Engineering College

Abstract: The Internet Protocol (IP) is the source of Internet transmission but an inadequate authentication technique paves a way for IP spoofing. Since IP spoofing initiates more attacks in the network, a secure authentication technique is required to defend against spoofing attacks. In order to achieve this, in this paper, we propose a secure verification technique for defending IP spoofing attacks. Our technique authenticates IP address of each Autonomous System (AS) using Neighbour Authentication (NA) algorithm. The algorithm works by validating NA table NA constructed by each node. The NA table is transmitted securely using RC-6 encryption algorithm. In addition to encryption, our technique use arithmetic coding to compress and decompress the NA table. The performance of our technique is proved through simulation results. Our technique incurs low overhead and significantly improves the performance of network.

Keywords: IP, IP spoofing, secure verification technique.

Received September 17, 2012; accepted July 20, 2014

Full Text

 

 

Read 1840 times Last modified on Wednesday, 04 November 2015 04:50
Share
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…