Results 11 to 20 of about 3,560 (200)
Software Defined Networking (SDN) shows network operations to be performed for efficient network operations. Due to the increase in network devices, the percentage of attacks is also increased, and it is challenging to provide defense against such ...
Faisal jamil, Harun Jamil, Abid Ali
doaj +1 more source
A Survey on Consensus Protocols and Attacks on Blockchain Technology
In the current era, blockchain has approximately 30 consensus algorithms. This architecturally distributed database stores data in an encrypted form with multiple checks, including elliptical curve cryptography (ECC) and Merkle hash tree.
Abhishek Guru +5 more
doaj +1 more source
Improved Secure Address Resolution Protocol [PDF]
In this paper, an improved secure address resolution protocol is presented where ARP spoofing attack is prevented. The proposed methodology is a centralised methodology for preventing ARP spoofing attack.
Chaurasia, Vijay Kumar +2 more
core +1 more source
Blockchain-based ARP defense scheme
In order to improve the difficulty of maintaining the static binding method when defending against ARP attacks,a defense method was designed with the features of low cost of defense and easy maintenance by using the idea of a blockchain technology.The ...
Fanming LIU,Wei SHI
doaj +3 more sources
Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot [PDF]
The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly changing our society and shaping its future development.
Cerrudo Cesar +13 more
core +2 more sources
Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities [PDF]
Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches.
Ho, Anthony T. S. +6 more
core +2 more sources
Scalable and secure SDN based ethernet architecture by suppressing broadcast traffic
Ethernet is one of the widespread protocols residing in the second layer of the seven-layers Open Systems Interconnection (OSI) model. Ethernet offers various advantages which enable its widespread use in all types of network topology and becomes an ...
Munther Numan Munther +4 more
doaj +1 more source
ARP Modification for Prevention of IP Spoofing [PDF]
The address resolution protocol (ARP) provides dynamic mapping between two different forms of addresses: the 32-bit Internet protocol (IP) address of the network layer and the 48-bit medium access control (MAC) address of the data link layer. A host computer finds the MAC address of the default gateway or the other hosts on the same subnet by using ARP
Jung-Ha Kang +3 more
openaire +1 more source
An Automated approach for Preventing ARP Spoofing Attack using Static ARP Entries [PDF]
ARP spoofing is the most dangerous attack that threats LANs, this attack comes from the way the ARP protocol works, since it is a stateless protocol. The ARP spoofing attack may be used to launch either denial of service (DoS) attacks or Man in the middle (MITM) attacks.
Ahmed M., Wail S.Elkilani, Khalid M.Amin
openaire +1 more source
One of the fields where Artificial Intelligence (AI) must continue to innovate is computer security. The integration of Wireless Sensor Networks (WSN) with the Internet of Things (IoT) creates ecosystems of attractive surfaces for security intrusions ...
Gutierrez-Portela Fernando +5 more
doaj +1 more source

