Results 21 to 30 of about 3,560 (200)

A Holistic Study on the Use of Blockchain Technology in CPS and IoT Architectures Maintaining the CIA Triad in Data Communication

open access: yesInternational Journal of Applied Mathematics and Computer Science, 2022
Blockchain-based cyber-physical systems (CPSs) and the blockchain Internet of things (BIoT) are two major focuses of the modern technological revolution.
Bhattacharjya Aniruddha
doaj   +1 more source

Security test of 101 protocol of FTU

open access: yes网络与信息安全学报, 2018
The IEC60870-5-101 protocol is mainly used for transmitting messages between the primary station and the substation of the power SCADA data monitoring and acquisition system.Since the message mainly adopts “frame check and sum” to ensure communication ...
Yong WANG,Xiang WANG,Yufan CAI   +2 more
doaj   +3 more sources

Comparison of Port Security Switch Layer 2 MAC Address Dynamic With MAC Address Static Sticky

open access: yesInspiration, 2022
Security and stability in a network service is a top priority for a network administrator. The slightest security vulnerability can make a very big threat in the stability of network services.
Tommi Alfian Armawan Sandi   +4 more
doaj   +1 more source

Protection of LAN-wide, P2P interactions: a holistic approach [PDF]

open access: yes, 2009
This article advocates the need of a holistic approach to protect LAN interactions and presents a solution for implementing it based on secure LAN (SLAN), a novel security architecture. SLAN uses the 802.1X access control mechanisms and is supported by a
Zúquete, A.
core   +1 more source

An Extensive Blockchain Based Applications Survey: Tools, Frameworks, Opportunities, Challenges and Solutions

open access: yesIEEE Access, 2022
Many security standards and cryptographic solutions exist for different applications such as agriculture, aircraft, banking systems and etc. but a more effective and efficient solution can be given by combining existing technologies with blockchain. This
Kanika Agrawal   +5 more
doaj   +1 more source

An Integrated Framework for Sensing Radio Frequency Spectrum Attacks on Medical Delivery Drones

open access: yes, 2020
Drone susceptibility to jamming or spoofing attacks of GPS, RF, Wi-Fi, and operator signals presents a danger to future medical delivery systems. A detection framework capable of sensing attacks on drones could provide the capability for active responses.
Kulp, Philip H., Mei, Nagi
core   +1 more source

Novel Duplicate Address Detection with Hash Function. [PDF]

open access: yesPLoS ONE, 2016
Duplicate address detection (DAD) is an important component of the address resolution protocol (ARP) and the neighbor discovery protocol (NDP). DAD determines whether an IP address is in conflict with other nodes.
GuangJia Song, ZhenZhou Ji
doaj   +1 more source

Multi-Attribute SCADA-Specific Intrusion Detection System for Power Networks [PDF]

open access: yes, 2014
The increased interconnectivity and complexity of supervisory control and data acquisition (SCADA) systems in power system networks has exposed the systems to a multitude of potential vulnerabilities. In this paper, we present a novel approach for a next-
Im, E. G.   +6 more
core   +1 more source

Enhancing security in Software-Defined Networks: An approach to efficient ARP spoofing attacks detection and mitigation

open access: yesTelematics and Informatics Reports
The proliferation of Software-Defined Networks (SDNs) has introduced unparalleled flexibility and efficiency to network management, but at the same time, it has introduced new challenges in securing network infrastructures.
Vanlalruata Hnamte, Jamal Hussain
doaj   +1 more source

A Lightweight Training Approach for MITM Detection in IoT Networks: Time-Window Selection and Generalization

open access: yesApplied Sciences
The world has adopted so many IoT devices but it comes with its own share of security vulnerabilities. One such issue is ARP spoofing attack which allows a man-in-the-middle to intercept packets and thereby modify the communication.
Yi-Min Yang, Ko-Chin Chang, Jia-Ning Luo
doaj   +1 more source

Home - About - Disclaimer - Privacy