Results 21 to 30 of about 3,560 (200)
Blockchain-based cyber-physical systems (CPSs) and the blockchain Internet of things (BIoT) are two major focuses of the modern technological revolution.
Bhattacharjya Aniruddha
doaj +1 more source
Security test of 101 protocol of FTU
The IEC60870-5-101 protocol is mainly used for transmitting messages between the primary station and the substation of the power SCADA data monitoring and acquisition system.Since the message mainly adopts “frame check and sum” to ensure communication ...
Yong WANG,Xiang WANG,Yufan CAI +2 more
doaj +3 more sources
Comparison of Port Security Switch Layer 2 MAC Address Dynamic With MAC Address Static Sticky
Security and stability in a network service is a top priority for a network administrator. The slightest security vulnerability can make a very big threat in the stability of network services.
Tommi Alfian Armawan Sandi +4 more
doaj +1 more source
Protection of LAN-wide, P2P interactions: a holistic approach [PDF]
This article advocates the need of a holistic approach to protect LAN interactions and presents a solution for implementing it based on secure LAN (SLAN), a novel security architecture. SLAN uses the 802.1X access control mechanisms and is supported by a
Zúquete, A.
core +1 more source
Many security standards and cryptographic solutions exist for different applications such as agriculture, aircraft, banking systems and etc. but a more effective and efficient solution can be given by combining existing technologies with blockchain. This
Kanika Agrawal +5 more
doaj +1 more source
An Integrated Framework for Sensing Radio Frequency Spectrum Attacks on Medical Delivery Drones
Drone susceptibility to jamming or spoofing attacks of GPS, RF, Wi-Fi, and operator signals presents a danger to future medical delivery systems. A detection framework capable of sensing attacks on drones could provide the capability for active responses.
Kulp, Philip H., Mei, Nagi
core +1 more source
Novel Duplicate Address Detection with Hash Function. [PDF]
Duplicate address detection (DAD) is an important component of the address resolution protocol (ARP) and the neighbor discovery protocol (NDP). DAD determines whether an IP address is in conflict with other nodes.
GuangJia Song, ZhenZhou Ji
doaj +1 more source
Multi-Attribute SCADA-Specific Intrusion Detection System for Power Networks [PDF]
The increased interconnectivity and complexity of supervisory control and data acquisition (SCADA) systems in power system networks has exposed the systems to a multitude of potential vulnerabilities. In this paper, we present a novel approach for a next-
Im, E. G. +6 more
core +1 more source
The proliferation of Software-Defined Networks (SDNs) has introduced unparalleled flexibility and efficiency to network management, but at the same time, it has introduced new challenges in securing network infrastructures.
Vanlalruata Hnamte, Jamal Hussain
doaj +1 more source
The world has adopted so many IoT devices but it comes with its own share of security vulnerabilities. One such issue is ARP spoofing attack which allows a man-in-the-middle to intercept packets and thereby modify the communication.
Yi-Min Yang, Ko-Chin Chang, Jia-Ning Luo
doaj +1 more source

