Results 1 to 10 of about 308,714 (183)

Harnessing advanced hybrid deep learning model for real-time detection and prevention of man-in-the-middle cyber attacks [PDF]

open access: yesScientific Reports
The growing number of connected devices in smart home environments has amplified security risks, particularly from Man-in-the-Middle (MitM) attacks. These attacks allow cybercriminals to intercept and manipulate communication streams between devices ...
V. Kandasamy, A. Ameelia Roseline
doaj   +2 more sources

Mobile Authentication Secure Against Man-In-The-Middle Attacks

open access: yesProcedia Computer Science, 2014
AbstractCurrent mobile authentication solutions put a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle attacks without relying on a human in the loop.
Kemal Bicakci, Devrim Unal
exaly   +3 more sources

TRAFFIC AUTHENTICITY ANALYSIS BASED ON DIGITAL FINGERPRINT DATA OF NETWORK PROTOCOL IMPLEMENTATIONS [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2020
Subject of Research. The problem of traffic authenticity determination based on digital fingerprint data of network protocol implementations is considered.
Sergei M. Ishkuvatov, Igor I. Komarov
doaj   +1 more source

IoTBChain: Adopting Blockchain Technology to Increase PLC Resilience in an IoT Environment

open access: yesInformation, 2023
The networks on a centralized cloud architecture that interconnect Internet of Things (IoT) gadgets are not limited by national or jurisdictional borders. To ensure the secure sharing of sensitive user data among IoT gadgets, it is imperative to maintain
Philipp Schmid   +2 more
doaj   +1 more source

NoPASARAN: a Novel Platform for Analysing Semi-Active elements in Routes Across a Network

open access: yesApplied Cybersecurity & Internet Governance, 2022
In this paper, we propose a novel, collaborative distributed platform to discover the presence, or analyse the configuration, of what we call semi-active elements.
Ilies Benhabbour, Marc Dacier
doaj   +1 more source

Preventing man-in-the-middle attacks in DNS through certificate less signature

open access: yes网络与信息安全学报, 2021
Aiming at resisting the man-in-the-middle attacks in the domain name system protocol, a lightweight solution was proposed. The scheme introduced certificate less signature algorithm, removed the difficult-to-deploy trust chain to improve the efficiency ...
HU Yang, HAN Zengjie, YE Guohua   +1 more
doaj   +3 more sources

Security Analysis of the Distance Bounding Protocol Proposed by Jannati and Falahati [PDF]

open access: yesJournal of Electrical and Computer Engineering Innovations, 2014
In this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by Jannati and Falahati (so-called JF). We prove that an adversary can recover key bits of JF protocol with probability of “1” while the complexity ...
F. Baghernejad, N. Bagheri, M. Safkhani
doaj   +1 more source

D-ARP: An Efficient Scheme to Detect and Prevent ARP Spoofing

open access: yesIEEE Access, 2022
Nowadays, cyber-attack is a severe criminal violation, and it is one of the most active fields of research. A Man-in-the-middle attack (MITM) is a type of cyber-attack in which an unauthorized third party secretly accesses the communication between two ...
Sabah M. Morsy, Dalia Nashat
doaj   +1 more source

Security test of 101 protocol of FTU

open access: yes网络与信息安全学报, 2018
The IEC60870-5-101 protocol is mainly used for transmitting messages between the primary station and the substation of the power SCADA data monitoring and acquisition system.Since the message mainly adopts “frame check and sum” to ensure communication ...
Yong WANG,Xiang WANG,Yufan CAI   +2 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy