Results 51 to 60 of about 308,714 (183)
First, we show a new inexpensive defense against intruders and the man-in-the-middle attack in the Kirchhoff's-loop-Johnson-like-noise (KLJN) cipher. Then instead of point-to-point communication, we propose a high efficiency, secure network.
Kish, Laszlo B., Mingesz, Robert
core +1 more source
Tool for the Analysis of Network Wireless Security [PDF]
Tato práce se zabývá bezpečností bezdrátových sítí a počítačovými útoky. Obsahuje popis různých zabezpečení sítí, nejznámějších útoků a nástrojů, kterými jsou útoky proveditelné.
Šenovský, Jakub
core
Real-Time Detection and Identification of ARP Spoofing Attacks in Microgrids
The integration of smart devices and advanced communication infrastructure has turned power systems into cyber-physical systems (CPS), introducing cyber vulnerabilities. One such vulnerability arises from the use of the address resolution protocol (ARP),
Kalinath Katuri +2 more
doaj +1 more source
IoT and Man‐in‐the‐Middle Attacks
ABSTRACTThis article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni +2 more
openaire +2 more sources
Attacks on quantum key distribution protocols that employ non-ITS authentication
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin +25 more
core +1 more source
The Protection of electric drive systems is significant in modern industrial applications to ensure reliable operations. These systems consist of multiple interconnected control units that communicate wirelessly, making them vulnerable to cyber threats ...
J. Dheeba +3 more
doaj +1 more source
TARN: A SDN-based Traffic Analysis Resistant Network Architecture
Destination IP prefix-based routing protocols are core to Internet routing today. Internet autonomous systems (AS) possess fixed IP prefixes, while packets carry the intended destination AS's prefix in their headers, in clear text.
Barrineau, Geddings +5 more
core +1 more source
Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking
The current era extensively utilizes the Internet, which uses data. Due to the apparent open-access Internet service, this data is highly vulnerable to attacks. Data privacy is affected by Web-based attacks.
Muteeb Bin Muzammil +4 more
doaj +1 more source
In the literature, many three-party authenticated key exchange (3PAKE) protocols are put forwarded to established a secure session key between two users with the help of trusted server. The computed session key will ensure secure message exchange between
S.K. Hafizul Islam +5 more
doaj +1 more source
A Security Enhancement to The Secure Mutual Authentication Protocol for Fog/Edge
A secured mutual authentication protocol (SMAP Fog/Edge) has been developed for fog computing. The protocol provides secure mutual authentication which lightweight and efficient for fog computing environments.
Yeni Farida +5 more
doaj +1 more source

