MARINE: Man-in-the-middle attack resistant trust model IN connEcted vehicles [PDF]
Vehicular Ad-hoc NETwork (VANET), a novel technology holds a paramount importance within the transportation domain due to its abilities to increase traffic efficiency and safety.
Adnane, Asma +4 more
core +5 more sources
Man-in-the-middle-attack: Understanding in simple words [PDF]
These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the ...
Avijit Mallik +3 more
doaj +4 more sources
TRAFFIC AUTHENTICITY ANALYSIS BASED ON DIGITAL FINGERPRINT DATA OF NETWORK PROTOCOL IMPLEMENTATIONS [PDF]
Subject of Research. The problem of traffic authenticity determination based on digital fingerprint data of network protocol implementations is considered.
Sergei M. Ishkuvatov, Igor I. Komarov
doaj +1 more source
Analysis and Verification of IPSec VPN Security Vulnerability [PDF]
Network boundary is the necessary channel for providing access services. As a key technique widely used in network boundary protection, IPSec VPN has a significant influence on the overall security of network.
ZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai
doaj +1 more source
IoTBChain: Adopting Blockchain Technology to Increase PLC Resilience in an IoT Environment
The networks on a centralized cloud architecture that interconnect Internet of Things (IoT) gadgets are not limited by national or jurisdictional borders. To ensure the secure sharing of sensitive user data among IoT gadgets, it is imperative to maintain
Philipp Schmid +2 more
doaj +1 more source
A Cyber-Security Methodology for a Cyber-Physical Industrial Control System Testbed
Due to recent increase in deployment of Cyber-Physical Industrial Control Systems in different critical infrastructures, addressing cyber-security challenges of these systems is vital for assuring their reliability and secure operation in presence of ...
Mohammad Noorizadeh +4 more
doaj +1 more source
Security test of 101 protocol of FTU
The IEC60870-5-101 protocol is mainly used for transmitting messages between the primary station and the substation of the power SCADA data monitoring and acquisition system.Since the message mainly adopts “frame check and sum” to ensure communication ...
Yong WANG,Xiang WANG,Yufan CAI +2 more
doaj +3 more sources
Malicious Data Frame Injection Attack Without Seizing Association in IEEE 802.11 Wireless LANs
In the infrastructure mode of IEEE 802.11 wireless local area networks (LANs), an access point (AP) provides wireless networking to multiple wireless client nodes in the shared medium.
Woocheol Kim, Soyeon Kim, Hyuk Lim
doaj +1 more source
Hardware Man-in-the-Middle Attacks on Smartphones [PDF]
With the democratization of smartphones, law enforcement agencies are increasingly faced with the necessity of extracting data from criminal devices. Several vulnerabilities can be exploited to extract these data, but they are usually quickly fixed by a software update as soon as they are discovered by the manufacturers.
Khelif, Mohamed Amine +2 more
openaire +1 more source
Ensuring the security of web applications operating on the basis of the SSL/TLS protocol [PDF]
SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications are designed to provide authentication based on a public key certificate, as well as generating a secure session key and traffic privacy based on a symmetric key.
Razumov Pavel +5 more
doaj +1 more source

