Results 1 to 10 of about 640,321 (187)

MARINE: Man-in-the-middle attack resistant trust model IN connEcted vehicles [PDF]

open access: yesIEEE Internet of Things Journal, 2020
Vehicular Ad-hoc NETwork (VANET), a novel technology holds a paramount importance within the transportation domain due to its abilities to increase traffic efficiency and safety.
Adnane, Asma   +4 more
core   +5 more sources

Man-in-the-middle-attack: Understanding in simple words [PDF]

open access: yesInternational Journal of Data and Network Science, 2019
These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the ...
Avijit Mallik   +3 more
doaj   +4 more sources

TRAFFIC AUTHENTICITY ANALYSIS BASED ON DIGITAL FINGERPRINT DATA OF NETWORK PROTOCOL IMPLEMENTATIONS [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2020
Subject of Research. The problem of traffic authenticity determination based on digital fingerprint data of network protocol implementations is considered.
Sergei M. Ishkuvatov, Igor I. Komarov
doaj   +1 more source

Analysis and Verification of IPSec VPN Security Vulnerability [PDF]

open access: yesJisuanji gongcheng, 2021
Network boundary is the necessary channel for providing access services. As a key technique widely used in network boundary protection, IPSec VPN has a significant influence on the overall security of network.
ZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai
doaj   +1 more source

IoTBChain: Adopting Blockchain Technology to Increase PLC Resilience in an IoT Environment

open access: yesInformation, 2023
The networks on a centralized cloud architecture that interconnect Internet of Things (IoT) gadgets are not limited by national or jurisdictional borders. To ensure the secure sharing of sensitive user data among IoT gadgets, it is imperative to maintain
Philipp Schmid   +2 more
doaj   +1 more source

A Cyber-Security Methodology for a Cyber-Physical Industrial Control System Testbed

open access: yesIEEE Access, 2021
Due to recent increase in deployment of Cyber-Physical Industrial Control Systems in different critical infrastructures, addressing cyber-security challenges of these systems is vital for assuring their reliability and secure operation in presence of ...
Mohammad Noorizadeh   +4 more
doaj   +1 more source

Security test of 101 protocol of FTU

open access: yes网络与信息安全学报, 2018
The IEC60870-5-101 protocol is mainly used for transmitting messages between the primary station and the substation of the power SCADA data monitoring and acquisition system.Since the message mainly adopts “frame check and sum” to ensure communication ...
Yong WANG,Xiang WANG,Yufan CAI   +2 more
doaj   +3 more sources

Malicious Data Frame Injection Attack Without Seizing Association in IEEE 802.11 Wireless LANs

open access: yesIEEE Access, 2021
In the infrastructure mode of IEEE 802.11 wireless local area networks (LANs), an access point (AP) provides wireless networking to multiple wireless client nodes in the shared medium.
Woocheol Kim, Soyeon Kim, Hyuk Lim
doaj   +1 more source

Hardware Man-in-the-Middle Attacks on Smartphones [PDF]

open access: yesForensic Science Today, 2020
With the democratization of smartphones, law enforcement agencies are increasingly faced with the necessity of extracting data from criminal devices. Several vulnerabilities can be exploited to extract these data, but they are usually quickly fixed by a software update as soon as they are discovered by the manufacturers.
Khelif, Mohamed Amine   +2 more
openaire   +1 more source

Ensuring the security of web applications operating on the basis of the SSL/TLS protocol [PDF]

open access: yesE3S Web of Conferences, 2023
SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications are designed to provide authentication based on a public key certificate, as well as generating a secure session key and traffic privacy based on a symmetric key.
Razumov Pavel   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy