Mobile Authentication Secure against Man-in-the-Middle Attacks
AbstractCurrent mobile authentication solutions put a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle attacks without relying on a human in the loop.
Bicakci, Kemal +3 more
openaire +4 more sources
Everyone has accepted that the most vital resource of our age is information. As information is felt more and more as a power factor, great changes are taking place in our ways of thinking and perceiving, our research methods and our lifestyles. In this context, the importance of cyber threats has emerged especially in recent years and the ways to ...
openaire +2 more sources
Detecting Man-in-the-Middle Attacks by Precise Timing [PDF]
Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless ...
Aziz, Benjamin, Hamilton, G.
openaire +2 more sources
Man-in-the-Middle Attack Detection and Localization Based on Cross-Layer Location Consistency
As a promising communication paradigm in the 5G era, IEEE 802.11ad 60GHz mmWave communication has many desirable properties, including high bandwidth, narrow beam, high transmission quality, and low mutual-interference.
Yaoqi Yang +5 more
doaj +1 more source
Impact of Cyber-Attacks on Economy of Smart Grid and their Prevention
The technical improvements in modern power systems by the use of smart sensors, smart meters, multi-direction communication networks, and computers have given birth to the cyber-physical smart grid networks. Any attack on the grid is a threat to the grid'
Soumya Mudgal +6 more
doaj +1 more source
Analysis of Message Attacks in Aviation Data-Link Communication
In aviation communication system, VHF data-link message is used to transmit flight status, airport control instructions as well as the other sensitive information.
Ru Zhang +3 more
doaj +1 more source
Efficient and flexible password authenticated key agreement for Voice over Internet Protocol session initiation protocol using smart card [PDF]
Providing a suitable key agreement protocol for session initiation protocol is crucial to protecting the communication among the users over the open channel.
Cai, Zhihua, Tang, Shanyu, Zhang, Liping
core +1 more source
Analysis and Correction of the Attack against the LPN-Problem Based Authentication Protocols
This paper reconsiders a powerful man-in-the-middle attack against Random-HB# and HB# authentication protocols, two prominent representatives of the HB family of protocols, which are built based on the Learning Parity in Noise (LPN) problem.
Siniša Tomović +2 more
doaj +1 more source
Learning-Based Secret Key Generation in Relay Channels Under Adversarial Attacks
Wireless secret key generation (WSKG) facilitates efficient key agreement protocols for securing the sixth generation (6G) wireless networks thanks to its inherently lightweight functionality.
Mehdi Letafati +3 more
doaj +1 more source
Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications [PDF]
A suitable key agreement protocol plays an essential role in protecting the communications over open channels among users using Voice over Internet Protocol (VoIP).
Cai, Zhihua, Tang, Shanyu, Zhang, Liping
core +1 more source

