Results 71 to 80 of about 409,625 (195)
Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things
Securing the Internet of Things (IoT) is a necessary milestone toward expediting the deployment of its applications and services. In particular, the functionality of the IoT devices is extremely dependent on the reliability of their message transmission.
Ferdowsi, Aidin, Saad, Walid
core +1 more source
Position Spoofing Attacks on Unmanned Surface Vehicles
Unmanned surface vehicles (USVs) are equipped with numerous sensors, and data is transmitted through networks. Attackers may remotely compromise unmanned surface vehicle (USV) systems and commit criminal acts via networks, causing USVs to deviate from ...
Jia Wang +3 more
doaj +1 more source
Man-In-The-Middle Attacks Targeting Quantum Cryptography
The development of the Willow quantum chip by Google has sparked significant interest in quantum computing, ushering in a new wave of advancements in the field. As quantum computing technology continues to mature, secure quantum communication has garnered increasing attention.
openaire +2 more sources
A Security Enhancement to The Secure Mutual Authentication Protocol for Fog/Edge
A secured mutual authentication protocol (SMAP Fog/Edge) has been developed for fog computing. The protocol provides secure mutual authentication which lightweight and efficient for fog computing environments.
Yeni Farida +5 more
doaj +1 more source
The Smart Grid (SG) is an upgraded electrical system integrated with Information and Communication Technology (ICT) to provide two-way data exchange between power consumers and manufacturers.
Umair Habib +4 more
doaj +1 more source
Attack Detection in Sensor Network Target Localization Systems with Quantized Data
We consider a sensor network focused on target localization, where sensors measure the signal strength emitted from the target. Each measurement is quantized to one bit and sent to the fusion center.
Blum, Rick S. +3 more
core +1 more source
The Internet of Things (IoT) can includes many resource-constrained devices, with most usually needing to securely communicate with their network managers, which are more resource-rich devices in the IoT network.
Sarmadullah Khan +4 more
doaj +1 more source
Spoiled Onions: Exposing Malicious Tor Exit Relays
Several hundred Tor exit relays together push more than 1 GiB/s of network traffic. However, it is easy for exit relays to snoop and tamper with anonymised network traffic and as all relays are run by independent volunteers, not all of them are innocuous.
Lindskog, Stefan, Winter, Philipp
core
Federated learning (FL) is a machine learning technique where clients exchange only local model updates with a central server that combines them to create a global model after local training.
Eman Shalabi +3 more
doaj +1 more source
Deniable Authentication Protocol Resisting Man-In-The-Middle Attack
Deniable authentication is a new protocol which not only enables a receiver to identify the source of a received message but also prevents a third party from identifying the source of the message. The proposed protocol in this paper makes use of bilinear pairings over elliptic curves, as well as the Diffie-Hellman key exchange protocol.
Han, Song, Wanquan Liu, Chang, Elizabeth
openaire +1 more source

