Results 101 to 110 of about 8,344 (213)

Wireless Networks Security Flaws and Hacking Avenues of Attacks

open access: yesNTU Journal of Engineering and Technology
An access point offers wireless networking to several wireless client nodes in the shared medium when using IEEE 802.11 wireless local area networks in infrastructure mode. The related nodes could be at risk of security attacks.
Asmaa Akram Ghanim   +1 more
doaj   +1 more source

Cryptanalysis of Full-Round BipBip

open access: yesIACR Transactions on Symmetric Cryptology
BipBip is a low-latency tweakable block cipher proposed by Belkheyar et al. in 2023. It was designed for pointer encryption inside a new memory safety mechanism called Cryptographic Capability Computing (C3). BipBip encrypts blocks of 24 bits using a 40-
Jinliang Wang   +5 more
doaj   +1 more source

Integrated security systems for protecting payment synchronization from MITM attacks

open access: yesPROBLEMS IN PROGRAMMING
The article addresses the challenge of securing payment synchronization against Man-in-the-Middle (MITM) attacks in multichannel payment systems, where cash, card, and online transactions are integrated with CRM and accounting platforms. It examines MITM attack scenarios and their impact on transaction integrity.
I.O. Shahmatov, I.V. Zamrii
openaire   +3 more sources

Scalable cyber‐physical testbed for cybersecurity evaluation of synchrophasors in power systems

open access: yesIET Cyber-Physical Systems
This paper presents a synchrophasor‐based real‐time cyber‐physical power system testbed with a novel security evaluation tool, pySynphasor, that can emulate different real attack scenarios on the phasor measurement unit (PMU). The testbed focuses on real‐
Shuvangkar Chandra Das   +2 more
doaj   +1 more source

A Comprehensive Approach for Detecting and Handling MitM-ARP Spoofing Attacks

open access: yesIEEE Access
Nowadays, most public facilities provide free internet access to support daily activities. These public internet facilities are open to anyone, making them prone to attacks.
Standy Oei   +2 more
doaj   +1 more source

Enhancing MQTT security for internet of things: Lightweight two-way authorization and authentication with advanced security measures

open access: yesMeasurement: Sensors
The MQTT (Message Queuing Telemetry Transport) protocol used the pub-sub model for IoT communication. Bolstering security with two-way authentication becomes a critical necessity.
Pallavi S. Bangare, Kishor P. Patil
doaj   +1 more source

Securing Bidirectional Wireless Control of DC Motors Against MQTT-Based Cyber Attacks Using Chaos-Based Encryption

open access: yesIEEE Access
This paper presents a comprehensive study on the security of wireless control systems by modeling a practical cyber-attack scenario that combines eavesdropping and man-in-the-middle (MITM) techniques over the MQTT protocol.
Ngoc Ha An   +2 more
doaj   +1 more source

A dataset collected in real-world industrial control systems for network attack detection. [PDF]

open access: yesSci Data
Zhou X   +9 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy